Submit Search
Upload
February 18 UVic Presentation
•
Download as PPT, PDF
•
0 likes
•
180 views
Debbie Gascoyne
Follow
Technology
Education
Report
Share
Report
Share
1 of 11
Download now
Recommended
Introduction to Web 2.0 Tools-Multimedia Unit 2
Introduction to Web 2.0 Tools-Multimedia Unit 2
mrsbrown526
Social Media Terminologies
Social Media Terminologies
Erin Sean McAtee
Web 2
Web 2
santiago flores
Presentation I did at the Information Authority on behalf of Steve Dale - also involved a lot of practical demos of social media services.
Social Media And The Information Authority
Social Media And The Information Authority
Dave Briggs
Library marketing and outreach via social media.
Marketing2.0
Marketing2.0
jgutacker
Web 2 0 Workshopslideshare
Web 2 0 Workshopslideshare
alkeklibrary
informatica
Web 2
Web 2
Lizbeth Aleidy Zonrixss
Class project.
Web 130 Group 3
Web 130 Group 3
Craig Hunt
Recommended
Introduction to Web 2.0 Tools-Multimedia Unit 2
Introduction to Web 2.0 Tools-Multimedia Unit 2
mrsbrown526
Social Media Terminologies
Social Media Terminologies
Erin Sean McAtee
Web 2
Web 2
santiago flores
Presentation I did at the Information Authority on behalf of Steve Dale - also involved a lot of practical demos of social media services.
Social Media And The Information Authority
Social Media And The Information Authority
Dave Briggs
Library marketing and outreach via social media.
Marketing2.0
Marketing2.0
jgutacker
Web 2 0 Workshopslideshare
Web 2 0 Workshopslideshare
alkeklibrary
informatica
Web 2
Web 2
Lizbeth Aleidy Zonrixss
Class project.
Web 130 Group 3
Web 130 Group 3
Craig Hunt
Information Standards - Featuring Web 2.0 Presentation given at the 2007 SLA Conference. Co-presented with Jill Hurst-Wahl and Ken Okaya.
Information Standards - Featuring Web 2.0
Information Standards - Featuring Web 2.0
Sophia Guevara
IGCSE ICT O-Level
Internet developments
Internet developments
Hira Sohaib
This tutorial presents a high level overview of what is social bookmarking and the implications for education and business.
Social bookmarking
Social bookmarking
The Post Institute: Center for Life-Long Learning
Presentation for VCSU's Welcome Week 2009
Web 2.0
Web 2.0
Jennifer Jenness
Wikis can be powerful tools to help libraries connect and engage with patrons.
Working With Wikis Libraries Aug2007
Working With Wikis Libraries Aug2007
Martha Rossi
Five great ways to use Box
Five great ways to use Box
Digithead
Wicked wikis presentation[1]
Wicked wikis presentation[1]
kokasam
Web
Web
Web
Ana Valencia
Super charge your social bookmarking and PLN building. Vicki Davis (@coolcatteacher, teacher, blogger, co-founder Flat Classroom), Maggie Tsai (co-founder Diigo), and Suzie Nestico (award winning Pennsylvania public school teacher) presented this session face to face and virtually at ISTE 2012 in San Diego.
Bookmarking and Beyond - ISTE 2012
Bookmarking and Beyond - ISTE 2012
Vicki Davis
The lineage of heroes from myth to anti-hero
Heroes
Heroes
Debbie Gascoyne
updated to 2016 MLA 8th edition
Works cited guidelines
Works cited guidelines
Debbie Gascoyne
guidelines for integrating source material in essay writing
In text citations and integrating sources
In text citations and integrating sources
Debbie Gascoyne
key to rhetorical analysis
Green winter
Green winter
Debbie Gascoyne
Background information for teaching Sophocles Oedipus the King
Oedipus Background
Oedipus Background
Debbie Gascoyne
Guidelines for short critical essays about literature
Literature essay guide
Literature essay guide
Debbie Gascoyne
How to analyze an argument essay
Analyzing an argument
Analyzing an argument
Debbie Gascoyne
Paragraph structure for introduction to composition
Tea paragraph keegan
Tea paragraph keegan
Debbie Gascoyne
Guidelines for group Renga project
Renga
Renga
Debbie Gascoyne
Guidelines for in-text citations and works cited list, MLA (consistent with MLA 2009 guidelines)
Works cited guidelines
Works cited guidelines
Debbie Gascoyne
definition and guidelines to help avoid plagiarism
Plagiarism
Plagiarism
Debbie Gascoyne
Examples of beautiful and inspiring prose
Language rhythm
Language rhythm
Debbie Gascoyne
Poetry portfolio
Poetry portfolio
Debbie Gascoyne
More Related Content
What's hot
Information Standards - Featuring Web 2.0 Presentation given at the 2007 SLA Conference. Co-presented with Jill Hurst-Wahl and Ken Okaya.
Information Standards - Featuring Web 2.0
Information Standards - Featuring Web 2.0
Sophia Guevara
IGCSE ICT O-Level
Internet developments
Internet developments
Hira Sohaib
This tutorial presents a high level overview of what is social bookmarking and the implications for education and business.
Social bookmarking
Social bookmarking
The Post Institute: Center for Life-Long Learning
Presentation for VCSU's Welcome Week 2009
Web 2.0
Web 2.0
Jennifer Jenness
Wikis can be powerful tools to help libraries connect and engage with patrons.
Working With Wikis Libraries Aug2007
Working With Wikis Libraries Aug2007
Martha Rossi
Five great ways to use Box
Five great ways to use Box
Digithead
Wicked wikis presentation[1]
Wicked wikis presentation[1]
kokasam
Web
Web
Web
Ana Valencia
Super charge your social bookmarking and PLN building. Vicki Davis (@coolcatteacher, teacher, blogger, co-founder Flat Classroom), Maggie Tsai (co-founder Diigo), and Suzie Nestico (award winning Pennsylvania public school teacher) presented this session face to face and virtually at ISTE 2012 in San Diego.
Bookmarking and Beyond - ISTE 2012
Bookmarking and Beyond - ISTE 2012
Vicki Davis
What's hot
(9)
Information Standards - Featuring Web 2.0
Information Standards - Featuring Web 2.0
Internet developments
Internet developments
Social bookmarking
Social bookmarking
Web 2.0
Web 2.0
Working With Wikis Libraries Aug2007
Working With Wikis Libraries Aug2007
Five great ways to use Box
Five great ways to use Box
Wicked wikis presentation[1]
Wicked wikis presentation[1]
Web
Web
Bookmarking and Beyond - ISTE 2012
Bookmarking and Beyond - ISTE 2012
More from Debbie Gascoyne
The lineage of heroes from myth to anti-hero
Heroes
Heroes
Debbie Gascoyne
updated to 2016 MLA 8th edition
Works cited guidelines
Works cited guidelines
Debbie Gascoyne
guidelines for integrating source material in essay writing
In text citations and integrating sources
In text citations and integrating sources
Debbie Gascoyne
key to rhetorical analysis
Green winter
Green winter
Debbie Gascoyne
Background information for teaching Sophocles Oedipus the King
Oedipus Background
Oedipus Background
Debbie Gascoyne
Guidelines for short critical essays about literature
Literature essay guide
Literature essay guide
Debbie Gascoyne
How to analyze an argument essay
Analyzing an argument
Analyzing an argument
Debbie Gascoyne
Paragraph structure for introduction to composition
Tea paragraph keegan
Tea paragraph keegan
Debbie Gascoyne
Guidelines for group Renga project
Renga
Renga
Debbie Gascoyne
Guidelines for in-text citations and works cited list, MLA (consistent with MLA 2009 guidelines)
Works cited guidelines
Works cited guidelines
Debbie Gascoyne
definition and guidelines to help avoid plagiarism
Plagiarism
Plagiarism
Debbie Gascoyne
Examples of beautiful and inspiring prose
Language rhythm
Language rhythm
Debbie Gascoyne
Poetry portfolio
Poetry portfolio
Debbie Gascoyne
Creative non fiction portfolio
Creative non fiction portfolio
Debbie Gascoyne
overview of writing poetry forms limerick and double-dactyl with examples
Limericks and double dactyls
Limericks and double dactyls
Debbie Gascoyne
What is creative non fiction
What is creative non fiction
Debbie Gascoyne
Literary journalism
Literary journalism
Debbie Gascoyne
Write about person
Write about person
Debbie Gascoyne
Eyre genres
Eyre genres
Debbie Gascoyne
Write About Place
Write About Place
Debbie Gascoyne
More from Debbie Gascoyne
(20)
Heroes
Heroes
Works cited guidelines
Works cited guidelines
In text citations and integrating sources
In text citations and integrating sources
Green winter
Green winter
Oedipus Background
Oedipus Background
Literature essay guide
Literature essay guide
Analyzing an argument
Analyzing an argument
Tea paragraph keegan
Tea paragraph keegan
Renga
Renga
Works cited guidelines
Works cited guidelines
Plagiarism
Plagiarism
Language rhythm
Language rhythm
Poetry portfolio
Poetry portfolio
Creative non fiction portfolio
Creative non fiction portfolio
Limericks and double dactyls
Limericks and double dactyls
What is creative non fiction
What is creative non fiction
Literary journalism
Literary journalism
Write about person
Write about person
Eyre genres
Eyre genres
Write About Place
Write About Place
Recently uploaded
An excellent report on AI technology, specifically generative AI, the next step after ChatGPT from Epam. Impact Assessments, Road Charts with fully updated Results and new charts.
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Copy of the slides presented by Matt Robison to the SFWelly Salesforce user group community on May 2 2024. The audience was truly international with attendees from at least 4 different countries joining online. Matt is an expert in data cloud and this was a brilliant session.
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
As privacy and data protection regulations evolve rapidly, organizations operating in multiple jurisdictions face mounting challenges to ensure compliance and safeguard customer data. With state-specific privacy laws coming up in multiple states this year, it is essential to understand what their unique data protection regulations will require clearly. How will data privacy evolve in the US in 2024? How to stay compliant? Our panellists will guide you through the intricacies of these states' specific data privacy laws, clarifying complex legal frameworks and compliance requirements. This webinar will review: - The essential aspects of each state's privacy landscape and the latest updates - Common compliance challenges faced by organizations operating in multiple states and best practices to achieve regulatory adherence - Valuable insights into potential changes to existing regulations and prepare your organization for the evolving landscape
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
With more memory available, system performance of three Dell devices increased, which can translate to a better user experience Conclusion When your system has plenty of RAM to meet your needs, you can efficiently access the applications and data you need to finish projects and to-do lists without sacrificing time and focus. Our test results show that with more memory available, three Dell PCs delivered better performance and took less time to complete the Procyon Office Productivity benchmark. These advantages translate to users being able to complete workflows more quickly and multitask more easily. Whether you need the mobility of the Latitude 5440, the creative capabilities of the Precision 3470, or the high performance of the OptiPlex Tower Plus 7010, configuring your system with more RAM can help keep processes running smoothly, enabling you to do more without compromising performance.
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Cisco CCNA
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Read about the journey the Adobe Experience Manager team has gone through in order to become and scale API-first throughout the organisation.
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
writing some innovation for development and search
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Microsoft's Threat Matrix for Kubernetes helps organizations understand the attack surface a Kubernetes deployment introduces to their environments. This ensures that adequate detections and mitigations are in place. By covering over 40 different attacker techniques, defenders can learn about Kubernetes-specific mitigations and controls to deploy to their environments. In this session, we will explore the MS-TA9013 Host Path Mount technique, which is commonly used by attackers to perform privilege escalation in a Kubernetes cluster. Attendees will learn how attackers and defenders can: * Escape the container's host volume mount to gain persistence on an underlying node * Move laterally from the underlying node into the customer's cloud environment * Analyze Kubernetes audit logs to detect pods deployed with a hostPath mount * Deploy an admission controller that prevents new pods from using a hostPath mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
These are the slides delivered in a workshop at Data Innovation Summit Stockholm April 2024, by Kristof Neys and Jonas El Reweny.
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Enterprise Knowledge’s Urmi Majumder, Principal Data Architecture Consultant, and Fernando Aguilar Islas, Senior Data Science Consultant, presented "Driving Behavioral Change for Information Management through Data-Driven Green Strategy" on March 27, 2024 at Enterprise Data World (EDW) in Orlando, Florida. In this presentation, Urmi and Fernando discussed a case study describing how the information management division in a large supply chain organization drove user behavior change through awareness of the carbon footprint of their duplicated and near-duplicated content, identified via advanced data analytics. Check out their presentation to gain valuable perspectives on utilizing data-driven strategies to influence positive behavioral shifts and support sustainability initiatives within your organization. In this session, participants gained answers to the following questions: - What is a Green Information Management (IM) Strategy, and why should you have one? - How can Artificial Intelligence (AI) and Machine Learning (ML) support your Green IM Strategy through content deduplication? - How can an organization use insights into their data to influence employee behavior for IM? - How can you reap additional benefits from content reduction that go beyond Green IM?
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Slides from the presentation on Machine Learning for the Arts & Humanities seminar at the University of Bologna (Digital Humanities and Digital Knowledge program)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Discover the advantages of hiring UI/UX design services! Our blog explores how professional design can enhance user experiences, boost brand credibility, and increase customer engagement. Learn about the latest design trends and strategies that can help your business stand out in the digital landscape. Elevate your online presence with Pixlogix's expert UI/UX design services.
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
In an era where artificial intelligence (AI) stands at the forefront of business innovation, Information Architecture (IA) is at the core of functionality. See “There’s No AI Without IA” – (from 2016 but even more relevant today) Understanding and leveraging how Information Architecture (IA) supports AI synergies between knowledge engineering and prompt engineering is critical for senior leaders looking to successfully deploy AI for internal and externally facing knowledge processes. This webinar be a high-level overview of the methodologies that can elevate AI-driven knowledge processes supporting both employees and customers. Core Insights Include: Strategic Knowledge Engineering: Delve into how structuring AI's knowledge base is required to prevent hallucinations, enable contextual retrieval of accurate information. This will include discussion of gold standard libraries of use cases support testing various LLMs and structures and configurations of knowledge base. Precision in Prompt Engineering: Learn the art of crafting prompts that direct AI to deliver targeted, relevant responses, thereby optimizing customer experiences and business outcomes. Unified Approach for Enhanced AI Performance: Explore the intersection of knowledge and prompt engineering to develop AI systems that are not only more responsive but also aligned with overarching business strategies. Guiding Principles for Implementation: Equip yourself with best practices, ethical guidelines, and strategic considerations for embedding these technologies into your business ecosystem effectively. This webinar is designed to empower business and technology leaders with the knowledge to harness the full potential of AI, ensuring their organizations not only keep pace with digital transformation but lead the charge. Join us to map a roadmap to fully leverage Information Architecture (IA) and AI chart a course towards a future where AI is a key pillar of strategic innovation and business success.
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Building Digital Trust in a Digital Economy Veronica Tan, Director - Cyber Security Agency of Singapore Apidays Singapore 2024: Connecting Customers, Business and Technology (April 17 & 18, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Created by Mozilla Research in 2012 and now part of Linux Foundation Europe, the Servo project is an experimental rendering engine written in Rust. It combines memory safety and concurrency to create an independent, modular, and embeddable rendering engine that adheres to web standards. Stewardship of Servo moved from Mozilla Research to the Linux Foundation in 2020, where its mission remains unchanged. After some slow years, in 2023 there has been renewed activity on the project, with a roadmap now focused on improving the engine’s CSS 2 conformance, exploring Android support, and making Servo a practical embeddable rendering engine. In this presentation, Rakhi Sharma reviews the status of the project, our recent developments in 2023, our collaboration with Tauri to make Servo an easy-to-use embeddable rendering engine, and our plans for the future to make Servo an alternative web rendering engine for the embedded devices industry. (c) Embedded Open Source Summit 2024 April 16-18, 2024 Seattle, Washington (US) https://events.linuxfoundation.org/embedded-open-source-summit/ https://ossna2024.sched.com/event/1aBNF/a-year-of-servo-reboot-where-are-we-now-rakhi-sharma-igalia
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
My presentation at the Lehigh Carbon Community College (LCCC) NSA GenCyber Cyber Security Day event that is intended to foster an interest in the cyber security field amongst college students.
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Recently uploaded
(20)
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
February 18 UVic Presentation
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Download now