The document provides an overview of social networking and addresses some common concerns about it. It discusses how social networks allow users to build a profile and connect with friends. Users can then message with their connections and participate in groups and events. The document also defines common social media terminology like "profile" and seeks to alleviate fears by noting social networks are simply about sharing and staying in touch with others.
The document discusses social media and policy considerations for its use. It outlines how social media has transformed from one-way broadcasting to two-way conversations. It provides tips for developing a social media strategy, including thinking strategically, engaging the right people, monitoring discussions, and building online communities. The document also stresses the importance of training users on privacy and guidelines for participating in social media to represent an organization appropriately.
Slides from Morten Rand-Hendriksen's WordCamp Europe 2016 talk by the same title. Companion article at https://mor10.com/empathy
The prevailing narrative in the web community hails empathy as a cure for much of what ails our modern digital spaces. Empathy seems a worthy tool for making our designs and interactive experiences more human, but used indiscriminately it may do more harm than good. To design experiences that fit the real lives of the people who use them, we need to take a critical look at our methods and make empathy the first step in a larger process.
The document describes 15 styles of hand-painted ladies bags available from Jiwanline Cuero Accesorios. Each bag style lists the style number, uses cow white leather, and has a minimum order quantity of 100 pieces. The bag styles have various painted designs including Marilyn Monroe, leopard, lady on couch, orchid, small butterfly, old map, lady face, dolphin, G.Klimint, big butterfly, flower design, kiss, abstract leaves, abstract, and celestial.
The document contains product listings for various styles of wallets for men and women produced by Jiwanline Cuero Accesorios. Each listing provides the style number, leather type, and minimum order quantity of 300 pieces per design and style. The wallets are made from different types and colors of leather including cow, Italian belly, antik, grand, and nappa leather.
The document discusses data acquisition for the German1 vehicle management center (VMC) in the euroFOT project. It describes the requirements for a naturalistic field operational test, including logging vehicle signals without additional sensors or tasks for drivers. A data acquisition system was selected with CAN logging, GPS, and GPRS capabilities. The system will autonomously upload logged data via GPRS to a central management system for storage and analysis. Testing of the system will continue with validation planned for a piloting phase in September 2009.
The document discusses social media and policy considerations for its use. It outlines how social media has transformed from one-way broadcasting to two-way conversations. It provides tips for developing a social media strategy, including thinking strategically, engaging the right people, monitoring discussions, and building online communities. The document also stresses the importance of training users on privacy and guidelines for participating in social media to represent an organization appropriately.
Slides from Morten Rand-Hendriksen's WordCamp Europe 2016 talk by the same title. Companion article at https://mor10.com/empathy
The prevailing narrative in the web community hails empathy as a cure for much of what ails our modern digital spaces. Empathy seems a worthy tool for making our designs and interactive experiences more human, but used indiscriminately it may do more harm than good. To design experiences that fit the real lives of the people who use them, we need to take a critical look at our methods and make empathy the first step in a larger process.
The document describes 15 styles of hand-painted ladies bags available from Jiwanline Cuero Accesorios. Each bag style lists the style number, uses cow white leather, and has a minimum order quantity of 100 pieces. The bag styles have various painted designs including Marilyn Monroe, leopard, lady on couch, orchid, small butterfly, old map, lady face, dolphin, G.Klimint, big butterfly, flower design, kiss, abstract leaves, abstract, and celestial.
The document contains product listings for various styles of wallets for men and women produced by Jiwanline Cuero Accesorios. Each listing provides the style number, leather type, and minimum order quantity of 300 pieces per design and style. The wallets are made from different types and colors of leather including cow, Italian belly, antik, grand, and nappa leather.
The document discusses data acquisition for the German1 vehicle management center (VMC) in the euroFOT project. It describes the requirements for a naturalistic field operational test, including logging vehicle signals without additional sensors or tasks for drivers. A data acquisition system was selected with CAN logging, GPS, and GPRS capabilities. The system will autonomously upload logged data via GPRS to a central management system for storage and analysis. Testing of the system will continue with validation planned for a piloting phase in September 2009.
The document discusses analytics for a website called "Let's Talk" that had over 70,000 visitors from 156 countries. The top 10 visitor countries are listed, with the United Kingdom being number one. Key metrics on site visits, page views, time on site, testimonials, questions, and customer service resolutions are provided. The "About Us" page received several positive comments on social media. The document concludes by suggesting companies educate themselves, play, and be bold to increase adaptability in social media.
Understanding how collaboration improves productivity workshopPaul Boos
This document describes a simulation game called "Power of 13" that is used to demonstrate the benefits of collaboration. The game has participants work to complete tasks by rolling dice, with different rounds simulating individual work, pulling additional work, pairing, and swarming. After playing, participants debriefed and noticed that effectiveness increased with each successive round allowing more collaboration. Models of group dynamics and communication are also discussed, showing how collaboration improves outcomes through information sharing, social interaction, and the development of trust over time.
This document summarizes the results of a survey about sleep habits that was completed by 82 respondents. The survey included questions about respondents' gender, relationship status, whether they remember and record their dreams, meditation and sleeping aid habits, sleep environment preferences, and spiritual beliefs. The summary provides the response percentages and counts for each multiple choice question in the survey.
The document outlines an agenda for a presentation on web marketing capabilities. The presentation covers topics such as less time lost shipping, conceptual design approaches, common mistakes in web marketing, and examples of before and after websites redesigned by the company. Recent web projects are also highlighted. The goal is to help clients understand how to improve their online presence through strategic web design that incorporates SEO, easy contact methods, and updated formats.
This study found that cytomegalovirus (CMV) coinfection is associated with higher CD8 T-cell counts, lower CD4/CD8 ratios, and increased systemic inflammation in HIV-positive individuals on antiretroviral therapy (ART). The study compared 158 HIV-positive individuals, of which 32 were CMV-negative and 126 were CMV-positive, to 21 HIV-negative controls. It found that CD8 T-cell counts were significantly higher in HIV-positive/CMV-positive individuals compared to HIV-positive/CMV-negative individuals or controls. Additionally, plasma levels of inflammatory markers IP-10, TNF-RII, and D-dimer were higher in HIV
1) The document discusses La-Z-Boy Healthcare's collection of seating designed for healthcare facilities.
2) The seating aims to bring comfort from home to patients and caregivers in healthcare settings. Products include recliners, lounge chairs, and task chairs.
3) The seating focuses on comfort through features like infinite recline positions, lumbar support, cushioning, and some products include rocking mechanisms. Mobility features and safety are also emphasized.
Planning of a field operational test on navigation systems: Implementation an...euroFOT
The document summarizes two pre-studies conducted to help plan a field operational test comparing navigation systems. Study 1 was a questionnaire of 147 drivers that found owners of navigation systems drove more and were more likely to take unfamiliar routes. Study 2 tested data collection and analysis algorithms by having 10 drivers complete routes with and without navigation, finding the algorithms could detect differences but needed improvement to reduce errors. The pre-studies aimed to inform sample selection and analysis methods for the larger field operational test.
This document discusses best practices for brands using social media and community management. It recommends that brands take an "ubiquitous brand" approach by coordinating social media strategies across different departments. Brands should dedicate smart, responsive resources to engage with customers, monitor conversations, and respond quickly to issues. The document also provides tips for setting goals, budgets, emergency procedures, and avoiding common mistakes like not engaging fans or providing 24/7 support.
Articulo que intenta demostrar en un modelo linear mixto de efectos al azar, que las variables edad, sexo y estado nutricional de un paciente coinfectado VIH/TB influyen en la recuperación del CD4
La ley de inclusión escolar establece un nuevo marco regulatorio para el sistema educativo chileno que garantiza mayores recursos económicos, protege los derechos de la comunidad educativa, y fomenta la gratuidad progresiva mediante la subvención escolar preferencial y el aporte de gratuidad. Asimismo, permite que los actuales sostenedores mantengan sus proyectos educativos y facilita que puedan adquirir definitivamente los inmuebles donde funcionan los establecimientos a través de créditos hipotecarios garant
Nuovo anno e tante novità nel mondo dei Social Media. Cambiamenti nelle piattaforme e nelle strategie, previsioni, dinamiche, strumenti e, nel mezzo, gli utenti e le loro preferenze.
Scopriamo insieme tutto quello che c'è da sapere su canali principali e "secondari" per capire come gestire al meglio l'identità del Brand e il suo rapporto con il Target.
Ecco le slides del webinar!
Video completo del webinar qui: http://youtu.be/YX2-r3ZqL2Q
The document summarizes a simulation game called mySTRATEX that is used to help companies execute their strategies more effectively. The game allows employees to learn a company's strategy through simulation. It also helps management understand relationships between strategic objectives and the impact of decisions and external events on performance. The customizable game includes a strategy map, event cards, initiative cards, and scoring to engage employees and motivate strategy implementation.
#fotocasaResponde: ¿Cómo reclamar la devolución de las cláusulas suelo?fotocasa
¿En qué casos se puede reclamar? ¿Cuáles son las cantidades a devolver? ¿Cómo reclamar la devolución del dinero? Estas son sólo algunas de las preguntas que estos días nos han hecho llegar nuestros usuarios. Para dar respuesta a estas y otras dudas, contamos con la presencia de Miguel Muñoz, abogado experto en Derecho Inmobiliario de Legálitas.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
The document discusses analytics for a website called "Let's Talk" that had over 70,000 visitors from 156 countries. The top 10 visitor countries are listed, with the United Kingdom being number one. Key metrics on site visits, page views, time on site, testimonials, questions, and customer service resolutions are provided. The "About Us" page received several positive comments on social media. The document concludes by suggesting companies educate themselves, play, and be bold to increase adaptability in social media.
Understanding how collaboration improves productivity workshopPaul Boos
This document describes a simulation game called "Power of 13" that is used to demonstrate the benefits of collaboration. The game has participants work to complete tasks by rolling dice, with different rounds simulating individual work, pulling additional work, pairing, and swarming. After playing, participants debriefed and noticed that effectiveness increased with each successive round allowing more collaboration. Models of group dynamics and communication are also discussed, showing how collaboration improves outcomes through information sharing, social interaction, and the development of trust over time.
This document summarizes the results of a survey about sleep habits that was completed by 82 respondents. The survey included questions about respondents' gender, relationship status, whether they remember and record their dreams, meditation and sleeping aid habits, sleep environment preferences, and spiritual beliefs. The summary provides the response percentages and counts for each multiple choice question in the survey.
The document outlines an agenda for a presentation on web marketing capabilities. The presentation covers topics such as less time lost shipping, conceptual design approaches, common mistakes in web marketing, and examples of before and after websites redesigned by the company. Recent web projects are also highlighted. The goal is to help clients understand how to improve their online presence through strategic web design that incorporates SEO, easy contact methods, and updated formats.
This study found that cytomegalovirus (CMV) coinfection is associated with higher CD8 T-cell counts, lower CD4/CD8 ratios, and increased systemic inflammation in HIV-positive individuals on antiretroviral therapy (ART). The study compared 158 HIV-positive individuals, of which 32 were CMV-negative and 126 were CMV-positive, to 21 HIV-negative controls. It found that CD8 T-cell counts were significantly higher in HIV-positive/CMV-positive individuals compared to HIV-positive/CMV-negative individuals or controls. Additionally, plasma levels of inflammatory markers IP-10, TNF-RII, and D-dimer were higher in HIV
1) The document discusses La-Z-Boy Healthcare's collection of seating designed for healthcare facilities.
2) The seating aims to bring comfort from home to patients and caregivers in healthcare settings. Products include recliners, lounge chairs, and task chairs.
3) The seating focuses on comfort through features like infinite recline positions, lumbar support, cushioning, and some products include rocking mechanisms. Mobility features and safety are also emphasized.
Planning of a field operational test on navigation systems: Implementation an...euroFOT
The document summarizes two pre-studies conducted to help plan a field operational test comparing navigation systems. Study 1 was a questionnaire of 147 drivers that found owners of navigation systems drove more and were more likely to take unfamiliar routes. Study 2 tested data collection and analysis algorithms by having 10 drivers complete routes with and without navigation, finding the algorithms could detect differences but needed improvement to reduce errors. The pre-studies aimed to inform sample selection and analysis methods for the larger field operational test.
This document discusses best practices for brands using social media and community management. It recommends that brands take an "ubiquitous brand" approach by coordinating social media strategies across different departments. Brands should dedicate smart, responsive resources to engage with customers, monitor conversations, and respond quickly to issues. The document also provides tips for setting goals, budgets, emergency procedures, and avoiding common mistakes like not engaging fans or providing 24/7 support.
Articulo que intenta demostrar en un modelo linear mixto de efectos al azar, que las variables edad, sexo y estado nutricional de un paciente coinfectado VIH/TB influyen en la recuperación del CD4
La ley de inclusión escolar establece un nuevo marco regulatorio para el sistema educativo chileno que garantiza mayores recursos económicos, protege los derechos de la comunidad educativa, y fomenta la gratuidad progresiva mediante la subvención escolar preferencial y el aporte de gratuidad. Asimismo, permite que los actuales sostenedores mantengan sus proyectos educativos y facilita que puedan adquirir definitivamente los inmuebles donde funcionan los establecimientos a través de créditos hipotecarios garant
Nuovo anno e tante novità nel mondo dei Social Media. Cambiamenti nelle piattaforme e nelle strategie, previsioni, dinamiche, strumenti e, nel mezzo, gli utenti e le loro preferenze.
Scopriamo insieme tutto quello che c'è da sapere su canali principali e "secondari" per capire come gestire al meglio l'identità del Brand e il suo rapporto con il Target.
Ecco le slides del webinar!
Video completo del webinar qui: http://youtu.be/YX2-r3ZqL2Q
The document summarizes a simulation game called mySTRATEX that is used to help companies execute their strategies more effectively. The game allows employees to learn a company's strategy through simulation. It also helps management understand relationships between strategic objectives and the impact of decisions and external events on performance. The customizable game includes a strategy map, event cards, initiative cards, and scoring to engage employees and motivate strategy implementation.
#fotocasaResponde: ¿Cómo reclamar la devolución de las cláusulas suelo?fotocasa
¿En qué casos se puede reclamar? ¿Cuáles son las cantidades a devolver? ¿Cómo reclamar la devolución del dinero? Estas son sólo algunas de las preguntas que estos días nos han hecho llegar nuestros usuarios. Para dar respuesta a estas y otras dudas, contamos con la presencia de Miguel Muñoz, abogado experto en Derecho Inmobiliario de Legálitas.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
2. Let’s Talk About...
Social Networking
Because it’s not an if; it’s a when.
Wednesday, October 28, 2009
3. Let’s Talk About...
Social Networking
Because it’s not an if; it’s a when.
And that’s not a bad thing. We just need to
learn about what a social network is.
Let’s Talk!
Wednesday, October 28, 2009
4. Let’s Talk About...
Social Networking
Because it’s not an if; it’s a when.
And that’s not a bad thing. We just need to
learn about what a social network is.
Let’s Talk!
Wednesday, October 28, 2009
11. Some Common Misconceptions
These interwebs are just full of
Meet Gladys, our resident
DANGEROUS MyFace Twiddlers who are
Internet Skeptic
out to STEAL your MONEY! Dang Kids!
Wednesday, October 28, 2009
12. Some Common Misconceptions
These interwebs are just full of
Meet Gladys, our resident
DANGEROUS MyFace Twiddlers who are
Internet Skeptic
out to STEAL your MONEY! Dang Kids!
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
Wednesday, October 28, 2009
13. Some Common Misconceptions
Meet Gladys, our resident
Internet Skeptic
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
Wednesday, October 28, 2009
14. Some Common Misconceptions
Meet Gladys, our resident
In my day, you had to
Internet Skeptic
talk to interact...
grumblemutterrabble
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
Wednesday, October 28, 2009
15. Some Common Misconceptions
Meet Gladys, our resident
In my day, you had to
Internet Skeptic
talk to interact...
grumblemutterrabble
She doesn't like this whole “Social
Networking” thing, and she has all
sorts of objections and concerns.
We’re not down on talking, Gladys (even in person).
After all, that’s what Social Networking is all about!
Wednesday, October 28, 2009
16. i yths v 1.0
Brought to you by Gladys
There are just too many sites and too
much going on online to ever have a
chance at grasping anything!
Wednesday, October 28, 2009
17. i yths v 1.0
Brought to you by Gladys
There are just too many sites and too
much going on online to ever have a
chance at grasping anything!
Well... maybe. There is a lot out there. But that just means you
need to be judicious about where you go. Just think: there are
too many towns in the world to ever get to know all of them in
your lifetime... but that doesn't mean you shouldn’t visit Paris.
Wednesday, October 28, 2009
18. i yths v 1.0
Brought to you by Gladys
Well... maybe. There is a lot out there. But that just means you
need to be judicious about where you go. Just think: there are
too many towns in the world to ever get to know all of them in
your lifetime... but that doesn't mean you shouldn’t visit Paris.
Wednesday, October 28, 2009
19. i yths v 1.0
Brought to you by Gladys
Technorati.com, Digg.com and
Stumbleupon.com are all great communities
that are already there to point you toward
the best of the web!
Well... maybe. There is a lot out there. But that just means you
need to be judicious about where you go. Just think: there are
too many towns in the world to ever get to know all of them in
your lifetime... but that doesn't mean you shouldn’t visit Paris.
Wednesday, October 28, 2009
20. The Big Two
Facebook
Real Life Friends Network
and Catch Up
MySpace
Connect to Others Via Your
Creative Side
Wednesday, October 28, 2009
22. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
Wednesday, October 28, 2009
23. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
From there, you have the ability to connect with friends who are
also on Facebook, using a simple search feature.
Wednesday, October 28, 2009
24. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
From there, you have the ability to connect with friends who are
also on Facebook, using a simple search feature.
Depending on your privacy options, you are able to message
with your friends, friends of your friends, or anyone in the
network you choose to join. (e.g. New York City or Swarthmore
College)
Wednesday, October 28, 2009
25. A Walkthrough
You start out by building a profile, which contains information
about yourself: text and photos.
From there, you have the ability to connect with friends who are
also on Facebook, using a simple search feature.
Depending on your privacy options, you are able to message
with your friends, friends of your friends, or anyone in the
network you choose to join. (e.g. New York City or Swarthmore
College)
What's it for? Sharing pictures, catching up with old friends,
finding groups with a shared interest, and even birthday reminders
and event invitations.
Wednesday, October 28, 2009
29. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Wednesday, October 28, 2009
30. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Wednesday, October 28, 2009
31. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wednesday, October 28, 2009
32. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wednesday, October 28, 2009
33. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Wednesday, October 28, 2009
34. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Wednesday, October 28, 2009
35. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Wednesday, October 28, 2009
36. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Wednesday, October 28, 2009
37. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Wednesday, October 28, 2009
38. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Wednesday, October 28, 2009
39. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Groups - From supporting a candidate, to following your favorite team, to something as silly
as “people who like to chew gum and skip rope,” groups connect you to people around the world
with similar interests.
Wednesday, October 28, 2009
40. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Groups - From supporting a candidate, to following your favorite team, to something as silly
as “people who like to chew gum and skip rope,” groups connect you to people around the world
with similar interests.
Wednesday, October 28, 2009
41. Some Lingo to Remember
Profile - a personalized web page that contains as much (or as little) information about
yourself and your interests as you would like to add. (ex. favorite books, current job, educational
background). Your profile can also contain a photobook with pictures that you or your friends
upload.
Tag - A method of marking (or tagging) a website or picture that links it to any other picture
or content with a similar tag. For example, sites like Facebook use tags to create a network of
your pictures, and they allow you to search by tags.
Wall - Your wall is what Facebook calls your virtual message board. Your friends can leave
you messages here, but everyone else will also be able to view them. If you’d rather stay
private, you can also send a personal message, just like an Email.
Status - This is a place where you can write what you are currently doing/thinking about.
This means you can stay constantly in touch with your network, to help them keep up with
your daily life, thoughts, and activities. You can also use status updates to organize plans with
others or share a URL (web address).
Friend Request - When you see a person on Facebook whose profile you'd like to be
connected to, you send them a friend request. Before you can see their profile, they must
"accept" you. A connection is only formed when both sides choose to opt in, a method that has
become standard across many social networking sites.
Groups - From supporting a candidate, to following your favorite team, to something as silly
as “people who like to chew gum and skip rope,” groups connect you to people around the world
with similar interests.
Wednesday, October 28, 2009
43. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
Wednesday, October 28, 2009
44. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
Where Facebook starts with real life friends and family, then
builds out from there, MySpace focuses on shared interests. Artists,
musicians and writers use MySpace to share their work.
Wednesday, October 28, 2009
45. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
Where Facebook starts with real life friends and family, then
builds out from there, MySpace focuses on shared interests. Artists,
musicians and writers use MySpace to share their work.
MySpace contains a wide open design scheme, a Blog (often a
kind of web diary - way more then a Wall) and a place to upload
music, giving it the flexibility of a personalized web-page.
Wednesday, October 28, 2009
46. A Walkthrough
Like Facebook, you start out by building a profile. Unlike
Facebook, it’s not always about you. A profile can be about a band,
a studio, a project or an organization... and some people use more
imagination than others.
Where Facebook starts with real life friends and family, then
builds out from there, MySpace focuses on shared interests. Artists,
musicians and writers use MySpace to share their work.
MySpace contains a wide open design scheme, a Blog (often a
kind of web diary - way more then a Wall) and a place to upload
music, giving it the flexibility of a personalized web-page.
What's it for? Sharing personal music and artwork, connecting
with others who share your interests, promoting upcoming work,
sharing feelings, and re-inventing selves.
Wednesday, October 28, 2009
49. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Wednesday, October 28, 2009
50. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Wednesday, October 28, 2009
51. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Wednesday, October 28, 2009
52. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Wednesday, October 28, 2009
53. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
Wednesday, October 28, 2009
54. i yths v 2.0
Brought to you by Gladys
Everyone online is some kind of crazed
sex pervert, just waiting to prey on my
child. I have to watch their EVERY
MOUSE CLICK!
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
Wednesday, October 28, 2009
55. i yths v 2.0
Brought to you by Gladys
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
Wednesday, October 28, 2009
56. i yths v 2.0
Brought to you by Gladys
KidsHealth.org and Wiredsafety.org are two
great resources for kids AND parents to learn
the warning signs that can help identify
predators, as well as preventative measures to
increase safety.
Well...most adults who are using the internet and social networking sites are engaging in
everyday social behaviors, not behaving like predators.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
Wednesday, October 28, 2009
57. i yths v 2.0
Brought to you by Gladys
KidsHealth.org and Wiredsafety.org are two
great resources for kids AND parents to learn Facebook is FYI:
the warning signs that can help identify safer than
predators, as well as preventative measures to
MySpace in this
increase safety.
regard; both are
Well...most adults who are using the internet and social networkingsaferare engaging in
sites than an
everyday social behaviors, not behaving like predators.
AOL chat room.
Some people do use the anonymity of the web to trick
unsuspecting users. But this is why social networks are good.
Facebook, for example, allows you to see who else is in a stranger’s
network. It acts as a gated community in an otherwise unfettered e-
world.
Talking to your child about where they go on the web and who
they interact with is important (just like in physical reality!).
You should teach your children not to take candy from a stranger, but you don’t
(can’t!) follow them everywhere they go, right? The same should be true online.
Wednesday, October 28, 2009
66. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
Wednesday, October 28, 2009
67. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
140 characters long, Twitter updates are called “Tweets.”
Wednesday, October 28, 2009
68. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
140 characters long, Twitter updates are called “Tweets.”
Where Facebook has friends, Twitter has followers: you can
follow anyone on Twitter... even if they aren’t following you. (Al
Gore and Shaquille O’Neal have many followers on Twitter.)
Wednesday, October 28, 2009
69. Remember the Facebook Status Updates?
This is Worse.
Twitter is an entire Social Network designed to give you the
very latest in what people are thinking and doing.
140 characters long, Twitter updates are called “Tweets.”
Where Facebook has friends, Twitter has followers: you can
follow anyone on Twitter... even if they aren’t following you. (Al
Gore and Shaquille O’Neal have many followers on Twitter.)
Organizations, politicians, and non-profits are using Twitter now:
even the nightly news wants you to follow them.
Wednesday, October 28, 2009
70. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Wednesday, October 28, 2009
71. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Wednesday, October 28, 2009
72. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Wednesday, October 28, 2009
73. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Wednesday, October 28, 2009
74. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
Wednesday, October 28, 2009
75. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
Wednesday, October 28, 2009
76. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
Wednesday, October 28, 2009
77. You may have heard the phrases Chat Room or Message
Board. These are catch-all terms for online communication:
some are parts of larger social networks and some stand
alone.
Chats are basically any real time communication: either
between individuals you already know, or in larger rooms
(often themed) filled with... pretty much anybody with a
web connection.
Message Boards are a more permanent version of
communicating online: people use them to hold longer
discussions, respond (via comments sections) to articles, sell
things or meet people. Craig’s List is a popular example.
There are two kinds of chatting: in one version, you are
real-life friends with your chat buddy. In the other, you
are chatting with a stranger...
Wednesday, October 28, 2009
79. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
Wednesday, October 28, 2009
80. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
Wednesday, October 28, 2009
81. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
Wednesday, October 28, 2009
82. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
Wednesday, October 28, 2009
83. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
Wednesday, October 28, 2009
84. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
Wednesday, October 28, 2009
85. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
Wednesday, October 28, 2009
86. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
Wednesday, October 28, 2009
87. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
Wednesday, October 28, 2009
88. Chat Rooms
In chat programs like “G-chat” (Google chat), or “AIM”, (AOL Instant
Messenger), you talk to a select “buddy list”- people that you know,
and with whom you have real life connections.
In contrast, in chat rooms you have little idea to whom you are
speaking. These sites lend themselves to anonymity, as users often post
under an alias. This means that you are never really sure of to whom
you are talking.
It is very important to tell your children to treat people in chat rooms
like they would strangers in real life, making sure to never give out
personal information.
Since chatting is immediate, it is a good way to have a conversation
with a friend, but also a danger for impulsive kids who might type
before they think.
Wednesday, October 28, 2009
90. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Wednesday, October 28, 2009
91. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Wednesday, October 28, 2009
92. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
Wednesday, October 28, 2009
93. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
Sharing Ideas: To share and build pictures, thoughts, and writing.
Wednesday, October 28, 2009
94. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
Sharing Ideas: To share and build pictures, thoughts, and writing.
Keeping in Touch: To communicate instantly (and for free!) with
people around the globe.
Wednesday, October 28, 2009
95. Social Networks: What are they good for?
Making Connections: To interact with folks that you would
otherwise never get to meet.
Using Connections: To find jobs, housing, friendship and romance.
Re-connecting: To catch up with and learn about old friends.
Sharing Ideas: To share and build pictures, thoughts, and writing.
Keeping in Touch: To communicate instantly (and for free!) with
people around the globe.
Now you know some basic information about specific sites, but the
internet is a constantly changing place; it’s worth the time to learn
about new sites and compare them to what is already there. Be
Alert. Read the Fine Print.
Wednesday, October 28, 2009
99. Talk
With Your
Child
Wednesday, October 28, 2009
100. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Wednesday, October 28, 2009
101. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Wednesday, October 28, 2009
102. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Wednesday, October 28, 2009
103. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
Wednesday, October 28, 2009
104. i yths v 3.0
Brought to you by Gladys
Opening an Email -- any Email -- can give
someone access to ALL of my MONEY! And
MY IDENTITY! I am ALWAYS AT RISK
of identity theft online!
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
Real Life applies: don’t do anything you wouldn’t do in a real store, and
you should be fine!
Wednesday, October 28, 2009
105. i yths v 3.0
Brought to you by Gladys
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
Real Life applies: don’t do anything you wouldn’t do in a real store, and
you should be fine!
Wednesday, October 28, 2009
106. i yths v 3.0
Brought to you by Gladys
Don’t open Emails or click on links unless you
know their origins.
Make sure you trust a website completely before
you give them any information. (If you have any
doubt, check out BizRate.com)
Well...there are a lot of scams out there, created by tech-savvy people
looking to make a quick buck. But if you keep your wits about you,
they should be easy to spot.
Avoid clicking or opening anything with generic language (e.g. “check this link out!”)
Legitimate sites will never ask you to send them private information through email,
and they won’t solicit things out of the blue. Don’t trust Email that looks like this,
even if it looks like a source you recognize. (e.g. Amazon.com saying “we lost your
credit card info! Could you send it again?”)
Real Life applies: don’t do anything you wouldn’t do in a real store, and
you should be fine!
Wednesday, October 28, 2009
107. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
Wednesday, October 28, 2009
108. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
Wednesday, October 28, 2009
109. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
Wednesday, October 28, 2009
110. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Wednesday, October 28, 2009
111. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
Wednesday, October 28, 2009
112. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
Wednesday, October 28, 2009
113. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
Wednesday, October 28, 2009
114. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
Wednesday, October 28, 2009
115. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
If you are watching the world... the world is watching you.
Wednesday, October 28, 2009
116. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
If you are watching the world... the world is watching you.
Remember that every time you are looking at someone else’s profile, they
probably are looking at yours. The fact that it’s a two way street sounds
obvious... but it is good to be reminded.
Wednesday, October 28, 2009
117. Realties of a Digital Age
v 1.0 What you put online stays online.
Even if you don’t mean it to, or
think you have taken it down.
The Internet is like an Elephant. It never forgets.
Even if the most recent version of a website appears to have removed an item,
there are always ways to dredge up that information.
This can have effects later in life that younger generations are just starting to
realize. A goofy picture now might come up in a job search later. The same goes
for something you write on your Blog.
If you are watching the world... the world is watching you.
Remember that every time you are looking at someone else’s profile, they
probably are looking at yours. The fact that it’s a two way street sounds
obvious... but it is good to be reminded.
Treat the Internet like a tattoo: it’s highly visible and will last
the rest of your life.
Wednesday, October 28, 2009
118. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Wednesday, October 28, 2009
119. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
Wednesday, October 28, 2009
120. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Wednesday, October 28, 2009
121. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
Wednesday, October 28, 2009
122. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
A child can be whoever they want to be, even completely changing their persona.
If they feel weak in life, they can act strongly online - just like the bullies who
might pick on them in person. Many kids don’t realize that the internet can cross
into the real world, so they are even more willing to say mean and hurtful things
in a digital space.
Wednesday, October 28, 2009
123. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
otherwise targeted by another minor
using the Internet, interactive and digital
technologies or mobile phones.
Cyberbullying often flourishes on social networking sites, where
there is no strict monitoring system in place.
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
A child can be whoever they want to be, even completely changing their persona.
If they feel weak in life, they can act strongly online - just like the bullies who
might pick on them in person. Many kids don’t realize that the internet can cross
into the real world, so they are even more willing to say mean and hurtful things
in a digital space.
Teach children to respect others - in real life and online. Create a
safe space for kids to talk openly about bullying.
Wednesday, October 28, 2009
124. Cyberbullying
v 2.0 Cyberbullying is when a child, preteen
o r teen is to r m ente d, threaten e d,
harassed, humiliated, embarrassed or
You otherwise targeted by another minor
can find
using the Internet, interactive and digital
resources for bothmobile phones.
technologies or
children and adults
Cyberbullying often flourishes on social networking sites, where
at
there is no strict monitoring system in place.
stopcyberbullying.org
When schools try to get involved with off-campus cyberbullying, they have
been sued for exceeding their authority.
Remember, online changes the playing field.
A child can be whoever they want to be, even completely changing their persona.
If they feel weak in life, they can act strongly online - just like the bullies who
might pick on them in person. Many kids don’t realize that the internet can cross
into the real world, so they are even more willing to say mean and hurtful things
in a digital space.
Teach children to respect others - in real life and online. Create a
safe space for kids to talk openly about bullying.
Wednesday, October 28, 2009
125. You Know Your Child
v 3.0
Wednesday, October 28, 2009
126. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
Wednesday, October 28, 2009
127. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Wednesday, October 28, 2009
128. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
Wednesday, October 28, 2009
129. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Wednesday, October 28, 2009
130. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Wednesday, October 28, 2009
131. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Wednesday, October 28, 2009
132. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
Wednesday, October 28, 2009
133. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Wednesday, October 28, 2009
134. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
Wednesday, October 28, 2009
135. You Know Your Child
Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
If you come into the discussion knowing what’s out there and what’s going on online,
your child is more likely to listen.
Wednesday, October 28, 2009
136. Are there hard and fast rules about when
v 3.0 a kid is old enough to use the web?
No
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
If you come into the discussion knowing what’s out there and what’s going on online,
your child is more likely to listen.
Wednesday, October 28, 2009
137. You Know Your Child
bett
Are there hard and fast rules er th
about when
v 3.0 a kid is old enough to use anyo n
the web?
e els
an
No e
Are there parts of the internet that you
can guarantee will always be safe?
No
Is there a way to get your child to make the right decision EVERY TIME?
Do we even need to answer this one? No
Does this mean that you have to give up all control?
No. Of course not. You know what your kid is ready for and what responsibilities
they can handle. Together, you can make rules that allow them to use the internet
for good, and create an environment where your child is willing to come to you if
they find things that are evil.
Despite popular opinion to the contrary... Kids are willing to talk about this stuff
with you. Not only does an open conversation give them more freedom, but they
might enjoy getting to teach you a thing or two.
If you come into the discussion knowing what’s out there and what’s going on online,
your child is more likely to listen.
Wednesday, October 28, 2009
138. Social Networks and Privacy Settings
Protect Yourself
Wednesday, October 28, 2009
139. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Wednesday, October 28, 2009
140. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Wednesday, October 28, 2009
141. Social Networks and Privacy Settings
Protect Yourself
Customize privacy settings for each section of your
profile. (e.g. Allow everyone to see your photos, but
only “friends” to see your address)
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Wednesday, October 28, 2009
142. Social Networks and Privacy Settings
Protect Yourself
Customize privacy settings for each section of your
profile. (e.g. Allow everyone to see your photos, but
only “friends” to see your address)
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
You can block an individual (a Cyberbully... or
a Boss) from seeing your profile.
Wednesday, October 28, 2009
143. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Wednesday, October 28, 2009
144. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
Wednesday, October 28, 2009
145. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
Wednesday, October 28, 2009
146. Social Networks and Privacy Settings
Protect Yourself
Every piece of information in a profile is usually customizable.
Going through Privacy Settings with your child provides a
great time to talk about what they should and should not put
Any Social Network worth its salt has
online.
options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
Wednesday, October 28, 2009
147. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
Wednesday, October 28, 2009
148. Social Networks and Privacy Settings
Protect Yourself
Any Social Network worth its salt has options for
personal privacy settings.
These range from letting the entire world see everything you post to limiting your
profile so only you can see it -- and everywhere in between.
Privacy Settings, and the discussions they raise, should
be the first step in engaging with a new social network.
If you utilize privacy settings (and are smart about who
you accept as connections) many of the previous Myths
and Realities can be minimized.
Wednesday, October 28, 2009
149. Social Networks and Privacy Settings
It’s not ALL on you
Wednesday, October 28, 2009
150. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
Wednesday, October 28, 2009
151. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
Wednesday, October 28, 2009
152. Social Networks and Privacy Settings
It’s not ALL on you
The message board Craigslist prides itself in policing its posts
and protecting its users. They have a place to report abuse
(Craig is very responsive), and they have bred a culture of
responsible users who protect each other.
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
Wednesday, October 28, 2009
153. Social Networks and Privacy Settings
It’s not ALL on you
The message board Craigslist prides itself in policing its posts
and protecting its users. They have a place to report abuse
(Craig is very responsive), and they have bred a culture of
responsible users who protect each other.
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
Violating the
trust of a
Craigslist post
is very bad
juju.
Wednesday, October 28, 2009
154. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
Wednesday, October 28, 2009
155. Social Networks and Privacy Settings
It’s not ALL on you
Don’t worry: much of the appeal of Social Networks is tied
in with being part of a community. And the community can
give back.
You can also expect that a site will be on the look-out for
spammers who are out to trick users. Good sites will work
with you, not against you.
Wednesday, October 28, 2009