Technology

Technology

How to Build SEO into Content Strategy - Technology
Technology 3 years ago

How to Build SEO into Content Strategy

Let’s be honest: for most content strategists and other people working with online content, SEO is The Worst Part Of The Job. It’s hugely technical, it’s shrouded in…

Why Your Mobile Device Isn’t As Secure As You Think - Technology
Technology 3 years ago

Why Your Mobile Device Isn’t As Secure As You Think

Most people have the illusion that phones are somehow impervious to viruses and that you are safe browsing virtually anything online. Not so. Mobile usage is growing fast,…

LinkedIn and Slideshare - Technology
Technology 3 years ago

LinkedIn and Slideshare

LinkedIn and Slideshare, managing

Docker introduction - Technology
Technology 3 years ago

Docker introduction

Docker introduction | November 2013

10 ways to crack the GD (Group Discussion) - Technology
Technology 2 years ago

10 ways to crack the GD (Group Discussion)

Want to learn Software Testing from the Experts? Visit this page: http://SoftwareTestingHelp.org Many companies and institutes are making group discussion as the…

Best Of Top 11 Android Racing Games You Should Know About [MUST HAVE] - Technology
Technology 2 years ago

Best Of Top 11 Android Racing Games You Should Know About [MUST HAVE]

Best collection of top 11 deadliest android racing games that will stop your heartbeats. The video gives idea about top 10 Android Racing Games, which are: Mini Motor Racing,…

Future Web Trends - at Innovation series with Jimmy Wales - Technology
Technology 2 years ago

Future Web Trends - at Innovation series with Jimmy Wales

Presentation on future web trends, presented at the iCommons "Innovation Series" with Wikipedia founder Jimmy Wales

OKFestival 2012 | Helsinki Finland - Technology
Technology 2 years ago

OKFestival 2012 | Helsinki Finland

This is the story of the world's first Open Knowledge Festival in Helsinki, Finland on September 17-22, 2012. Tickets and details at http://okfestival.org and updates…

PHP Programming India - Technology
Technology 2 years ago

PHP Programming India

Top offshore PHP Programming company in India - Hidden Brains offers custom PHP web development services. We have highly experienced PHP programmers, who are expert in PHP…

Literature survey on identity management - Technology
Technology 2 years ago

Literature survey on identity management

1.Literature Survey to understand online identity management and its importance in E-commerce Sathe, Vaibhav1Indian Institute of Management LucknowIIM Campus, Prabandh Nagar,…

LinkMeUp-V3 (05.2013) - Technology
Technology 2 years ago

LinkMeUp-V3 (05.2013)

1. ЛинкМиАпПервый подкаст…

Satyam - The Letter that Ramalinga Raju wrote, reveals shocking details - Technology
Technology 2 years ago

Satyam - The Letter that Ramalinga Raju wrote, reveals shocking details

Satyam [Get Quote] Computer on Monday plunged into a deep crisis, as B Ramalinga Raju resigned as its chairman after admitting to major financial wrong-doings and saying…

Xyo App Search Report USA July 2013 - How users search for iPhone, iPad, Google Play (Android), Windows Phone apps and games - Technology
Technology 3 years ago

Xyo App Search Report USA July 2013 - How users search for iPhone, iPad, Google Play (Android), Windows Phone apps and games

Welcome to the 1st edition of Xyo’s App Search Report. In this unique report series we provide actionable know-how for app marketers to drive their data-driven app search…

Gephi Quick Start - Technology
Technology 3 years ago

Gephi Quick Start

This is the introduction tutorial. It will guide you to the basic steps of network visualization and manipulation in Gephi.

Messenger Wars: How Facebook lost its lead - Technology
Technology 2 years ago

Messenger Wars: How Facebook lost its lead

1. Messenger Wars How Facebook lost its lead 2. Facebook is the giant in social networking butWhatsApp has taken the lead in social messaging on mobile 3. A survey of 3,759…

Offline bruteforce attack on WiFi Protected Setup - Technology
Technology 3 years ago

Offline bruteforce attack on WiFi Protected Setup

Offline bruteforce attack on WiFi Protected Setup

Creative Uses for iPad in the Classroom - Technology
Technology 2 years ago

Creative Uses for iPad in the Classroom

These slides were used as part of my presentation at the Apple Store Upper West Side on December 1, 2011.

How to Create (use use) Strong & Unique Passwords - Technology
Technology 2 years ago

How to Create (use use) Strong & Unique Passwords

A short (10 slides) presentation on how to create and use strong passwords

20 Game Ideas You Should Steal - Technology
Technology 2 years ago

20 Game Ideas You Should Steal

20 Great Innovations in Casual, Social and Mobile Games That You Should Steal 20 Great Innovations in Casual, Social and Mobile Games That You Should Steal Stuart Dredge…

Refresh OKC - Technology
Technology 3 years ago

Refresh OKC

Slides for a talk at Refresh OKC http://refreshokc.org/2011/03/21/upcoming-april-meeting

My Top 10 slides on presentations - Technology
Technology 3 years ago

My Top 10 slides on presentations

My top 10 (out of 200) slides on presentations.

Best-in-Class Oracle Performance - Technology
Technology 2 years ago

Best-in-Class Oracle Performance

At a Fraction of the Price

Enough with the JavaScript already! - Technology
Technology 3 years ago

Enough with the JavaScript already!

After consulting with several companies on performance related issues, it became clear that one of the biggest performance issues facing websites today is the sheer amount…

Amazing Math Trick - Technology
Technology 3 years ago

Amazing Math Trick

Fun to know about math if you know how to use its

How to Combine SEO, Blogging, and Social Media For Results HubSpot - Technology
Technology 2 years ago

How to Combine SEO, Blogging, and Social Media For Results HubSpot

1. Inbound Marketing: SEO + Blogs + Social Media Mike VolpeVP Inbound MarketingHubSpotTwitter: @mvolpe 2. Outbound Marketing 3. Outbound Marketing800-555-1234AnnoyingSalesperson…

Securing your cloud with Xen's advanced security features - Technology
Technology 2 years ago

Securing your cloud with Xen's advanced security features

Xen is a mature enterprise-grade virtual machine with many advanced security features which are unique to Xen. For this reason it's the hypervisor of choice for the…

Parallel Futures of a Game Engine - Technology
Technology 2 years ago

Parallel Futures of a Game Engine

Game engines have long been in the forefront of taking advantage of the ever increasing parallel compute power of both CPUs and GPUs. This talk is about how the parallel…

Prototype & jQuery - Technology
Technology 3 years ago

Prototype & jQuery

A walk through process comparison between Prototype and jQuery to help developers go from one language to another.

Fly UP