Submit Search
Upload
How to get the best trade press product reviews
•
Download as PPTX, PDF
•
0 likes
•
1,205 views
David Strom
Follow
Slides for a speech at the St Louis Product Camp 3/14
Read less
Read more
Technology
Report
Share
Report
Share
1 of 17
Download now
Recommended
presentation in September 2015 in St. Louis
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom
This is a slide deck from a series of talks that I gave for TechTarget's events group Feb-June 2016 in various cities.
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
David Strom
There are numerous analytical techniques that can be used to examine Big Data sources. I describe several of the more popular ones in this talk for a Washington University roundtable discussion in July 2015
Big data analytics
Big data analytics
David Strom
Speech given in July 2010 for the Nashville chapter of AITP.
WIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITP
David Strom
This is for a private presentation at Dell in March 2012
Dell social media
Dell social media
David Strom
This is a presentation that Jeff Edlund at HP and I gave in Nov. 2011 at the SNCR annual conference, presenting some preliminary results about our research.
Social Media Research at Comms Service Providers
Social Media Research at Comms Service Providers
David Strom
This is the deck for a speech at AITP St Louis chapter in March 2014 about next generation firewalls and using advanced persistent threats
Advanced Firewalls Progress Report
Advanced Firewalls Progress Report
David Strom Inc.
This is the set of slides for Telco Cloud conference in Dallas in September.
Keeping the customer in mind: a lesson for Telco's
Keeping the customer in mind: a lesson for Telco's
David Strom
Recommended
presentation in September 2015 in St. Louis
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom
This is a slide deck from a series of talks that I gave for TechTarget's events group Feb-June 2016 in various cities.
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
David Strom
There are numerous analytical techniques that can be used to examine Big Data sources. I describe several of the more popular ones in this talk for a Washington University roundtable discussion in July 2015
Big data analytics
Big data analytics
David Strom
Speech given in July 2010 for the Nashville chapter of AITP.
WIndows 7 Migration tools for Nashville AITP
WIndows 7 Migration tools for Nashville AITP
David Strom
This is for a private presentation at Dell in March 2012
Dell social media
Dell social media
David Strom
This is a presentation that Jeff Edlund at HP and I gave in Nov. 2011 at the SNCR annual conference, presenting some preliminary results about our research.
Social Media Research at Comms Service Providers
Social Media Research at Comms Service Providers
David Strom
This is the deck for a speech at AITP St Louis chapter in March 2014 about next generation firewalls and using advanced persistent threats
Advanced Firewalls Progress Report
Advanced Firewalls Progress Report
David Strom Inc.
This is the set of slides for Telco Cloud conference in Dallas in September.
Keeping the customer in mind: a lesson for Telco's
Keeping the customer in mind: a lesson for Telco's
David Strom
Presentation to a high school entrepreneur class
Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom
This is a presentation I gave to a St. Louis org to help first-time security professionals land a job in the field
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom
This is a talk that I gave at the St Louis IAM meetup in November 2021.
Understanding passwordless technologies
Understanding passwordless technologies
David Strom
This is a talk I gave in Nov 2020 about how the working from anywhere movement is changing how we protect our endpoints and business networks.
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom
A talk given to the Minn. county IT conference in October 2019
Fears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom
I gave this talk in October 2019 about ways that your digital and online habits can be tracked and what kind of data you inadvertently leak, along with tools that you can use to protect your privacy.
Protecting your digital and online privacy
Protecting your digital and online privacy
David Strom
This is my talk at ailive.inside.com conference given May 2019
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom
This was a keynote presentation given at St. Louis 9/18 Secure World conference
The legalities of hacking back
The legalities of hacking back
David Strom
Self-published authors need to learn how to use various digital tools to help them market their books. This seminar will show you some of the more common and inexpensive ones
How to market your book in today's social media world
How to market your book in today's social media world
David Strom
This is a talk I gave in St. Louis in April 2018 about how businesses need to understand the Internet of Things and how they can better protect themselves.
Understanding the Internet of Things
Understanding the Internet of Things
David Strom
While the news about laptop camera covers can make any of us paranoid, the real cyber threat comes from the computer we all carry in our pockets and purses: our mobile phones. I will describe some of the more dangerous cyber threats that can turn your phone into a recording device and launch pad for hackers, and how you can try to prevent these in your daily life.
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom
This is part of a talk that I gave at Syracuse University lecture on breach response in Apr 2017
Implications and response to large security breaches
Implications and response to large security breaches
David Strom
This is a speech I gave at the National Computer Conference for AITP in St. Louis 4/17
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom
A presentation at @ISACASTL 10-16
Security v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
David Strom
This is a talk that I gave for the St Louis Spark incubator for high school student entrepreneurs
Notable Twitter fails
Notable Twitter fails
David Strom
For a weibar sponsored by Citrix 11/15. IT needs to provide the best possible support to its end users. Indeed, treating them as your customers is critical. We’ll cover some of the lessons learned from the best and worst customer-facing organizations to see how IT can make improvements in this area.
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom
This the deck for a guest lecture that I am giving in 11/15 for a computer security class at Fontbonne University
Network security practice: then and now
Network security practice: then and now
David Strom
A talk that I gave to a group of high school student entrepreneur class 9/15
Biggest startup mistakes
Biggest startup mistakes
David Strom
talk for Daly Computers in Baltimore May 1, 2015
Emerging computing trends 2015
Emerging computing trends 2015
David Strom
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Workshop Build With AI - Google Developers Group Rio Verde
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
More Related Content
More from David Strom
Presentation to a high school entrepreneur class
Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
David Strom
This is a presentation I gave to a St. Louis org to help first-time security professionals land a job in the field
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
David Strom
This is a talk that I gave at the St Louis IAM meetup in November 2021.
Understanding passwordless technologies
Understanding passwordless technologies
David Strom
This is a talk I gave in Nov 2020 about how the working from anywhere movement is changing how we protect our endpoints and business networks.
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
David Strom
A talk given to the Minn. county IT conference in October 2019
Fears and fulfillment with IT security
Fears and fulfillment with IT security
David Strom
I gave this talk in October 2019 about ways that your digital and online habits can be tracked and what kind of data you inadvertently leak, along with tools that you can use to protect your privacy.
Protecting your digital and online privacy
Protecting your digital and online privacy
David Strom
This is my talk at ailive.inside.com conference given May 2019
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
David Strom
This was a keynote presentation given at St. Louis 9/18 Secure World conference
The legalities of hacking back
The legalities of hacking back
David Strom
Self-published authors need to learn how to use various digital tools to help them market their books. This seminar will show you some of the more common and inexpensive ones
How to market your book in today's social media world
How to market your book in today's social media world
David Strom
This is a talk I gave in St. Louis in April 2018 about how businesses need to understand the Internet of Things and how they can better protect themselves.
Understanding the Internet of Things
Understanding the Internet of Things
David Strom
While the news about laptop camera covers can make any of us paranoid, the real cyber threat comes from the computer we all carry in our pockets and purses: our mobile phones. I will describe some of the more dangerous cyber threats that can turn your phone into a recording device and launch pad for hackers, and how you can try to prevent these in your daily life.
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
David Strom
This is part of a talk that I gave at Syracuse University lecture on breach response in Apr 2017
Implications and response to large security breaches
Implications and response to large security breaches
David Strom
This is a speech I gave at the National Computer Conference for AITP in St. Louis 4/17
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
David Strom
A presentation at @ISACASTL 10-16
Security v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
Slides from a webinar that I and Dell Virtualization Evangelist Hassan Fahimi gave in March 2016. We provide a complete overview of OpenStack and Foglight for OpenStack.
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
David Strom
This is a talk that I gave for the St Louis Spark incubator for high school student entrepreneurs
Notable Twitter fails
Notable Twitter fails
David Strom
For a weibar sponsored by Citrix 11/15. IT needs to provide the best possible support to its end users. Indeed, treating them as your customers is critical. We’ll cover some of the lessons learned from the best and worst customer-facing organizations to see how IT can make improvements in this area.
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
David Strom
This the deck for a guest lecture that I am giving in 11/15 for a computer security class at Fontbonne University
Network security practice: then and now
Network security practice: then and now
David Strom
A talk that I gave to a group of high school student entrepreneur class 9/15
Biggest startup mistakes
Biggest startup mistakes
David Strom
talk for Daly Computers in Baltimore May 1, 2015
Emerging computing trends 2015
Emerging computing trends 2015
David Strom
More from David Strom
(20)
Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
Getting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
Understanding passwordless technologies
Understanding passwordless technologies
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
Fears and fulfillment with IT security
Fears and fulfillment with IT security
Protecting your digital and online privacy
Protecting your digital and online privacy
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
The legalities of hacking back
The legalities of hacking back
How to market your book in today's social media world
How to market your book in today's social media world
Understanding the Internet of Things
Understanding the Internet of Things
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
Implications and response to large security breaches
Implications and response to large security breaches
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
Security v. Privacy: the great debate
Security v. Privacy: the great debate
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
Notable Twitter fails
Notable Twitter fails
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
Network security practice: then and now
Network security practice: then and now
Biggest startup mistakes
Biggest startup mistakes
Emerging computing trends 2015
Emerging computing trends 2015
Recently uploaded
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Workshop Build With AI - Google Developers Group Rio Verde
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
The value of a flexible API Management solution for Open Banking Steve Melan, Manager for IT Innovation and Architecture - State's and Saving's Bank of Luxembourg Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
ICT role in 21 century education. How to ICT help in education
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Tracing the root cause of a performance issue requires a lot of patience, experience, and focus. It’s so hard that we sometimes attempt to guess by trying out tentative fixes, but that usually results in frustration, messy code, and a considerable waste of time and money. This talk explains how to correctly zoom in on a performance bottleneck using three levels of profiling: distributed tracing, metrics, and method profiling. After we learn to read the JVM profiler output as a flame graph, we explore a series of bottlenecks typical for backend systems, like connection/thread pool starvation, invisible aspects, blocking code, hot CPU methods, lock contention, and Virtual Thread pinning, and we learn to trace them even if they occur in library code you are not familiar with. Attend this talk and prepare for the performance issues that will eventually hit any successful system. About authorWith two decades of experience, Victor is a Java Champion working as a trainer for top companies in Europe. Five thousands developers in 120 companies attended his workshops, so he gets to debate every week the challenges that various projects struggle with. In return, Victor summarizes key points from these workshops in conference talks and online meetups for the European Software Crafters, the world’s largest developer community around architecture, refactoring, and testing. Discover how Victor can help you on victorrentea.ro : company training catalog, consultancy and YouTube playlists.
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Uncertainty, Acting under uncertainty, Basic probability notation, Bayes’ Rule,
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Presentation from Melissa Klemke from her talk at Product Anonymous in April 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Angeliki Cooney has spent over twenty years at the forefront of the life sciences industry, working out of Wynantskill, NY. She is highly regarded for her dedication to advancing the development and accessibility of innovative treatments for chronic diseases, rare disorders, and cancer. Her professional journey has centered on strategic consulting for biopharmaceutical companies, facilitating digital transformation, enhancing omnichannel engagement, and refining strategic commercial practices. Angeliki's innovative contributions include pioneering several software-as-a-service (SaaS) products for the life sciences sector, earning her three patents. As the Senior Vice President of Life Sciences at Avenga, Angeliki orchestrated the firm's strategic entry into the U.S. market. Avenga, a renowned digital engineering and consulting firm, partners with significant entities in the pharmaceutical and biotechnology fields. Her leadership was instrumental in expanding Avenga's client base and establishing its presence in the competitive U.S. market.
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
When you’re building (micro)services, you have lots of framework options. Spring Boot is no doubt a popular choice. But there’s more! Take Quarkus, a framework that’s considered the rising star for Kubernetes-native Java. It always depends on what's best for your situation, but how to choose the best solution if you're comparing 2 frameworks? Both Spring Boot and Quarkus have their positives and negatives. Let us compare the two by live coding a couple of common use cases in Spring Boot and Quarkus. After this talk, you’ll be ready to get started with Quarkus yourself, and know when to select Quarkus or Spring Boot.
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
Presented by Mike Hicks
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Keynote 2: APIs in 2030: The Risk of Technological Sleepwalk Paolo Malinverno, Growth Advisor - The Business of Technology Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Terragrunt, Terraspace, Terramate, terra... whatever. What is wrong with Terraform so people keep on creating wrappers and solutions around it? How OpenTofu will affect this dynamic? In this presentation, we will look into the fundamental driving forces behind a zoo of wrappers. Moreover, we are going to put together a wrapper ourselves so you can make an educated decision if you need one.
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
ICT role in education and it's challenges. In which we learn about ICT, it's impact, benefits and challenges.
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Abhishek Deb(1), Mr Abdul Kalam(2) M. Des (UX) , School of Design, DIT University , Dehradun. This paper explores the future potential of AI-enabled smartphone processors, aiming to investigate the advancements, capabilities, and implications of integrating artificial intelligence (AI) into smartphone technology. The research study goals consist of evaluating the development of AI in mobile phone processors, analyzing the existing state as well as abilities of AI-enabled cpus determining future patterns as well as chances together with reviewing obstacles as well as factors to consider for more growth.
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
We present an architecture of embedding models, vector databases, LLMs, and narrow ML for tracking global news narratives across a variety of countries/languages/news sources. As an example, we explore the real-time application of this architecture for tracking the news narrative surrounding the death of Russian opposition leader Alexei Navalny coming from Russian, French, and English sources.
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Effective data discovery is crucial for maintaining compliance and mitigating risks in today's rapidly evolving privacy landscape. However, traditional manual approaches often struggle to keep pace with the growing volume and complexity of data. Join us for an insightful webinar where industry leaders from TrustArc and Privya will share their expertise on leveraging AI-powered solutions to revolutionize data discovery. You'll learn how to: - Effortlessly maintain a comprehensive, up-to-date data inventory - Harness code scanning insights to gain complete visibility into data flows leveraging the advantages of code scanning over DB scanning - Simplify compliance by leveraging Privya's integration with TrustArc - Implement proven strategies to mitigate third-party risks Our panel of experts will discuss real-world case studies and share practical strategies for overcoming common data discovery challenges. They'll also explore the latest trends and innovations in AI-driven data management, and how these technologies can help organizations stay ahead of the curve in an ever-changing privacy landscape.
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
In the thrilling conclusion to 2023, ransomware groups had a banner year, really outdoing themselves in the "make everyone's life miserable" department. LockBit 3.0 took gold in the hacking olympics, followed by the plucky upstarts Clop and ALPHV/BlackCat. Apparently, 48% of organizations were feeling left out and decided to get in on the cyber attack action. Business services won the "most likely to get digitally mugged" award, with education and retail nipping at their heels. Hackers expanded their repertoire beyond boring old encryption to the much more exciting world of extortion. The US, UK and Canada took top honors in the "countries most likely to pay up" category. Bitcoins were the currency of choice for discerning hackers, because who doesn't love untraceable money?
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Join our latest Connector Corner webinar to discover how UiPath Integration Service revolutionizes API-centric automation in a 'Quote to Cash' process—and how that automation empowers businesses to accelerate revenue generation. A comprehensive demo will explore connecting systems, GenAI, and people, through powerful pre-built connectors designed to speed process cycle times. Speakers: James Dickson, Senior Software Engineer Charlie Greenberg, Host, Product Marketing Manager
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Corporate and higher education. Two industries that, in the past, have had a clear divide with very little crossover. The difference in goals, learning styles and objectives paved the way for differing learning technologies platforms to evolve. Now, those stark lines are blurring as both sides are discovering they have content that’s relevant to the other. Join Tammy Rutherford as she walks through the pros and cons of corporate and higher ed collaborating. And the challenges of these different technology platforms working together for a brighter future.
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Recently uploaded
(20)
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
How to get the best trade press product reviews
1.
How to get
the best trade press product reviews STL Product Camp 3/14 David Strom @dstrom david@strom.com http://Strominator.com
2.
No follow up
after initial inquiry
3.
Don’t turn any
interested parties down
4.
5.
Don’t pile on the
people on your conference call
6.
Have a real
budget for reviews
7.
Know thy reviewer
8.
Understand the test
bed
9.
Set up a
hotline
10.
What is the
beta policy?
11.
12.
13.
Understand the art
of following up
14.
Know what this
is? Then USE IT!
15.
Badgering the witness
reporter
16.
17.
Where you can
find me • • • • • • david@strom.com Strominator.com (for clips) Webinformant.tv (for video reviews) Twitter: @dstrom LinkedIn.com/in/davidstrom 314 277 7832 if you must
Download now