SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
NEWS
CURATION
cu•ra•tor
(from Latin cura, care), means manager,
overseer, one who has the care and
superintendence of something
“   The editor who sits in a big building at the New
    York Times or your local newspaper that chooses
    what content you’ll see in your newspaper is a
    curator. So is the page designer who decides
    what story is at the top of the page - Robert Scoble
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
INFO MOLECULES
A curator is an information chemist. He or she mixes atoms together
in a way to build an info-molecule. Then adds value to that molecule.
HOWNEWS
CURATE
       TO
   - The Seven Needs of Real-Time Curators, Robert Scoble
1
BUNDLE
2
REORDER
3
DISTRIBUTE
4
EDITORIALIZE
“   ANYONE CAN COLLECT LINKS, AND
    ALGORITHMS CAN AGGREGATE.
    BUT ONLY TRAINED EDITORS
    HAVE THE SKILLS TO SELECT AND
    COLLECT THE BEST INFORMATION                     “
    AND BUILD A LOYAL AUDIENCE.
                    - MARK BRIGGS, JOURNALISM NEXT
5
UPDATE
    Upd
    V
        ated
      ersi on!
6
PARTICIPATE
7
TRACK
CURATION
EXAMPLES
THE REVOLUTION
WILL BE TWEETED
     TWITTER CURATION: NPR’S ANDY CARVIN
THE REVOLUTION
WILL BE TWEETED
     TWITTER CURATION: NPR’S ANDY CARVIN
NPR’S ANDY CARVIN
TWITTER CURATION USING A WIDGET
CURATING TWITTER CONTENT WITH PAPER.LI
Storify: pulls in content from Twitter, Facebook, Flickr &
   YouTube and generates a story based on real-time
             information from these networks
IN-CLASS WORK
CURATING TWEETS
ADD A TWITTER LIST & SEARCH WIDGET TO YOUR BLOG
HOW TO CREATE A
TWITTER LIST
         •   GO TO YOUR PROFILE
         •   CLICK ON LISTS
         •   CLICK CREATE A LIST
         •   NAME IT
         •   NAVIGATE TO PROFILE OF
             USER YOU WANT TO ADD
         •   CLICK ON
         •   CHECK BOX TO ADD
WHEN DONE, GO TO TWITTER WIDGETS PAGE, SELECT THE
  LIST, FILL OUT INFO, GRAB CODE & EMBED ON BLOG
CREDITS:
    Assistant Professor of Communication
   St. Edward’s University, Austin, Texas
      Email: corinnew@stedwards.edu
Blog: http://socialmediaprclass.blogspot.com
             Twitter: @corinnew

Contenu connexe

En vedette

Industrial Automation using unmanned Aerial vehicle
Industrial Automation using unmanned Aerial vehicleIndustrial Automation using unmanned Aerial vehicle
Industrial Automation using unmanned Aerial vehicleMusthafa Nowfal
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAleksandr Timorin
 
Convert PowerPoint to Video
Convert PowerPoint to VideoConvert PowerPoint to Video
Convert PowerPoint to VideoVuthirak Vanny
 
IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11Kevin Mahoney
 
The Bioteaming Manifesto
The Bioteaming ManifestoThe Bioteaming Manifesto
The Bioteaming ManifestoRobin Good
 
Enabling Digital Transformation
Enabling Digital TransformationEnabling Digital Transformation
Enabling Digital TransformationTathagat Varma
 
Content is king: easy & simple ways to curate relevant content
Content is king: easy & simple ways to curate relevant contentContent is king: easy & simple ways to curate relevant content
Content is king: easy & simple ways to curate relevant contentScoop.it
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
35 Lessons Learned in 35 Years
35 Lessons Learned in 35 Years35 Lessons Learned in 35 Years
35 Lessons Learned in 35 YearsDavid Crandall
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Altoros
 
Cloud Businesses: Strategic Considerations
Cloud Businesses: Strategic ConsiderationsCloud Businesses: Strategic Considerations
Cloud Businesses: Strategic ConsiderationsTathagat Varma
 
Introduction to Convolutional Neural Nets
Introduction to Convolutional Neural Nets Introduction to Convolutional Neural Nets
Introduction to Convolutional Neural Nets Shamane Siriwardhana
 
Migrating Large Scale Data Sets to the Cloud
Migrating Large Scale Data Sets to the CloudMigrating Large Scale Data Sets to the Cloud
Migrating Large Scale Data Sets to the CloudAmazon Web Services
 
Optimizing Storage for Big Data Analytics Workloads
Optimizing Storage for Big Data Analytics WorkloadsOptimizing Storage for Big Data Analytics Workloads
Optimizing Storage for Big Data Analytics WorkloadsAmazon Web Services
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
Beyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the GapBeyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the GapJosh Evans
 

En vedette (18)

Industrial Automation using unmanned Aerial vehicle
Industrial Automation using unmanned Aerial vehicleIndustrial Automation using unmanned Aerial vehicle
Industrial Automation using unmanned Aerial vehicle
 
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVEAttacking SCADA systems: Story Of SCADASTRANGELOVE
Attacking SCADA systems: Story Of SCADASTRANGELOVE
 
Convert PowerPoint to Video
Convert PowerPoint to VideoConvert PowerPoint to Video
Convert PowerPoint to Video
 
IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11
 
The Bioteaming Manifesto
The Bioteaming ManifestoThe Bioteaming Manifesto
The Bioteaming Manifesto
 
Enabling Digital Transformation
Enabling Digital TransformationEnabling Digital Transformation
Enabling Digital Transformation
 
Content is king: easy & simple ways to curate relevant content
Content is king: easy & simple ways to curate relevant contentContent is king: easy & simple ways to curate relevant content
Content is king: easy & simple ways to curate relevant content
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
 
35 Lessons Learned in 35 Years
35 Lessons Learned in 35 Years35 Lessons Learned in 35 Years
35 Lessons Learned in 35 Years
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
 
Cloud Businesses: Strategic Considerations
Cloud Businesses: Strategic ConsiderationsCloud Businesses: Strategic Considerations
Cloud Businesses: Strategic Considerations
 
Introduction to Convolutional Neural Nets
Introduction to Convolutional Neural Nets Introduction to Convolutional Neural Nets
Introduction to Convolutional Neural Nets
 
Migrating Large Scale Data Sets to the Cloud
Migrating Large Scale Data Sets to the CloudMigrating Large Scale Data Sets to the Cloud
Migrating Large Scale Data Sets to the Cloud
 
Optimizing Storage for Big Data Analytics Workloads
Optimizing Storage for Big Data Analytics WorkloadsOptimizing Storage for Big Data Analytics Workloads
Optimizing Storage for Big Data Analytics Workloads
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Beyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the GapBeyond DevOps - How Netflix Bridges the Gap
Beyond DevOps - How Netflix Bridges the Gap
 

Similaire à Curating news

Creating Compelling Content for Nonprofits
Creating Compelling Content for Nonprofits Creating Compelling Content for Nonprofits
Creating Compelling Content for Nonprofits Mixtape Communications
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoPadsromel
 
Web 2.0 For Western Springs Jun25, 2009
Web 2.0 For Western Springs Jun25, 2009Web 2.0 For Western Springs Jun25, 2009
Web 2.0 For Western Springs Jun25, 2009Andrew Krzmarzick
 
Building Thought Leadership through Content Curation
Building Thought Leadership through Content CurationBuilding Thought Leadership through Content Curation
Building Thought Leadership through Content CurationCorinne Weisgerber
 
NABJ DJTF Social Reporting Webinar
NABJ DJTF Social Reporting WebinarNABJ DJTF Social Reporting Webinar
NABJ DJTF Social Reporting WebinarNiketa Patel
 
How to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityHow to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityEric Athas
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaYbonnica22
 
How to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityHow to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityEric Athas
 
Lecture 6 2012 twitter & science
Lecture 6 2012   twitter & scienceLecture 6 2012   twitter & science
Lecture 6 2012 twitter & scienceJessica Laccetti
 
Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)klstar1
 
Case studies-mining-social
Case studies-mining-socialCase studies-mining-social
Case studies-mining-socialEric Athas
 
MyCharityConnects Winnipeg - Philanthropy 2.0 - Winnipeg [2011-03-02]
MyCharityConnects Winnipeg - Philanthropy 2.0  - Winnipeg [2011-03-02]MyCharityConnects Winnipeg - Philanthropy 2.0  - Winnipeg [2011-03-02]
MyCharityConnects Winnipeg - Philanthropy 2.0 - Winnipeg [2011-03-02]CanadaHelps / MyCharityConnects
 
Curation and Crowdsourcing for Journalists
Curation and Crowdsourcing for JournalistsCuration and Crowdsourcing for Journalists
Curation and Crowdsourcing for JournalistsMandy Jenkins
 
Twitter Tips and Tricks
Twitter Tips and TricksTwitter Tips and Tricks
Twitter Tips and TricksUBC Library
 
Web 2.0 for Texas State Certified Public Manager (CPM)
Web 2.0 for Texas State Certified Public Manager (CPM)Web 2.0 for Texas State Certified Public Manager (CPM)
Web 2.0 for Texas State Certified Public Manager (CPM)Andrew Krzmarzick
 
Web 2.0 For Texas State CPM Program
Web 2.0 For Texas State CPM ProgramWeb 2.0 For Texas State CPM Program
Web 2.0 For Texas State CPM Programguest6e6651
 
Gov 2.0 for Texas Certified Public Manager (CPM ) Program
Gov 2.0 for Texas Certified Public Manager (CPM ) ProgramGov 2.0 for Texas Certified Public Manager (CPM ) Program
Gov 2.0 for Texas Certified Public Manager (CPM ) ProgramGovLoop
 
Social Media for the Catholic Press
Social Media for the Catholic PressSocial Media for the Catholic Press
Social Media for the Catholic PressCFCA
 

Similaire à Curating news (20)

Twitter For Journalists
Twitter For JournalistsTwitter For Journalists
Twitter For Journalists
 
Creating Compelling Content for Nonprofits
Creating Compelling Content for Nonprofits Creating Compelling Content for Nonprofits
Creating Compelling Content for Nonprofits
 
Empowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and CatalinoEmpowerment technology Grecille Mae Gesulga and Catalino
Empowerment technology Grecille Mae Gesulga and Catalino
 
Web 2.0 For Western Springs Jun25, 2009
Web 2.0 For Western Springs Jun25, 2009Web 2.0 For Western Springs Jun25, 2009
Web 2.0 For Western Springs Jun25, 2009
 
Building Thought Leadership through Content Curation
Building Thought Leadership through Content CurationBuilding Thought Leadership through Content Curation
Building Thought Leadership through Content Curation
 
Twitter 2019
Twitter 2019Twitter 2019
Twitter 2019
 
NABJ DJTF Social Reporting Webinar
NABJ DJTF Social Reporting WebinarNABJ DJTF Social Reporting Webinar
NABJ DJTF Social Reporting Webinar
 
How to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityHow to Identify and Track Your Social Community
How to Identify and Track Your Social Community
 
Empowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jeshaEmpowerment technology by ybonne amor and jesha
Empowerment technology by ybonne amor and jesha
 
How to Identify and Track Your Social Community
How to Identify and Track Your Social CommunityHow to Identify and Track Your Social Community
How to Identify and Track Your Social Community
 
Lecture 6 2012 twitter & science
Lecture 6 2012   twitter & scienceLecture 6 2012   twitter & science
Lecture 6 2012 twitter & science
 
Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)Principles ofnewssocialmedia overview(1)
Principles ofnewssocialmedia overview(1)
 
Case studies-mining-social
Case studies-mining-socialCase studies-mining-social
Case studies-mining-social
 
MyCharityConnects Winnipeg - Philanthropy 2.0 - Winnipeg [2011-03-02]
MyCharityConnects Winnipeg - Philanthropy 2.0  - Winnipeg [2011-03-02]MyCharityConnects Winnipeg - Philanthropy 2.0  - Winnipeg [2011-03-02]
MyCharityConnects Winnipeg - Philanthropy 2.0 - Winnipeg [2011-03-02]
 
Curation and Crowdsourcing for Journalists
Curation and Crowdsourcing for JournalistsCuration and Crowdsourcing for Journalists
Curation and Crowdsourcing for Journalists
 
Twitter Tips and Tricks
Twitter Tips and TricksTwitter Tips and Tricks
Twitter Tips and Tricks
 
Web 2.0 for Texas State Certified Public Manager (CPM)
Web 2.0 for Texas State Certified Public Manager (CPM)Web 2.0 for Texas State Certified Public Manager (CPM)
Web 2.0 for Texas State Certified Public Manager (CPM)
 
Web 2.0 For Texas State CPM Program
Web 2.0 For Texas State CPM ProgramWeb 2.0 For Texas State CPM Program
Web 2.0 For Texas State CPM Program
 
Gov 2.0 for Texas Certified Public Manager (CPM ) Program
Gov 2.0 for Texas Certified Public Manager (CPM ) ProgramGov 2.0 for Texas Certified Public Manager (CPM ) Program
Gov 2.0 for Texas Certified Public Manager (CPM ) Program
 
Social Media for the Catholic Press
Social Media for the Catholic PressSocial Media for the Catholic Press
Social Media for the Catholic Press
 

Plus de Corinne Weisgerber

Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCorinne Weisgerber
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineCorinne Weisgerber
 
Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Corinne Weisgerber
 
Teaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteTeaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteCorinne Weisgerber
 
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Corinne Weisgerber
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for AcademicsCorinne Weisgerber
 
Communicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCommunicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCorinne Weisgerber
 
Negotiating multiple identities on the social web
Negotiating multiple identities on the social webNegotiating multiple identities on the social web
Negotiating multiple identities on the social webCorinne Weisgerber
 
Re-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsRe-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsCorinne Weisgerber
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Social Media & Interreligious Understanding
Social Media & Interreligious UnderstandingSocial Media & Interreligious Understanding
Social Media & Interreligious UnderstandingCorinne Weisgerber
 
Empowering students through personal learning networks
Empowering students through personal learning networksEmpowering students through personal learning networks
Empowering students through personal learning networksCorinne Weisgerber
 
Egypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesEgypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesCorinne Weisgerber
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media DreamCorinne Weisgerber
 
Creating a Personal Learning Network
Creating a Personal Learning NetworkCreating a Personal Learning Network
Creating a Personal Learning NetworkCorinne Weisgerber
 
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...Corinne Weisgerber
 

Plus de Corinne Weisgerber (20)

Interviewing 2
Interviewing 2Interviewing 2
Interviewing 2
 
Crisis communication & the Austin Bombings
Crisis communication & the Austin BombingsCrisis communication & the Austin Bombings
Crisis communication & the Austin Bombings
 
A Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe OnlineA Parent's Guide to Keeping Kids Safe Online
A Parent's Guide to Keeping Kids Safe Online
 
Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015Disrupting the Disruption in Higher Education - SXSWedu 2015
Disrupting the Disruption in Higher Education - SXSWedu 2015
 
Teaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuiteTeaching with Storify, Diigo and HootSuite
Teaching with Storify, Diigo and HootSuite
 
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
Du professeur connecté à l'étudiant connecté: Vers une pédagogie stratégique ...
 
The Networked Academic
The Networked AcademicThe Networked Academic
The Networked Academic
 
Social Media for Churches
Social Media for ChurchesSocial Media for Churches
Social Media for Churches
 
Social Media Metrics for Academics
Social Media Metrics for AcademicsSocial Media Metrics for Academics
Social Media Metrics for Academics
 
Communicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case StudyCommunicating Hurricane Evacuation Orders: A Case Study
Communicating Hurricane Evacuation Orders: A Case Study
 
Negotiating multiple identities on the social web
Negotiating multiple identities on the social webNegotiating multiple identities on the social web
Negotiating multiple identities on the social web
 
Re-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as CuratorsRe-envisioning Modern Pedagogy: Educators as Curators
Re-envisioning Modern Pedagogy: Educators as Curators
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Media & Interreligious Understanding
Social Media & Interreligious UnderstandingSocial Media & Interreligious Understanding
Social Media & Interreligious Understanding
 
Empowering students through personal learning networks
Empowering students through personal learning networksEmpowering students through personal learning networks
Empowering students through personal learning networks
 
Egypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issuesEgypt's role in highlighting 21st century Internet issues
Egypt's role in highlighting 21st century Internet issues
 
Re-interpreting the Social Media Dream
Re-interpreting the Social Media DreamRe-interpreting the Social Media Dream
Re-interpreting the Social Media Dream
 
PRSSA Twitter Workshop
PRSSA Twitter WorkshopPRSSA Twitter Workshop
PRSSA Twitter Workshop
 
Creating a Personal Learning Network
Creating a Personal Learning NetworkCreating a Personal Learning Network
Creating a Personal Learning Network
 
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
Social Media as a Crisis Communication Tool during the Icelandic Volcano Erup...
 

Dernier

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Dernier (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Curating news