A beginner's guide to social media, particularly for those working in government, engineering, and/or public works.. This ebook walks beginners through the sign-up process of each major social media tool available today. The tone is fun and conversational.
Becoming a Blog and Social Media EntrepreneurJanette Toral
Ā
Overview of Ateneo de Manila University and DigitalFilipino.com "Certified Blog and Social Media Entrepreneur Program" (http://www.digientrepreneur.com). Online class starts on June 13, 2012.
Digital Philippines 2011 Yahoo - Nielsen Net Index HighlightsJanette Toral
Ā
In 2009, Yahoo!-Nielsen Net Index study was launched to gather an baseline understanding of the Filipino internet user
Building on this foundation, the study was repeated in 2010 to track shifts in user behaviour and evolving preferences
In 2011, the study continues to evolve, to reflect the changing digital landscapeā¦whilst maintaining key longitudinal measures.
Youth's Role in Social Media and E-Commerce GrowthJanette Toral
Ā
A presentation given by Janette Toral encouraging the youth to form their start-ups serving the needs of their market last January 25 at Lingayen Pangasinan for the Creative Alliance Services ICT Seminar Series 2012.
Measuring Success with Google Analytics - which traffic sources are more like...NetSquared Vancouver
Ā
Eli van der Giessen rips apart the David Suzuki Foundationās recent action alert and uses it as a case study to demonstrate how to use Google Analytics goal-tracking and link tagging to measure which traffic sources are most useful. Which group is more likely to complete an action? Email subscribers or Facebook Like-ers?
A beginner's guide to social media, particularly for those working in government, engineering, and/or public works.. This ebook walks beginners through the sign-up process of each major social media tool available today. The tone is fun and conversational.
Becoming a Blog and Social Media EntrepreneurJanette Toral
Ā
Overview of Ateneo de Manila University and DigitalFilipino.com "Certified Blog and Social Media Entrepreneur Program" (http://www.digientrepreneur.com). Online class starts on June 13, 2012.
Digital Philippines 2011 Yahoo - Nielsen Net Index HighlightsJanette Toral
Ā
In 2009, Yahoo!-Nielsen Net Index study was launched to gather an baseline understanding of the Filipino internet user
Building on this foundation, the study was repeated in 2010 to track shifts in user behaviour and evolving preferences
In 2011, the study continues to evolve, to reflect the changing digital landscapeā¦whilst maintaining key longitudinal measures.
Youth's Role in Social Media and E-Commerce GrowthJanette Toral
Ā
A presentation given by Janette Toral encouraging the youth to form their start-ups serving the needs of their market last January 25 at Lingayen Pangasinan for the Creative Alliance Services ICT Seminar Series 2012.
Measuring Success with Google Analytics - which traffic sources are more like...NetSquared Vancouver
Ā
Eli van der Giessen rips apart the David Suzuki Foundationās recent action alert and uses it as a case study to demonstrate how to use Google Analytics goal-tracking and link tagging to measure which traffic sources are most useful. Which group is more likely to complete an action? Email subscribers or Facebook Like-ers?
Hitching A Ride Through the Knowledge Universe on the Social Media ExpressKerrieAnne Christian
Ā
My journey of social media discovery - applied to knowledge management, quality management, project management, reliability, lean & maintenance engineering - implications for information management governance
Government and Social Media: The Legal Issues to ConsiderWalter Neary
Ā
This column by attorney Ramsey Ramerman details important concerns for local elected officials and local governments to consider when they use social media like Twitter, Facebook and blogs. The column is particularly useful for Washington State, where Ramerman is an assistant city attorney for the city of Everett. This reprint appears with the kind permission of the Association of Washington Cities. This column first appeared in the September 2009 issue of their magazine, CityWise.
A comprehensive over view of how customer service, PR and marketing professionals can use incorporate social media into their customer care or over all marketing communications mix.
Hitching A Ride Through the Knowledge Universe on the Social Media ExpressKerrieAnne Christian
Ā
My journey of social media discovery - applied to knowledge management, quality management, project management, reliability, lean & maintenance engineering - implications for information management governance
Government and Social Media: The Legal Issues to ConsiderWalter Neary
Ā
This column by attorney Ramsey Ramerman details important concerns for local elected officials and local governments to consider when they use social media like Twitter, Facebook and blogs. The column is particularly useful for Washington State, where Ramerman is an assistant city attorney for the city of Everett. This reprint appears with the kind permission of the Association of Washington Cities. This column first appeared in the September 2009 issue of their magazine, CityWise.
A comprehensive over view of how customer service, PR and marketing professionals can use incorporate social media into their customer care or over all marketing communications mix.
Presentation I gave at Innotech in fall of 2008 on Practical Government and the importance of Open Data standards. kind derivative of others here... but I did promise I would publish it (though I'm a bit late...)
This presentation looks at "web2" in the context of human experience, suggesting that the social web as extension of "real life" means that it transcends the marketing-biased, "numbered web" hype that has typically surrounded it.
The slides focus particularly on the use of "social web" tools in the enterprise.
I will present these slides at Online Information 4th December 2008. See http://www.online-information.co.uk/online08/seminar_description_ims.html?presentation_id=442 for more information
"If you love your content, set it free" ?Mike Ellis
Ā
Traditional business models have scarcity at their core: when something is scarce, it becomes valuable. Online, this notion is challenged: in a world where every one of us can copy and distribute content at the click of a mouse, notions of āscarcityā become more and more distant from reality. Several commentators have suggested that scale ā i.e. providing more access to āvaluableā content rather than less ā is actually a more scalable business model for the online economy. This session will look at ways in which content can be freed, and will also examine some of the issues which follow around control and authority.
Engagement with Stakeholders in CCR&R: What Does Social Networking Have to Do...Engagement Strategies, LLC
Ā
A presentation at the Ohio Child Care Resource ad Referral Agency Conference on October 13, 2010. This presentation covers an overview of social networking, best practice, social media policies, and takes a deep dive into blogging, Facebook, LinkedIn, and Twitter.
6 damaging myths about social media and the truths behind themThe Social Executive
Ā
Why with so much evidence about the value of social media do so few executives use it? They're anchored to 6 damaging myths about social media that hold them back. Here are the truths.
Social Media & Digital Marketing: A ReflectionNew Mediators
Ā
A Pecha Kucha (20x20) to reflect on the modern digital and social media consumer. How has it come about that we depend on technology as much as it depends on us? And what can we make of that?
This discussion was designed for a one-hour meeting of Fashion & Branding lecturers at the Amsterdam Fashion Institute in October 2015.
Designing twenty-ļ¬rst century organisations with social toolsLee Bryant
Ā
A talk I gave at the Somesso London Conference in May 2009 about how we can take forward the idea of social business design to finally move beyond the legacy Twentieth-Century model of corporate structure
Social Media: an Obligation, an Opportunity, or a ThreatNinetyTen
Ā
Is online social media really a threat, or a great opportunity.
This presentation aims to:
1) Discuss the social media landscape as it stands with reference to public networks and common conceptions
2) Show how a social network resonates as a model for associations and their goals
3) Look at how private and public social networks can become a threat to an association, with examples
4) Cover using a private social network for an association and how to get the best from it
5) Show how to use the best of both (private & public social networks)
Case studies from outside of the membership sector will include:
- Channel 4
- Nokia
Proximity Prague Digital Team is holding meeting every friday. This is one from presentation shown on usual friday's - we look at trends, show cases, interesting samples, studies, numbers. Last friday i took Hype Cycle for technology from Gartner, separated it into few views and added samples of some emerging technologies. Presentation ends with insight into interesting article from ZDNet - showing social media fails.
ViO Presentation The Future of Communications and Virtual EnvironmentsWill Burns
Ā
A quick presentation concerning the future of communications and virtual environments, given on May 2nd 2010 in SecondLife at the ViO Business Group Auditorium
I gave this impromptu presentation at Designcamp Jan 2009. I was inspired by an openslot and decided to talk to the designers about opensource...
sorry no pretty pics here either! it was a quickie!
wow this is very old from 2005 when lotv had just been born. I came up with the idea in 2004 and registered in Oct of 04 with the state of Texas as a NPO.
In 2005 I went for IRS 501c3 status which took 2 yrs!
This is a presentation I did for grid.org. it is a big sad for me now since because of the recession I didn't get to realize all the wonderful contents. But I think it is a great starting point.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Ā
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
Ā
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Ā
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Ā
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Ā
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Ā
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Ā
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Ā
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatās changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
3. If you
search on
Silona - top
40 hits
Iām the only
āsilona
Bonewaldā
in the
world
http://google.com
Note 5 Social networks
my personal site
and a business site
who I am is also who I know and associate with.
4. ā¢ On the Internet since 86
ā¢ On the web since inception
ā¢ Ran political campaigns 89-94
ā¢ Wrote political software 94-96
ā¢ started ISP 97
ā¢ large CMS systems 98-04
ā¢ started LoTV 04- present
ā¢ OS Evangelist for grid.org
brief resume - drift over this... you can validate it all on Google
5. Techie
politico
My
personas gamer
Auntie nona
hippie?
actually not a hippie more a burner ala burningman. But we become what people label us...
6. What is a social
network?
a person and their āfriendsā
7. Illustrates connections btn Govt, people online and people not online and the connections btn the
two
http://www.cheswick.com/ches/map/gallery/wired.gif
10. Wikipedia currently lists
120+ ānotableā social networking sites
MySpace Facebook LinkedIn
orkut
Windows Live Spaces Xanga
netlog LiveJournal
Reunion.com
yelp Friendster
Hi5
Broadcaster.com
bebo
their numbers will surprise you
as will their purposes...
http://en.wikipedia.org/wiki/List_of_social_networking_websites
en.wikipedia.org/wiki/List_of_social_networking_websites
11. What is a Social
Graph?
the actual mathematical mappings of those objects and their relationships - something
quantiļ¬able!
12. WhY use a social
network service?
what is your purpose and why should they come and STAY?
dunbar number story
to remain competitive
psychometric data to understand your clients better
real numbers for continued funding
19. Thru Obscurity?
http://www.ļ¬ickr.com/photos/randomskk/943054175/
you can hide but they will ļ¬nd you
CRM, HIPAA, grocery store, credit scores
your privacy is already gone.
focus on your rights!
20. Why hasnāt the data all merged?
it will.
it is a matter of time and
money
tell the Microsoft CRM story about frontpage
lazy companies CRM
lazy companies marketing
poor companies
not selling that data YET
22. Nor is this...
http://www.ļ¬ickr.com/photos/ndm007/171398958/
http://www.ļ¬ickr.com/photos/ndm007/171398958/
23. Embrace the change
http://www.ļ¬ickr.com/photo_zoom.gne?id=122906768&size=l
We are entering a new era
new rules
24. What are the trends?
746,934,000 on Internet (772 in May)
10% increase from last year
70mi new people
Social Networks doubled in users from 2005-06
verizon data services grew by 2bi last quarter
Juniper research revenue of Social networks from
$572mi in 2007 to 3.1bi in 2012 (this doesnāt count the
worth of data) with a focus on mobile platforms
estimated that phone companies make 20% off data
services this year
71% of myspace and friendster >25 yrs old
25. For Govt to
participate with
web 2.0
We need to know the
new rules
26. Web 2.0
Tech that enables
Sharing
Collaborating
Creativity
27. Sharing
Is giving way to the idea of copy-left with new licensing models like creative commons and public domain.
Even mainstream artists like Radiohead are trying pay what you can models as they know they canāt really
ļ¬ght the growth of ļ¬le sharing.
28. collaboration.
Collaboration
http://www.ļ¬ickr.com/photo_zoom.gne?id=522432567&size=o
collaborative model, with competitors actually coming together to discuss delivering better customer
experiences. We are calling this phenomenon co-opetition.
31. openness means...open access to the information
or material resources needed for a diverse range of
users/producers/contributors to contribute to
projects.
wikipedia.org
open access to information is needed...in order to achieve true openness, you have to be
totally...
33. Trust
goes
both
ways
http://www.ļ¬ickr.com/photos/icyrae/172495321/
you have to trust citizens as well as citizensā trusting you for this to work!
34. Dual Transparency
how to mitigate the risks of online participation?
systems will always be gamed
how to create a system that can be ļ¬xed and have repercussions for poor behavior
jury trials - let peers sort it out
which leads to ...
36. It isnāt about trusting the
individual.
it is about trusting the
community.
Use tools that do this...
(social networks)
talk about wikipedia examples - talk a bit about GOOD HEALTHY communities
37. This is the good side of the
lack of privacy
free to make own judgments
and be responsible for them
again HEALTHY community
38. Forgive
ness
http://www.ļ¬ickr.com/photos/spaunsglo/391581637/
http://www.ļ¬ickr.com/photos/spaunsglo/391581637/
context again - 3 yrs old
42. Context
transparency
honesty
real honesty is a complex thing
43. how?
Weblogs Social Software
Wikis Tagging
google Docs Social bookmarking
Podcasts Forums or discussion
RSS Feeds groups
Chat
APIs and Services
see resources slide at end of prezo
51. The Inexpensive way...
Let the community do it!
we want your data
and then they are accountable for the interpretation
52. It is the easiest thing
Govt can do...
gsa.gov has some nifty publications
53. let citizens
illuminate it
for you
Of course -
then Citizens are responsible for what They say
and how They interpret it...
an added bonus
then you donāt have to grow a community on your site.
57. case study:
san diego fires, a concerned citizen
and Twitter, flickr, and mashups
Citizen safety
58. SMS and Cell phones
A friend of ours, Nate, who lives in San Diego started publishing up to date information regarding the San
Diego ļ¬res. The kind of stuff that you could really only ļ¬nd out by being there, searching around the net for
every piece of information possible and having access to the right information feeds...
59. notice
tags
notice
tags
In fact, he is probably sending out a tweet every couple of minutes with updates on shelters that are ļ¬lling up,
links to photos taken by locals, places where you can send donations, etc. Nate was able, through Twitter, to
actually help individuals ļ¬nd out speciļ¬c information about their loved ones in the area. It was like having our
very own newscaster.
60. notice
tags
What was even more signiļ¬cant was that the LAFD, who have a twitter account, had tweeted earlier that they
were not covering the ļ¬res as it was out of their jurisdiction and, from what we could tell, there wasnāt a twitter
account set up for the San Diego department. That being said, if there WERE, we would have expected them
to be ļ¬ghting the ļ¬res, not stopping to twitter every couple of minutes. This type of partnership with a
concerned citizen who can deliver this information is one of the amazing things that happens time and time
again.
62. With data -
mashups can occur!
http://blog.programmableweb.com/2007/10/24/track-california-fires-via-mashups/
http://twitter.com/kpbsnews
http://www.programmableweb.com/code
63.
64.
65.
66. Texas coming soon!
gather data from publicly available and posted online
legislation
campaign ļ¬nance
and then adds in categories of special interests - vetted by specialists on their team.
LoTV will be helping with Texas and creating an open standard of data exchange
69. The UK OPSI, is working on having referenceable URIs in every section of every document it publishes and is working on publishing the London
Gazette in RDF form and using Semantic Web technology in deļ¬ning small notices. This could act as a root leading to a trunk of data-mashing and
ļ¬owering of utility.
http://www.w3.org/2007/06/eGov-dc/summary
74. Web Standards
constantly change
http://www.ļ¬ickr.com/photos/mrfrosted/278847814
75. 5 paragraphs
Sen 4
Sub
committee
Sen 1
Sen 3
Sen 2
D1 at 100 D2 at 100 D3 at 125 D5 at 100
Senator 1 has
425K from SBC
related
interests
SBC
So that we can let citizens create mappings like this
76. New Zealand
wiki for input on sunset
review of police riot act
14000 edit in one day
http://www.e.govt.nz
1) About the same size as most states 4mi people
2) involved populace
3) internet connectivity isnāt even close to as good as here
82. establish a community
take a lesson from
wikipedia!
make citizens part of
that process
what is a citizen?
remember that citizens are varied! have multiple personas associate with groups and remember
that groups are citizens as well!
83. Openness
1) platform
2) clarity
3) be available
4) foster creativity
5) Accomplishments
6) accountable
7) Diversity
8) be accessible
9) respect
10) usability
84. 1) platform
become a data Source!
openApiās - making data available
Free and open Source software
allows customization (let us write
widgets for YOU!)
is a system that can be programmed and therefore customized by outside developers ā users ā and in that way, adapted to countless needs and
niches that the platform's original developers could not have possibly contemplated, much less had time to accommodate. āMarc Andreessen,
http://blog.pmarca.com/2007/09/the-threekinds.html
85. 2) Clarity
try to publish everything openly
Think blogs, wikis, groups, chat etc
e.govt.nz has a good policy for their
employees
86. IM me Email Me
3) availability
let people contact you directly and answer
them openly
call me comment here
87. 4) Creativity
Recognize that mistakes will
happen
Fix and forgive
with openness people will forgive you too!
88. 5) Accomplishments
Recognize contributors
run open betas
do press releases
acknowledging collaborators
89. 6) accountable
be clear about progress
accept failure and successes
let people know who does what
90. 7) Diversity
Key element of a healthy
community
Encourage participation from
different people from different
areas and backgrounds
91. 8) Accessible
remember those that are
challenged more by technology
(digital divide, elderly, disabled)
94. League of Technical Voters
is creating a
Free and Open Source
Social Network
Why?
95. Creating a new
standard for
Dual Transparency
partnering with some amazing groups like brad ļ¬tzpatrick, tantek celik, plaxo, facebook, linkedin,
digg,
99. federated identities
networks
I recommend
New Zealandās IVS
- great on privacy rights
http://www.e.govt.nz/services/resources/news/2007/20070927.html
100.
101. OpenSocial - Brad Fitzpatrick
wikipedia says:
āOpenSocial is a set of common application programming interfaces (APIs) for web-based social network applications, developed by Google, and
released November 1, 2007.[1] Applications implementing the OpenSocial APIs will be interoperable with any social network system that supports
them, including features on sites such as MySpace[2] and Friendster.[3]ā
Partners: Myspace, bebo, Sixapart, Hi5, Friendster, LinkedIn, Ning, Orkut, wink
102. OpenID
OpenID - brad Fitspartick, Dick hardt, AOL,
and many others
Using a few users of OpenID: AOL Digg livejournal microsoft wikipedia plaxo slashdot wordpress
Jyte, Ma.gnolia.com or Zooomr VOX twitter
103. my have the key to making OpenID secure by updating the browser talking to Mozilla and Microsoft
right now
104. OAuth
donāt worry about this just make sure your tech guys know!
āMany luxury cars today come with a valet key. It is a special key you give the parking attendant and unlike your regular key, will not allow the car
to drive more than a mile or two. Some valet keys will not open the trunk, while others will block access to your onboard cell phone address book.
Regardless of what restrictions the valet key imposes, the idea is very clever. You give someone limited access to your car with a special key, while
using your regular key to unlock everything.
Everyday new website offer services which tie together functionality from other sites. A photo lab printing your online photos, a social network using
your address book to look for friends, and APIs to build your own desktop application version of a popular site. These are all great services ā what
is not so great about some of the implementations available today is their request for your username and password to the other site. When you
agree to share your secret credentials, not only you expose your password to someone else (yes, that same password you also use for online
banking), you also give them full access to do as they wish. They can do anything they wanted ā even change your password and lock you out.
This is what OAuth does, it allows the you the User to grant access to your private resources on one site (which is called the Service Provider), to
another site (called Consumer, not to be confused with you, the User). While OpenID is all about using a single identity to sign into many sites,
OAuth is about giving access to your stuff without sharing your identity at all (or its secret parts).ā
110. The real reason...
I use many pictures of children in this prezo...
because this is the reality of whose system this will be and who will be using it in the future. We
have to plan for them and understand the newer generation that is adopting these systems
worldwide at an amazing rate.
111. Credits:
many concepts here are borrowed from
http://www.slideshare.net/missrogue
http://participation.e.govt.nz
images are credited on each slide
URLās are listed on each screen capture
The picture of me is not released under Creative commons license but
is All rights reserved by Steven Noreyko. It may be copied for
purposes of redistributing this presentation but may not be altered
or reused in a different context.
Font is evil Genius BB
statistic are from comScore World matrix
http://www.comscore.com/press/release.asp?press=1242
http://socnetwork.blogspot.com
112. Learn more:
what is a...
wiki? http://www.commoncraft.com/video-wikis-plain-english
Blog? http://www.blogbasics.com/blog-tutorial-1-1.php
google doc? can you use word? you donāt need one! http://docs.google.com
rss feed? http://www.commoncraft.com/rss_plain_english
podcast? http://www.commoncraft.com/mygads
Chat? http://www.davesite.com/webstation/inet101/chat01.shtml
Social Software? http://www.commoncraft.com/video-social-networking
SMS texting? http://www.commoncraft.com/mygads
Social Bookmarking? http://www.commoncraft.com/bookmarking-plain-english
forums/bulletin board groups? http://www.commoncraft.com/archives/000768.html