SlideShare une entreprise Scribd logo
1  sur  53
Télécharger pour lire hors ligne
THE BUZZ EXPLAINED:
  CLOUD COMPUTING AND
SOCIAL MEDIA IN DENTISTRY
         LYNN JOHNSON, PHD



           University of
              Michigan
TOPICS


• Using Social Media to Market your Practice
• Website Tips or How to get your Website Noticed
• Technology behind the Internet and Social Computing,
  a.k.a., the Cloud
USING SOCIAL MEDIA TO
                                                   MARKET YOUR PRACTICE




Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
WHAT IS SOCIAL MEDIA?
WHY HAVE AN ON-LINE
      PRESENCE?

• ~75% of practices have websites
• Easy-to-update
• Promotes YOU and your services
• Always there
• Ratings are powerful
5 Recommendations for a
  Social Media Strategy


  AFTER your Website
#5 -

• Tweet = Microblog; <140 characters
• People decide to “follow” you & receive
  your “tweets”
CONTENT OF TWEETS
                          9%               4% 4%
                                                                6%

                                                                                                                          News
                                                                                                                          Spam
                                                                                                                          Self-promotion
                                                                                                                          Pointless babble
                                                                                                                          Conversational
37%                                                                                                                       Pass-along value


                                                                         40%



 Kelly, Ryan, ed (August 12, 2009). "Twitter Study – August 2009". Twitter Study Reveals Interesting Results About Usage. San Antonio, Texas: Pear Analytics.
 Retrieved Jun 3, 2010
#4 -

Put all videos here & link from Facebook,
website, etc.
#3 - BLOG
• Most common patient questions
• Information about staff
• New products, services, etc.
• Link from YOUR website
• 30-60 minutes/week; 200-400 words; folksy
• March 18--Children’s Clinic Book Drive
• March 16--Life after the NERB
• March 11--How to Prepare for your Dental
    School Interview
•   March 9--Studying is Easier when the
    Weather is Miserable
•   March 4--Conferences-Not just for MBAs
•   February 23--Spring Break!
#2 - FACEBOOK
• Friend vs. Fan; Don’t mix them
#2 - FACEBOOK
• Friend vs. Fan; Don’t mix them
ORIGINAL FAN PAGE
UNDERDEVELOPMENT
    FAN PAGE
#2 - FACEBOOK
• Friend vs. Fan; Don’t mix them
• 50% of people have account
• Unlike website all information is delivered
    to your fans/friends
•   Easier to update than website
•   Need Friend account; then Fan account
•   Can be a time sink
•   Custom page requires consultant
#1 -   PLACES
#1 -   PLACES
#1 -                      PLACES

• On-line Yellow Pages
• Automatically created by Google
• You cannot opt in or out
• Suggest patients post reviews
• “Claim” your business to edit
• Cannot edit reviews
#1 -   PLACES
#1 -   PLACES
SOCIAL MEDIA TIPS
• Website is the hub; do this first!
• Part of someone’s job
• Schedule work
• Hire experienced design help
• Link between sites
• Contest to “like” your practice
• Encourage reviews in other places; do
  slowly
WEBSITE TIPS OR HOW TO GET
                                              YOUR WEBSITE NOTICED




Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
IMPORTANCE OF
           SEARCH


• People start with Google
• YouTube is 2nd largest search engine
• Google Places is 3rd largest search
  engine
SEARCH ENGINE
     OPTIMIZATION (SEO)
• On the 1st page (40% of clicks)
• Engines constantly change; content
    must change
•   Establish back links through blogs,
    Facebook, etc.
•   Longevity helps rankings
•   Use keywords in title
•   New content is liked by Google
SUCCESSFUL SITES

• Market 1st; inform 2nd
• THREE clicks they’re out
• Have 10 seconds to attract attention;
    NO Hoop Jumping!
•   Ask if patients have visited your site
•   Photos with names
SUCCESSFUL SITES


• Download forms
• Patient incentive programs
• Use video
• Testimonials (L. Johnson, Ann Arbor)
PLACES
ADWORDS




• Most important listing service
• Google Ads is $25/month
• Tracking report (# visitors; # read site)
• Ask how new patients found you
FUTURE; FUTURE
FUTURE; TODAY




• QR Code (Quick Response Code)
• Drive to website
THANK YOU!


LYNN.A.JOHNSON@UMICH.EDU
TECHNOLOGY BEHIND THE
                                             INTERNET AND SOCIAL
                                          COMPUTING, A.K.A., THE CLOUD




Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
MAINFRAME




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
MAINFRAME




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
PERSONAL COMPUTER




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
PERSONAL COMPUTER




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
LOCAL AREA NETWORKS




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
LOCAL AREA NETWORKS




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
MOBILE




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
MOBILE




 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
EVOLUTION OF COMPUTING




                                         • Mainframe
                                         • Personal Computer
                                         • Local Area Networks
                                         • Mobile

 1.     Mainframe: dumb terminals attached via wires; DOS-like screen capture
 2.     Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture
 3.     Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture
 4.     Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data;
        iPhone & Android screen capture


Point out where the data is stored and where the software is operating in each
WHAT IS CLOUD COMPUTING?
IT IS NOT THE CLOUD IF...


You takesyourupdatessoftware
 ...Youonly yourdata when your
 You lose get aboutyour desktop
  You have to beIT folk every 4
     it purchase yearly 2 more
         worry     at viruses.
laptop& ... your it.
 to access
 years to installcontacts.
  maintenance information.
          dies.
THANK YOU!


LYNN.A.JOHNSON@UMICH.EDU
Social computing

Contenu connexe

Tendances

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Protect your family
Protect your familyProtect your family
Protect your familyneodad1
 
Internet Trends (C*), Search & Social
Internet Trends (C*), Search & SocialInternet Trends (C*), Search & Social
Internet Trends (C*), Search & SocialBuhwan Jeong
 
bemoko's 5 easy steps to mobilising your brand
bemoko's 5 easy steps to mobilising your brandbemoko's 5 easy steps to mobilising your brand
bemoko's 5 easy steps to mobilising your brandbemoko Ltd.
 
What’s Next For E-mail, Mobile and Social Media (2011)
What’s Next For E-mail, Mobile and Social Media (2011)What’s Next For E-mail, Mobile and Social Media (2011)
What’s Next For E-mail, Mobile and Social Media (2011)Bryan Huber
 
Marketing in the Mobile Age
Marketing in the Mobile AgeMarketing in the Mobile Age
Marketing in the Mobile AgePropeld
 
Simple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your BusinessSimple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your BusinessColin Daniels
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 
Advice for parents: BYOD
Advice for parents: BYOD  Advice for parents: BYOD
Advice for parents: BYOD Linda Rubens
 
Sm On The Go Successful Thinkers
Sm On The Go   Successful ThinkersSm On The Go   Successful Thinkers
Sm On The Go Successful Thinkerstonygates44
 
Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...
Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...
Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...Distimo
 

Tendances (14)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
20110325 facebookgoogle
20110325 facebookgoogle20110325 facebookgoogle
20110325 facebookgoogle
 
Protect your family
Protect your familyProtect your family
Protect your family
 
Internet Trends (C*), Search & Social
Internet Trends (C*), Search & SocialInternet Trends (C*), Search & Social
Internet Trends (C*), Search & Social
 
bemoko's 5 easy steps to mobilising your brand
bemoko's 5 easy steps to mobilising your brandbemoko's 5 easy steps to mobilising your brand
bemoko's 5 easy steps to mobilising your brand
 
What’s Next For E-mail, Mobile and Social Media (2011)
What’s Next For E-mail, Mobile and Social Media (2011)What’s Next For E-mail, Mobile and Social Media (2011)
What’s Next For E-mail, Mobile and Social Media (2011)
 
Marketing in the Mobile Age
Marketing in the Mobile AgeMarketing in the Mobile Age
Marketing in the Mobile Age
 
Simple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your BusinessSimple Technology: Quantum Leaps For Your Business
Simple Technology: Quantum Leaps For Your Business
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
PLE
PLEPLE
PLE
 
Advice for parents: BYOD
Advice for parents: BYOD  Advice for parents: BYOD
Advice for parents: BYOD
 
Sm On The Go Successful Thinkers
Sm On The Go   Successful ThinkersSm On The Go   Successful Thinkers
Sm On The Go Successful Thinkers
 
Invenio Conquer-Password-Mgmt
Invenio Conquer-Password-MgmtInvenio Conquer-Password-Mgmt
Invenio Conquer-Password-Mgmt
 
Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...
Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...
Distimo Mobile World Congress 2010 Presentation - Mobile Application Stores S...
 

En vedette

Transforming Old Skool into Inbound Marketing
Transforming Old Skool into Inbound MarketingTransforming Old Skool into Inbound Marketing
Transforming Old Skool into Inbound MarketingRolf
 
New Standards For Long Term Business Survival
New Standards For Long Term Business SurvivalNew Standards For Long Term Business Survival
New Standards For Long Term Business Survivalmorrinnoel
 
Ristorante il velaccio a marina di grosseto maremma toscana
Ristorante il velaccio a marina di grosseto maremma toscanaRistorante il velaccio a marina di grosseto maremma toscana
Ristorante il velaccio a marina di grosseto maremma toscanaVelaccio
 

En vedette (6)

Transforming Old Skool into Inbound Marketing
Transforming Old Skool into Inbound MarketingTransforming Old Skool into Inbound Marketing
Transforming Old Skool into Inbound Marketing
 
Central
CentralCentral
Central
 
Excursion eng
Excursion engExcursion eng
Excursion eng
 
New Standards For Long Term Business Survival
New Standards For Long Term Business SurvivalNew Standards For Long Term Business Survival
New Standards For Long Term Business Survival
 
Ristorante il velaccio a marina di grosseto maremma toscana
Ristorante il velaccio a marina di grosseto maremma toscanaRistorante il velaccio a marina di grosseto maremma toscana
Ristorante il velaccio a marina di grosseto maremma toscana
 
Perkataan kvk
Perkataan kvkPerkataan kvk
Perkataan kvk
 

Similaire à Social computing

Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptxLesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptxArnoldoCimafranca2
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Mobile app ysmc
Mobile app ysmcMobile app ysmc
Mobile app ysmcLynn Kronk
 
Social Media- Chapter Presentation
Social Media- Chapter PresentationSocial Media- Chapter Presentation
Social Media- Chapter Presentationambrosam
 
Migo my labs
Migo my labsMigo my labs
Migo my labsrairuta
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Dnx Mobile Marketing Golden Rules
Dnx Mobile Marketing Golden RulesDnx Mobile Marketing Golden Rules
Dnx Mobile Marketing Golden RulesAdam Troman
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web WorkshopChris Messina
 
web30-12916431859176-phpapp01.pdf
web30-12916431859176-phpapp01.pdfweb30-12916431859176-phpapp01.pdf
web30-12916431859176-phpapp01.pdfandre241421
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessMark Stokes
 
Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)
Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)
Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)Hubbard One
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 
Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...
Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...
Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...Tiffany Odutoye
 

Similaire à Social computing (20)

Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptxLesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Mobile app ysmc
Mobile app ysmcMobile app ysmc
Mobile app ysmc
 
Social Media- Chapter Presentation
Social Media- Chapter PresentationSocial Media- Chapter Presentation
Social Media- Chapter Presentation
 
Migo my labs
Migo my labsMigo my labs
Migo my labs
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Dnx Mobile Marketing Golden Rules
Dnx Mobile Marketing Golden RulesDnx Mobile Marketing Golden Rules
Dnx Mobile Marketing Golden Rules
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web Workshop
 
web30-12916431859176-phpapp01.pdf
web30-12916431859176-phpapp01.pdfweb30-12916431859176-phpapp01.pdf
web30-12916431859176-phpapp01.pdf
 
Digital Trends March 2012
Digital Trends March 2012Digital Trends March 2012
Digital Trends March 2012
 
SUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of businessSUG - Singapore - Use of Social communication in the next generation of business
SUG - Singapore - Use of Social communication in the next generation of business
 
Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)
Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)
Mobile Mania: What You Need to Know to Kick-Start Your Strategy (UK)
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...
Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...
Virtual Partner, Tiffany Odutoye Discusses Mobile Technology in the Meeting a...
 

Dernier

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Social computing

  • 1. THE BUZZ EXPLAINED: CLOUD COMPUTING AND SOCIAL MEDIA IN DENTISTRY LYNN JOHNSON, PHD University of Michigan
  • 2. TOPICS • Using Social Media to Market your Practice • Website Tips or How to get your Website Noticed • Technology behind the Internet and Social Computing, a.k.a., the Cloud
  • 3. USING SOCIAL MEDIA TO MARKET YOUR PRACTICE Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
  • 4.
  • 5. WHAT IS SOCIAL MEDIA?
  • 6.
  • 7. WHY HAVE AN ON-LINE PRESENCE? • ~75% of practices have websites • Easy-to-update • Promotes YOU and your services • Always there • Ratings are powerful
  • 8. 5 Recommendations for a Social Media Strategy AFTER your Website
  • 9. #5 - • Tweet = Microblog; <140 characters • People decide to “follow” you & receive your “tweets”
  • 10. CONTENT OF TWEETS 9% 4% 4% 6% News Spam Self-promotion Pointless babble Conversational 37% Pass-along value 40% Kelly, Ryan, ed (August 12, 2009). "Twitter Study – August 2009". Twitter Study Reveals Interesting Results About Usage. San Antonio, Texas: Pear Analytics. Retrieved Jun 3, 2010
  • 11. #4 - Put all videos here & link from Facebook, website, etc.
  • 12.
  • 13.
  • 14.
  • 15. #3 - BLOG • Most common patient questions • Information about staff • New products, services, etc. • Link from YOUR website • 30-60 minutes/week; 200-400 words; folksy
  • 16.
  • 17.
  • 18. • March 18--Children’s Clinic Book Drive • March 16--Life after the NERB • March 11--How to Prepare for your Dental School Interview • March 9--Studying is Easier when the Weather is Miserable • March 4--Conferences-Not just for MBAs • February 23--Spring Break!
  • 19. #2 - FACEBOOK • Friend vs. Fan; Don’t mix them
  • 20. #2 - FACEBOOK • Friend vs. Fan; Don’t mix them
  • 22. UNDERDEVELOPMENT FAN PAGE
  • 23. #2 - FACEBOOK • Friend vs. Fan; Don’t mix them • 50% of people have account • Unlike website all information is delivered to your fans/friends • Easier to update than website • Need Friend account; then Fan account • Can be a time sink • Custom page requires consultant
  • 24. #1 - PLACES
  • 25. #1 - PLACES
  • 26. #1 - PLACES • On-line Yellow Pages • Automatically created by Google • You cannot opt in or out • Suggest patients post reviews • “Claim” your business to edit • Cannot edit reviews
  • 27. #1 - PLACES
  • 28. #1 - PLACES
  • 29. SOCIAL MEDIA TIPS • Website is the hub; do this first! • Part of someone’s job • Schedule work • Hire experienced design help • Link between sites • Contest to “like” your practice • Encourage reviews in other places; do slowly
  • 30. WEBSITE TIPS OR HOW TO GET YOUR WEBSITE NOTICED Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
  • 31. IMPORTANCE OF SEARCH • People start with Google • YouTube is 2nd largest search engine • Google Places is 3rd largest search engine
  • 32. SEARCH ENGINE OPTIMIZATION (SEO) • On the 1st page (40% of clicks) • Engines constantly change; content must change • Establish back links through blogs, Facebook, etc. • Longevity helps rankings • Use keywords in title • New content is liked by Google
  • 33. SUCCESSFUL SITES • Market 1st; inform 2nd • THREE clicks they’re out • Have 10 seconds to attract attention; NO Hoop Jumping! • Ask if patients have visited your site • Photos with names
  • 34. SUCCESSFUL SITES • Download forms • Patient incentive programs • Use video • Testimonials (L. Johnson, Ann Arbor)
  • 36. ADWORDS • Most important listing service • Google Ads is $25/month • Tracking report (# visitors; # read site) • Ask how new patients found you
  • 38. FUTURE; TODAY • QR Code (Quick Response Code) • Drive to website
  • 40. TECHNOLOGY BEHIND THE INTERNET AND SOCIAL COMPUTING, A.K.A., THE CLOUD Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
  • 41. MAINFRAME 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 42. MAINFRAME 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 43. PERSONAL COMPUTER 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 44. PERSONAL COMPUTER 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 45. LOCAL AREA NETWORKS 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 46. LOCAL AREA NETWORKS 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 47. MOBILE 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 48. MOBILE 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 49. EVOLUTION OF COMPUTING • Mainframe • Personal Computer • Local Area Networks • Mobile 1. Mainframe: dumb terminals attached via wires; DOS-like screen capture 2. Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture 3. Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture 4. Mobile; laptops, smart phone & tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone & Android screen capture Point out where the data is stored and where the software is operating in each
  • 50. WHAT IS CLOUD COMPUTING?
  • 51. IT IS NOT THE CLOUD IF... You takesyourupdatessoftware ...Youonly yourdata when your You lose get aboutyour desktop You have to beIT folk every 4 it purchase yearly 2 more worry at viruses. laptop& ... your it. to access years to installcontacts. maintenance information. dies.

Notes de l'éditeur

  1. Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
  2. Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
  3. Data is not stored close to you. Can you trust that it is safe on other servers? Can it get hacked? What about HIPAA?
  4. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  5. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  6. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  7. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  8. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  9. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  10. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  11. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each
  12. Mainframe: dumb terminals attached via wires; DOS-like screen capture Personal Computer: no network; communicate via “sneaker net;” Windows 3.1 screen capture Local Area Networks: PC’s in #2 connected via wires; Mosaic screen capture Mobile; laptops, smart phone &amp; tablets all connected wirelessly to the cloud; multiple data centers with same data; iPhone &amp; Android screen capture Point out where the data is stored and where the software is operating in each