• About Me Card

Max Hemingway

~ Musings as I work through life, career and everything.

Max Hemingway

Tag Archives: Social Media

Social Norms: Credit and Loyalty Cards

02 Tuesday Aug 2016

Posted by Max Hemingway in Digital, Social Media

≈ Leave a comment

Tags

Digital, Social Media

wallet-908569_960_720A round the watercooler discussion with a collegue this morning (Graham Chastney) sparked an interesting discussion about one of lifes Social Norms. Credit and Loyalty Cards and their uses and sizes. The conversation came about as we were discussing paying for a coffee and the merits of cards vs mobile pay systems.

As a society we have over a number of years been enticed with small bits of plastic containing chips and tags for Debit/Credit Cards and Loyalty Cards.

But why is it the size it is?

Forbes have an article that looks at “How Was The Standard Size Of A Credit Card Or A Business Card Established?” The post says:

The credit card was just the business card juxtaposed to the size of the standard business card, for ease of use in the wallet.

Faisal Khan, Forbes

and goes into some of the history behind this as well as a useful infographic on the subject.

Its size has been adopted into many things such as a typical pass to get you through doors at your place of work and past Security/Reception in the morning.

In the main these have stayed the same size with a recent change to keyfob versions of Loyalty Cards, being approx a third in size to the normal cards. I have seen a few dropped and discarded keyfob versions around supermarket car parks as they have fallen off a set of keys through wear and tear.

The standard size of the card has allowed us to secure them in ways that make us comfortable such as wallets, purses, card holders.

With the move to contactless payments there has now been an increase in the variety of RFID blocking wallets availble in the marketplace to help prevent accidental contactless payments and broadcasting of your data.

We also expect to see a standard sized card when someone transacts with us as second nature.

But what is next for the card. Are cards still needed?

One could argue that the card size has changed a lot going to digital payments and not needing the card, but there is something about having that piece of plastic to make a payment with.

There are applications now available that replace your plastic loyalty cards with an barcode on your mobile device that can be scanned at the till.

Going outside of the norm and showing innovation one lady has taken the chip out of her Oyster Card (used around London to pay for and gain access to travel/tube/bus etc) and embedded them into a set of false finger nails.

One company has a single card that can replace up to eight of your cards in your wallet https://onlycoin.com/ storing the data on a chip in the card and allowing you to select the card you want to use via a simple button.

The card size is an integeral part of society and whilst there are many devices built to accept the size of the card (tills, cashpoints, wallets, etc….) it will continue to be the norm. A move to the next generation of Digital Solutions will help reduce the number of cards we carry, however it will still remain as the size of card thats easliy recognisable throughout the world.

 

 

 

 

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

IFTTT – SMS when exiting a Location Recipe

19 Friday Feb 2016

Posted by Max Hemingway in IoT, Social Media

≈ 1 Comment

Tags

IoT, Social Media

SignsIn another step on my journey in the IoT (Internet of Things) I recently decided to use one of the digital recipes from IFTTT (If this then that) to use the location service to send a text to someone when I have left a particular zone.

The actual configuration of this task is very easy using either the web or mobile tool.

Using the tool in this example, I chose the recipe ingredients that related to my mobile. In this case an Android phone.

The interface takes you through an the process by clicking the relevant icons and entering some simple information. I have flow charted the process below:

IFTTT

You can install the application on your mobile and sign in so that it knows about the tool. Its also important that when using location recipes that you also turn on the Location/GPS function on your device.

I tried this recipe yesterday and it worked well. However it didn’t activate straight away from leaving the location zone that I had set up. I’m assuming that this is something to do with the polling or location services on my mobile. To test this I have set up a couple of other similar recipes to see if I can make the text message a bit more instant. This will be tested over the next week.

The text message itself can contain a number of parameters “I exited an area {{OccurredAt}} via Android {{LocationMapUrl}}”  which did put some context into the text message.

{{OccurredAt}} provided a date and time

{{LocationMapUrl}} provided a location in google maps

You can remove these from the message if they are not needed.

There are lots of sample recipes and ones created by others that you can reuse, or the site has the ability to create your own.

 

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

An A-Z Guide to being an Architect

07 Thursday Jan 2016

Posted by Max Hemingway in Architecture, Big Data, Cloud, Development, DevOps/OpsDev, Enterprise Architecture, Governance, Innovation, IoT, Open Source, Productivity, Programming, Security, Social Media, Tools

≈ Leave a comment

Tags

Architecture, Cloud, CPD, Data, Development, DevOps, Innovation, IoT, Knowledge, learning, Open Source, OpsDev, Productivity, Programming, Social Media

Back in 2008 Microsoft published An A-Z Guide to ABCBeing an Architect in their Architecture Journals.

Here is my take on an updated A to Z Guide to being an Architect. A couple of these may be similar.

A – Architect

Having the right level of skills as an Architect or engaging an Architect with the right level of skills will depend on the work needing to be undertaken. There are several types of Architect with some specialising in certain areas and others being multi domain skilled. The list below covers some of the different types of Architect- this is not an exhaustive list:

  • Enterprise Architect
  • Information Architect
  • Solutions Architect
  • Software Architect
  • Systems Architect

B – Blueprints

Following Blueprints and Patterns either published by vendors (such as the Microsoft Blueprints) or developed internally around your products and services will ensure repeat-ability and cost control around the design process.

Some examples showing different pattern types can be found at Architecture Patterns

C – Contextual Web Era

The up and coming 4th Platform area is the Contextual Web Era

  • 1st Platform – Mainframe Era
  • 2nd Platform – Client Server Era
  • 3rd Platform – Cloud Era
  • 4th Platform – Contextual Web Era

This is an up and coming era with lots of new innovation and developments. Keeping up with developments is key going forward for any architect to understand designs/solutions, art of the possible now and future, innovation and for developing roadmaps for solutions.

D – DevOps

To quote Wikipedia – “DevOps (a clipped compound of “development” and “operations”) is a culture, movement or practice that emphasizes the collaboration and communication of both software developers and other information-technology (IT) professionals while automating the process of software delivery and infrastructure changes”. Having knowledge of DevOps, OpsDev and Agile assist with Architecting a solution for a business understanding their practices and modes of interacting with technology to meet business requirements. A Good book on the subject of DevOps is “The Phoenix Project” by Gene Kim.

E – Enterprise Architecture

EA (Enterprise Architecture) is a blueprint that defines how a business can meet its objectives and strategy. This is achieved by conducting analysis, design, planning, recommendations and implementations through an Enterprise Architecture Framework

Enterprise Architecture Wikibook

F – Four Two Zero One Zero

42010 is the ISO Standard that most frameworks adhere to. Working to a Framework brings structure to your designs and life cycles.

There are a number of frame works available such as:

  • DoDAF
  • MoDAF
  • TOGAF
  • Zachman
  • Other Frameworks are available

Enterprise Architecture Wikipedia Book

G – Governance

Governance is an important part of architecture as it

  • Ensures Conformance
  • Controls Variance
  • Maintains Vitality
  • Enables Communication
  • Sets Direction
  • Issue Resolution
  • Provides Guidance and Prioritisation
  • Promotes Best Practise
  • Minimises Risk
  • Protects IT environments from tactical IT changes, project solutions, and strategic proposals that are not in an organisations global best interest
  • Controlling Technical Diversity, Over-Engineering and Unnecessary Complexity
  • Ensures projects can proceed quickly & efficiently
  • Control over IT spend
  • Quality Standards
  • Efficient and optimal use of resources and increase the effectiveness of IT processes

H – Hands On

It is important to be current and understand the technologies you are architecting. There are lots of options available to get your hands dirty using technology from using Cloud Servers to virtual machines on your compute device. There are other computing devices such as the Raspberry PI that provide a cheap alternative to standing up small farms to learn on.

I – IoT

IoT (Internet of Things) is where physical things are connected by the internet using embedded sensors, software, networks and electronics. This allows the items to be managed, controlled and reported on. My blog posts on IoT Device Security Considerations and Security Layers goes into more detail on this subject.

J – Juxtaposition

Juxtaposition is something an architect should be doing to compare things/items/artefacts etc.
noun;
1. an act or instance of placing close together or side by side, especially for comparison or contrast.
2.the state of being close together or side by side.

Source:http://dictionary.reference.com/browse/juxtaposition

K – Knowledge

I would class Skills with Knowledge. It is important as an Architect to ensure that your skills/knowledge are up to date and where you are unsure of a technology, you have a plan to address and skill up. Build a good CPD (Continuing Professional Development) plan and work towards completing it.

L – Language

With the move to cloud it is important to ensure your scripting skills are up to date as most cloud platforms use scripting to assist with the deployment of environments. This is also true of other DevOps/OpsDev applications. If you are unsure on what to learn this guide may help you – Learn a Programming Language – But which one?

M -Micro Segmentation

Micro Segmentation allows a business to use Networks, Compute and Storage to automate and deliver complex solutions by carving up and using the infrastructure. This segments part of the infrastructures to specific functions/tasks. It can also be used in a security context to segment networks, firewalls, compute and storage to increase security and reduce cyber attacks.  VMware have produced a book “Micro Segmentation for Dummies” that can be downloaded from here.

N – Next Generation

Next Generation refers to the next stage or development to something such as a new release of hardware or software. Next Generation is becoming a common term now to define products and artefacts, an example being Next Generation Firewalls.

O – Open Source

Open Source has been available for a long time with software such a Linux, however there is a bigger shift towards using Open Source and acceptance by businesses. Some examples of Open Source that is now mainstream within business include;

  • Ansible
  • Chef
  • Docker
  • Puppet

P – Performance

Performance can cover people as well as solutions / systems. Performance metrics should be set out at the inception of an engagement then monitored and reported on. This will be a factor in driving Continuous Improvement going forward as well as forecasting / planning for future upgrades and expansion.

Q – Quality

Quality is a huge subject and has a lot if standards governing it and how it affects all aspects of business and architecture. Knowing which standards and how they affect a solution will assist in the whole architecture lifecycle. There are also a number of tools available to help you;

  • Architecture Frameworks
  • ITIL
  • Six Sigma

There is also a level of pride and satisfaction in producing a quality solution and system achieving the objectives and requirements set out by the business.

R- Roadmap

Any architecture/solution should have a roadmap to set out its future. Roadmaps should include items such as:

  • Current state
  • Future state
  • Innovation
  • Upgrades / Releases
  • New Features / Functions
  • End of Life / Replacement

S – SMAC

SMAC stands for Social, Mobile, Analytics, Cloud. SMAC is an acronym that covers the areas and concepts when these four technologies are brought together to drive innovation in business. A good description of SMAC written by a colleague can be found here Acronyms SMAC.

T – Transformation

The majority, if not all systems will undergo a form of transformation. This may be in the form of a simple upgrade or to a complex redesign and migration to something else.

U – UX

UX (User eXperience) affects how people interact with your architecture / design and how they feel about it (emotions and attitudes). With the boom in apps and the nearing Contextual Web Era, UX is one of the most important factors to getting an architecture used. If your users don’t like the system they may find something else to use that they like.

V – Vision

Understanding the vision of your customer and their business is the driving factor for any architecture.

On working with your customer you should look to become a Trusted Advisor and also with your colleagues. A great book on the subject is The Trusted Advisor by David Maister. The book covers 3 main areas which discusses perspectives on trust, the structure of trust building and putting trust to work.

W – WWW

The internet is a key delivery mechanism for systems. Knowing how this works and key components to the internet should be understood such as:

  • IPV4 – IPV6
  • DNS
  • Routing
  • Connectivity
  • Security

X – X86

X86 – is a standard that every knows as its one of the most common platform types available.

Y – Year

Year is for the longevity of the solution you are designing. How many years are your expecting it to last What are the Business Requirements, statutory obligations, depreciation etc that need to be planned in. Consider things like End of Life, Maintenance and Upgrades on hardware and software from a solution point of view.

Z – Zero Defects

The best solution is the one with zero defects, but reaching this goal can be a challenge and can also consume a lot of expense. The best way to ensure Zero Defects is to use:

  • Best Practice
  • Reference Architectures
  • Blueprints/Patterns
  • Checklists
  • Reuse
  • Lessons Learnt

This is my current A to Z and some of the entries may be different in your version so “What is in your A to Z of being an Architect?”

I will look to write some further blog posts on the areas listed in this A to Z

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

Personal Knowledge Management System – Revised for 2016

06 Wednesday Jan 2016

Posted by Max Hemingway in Productivity, Social Media, Tools

≈ 5 Comments

Tags

Knowledge, Productivity, Social Media, Tools

I originally blogged about my Personal Knowledge Management System back in January 2015 and as we are beginning 2016 its time to review it again. I use my Personal Knowledge Management System to collect, sort and store useful artefacts, blogs, information, inspiration, articles and bits I find on the web.

PKMS

Journal

Journalling in both a Personal and Work life is a useful tool to keep notes on your thoughts and ideas. In my personal life I opt for recording these in a Moleskine – See my blog post No batteries required for further details.

Personal Social Media

This side of life I separate from my work life using things like Instagram and Facebook.

Research

I have split this into two areas:

  • Podcasts
  • Web

Podcasts cover both Audio and Video casts that I watch/stream online or download to my Media Player to listen to on journeys.

Web I pull down into one feed to read using Feedly.

Feedly

I am using this to collect the stories from blogs and web sites I regularly ready. A good tip picked up in the office today from a colleague. This allows you to scan the articles in a few minutes on a single screen without going via multiple sites. Using a series of key strokes you can read the headlines, then move down the articles, opening each one on the screen if you so wish.

Instapaper

I am using Instapaper to store the articles that I like and want to save. This is done via a manual process at the moment.

Twitter

Apart from my normal twitter account (link at the side of the screen) I now have a twitter account to show what I am currently reading. @HemingwayReads

Publishing my Blog

I publish my blog using WordPress which then posts to Twitter, Linkedin and G+ (While its still going)

Further Inspiration from others

Some other good Personal Knowledge Management Systems from my colleagues to read are:

  • Graham Chastney – How I process information
  • Stuart Downes – My Personal Knowledge Management Systems
  • Steve Richards – My personal work style

 

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

Is your being social data being mined?

04 Monday Jan 2016

Posted by Max Hemingway in Security, Social Media

≈ Leave a comment

Tags

Security, Social Media

Over the festive break I have seen many people letting their guard down on my Social Media feeds and responding to those quizzes and prediction sites that scan your data and come up with some random facts about you.

PhoneTalkThe lure of finding out “Which are your most used words on facebook?” or “Which friend will be your luck charm in 2016?” is too much for some to resist. These apps usually result is a few words or a match of pictures that appeases the user based on the mining of data in their social feeds and friends profiles.

Examples of these types of apps are:

  • Who is your craziest friend?
  • How will your 2016 be?
  • Which friend will be your luck charm in 2016?
  • Which are your most used words on facebook?
  • Who should you start a band with?

Whilst there are a number of innocent apps/sites that genuinely provide this type of tool to tell you who your best friend is, there is a darker side to some of these as well.

On the face of an app it may look genuine, but you are not aware of what the app is actually doing with your data and to what extent your data is being mined. Where the results are stored or to what purposes it will be used for afterwards.

Here are some basic actions to follow to secure your social data

  • Know your security settings and lock down
  • Kee
    p personal information personal
  • Think before you give an app permission to access your account/data
  • Do not use apps that you are unsure of
  • Think what this app will do with your data

Some useful links

  • Twitter – Safe Tweeting
  • Facebook – Basic Privacy Settings & Tools
  • Sophos – Best Practices for rogue facebook apps

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

Professional vs Personal Social Media

26 Thursday Mar 2015

Posted by Max Hemingway in Productivity, Social Media

≈ 2 Comments

Tags

GTD, Productivity, Social Media

Having read an article from HBR on “How to Separate the Personal and Professional on Social Media” I decided to look at the Social Media tool I often use and in what part of my Professional and Personal life they fall.

Working on from my Personal Knowledge Management System there are a couple of others shown in the diagram. This is just my quick classification of SMT (Social Media Tools) – everyone else may have a different view such as Facebook for business to reach consumers in particular markets. However it is worth looking if you class the tools as Professional or Personal. A few do sit in the middle for me as they have a place on both sides of the page.

Some of the tools are clearly for Professional use, but some do step either way across the line.

One potential way of keeping things apart is multiple accounts on a platform, one personal and one professional, but it is important to understand and set some guidelines on how you use these.

SocialPP

If you are communicating on Social Media representing an employer, always check their policy on Social Media and communications.

If you don’t have any, there are a number of good rules available.  Kevan Lee has done some research into these and had come up with a list of 29 Social Media Rules

For all social networks

1. Share several times a day, but space out your posts every few hours.

2. Respond to all comments as quickly as you can.

3. Know the art of the hashtag. 1 hashtag is fine. 10 hashtags are not.

4. Always keep the 80/20 rule! Entertain and inform your audience first, sell to them second.

5. Use first person plural when talking about your company brand (We, Us).

For Twitter

6. Don’t automatically direct message people that follow you.

7. Don’t use all 140 characters. Give people room to retweet with a reply.

8. Don’t hijack another company’s hashtag.

9. Don’t buy followers.

10. Don’t stuff your tweets with keywords.

For Facebook

11. Don’t Like your own post.

12. Don’t post or tag photos of fans, customers, or employees without permission.

13. Don’t tag people or pages that aren’t relevant to your post.

14. Don’t ask for Likes, Comments, or Shares.

LinkedIn

15. Personalize your connection requests. Tell them WHY you’re connecting.

16. Once connected, send a “welcome” message.

17. Don’t join groups and immediately start selling yourself.

18. Don’t ignore the more professional tone of the network.

Google+

19. Always +mention users when commenting on their posts.

20. When sharing a post, always add your own commentary to it first.

21. Share to Circles to target your content.

22. Use Google+ formatting for your text—bold, italics, and strikethrough.

Pinterest

23. Don’t neglect to provide good descriptions for your pins.

24. Always link back to the original source and give credit.

25. Don’t use images that have nothing to do with your clickthrough content to get more pins or clicks.

26. Don’t pin just your own material.

Instagram

27. Don’t ask people to follow you or use hashtags like #tagsforlikes – it’s unprofessional.

28. Don’t overgram. No one likes their feed filled up with one user.

29. Use hashtags for your brand appropriately. The golden number of hashtags is 11.

– Kevan Lee (https://blog.bufferapp.com/social-media-rules-etiquette)

Social Media seems to have taken the theory of Six Degrees of Separation and in some cases turned it into One or Two Degrees of Separation!

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

Lists – Are we addicted to them?

11 Wednesday Mar 2015

Posted by Max Hemingway in Social Media

≈ Leave a comment

Tags

Social Media

Maybe its me but there seems to be an increase in the use of Lists in both inside and outside of the work place. Social Media is full of them such as:

  • 14 Reasons to like….
  • 6 things you didn’t know about…..
  • 50 ways to…..

Businesses are also using this format internally to publish key information to their employees.

Lists (known as Listicles) are everywhere and ever popular as a way of getting information across to an audience. Listicles have been used for a long time in Magazines and now very common in all forms of media.

In journalism and blogging, a listicle is a short-form of writing that uses a list as its thematic structure, but is fleshed out with sufficient copy to be published as an article.

– Wikipedia

Why are they so popular?

  • They get a message across in the title
  • Quickly distil information
  • Popular form of getting the message across
  • Quick to read
  • Easy to write (no additional context needed)
  • Attract readers

So are there any dangers to lists? Readers are drawn into lists on Social Media which have been published with the sole reason of filling your screen with adverts. Known as Clickbait. We are so use to seeing lists and utilising them that we often click to read with no thought about where the link is taking us to.

There is some good advice on list writing that is often in the form of another list. The main key to a good list is the topic and the content.

Like them or hate them, lists have been around for a long time and will still be here for around for the foreseeable future.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

The Nature and Cycle of CPD

20 Friday Feb 2015

Posted by Max Hemingway in Development, Social Media

≈ 9 Comments

Tags

CPD, Development, Knowledge, learning, Social Media

Following on from my series of posts on the CPD and Learning Survey, another comment I want to look at is:

The nature of CPD in the IT industry is such that professionals must invest their time in a range of activities, some narrow and focused on specific skills and others quite broad, keeping up with trends and developments in business and technology in general. I also believe that in today’s environment professionals must be actively engaged as both producers and consumers of content in social networks as a means to learn and help others to do so.

– Anon (CPD and Learning Survey)

Personally I found this comment positive and hits on not only the importance of learning and CPD but also on what to do following learning something.

Using a typical learning cycle, this comment calls out an additional step that should be included around communicate.

The cycle may look something like this:

CPD Cycle

Identify

Identify your need for learning and what you need to do your job. Put this into your CPD Plan.

Learn

Carry out your learning event and record it into your CPD Plan.

Reflect

Look back on what you have learnt. Was it useful and how you can use this learning.

Communicate

Following reflecting consider what you can communicate to others in your role, job, company, Social Media. Even if this is just recommending the learning you have just completed.

Impact

Its important to measure the impact of your learning on your job and also following the communicate stage. Look at how you have used this learning and how it has impacted what you do.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

Best use of 140 characters – Testing your Tweets to Get Retweeted

18 Wednesday Feb 2015

Posted by Max Hemingway in Social Media

≈ Leave a comment

Tags

Social Media

Have you every tweeted something and then wondered why it gets retweeted or not. Did you word it correctly?

Chenhao Tan has published a paper on how Wording Effects Message Propagation and created a tool called “Retweeted More“.

The tool allows you to enter two versions of your tweet and analyses them based on an algorithm that predicts which will be retweeted more.

Some of thashtaghe trick to this will be down to the hashtags that you also use at the end of the tweet.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...

Mapping Social Media Clickbait in R and ggplot2

16 Monday Feb 2015

Posted by Max Hemingway in Data Science, Open Source, Social Media

≈ 1 Comment

Tags

Data Science, Social Media

Have you been caught out by the ever increasing world of Clickbait, enticed in with titles like “You’ll Never Believe What The Parrot Did Next!” in your Social Media feeds such as facebook.

The main purpose of Clickbait is to get you to a site where adverts are displayed to get you to onward click and generate revenue for the sites owners.

Max Woolf @ Minimaxir.com has recently mapped out 15,656 BuzzFeed Listicles which have been shared on Facebook.

Buzzfeed

This has been achieved using R and ggplot based on a dataset from Buzzfeed.  A copy of the code is also available on the authors Github repository.

Looking at the dataset itself:

The top 3 articles shared

  • 41 Camping Hacks That Are Borderline Genius – 1, 734,676 Shares
  • 50 Things That Look Just Like Your Childhood – 1,655,900 Shares
  • 27 Surreal Places To Visit Before You Die – 1,329,602 Shares

The bottom 3 articles shared:

  • 8 Celebrity Tweets You Missed Today – 1 share
  • 7 Outtakes From Out100s 2012 Portraits – 1 share
  • 5 Questions About The JOBS Act Vote And Whats Changed – 1 share

The total number of shares in the data set is a staggering 185,415,297

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on X (Opens in new window) X
  • Click to share on Bluesky (Opens in new window) Bluesky
Like Loading...
← Older posts
Newer posts →

RSS Feed

RSS Feed RSS - Posts

Other Publications I contribute to

https://sparrowhawkbushcraft.com/

Recent Posts

  • Graceful Speech & Timeless Tales: Mastering the Art of Gesture
  • Graceful Speech & Timeless Tales: The Power of Pitch
  • Graceful Speech & Timeless Tales: Modulation
  • Graceful Speech & Timeless Tales: Harnessing Inflection
  • Adventure Games: Open Sourced Zork

Categories

  • 21st Century Human
  • 3D Printing
  • AI
  • Applications
  • ArchiMate
  • Architecture
  • Arduino
  • Automation
  • BCS
  • Big Data
  • Certification
  • Climate Change
  • Cloud
  • Cobotics
  • Connected Home
  • Data
  • Data Fellowship
  • Data Science
  • Development
  • DevOps/OpsDev
  • Digital
  • DigitalFit
  • Drone
  • Enterprise Architecture
  • F-TAG
  • Governance
  • Health
  • Innovation
  • IoT
  • Machine Learning
  • Metaverse
  • Micro:Bit
  • Mindset
  • Mobiles
  • Networks
  • Open Source
  • Podcasts
  • Productivity
  • Programming
  • Quantum
  • Raspberry Pi
  • Robotics
  • Scouting
  • Scouts
  • Security
  • Smart Home
  • Social Media
  • Space
  • STEM
  • Story Telling
  • Technologists Toolkit
  • Tools
  • Uncategorized
  • Wearable Tech
  • Windows
  • xR

Archives

Reading Shelf

Archives

Recent Posts

  • Graceful Speech & Timeless Tales: Mastering the Art of Gesture
  • Graceful Speech & Timeless Tales: The Power of Pitch
  • Graceful Speech & Timeless Tales: Modulation
  • Graceful Speech & Timeless Tales: Harnessing Inflection
  • Adventure Games: Open Sourced Zork

Top Posts & Pages

  • Graceful Speech & Timeless Tales: The Art of Articulation
  • 20 Informative Podcasts for 2025: Boost Your PKMS
  • Understanding ISO/IEC 42001: A Course Review
  • Building Cyber Resilience: Enterprise Architecture and ArchiMate for Strategic Security
  • Graceful Speech & Timeless Tales: Modulation
  • Graceful Speech & Timeless Tales: The Power of Pitch
  • Graceful Speech & Timeless Tales: Mastering the Art of Gesture
  • Mastering the CPD Cycle for Professional Growth
  • Adventure Games: Open Sourced Zork

Category Cloud

21st Century Human Architecture Automation Big Data Cloud Data Data Science Development DevOps/OpsDev Digital DigitalFit Enterprise Architecture Innovation IoT Machine Learning Mindset Open Source Podcasts Productivity Programming Raspberry Pi Robotics Security Social Media STEM Story Telling Technologists Toolkit Tools Uncategorized Wearable Tech

Tags

3D Printing 21st Century Human AI Applications Architecture artificial-intelligence Automation BCS Big Data Blockchain business Certification Cloud Cobot Cobotics Coding Communication Connected Home CPD creativity cybersecurity Data Data Fellowship Data Science Delivery Development DevOps Digital DigitalFit Digital Human Drone Email Enterprise Architecture GTD Infographic Information Theory Innovation IoT Journal Knowledge learning Machine Learning Metaverse MicroLearning Mindset Mixed Reality Networks Open Source OpsDev PKMS Podcasts Productivity Programming Proving It Quantum R RaspberryPI Robot Robotics Scouts Security Smart Home Social Media STEM Story Telling Technologists Toolkit technology Technology Couch Podcast Thinking Tools Training Visualisation Voice Wearable Tech xR

License

Creative Commons Licence
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Blog at WordPress.com.

  • Subscribe Subscribed
    • Max Hemingway
    • Join 82 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Max Hemingway
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d