Social media allows people to connect and share information online. It refers to websites and apps that enable users to create and share content or participate in social networking. Popular social media sites include Facebook, Twitter, YouTube, and Skype. They allow users to communicate through messaging, video calls, sharing photos and videos. While social media has benefits like connecting people, it also presents privacy and security risks that users should be aware of.
Being a child or teenager today is not easy, the rise of cyberbullying, teen suicide, self harm and eating disorders amongst young adults has hit alarming numbers. This talk is to create awareness of the different social media platforms that are out there. It includes tips and advice on how to help your child or teenager become aware of what they are doing online and educate parents on the world of social media.
Medium: Twitter's Formative Years (2009) Creative Non-Fiction Brett Ruffenach
Creative non-fiction piece about Twitter. Written in 2009, this piece covers Twitter's formative years and looks at it from all sides as a new communication channel.
Being a child or teenager today is not easy, the rise of cyberbullying, teen suicide, self harm and eating disorders amongst young adults has hit alarming numbers. This talk is to create awareness of the different social media platforms that are out there. It includes tips and advice on how to help your child or teenager become aware of what they are doing online and educate parents on the world of social media.
Medium: Twitter's Formative Years (2009) Creative Non-Fiction Brett Ruffenach
Creative non-fiction piece about Twitter. Written in 2009, this piece covers Twitter's formative years and looks at it from all sides as a new communication channel.
Social Networking: Advantages, Disadvantages, Uses, Examples, Means of social communicating, Risks while communicating, Cautions to be taken.
This presentation is made for teachers who want to teach about social networking (Note: No pictures and fancy backgrounds added, so that you can edit it if you want).
Facebook, Whatsapp & Instagram for seniorsRobin Low
Seniors need to connect and learn social media.
It has many benefits
It helps them keep in touch, gives them entertainment, allow them to share their experience, it helps them find deals and help them form special interest groups online to combat senior loneliness.
Reach Out Pro Module - Connecting Our Worlds
Part 2
This document is designed to give you a basic overview of some of the popular programs, sites and technologies in use by young people. This overview is intended to give you a flavour of the technologies, but is not intended as a complete guide to the programs.
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"Bright One
Charities have grasped the opportunities that social media gives to communicate with their supporters, often being nimbler and more innovative than their private sector counterparts. Facebook and Twitter have become the dominant platforms, allowing charities to communicate directly with their supporters using rich and engaging content. But with new platforms on the rise - including social networks like Google+, mobile apps like Instagram, and devices liked the iPad - new and ever more divergent opportunities for stakeholder engagement are becoming apparent.
Whether communicating with donors, funders, government, internally or with 'free agents', charities face bigger challenges - and threats - more than ever. How can charities keep up with new technologies and platforms? What should their strategic approach be to ensure they are making the most of these opportunities? What are the risks and how can these be overcome?
Social Networking: Advantages, Disadvantages, Uses, Examples, Means of social communicating, Risks while communicating, Cautions to be taken.
This presentation is made for teachers who want to teach about social networking (Note: No pictures and fancy backgrounds added, so that you can edit it if you want).
Facebook, Whatsapp & Instagram for seniorsRobin Low
Seniors need to connect and learn social media.
It has many benefits
It helps them keep in touch, gives them entertainment, allow them to share their experience, it helps them find deals and help them form special interest groups online to combat senior loneliness.
Reach Out Pro Module - Connecting Our Worlds
Part 2
This document is designed to give you a basic overview of some of the popular programs, sites and technologies in use by young people. This overview is intended to give you a flavour of the technologies, but is not intended as a complete guide to the programs.
CIPR Fifth Estate - Voluntary Sector Group: "Social Media - an introduction"Bright One
Charities have grasped the opportunities that social media gives to communicate with their supporters, often being nimbler and more innovative than their private sector counterparts. Facebook and Twitter have become the dominant platforms, allowing charities to communicate directly with their supporters using rich and engaging content. But with new platforms on the rise - including social networks like Google+, mobile apps like Instagram, and devices liked the iPad - new and ever more divergent opportunities for stakeholder engagement are becoming apparent.
Whether communicating with donors, funders, government, internally or with 'free agents', charities face bigger challenges - and threats - more than ever. How can charities keep up with new technologies and platforms? What should their strategic approach be to ensure they are making the most of these opportunities? What are the risks and how can these be overcome?
Here we have entirely explained about Social media powerpoint presentation. Every slide in this presentation is powered by www.slideegg.com(Slideegg).
If you need to download these Social media PowerPoint templates, you can visit https://www.slideegg.com
Effects of Social Media on Young AdultsRatan Rajpal
Social media has taken the world by storm through dozens of websites, mobile apps, and other forms of technologies improving the way people communicate with each other. There are social media sites that have millions of members allowing them to share photos, videos, text messages, and more on a regular basis. There are a large number of advantages and disadvantages to using such sites that leave researchers wondering if we are better off without it. Has social media improved or damaged the way people connect with each other?
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
How to socialize in modern age
1.
2.
3. INTRODUCTION TO SOCIAL MEDIA
Through the use of social media, people can exchange
photos and videos, post their thoughts on blogs, and
participate in discussions hosted by online forums.
Social media also allow individuals, companies,
organizations, governments, and parliamentarians to
reach large numbers of people.
The term “social media” refers to the wide range of
Internet-based and mobile services that allow users to
participate in online exchanges, contribute user-created
content, or join online communities.
Social media is strongly influencing Pakistan’s
international relations. Anybody with a basic knowledge
of internet and other media tools can reach out and
interact with the global audiences any time.
4. WHAT IS SOCIAL MEDIA?
Social media is media designed to be disseminated through social
interaction, created using highly accessible and scalable publishing
techniques.
Social Media IS NOT
A fad
A replacement for traditional advertising
The first step
The magic bullet
FREE
All about YOU
Social Media IS
A big deal
Going where your customers already are or where they want to be
Applicable to most companies in some way or another
Time-consuming
All about THEM
5. LIFE BEFORE SOCIAL MEDIA!
1. People accessed Internet mainly to check their e-mails
2. Mobile phones were mostly used to talk and for sending messages
only
3. People were physically social, i.e. meeting other people personally
and communicating with them
4. School going children were more into outdoor activities
5. Users used to spend lesser time on the Web
6. An average person was not too keen in sharing his likes and dislikes
with the world
7. Businesses were focused on using only traditional mediums like TV,
print, etc. to advertise their products or services
8. Celebrities relied hugely on their PR agents to publicize their brand
image
9. Employees spent lesser time online at offices during working hours
10. Friends and relatives were wished on special occasions like
birthdays through telephones, messages and greeting cards.
6. USES OF SOCIAL MEDIA
Reasons for using the social networking sites varied.
Communication with family and friends was the most popular
reason students used social media, with 91.7% of participants
indicating this was the reason.
59.4% students said they used the sites for entertainment.
57.3% students said they used the sites when they felt bored.
Additional reasons reported included planning activities (33.3%),
companionship (11.5%).
Other reasons such as communicating with people far away
(10.4%).
The Department of Human Services updates official accounts on
the social networking websites YouTube, Facebook and Twitter as
an additional way of sharing information with you about
government support, services and payments.
The department also monitors issues in social media and responds
to customer questions and complaints in a range of online forums
and social networking sites.
8. POSSIBLE ADVANTAGES
Some possible advantages of social media are following :
Facilitates open communication, leading to enhanced information
discovery and delivery.
Allows employees to discuss ideas, post news, ask questions and
share links.
Provides an opportunity to widen business contacts.
Targets a wide audience, making it a useful and effective
recruitment tool.
Improves business reputation and client base with minimal use of
advertising.
Kids can gain social confidence from interacting with other people
online, which may help them feel more secure in new situations,
such as going to college, joining a sports team, and meeting new
friends.
Online communities can be very diverse and expose your child to
many new viewpoints, ideas, and opinions that she/he may not be
familiar with.
9. POSSIBLE DISADVANTAGES
Opens up the possibility for hackers to commit fraud and
launch spam and virus attacks.
Increases the risk of people falling prey to online scams
that seem genuine, resulting in data or identity theft.
May result in negative comments from employees about
the company or potential legal consequences if
employees use these sites to view objectionable, illicit
or offensive material.
Potentially results in lost productivity, especially if
employees are busy updating profiles, etc.
10.
11.
12. Facebook history
Facemash, the Facebook’s predecessor, opened on
October 28, 2003. Initially, the website was invented by a
Harvard student, Mark Zuckerberg, and three of his
classmates.
Zuckerberg wrote the software for the Facemash
website when he was in his second year of college.
The website was set up as a type of “hot or not” game
for Harvard students.
In January 2004, Mark Zuckerberg began writing the
code for a new website, known as the “facebook”.
15. NOTIFICATIONS
NOTIFICATIONS OF THE MORE IMPORTANT EVENTS, FOR EXAMPLE, SOMEONE SHARING
A LINK ON THE USER'S WALL OR COMMENTING ON A POST THE USER PREVIOUSLY
COMMENTED ON, BRIEFLY APPEAR FOR A FEW SECONDS IN THE BOTTOM LEFT AS A
POPUP MESSAGE (IF THE USER IS ONLINE), AND A RED COUNTER IS UPDATED ON THE
TOOLBAR AT THE TOP, THUS ALLOWING THE USER TO KEEP TRACK OF ALL THE MOST
RECENT NOTIFICATIONS.
16. CHAT
ON APRIL 5, 2008, FACEBOOK PRE-RELEASED FACEBOOK CHAT. AS OF APRIL 23, 2008,
FACEBOOK CHAT WAS RELEASED TO THE ENTIRE FACEBOOK USER BASE. USERS MAY CHAT
WITH THEIR FACEBOOK FRIENDS ON A ONE-TO-ONE BASIS, OR A USER MAY CHAT WITH
MULTIPLE FRIENDS SIMULTANEOUSLY THROUGH THE GROUPS FEATURE.
17. LIKE
INTRODUCED IN APRIL 2010, BY SEPTEMBER 2010 OVER 350,000 SITES HAD INSTALLED
USERS CAN "LIKE" STATUS UPDATES, COMMENTS, PHOTOS, AND LINKS POSTED BY THEIR
FRIENDS, AS WELL AS ADVERTS, BY CLICKING THE "LIKE" BUTTON AT THE BOTTOM OF THE
CONTENT. THIS MAKES THE CONTENT APPEAR IN THEIR FRIENDS' NEWS FEED.
25. Twitter
Twitter is an online social networking service and micro
blogging service that enables its users to send and read
text-based messages of up to 140 characters, known as
"tweets"
It was created in March 2006 by Jack Dorsey and
launched that July.
Dorsey, then an undergraduate student at New York
University, introduced the idea of an individual using an
SMS service to communicate with a small group
Work on the project started on March 21, 2006, when
Dorsey published the first Twitter message at 9:50
PM Pacific Standard Time (PST): "just setting up my
twttr”.
26.
27. LOGO
TWITTER HAS BECOME INTERNATIONALLY IDENTIFIABLE BY ITS SIGNATURE BIRD LOGO. THE
ORIGINAL LOGO WAS IN USE FROM ITS LAUNCH IN MARCH 2006 UNTIL SEPTEMBER 2010.
IT HAD THREE LOGOS.
The original logo, used from 15 July 2006 until 14 September 2010.
The second logo, used from 14 September 2010 until 5 June 2012.
The third and current logo, used since 5 June 2012
30. MOBILE USE
TWITTER HAS MOBILE APPS FOR IPHONE, IPAD, ANDROID, WINDOWS
PHONE, BLACKBERRY, AND NOKIA S40. THERE IS ALSO VERSION OF THE WEBSITE
FOR MOBILE DEVICES AS WELL AS SMS AND MMS SERVICE.
31. GROWTH RATE
THE COMPANY EXPERIENCED RAPID GROWTH. IT HAD 400,000 TWEETS POSTED PER
QUARTER IN 2007. THIS GREW TO 100 MILLION TWEETS POSTED PER QUARTER IN 2008. IN
FEBRUARY 2010, TWITTER USERS WERE SENDING 50 MILLION TWEETS PER DAY.
32. PRIVACY AND SECURITY
TWITTER MESSAGES ARE PUBLIC BUT USERS CAN ALSO SEND PRIVATE
MESSAGES. TWITTER COLLECTS PERSONALLY IDENTIFIABLE INFORMATION ABOUT ITS
USERS AND SHARES IT WITH THIRD PARTIES.
35. Yahoo
Yahoo! Messenger was originally launched under the
name Yahoo! Pager on March 9, 1998.
Yahoo! Messenger is provided free of charge and can
be downloaded and used with a generic "Yahoo! ID"
which also allows access to other Yahoo! services,
such as Yahoo! Mail, where users can be automatically
notified when they receive new email. Yahoo! also
offers PC-PC, PC-Phone and Phone-to-PC service, file
transfers, webcam hosting, text messaging service,
and chat rooms in various categories.
36. VOICEMAIL AND FILE SHARING
YAHOO! ADDED VOICEMAIL AND FILE SENDING CAPABILITIES TO ANYONE. FILE-
SHARING OF SIZES UP TO 2GB WAS ADDED TO YAHOO MESSENGER.
37. COMMUNICATION
YAHOO! PROVIDES INTERNET COMMUNICATION SERVICES SUCH AS YAHOO! MESSENGER AND YAHOO!
MAIL. AS OF MAY 2007, ITS E-MAIL SERVICE WOULD OFFER UNLIMITED STORAGE
38. MOBILE SERVICES
YAHOO! MOBILE OFFERS SERVICES FOR EMAIL, INSTANT MESSAGING, AND MOBILE
BLOGGING, AS WELL AS INFORMATION SERVICES, SEARCHES AND ALERTS. SERVICES
FOR THE CAMERA PHONE INCLUDE ENTERTAINMENT AND RING TONES.
39. YAHOO CHAT ROOM
Yahoo! Messenger also allows users to access Yahoo!
Chat Rooms.As of December 14, 2012, all public chat
rooms on Yahoo! Messenger have been shut down as
part of a series of features being
changed/added/deleted Yahoo! Chat was a free
online chat room service provided exclusively for
Yahoo! Users. Yahoo! Chat was first announced on
January 7, 1997, as it was confirmed to be a feature
on the very first release of Yahoo! Messenger. On
March 9, 1998, the first public version of Yahoo!
Messenger was released, which included Yahoo! Chat
as one of its features. It allowed Yahoo! Users to
create public chat rooms, send private messages, and
use emoticons.
40.
41.
42. YAHOO OWNED SITES AND COMPANIES
AdInterax:
It was a USA Online advertising company acquired by Yahoo! on October
17, 2006.
Fire Eagle:
Fire Eagle is a location brokerage service created by Yahoo! Brick house
and launched at E Tech on 5 March 2008.
Flickr:
Flickr is a popular photo sharing service which Yahoo! purchased on 29
March 2005.
FoxyTunes:
FoxyTunes is a browser extension which allows the user to control media
players from the browser window
43. UPCOMING OWNED SITES
IntoNow from Yahoo!
IntoNow is a consumer tech company that aims to enhance the way people engage
with each other around the shows they love. Based on the SoundPrint platform,
IntoNow gives users the ability to almost instantly recognize TV contentand then
helps them share and discuss those shows with friends, both within the product and
through other social streams such as Facebook and Twitter.Upcoming is a social
event calendar which Yahoo! acquired on 5 October 2005 (formerly upcoming.org)
44. UPCOMING..
Wretch:
Wretch is a Taiwanese social networking service acquired by Yahoo.
Rivals.com:
College recruiting website.
47. YAHOO PRIVACY AND SECURITY
YAHOO HAS ALSO BEEN CRITICIZED FOR FUNDING SPYWARE AND ADWARE — ADVERTISING
FROM YAHOO!’S CLIENTS OFTEN APPEARS ON-SCREEN IN POP-UPS GENERATED FROM ADWARE
THAT A USER MAY HAVE INSTALLED ON THEIR COMPUTER WITHOUT REALIZING IT BY
ACCEPTING ONLINE OFFERS TO DOWNLOAD SOFTWARE TO FIX COMPUTER CLOCKS OR
IMPROVE COMPUTER SECURITY, ADD BROWSER ENHANCEMENTS, ETC
48.
49. Skype
The service allows users to communicate with peers by
voice using a microphone, video by using a webcam,
and instant messaging over the Internet. Phone calls
may be placed to recipients on the traditional telephone
networks. Calls to other users within the Skype service
are free of charge, Skype was first released in 2003
written by Estonian developers Skype has 663 million
registered users.
50. FEATURES
Registered users of Skype are identified by a unique Skype Name, and may be listed in the Skype
directory. Skype allows these registered users to communicate through both instant messaging
and voice chat. Voice chat allows telephone calls between pairs of users and conference calling,
and uses a proprietary audio codec. Skype's text chat client allows group chats, emoticons,
storing chat history and editing of previous messages. Offline messages were implemented in a
beta of version 5, but removed after a few weeks without notification. The usual features familiar
to instant messaging users — user profiles, online status indicators, and so on — are also
included.
52. CLIENT APPLICATIONS AND DEVICES
ON 29 OCTOBER 2007, SKYPE LAUNCHED ITS OWN MOBILE PHONE UNDER THE
BRAND NAME 3 SKYPEPHONE, WHICH RUNS A BREW OS.SKYPE ALSO OFFERS A
SKYPE WI-FI PHONE WHICH IS A WIRELESS MOBILE PHONE THAT ALLOWS USERS TO
MAKE SKYPE CALLS, USING A WIRELESS INTERNET CONNECTION.
53.
54. EDUCATIONAL USE
Although Skype is a commercial product, its free version
is being used with increasing frequency among teachers
and schools interested in global education projects. For
example Skype is being used to facilitate language
exchange. Students in different parts of the world are
paired off, each is a native speaker of the language that
the other wishes to learn. In conversations over Skype
they alternate between in the two languages. Skype in
the classroom is another free tool that Skype has set up
on their website. It provides teachers with a way to
make their classrooms more interactive and interesting.
55.
56. SECURITY AND PRIVACY
SKYPE IS CLAIMED TO BE A SECURE COMMUNICATION; ENCRYPTION CANNOT BE DISABLED, AND IS
INVISIBLE TO THE USER. SKYPE REPORT SKYPE INCORPORATES SOME FEATURES WHICH TEND TO HIDE ITS
TRAFFIC, BUT IT IS NOT SPECIFICALLY DESIGNED TO THWART TRAFFIC ANALYSIS AND THEREFORE DOES NOT
PROVIDE ANONYMOUS COMMUNICATION. EDLY USES PUBLICLY DOCUMENTED.
57.
58. LIFE AFTER SOCIAL MEDIA!
1. People access Internet primarily to share what they are doing, and check what their
friends are up to
2. Mobile phones are increasingly being used to access social networking sites and
update their status messages, especially on Facebook and Twitter
3. People have become virtually social, i.e. meeting other people on social networks,
rather than meeting them personally
4. Even children prefer staying back at home to access social networks, due to which
their interest in outdoor activities is slowly diminishing
5. Users spend a lot more time on the Web, most of which is used for social networking
6. The advent of social networking has encouraged an average person to share his likes
and dislikes openly with the world
7. Business are investing huge amount of time and money in understanding social
networks to use them for advertising purposes
8. Celebrities are increasingly using social networks to keep in touch with their fans and
publicize their image
9. Companies where social networking sites are allowed to access, find their employees
using more time online during working hours
10. Friends and relatives are wished on special occasion.
63. CONCLUSION
“When you give everyone a voice and give people power,
the system usually ends up in a really good place, and
social media is a power for people. The beauty of social
media is that it will point out your company’s flaws; the
key question is how quickly you address these flaws.
“Social Media is about the people! Not about your
business. Provide for the people and the people will
provide for you. Social media give us opportunity to talk
and interact with our friends ; to people that are not
online at the time or that we have not seen in a long
time. Socializing online is incomparable to real-life
socializing. You need to be sure to get out from behind
your computer and talk to your friends in real life”