This chapter discusses the evolution and uses of social technologies. It describes how social networking, blogging, wikis, and media sharing emerged and are now being used for learning, working, and connecting. Examples are given of popular sites for each type of social media. Issues around privacy and copyright are also examined. The chapter aims to explain how participation in the social web has changed how people interact and share information online.
The document discusses different types of the web, including the surface web, deep web, and dark web. It provides details on how to access the deep web, including using a VPN, Tor browser, and .onion sites. It outlines some of the reasons why people access the deep web, both for legal purposes like privacy and anonymity, as well as for illegal activities like drugs, weapons, and challenge games.
Actividad No. 1.13: Configuración acceso seguro al servidor de base de datos ...Francisco Medina
Universidad Nacional Autónoma de México
Facultad de Contaduría y Administración
Diplomado Diseño y Administración de Base de Datos
Módulo 6. Seguridad de Bases de Datos
The document outlines key topics related to online safety, security, and ethics. It discusses protecting one's reputation and avoiding internet threats like malware, spam, and phishing. The learning objectives are for students to consider safety and reputation when sharing information online, determine and avoid internet dangers, be responsible on social media, and efficiently research the internet through proper referencing.
The document provides a history of the Internet beginning in 1957 when the Soviet Union launched Sputnik, prompting the US to create ARPA to regain technological leadership. ARPA developed the ARPANET in 1969, connecting computers between research centers. TCP/IP was introduced in 1983, becoming the dominant internet protocol. The World Wide Web was coined in 1990 by Tim Berners-Lee, fueling internet growth. The first web browser Mosaic was released in 1993. Internet usage exploded in the 1990s-2000s, growing from 45 million users in 1996 to over 1.5 billion by 2009 as it became integrated into daily life.
The document discusses the dark web and privacy. It begins with an overview of the dark web, including that it goes beyond just illegal activities and can be used to protect privacy. It then outlines the agenda, which includes exploring the origins of the dark web, anonymous browsing tools like Tor, how to navigate the dark web and its pitfalls, and tools that hackers use. The document provides background on topics like dial-up networks, bulletin board systems, the evolution to broadband, and the history of Tor and onion routing. It also covers navigating anonymously, such as through VPNs and Tor, and common hacker tools.
This document discusses how web 3.0 is transforming society. Web 3.0 involves all devices being geolocated and connected through the internet of things, enabling augmented and virtual reality. It allows machines to understand human language through semantic search. This is changing how people consume information and services. Consumers now have more power due to being connected, sophisticated in their choices, and experience collectors who share their experiences. They are also concerned about issues like privacy, advertising, and the environment. Businesses must adapt their offerings to empower consumers in their customer journey and measure all aspects of their experiences.
The document discusses the evolution from Web 2.0 to Web 3.0 and how this relates to libraries and information professionals. Web 2.0 allowed for remixing and mashing up of content but had issues with fragmentation and silos of information. Web 3.0, also called the Semantic Web, aims to make information on the web more open, interoperable and under user control through technologies like ontologies, taxonomies and folksonomies. ThisSemantic Web approach could help libraries with tasks like indexing, classification and metadata. The document also briefly outlines some potential applications of Web 3.0 like social networking integration and mobile access to information.
The document discusses different types of the web, including the surface web, deep web, and dark web. It provides details on how to access the deep web, including using a VPN, Tor browser, and .onion sites. It outlines some of the reasons why people access the deep web, both for legal purposes like privacy and anonymity, as well as for illegal activities like drugs, weapons, and challenge games.
Actividad No. 1.13: Configuración acceso seguro al servidor de base de datos ...Francisco Medina
Universidad Nacional Autónoma de México
Facultad de Contaduría y Administración
Diplomado Diseño y Administración de Base de Datos
Módulo 6. Seguridad de Bases de Datos
The document outlines key topics related to online safety, security, and ethics. It discusses protecting one's reputation and avoiding internet threats like malware, spam, and phishing. The learning objectives are for students to consider safety and reputation when sharing information online, determine and avoid internet dangers, be responsible on social media, and efficiently research the internet through proper referencing.
The document provides a history of the Internet beginning in 1957 when the Soviet Union launched Sputnik, prompting the US to create ARPA to regain technological leadership. ARPA developed the ARPANET in 1969, connecting computers between research centers. TCP/IP was introduced in 1983, becoming the dominant internet protocol. The World Wide Web was coined in 1990 by Tim Berners-Lee, fueling internet growth. The first web browser Mosaic was released in 1993. Internet usage exploded in the 1990s-2000s, growing from 45 million users in 1996 to over 1.5 billion by 2009 as it became integrated into daily life.
The document discusses the dark web and privacy. It begins with an overview of the dark web, including that it goes beyond just illegal activities and can be used to protect privacy. It then outlines the agenda, which includes exploring the origins of the dark web, anonymous browsing tools like Tor, how to navigate the dark web and its pitfalls, and tools that hackers use. The document provides background on topics like dial-up networks, bulletin board systems, the evolution to broadband, and the history of Tor and onion routing. It also covers navigating anonymously, such as through VPNs and Tor, and common hacker tools.
This document discusses how web 3.0 is transforming society. Web 3.0 involves all devices being geolocated and connected through the internet of things, enabling augmented and virtual reality. It allows machines to understand human language through semantic search. This is changing how people consume information and services. Consumers now have more power due to being connected, sophisticated in their choices, and experience collectors who share their experiences. They are also concerned about issues like privacy, advertising, and the environment. Businesses must adapt their offerings to empower consumers in their customer journey and measure all aspects of their experiences.
The document discusses the evolution from Web 2.0 to Web 3.0 and how this relates to libraries and information professionals. Web 2.0 allowed for remixing and mashing up of content but had issues with fragmentation and silos of information. Web 3.0, also called the Semantic Web, aims to make information on the web more open, interoperable and under user control through technologies like ontologies, taxonomies and folksonomies. ThisSemantic Web approach could help libraries with tasks like indexing, classification and metadata. The document also briefly outlines some potential applications of Web 3.0 like social networking integration and mobile access to information.
This document discusses internet governance and ARIN's role. It provides an overview of key internet governance organizations like ICANN, IETF, ITU and forums like the Internet Governance Forum. It summarizes discussions around transitioning oversight of the IANA functions and statements by groups on the future of internet cooperation, specifically the Montevideo Statement and NETmundial Multistakeholder Statement. The document encourages participation and involvement in ongoing internet governance discussions.
Most investigators turn to Google and common social media platforms such as Facebook and Twitter to conduct research for their investigations. However, much of the Internet is inaccessible through simple searches, and criminals are increasingly turning to the dark web to conduct illicit business.
The dark web is anonymous and requires a special browser to access and some knowledge of how to navigate it safely. However, used properly, it can be a valuable source of information for investigators. It’s worthwhile for every investigator to develop the skills and knowledge to mine this treasure trove of dark data.
Join Chad Los Schumacher, investigator and researcher at iThreat Cyber Group, as he leads participants on an exploration of investigations in the dark web.
Webinar attendees will learn:
What the dark web is and how it fits into the rest of the worldwide web
What can be found on the dark web
How to get to the dark web using Tor and other browsers
How to locate common hubs and resources on the dark web and explore what they have to offer
How to bring leads from the dark web to the surface in an investigation
The document discusses the different layers of the web, including the surface web, deep web, and dark web. The dark web is a small portion of the deep web that can only be accessed through specialized browsers like TOR that aim to conceal users' identities and locations. The dark web is known as a place for illegal activities like drug trafficking and weapons sales, and uses bitcoin as its currency to facilitate anonymous transactions.
This presentation teaches effective internet research skills. It discusses different types of search engines such as regular engines like Google and Yahoo compared to metasearch engines that search multiple engines. It recommends advanced searches to narrow results and Boolean operators like AND and OR. Finally, it stresses the importance of properly citing internet sources in a bibliography with the author, title, URL, copyright date and date accessed.
All content not indexed by traditional web-based search engines is known
as the DeepWeb. Wrongly been associated only with the Onion Routing
(TOR), the DeepWeb's ecosystem comprises a number of other anonymous and
decentralized networks. The Invisible Internet Project (I2P), FreeNET,
and Alternative Domain Names (like Name.Space and OpenNic) are examples
of networks leveraged by bad actors to host malware, high-resilient
botnets, underground forums and bitcoin-based cashout systems (e.g., for
cryptolockers).
We designed and implemented a prototype system called DeWA for the
automated collection and analysis of the DeepWeb, with the goal of
quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect,
e.g., trading of illicit and counterfeit goods, underground forums,
privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
This document discusses online safety, security, ethics, and etiquette when using the internet. It defines online safety, also called cyber safety or digital safety, as the practices and precautions users take when online. The document also discusses internet security, ethics, and netiquette. It provides tips for staying safe online such as using strong passwords, being wary of phishing scams, keeping security software up to date, using privacy settings, and not posting personal details. Users are advised to leave any website that makes them feel unsafe or uncomfortable.
The document discusses mass media and the internet. It defines the internet as an international network of connected computers that has become necessary for everyday life. The internet provides a great source of information on many topics and can be used for activities like social networking, shopping, banking, education, and entertainment. However, it also presents some dangers like viruses, identity theft, and exposure to inappropriate content.
Google's search engine works through three main processes:
1. Google web crawlers follow links throughout websites and grab content to add to search indexes. Crawlers only follow links between pages and sites.
2. Google indexers take the full text of pages from crawlers and store them in Google's database.
3. Google query processors consider over 100 factors to determine the most relevant documents for a search query and return results in under half a second.
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowAhmed Bouzid
This document discusses social media monitoring and provides information on why, where, what, and how to monitor social media. It outlines basic concepts like influence, sentiments, and workflow processes. It recommends monitoring company names, products, executives, and competition. Popular social media sites and tools for monitoring are listed. The document observes that companies are not taking advantage of customer information and should focus on engaging customers and becoming a resource to others through content marketing. Various dimensions for analyzing social media conversations are presented, as well as options for tracking and analyzing audio and video content.
This document provides a timeline of key events in the history of the Internet from 1857 to 2012. It outlines early developments like the first transatlantic cable in 1857, ARPANET connecting four universities in 1969, and the addition of the "@" symbol to emails in 1972. Major milestones are noted such as the first international ARPANET connection in 1973, the establishment of BITNET in 1981 providing file transfer and email, and the World providing dial-up access in 1989. The timeline also highlights the introduction of web browsers in 1994, the founding of Google in 1998, and the creation of Wikipedia in 2001.
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
What is Penetration & Penetration test ?Bhavin Shah
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
This presentation includes a short overview of the history of internet. also to get a virtual display with better quality checkout my youtube channel SPARKLE SLIDES. Do ckek it out!!
The document discusses the challenges that social media presents for media educators. It notes that most social media users are young students and discusses both the positive and negative impacts of social media. On one hand, social media allows widespread sharing of information and helped enable socio-political movements, but it also risks the spread of misinformation and can enable bullying, privacy breaches, and the loss of professional journalism standards. The document suggests that educators need to teach students and citizen journalists to take a mindful approach to social media and that governments and media organizations need systems to regulate information flows while preserving freedom of expression online.
This document discusses current ethical issues in social media. It outlines five ethical sins of social media according to Forbes which are unreported endorsements, improper anonymity, compromising consumer privacy, overly enthusiastic employees, and using social media to get free work. It also discusses ethics around social media use in the workplace and by corporations. Specific cases examined include the fake Twitter hack by MTV/BET and privacy issues with sharing information on Facebook. Throughout, it raises questions about how to balance social media use, anonymity, and privacy with ethical standards and responsibilities.
The document discusses the deep web and dark web. The deep web contains information not indexed by typical search engines, while the dark web can only be accessed through specialized browsers and allows for anonymous activity. Though the dark web has illegal activities like drugs and weapons, it also provides alternatives for dissidents and those in oppressive countries by protecting freedom of information and human rights. It can be accessed through the Tor network which encrypts internet activity.
The document discusses the history and evolution of the Internet. It began as a precursor technology called ARPANET, developed by the US Department of Defense in the 1960s. In the 1990s, Tim Berners-Lee invented the World Wide Web, introducing hyperlinks and URLs that allowed information to be shared over the Internet in a more interactive way. The introduction of graphical web browsers in the mid-1990s, such as Mosaic and Netscape, helped popularize the Internet. Internet usage then exploded from 1994-2000 as major websites like Amazon were launched and people began shopping and browsing online. The future of the Internet will focus on high-speed academic networks to support continued innovation.
This document provides a history of social media beginning with pre-internet platforms like message boards and AOL chat rooms. It outlines the evolution of major social media platforms from Friendster and Myspace in the early 2000s to the current dominance of Facebook, Twitter, LinkedIn, and Instagram. It discusses how smartphones fueled further growth of social media through location-based check-ins and photo sharing. The document also covers potential hazards of social media like privacy issues and cyberbullying, as well as newer developments like crowdfunding and short video platforms.
The document discusses the darknet, which is a collection of webpages not indexed by search engines and often hidden, requiring special software like Tor to access. While primarily used for legal purposes, the darknet's anonymity has also enabled some criminal activity, including drug markets, child pornography, and sites offering assassination services. Law enforcement finds it very difficult to police the darknet due to its scale and tight security. The document raises questions about whether a platform enabling both freedom and crime should exist, and if Tor's creators should do more to control the software's use.
The document discusses the deep/dark web and its history. It defines the deep web as content not indexed by standard search engines, comprising 96% of the digital universe. The surface web is the visible web accessed through sites like Google and Facebook. The dark web requires tools like TOR to access and aims to conceal users' identities and activities. It describes the deep web's early use for military communication and research and how sites like Silk Road later used bitcoin for anonymous transactions of illegal goods.
Email marketing is an effective tool for promoting events. MailChimp is recommended as it easily integrates with social media and Eventbrite, allows learning about audience habits, and has a mobile app and options for customization and resources, with a free tier for up to 2,000 subscribers and 12,000 emails per month. The document provides tips on using email marketing for events and highlights features of MailChimp for building email campaigns.
This document discusses internet governance and ARIN's role. It provides an overview of key internet governance organizations like ICANN, IETF, ITU and forums like the Internet Governance Forum. It summarizes discussions around transitioning oversight of the IANA functions and statements by groups on the future of internet cooperation, specifically the Montevideo Statement and NETmundial Multistakeholder Statement. The document encourages participation and involvement in ongoing internet governance discussions.
Most investigators turn to Google and common social media platforms such as Facebook and Twitter to conduct research for their investigations. However, much of the Internet is inaccessible through simple searches, and criminals are increasingly turning to the dark web to conduct illicit business.
The dark web is anonymous and requires a special browser to access and some knowledge of how to navigate it safely. However, used properly, it can be a valuable source of information for investigators. It’s worthwhile for every investigator to develop the skills and knowledge to mine this treasure trove of dark data.
Join Chad Los Schumacher, investigator and researcher at iThreat Cyber Group, as he leads participants on an exploration of investigations in the dark web.
Webinar attendees will learn:
What the dark web is and how it fits into the rest of the worldwide web
What can be found on the dark web
How to get to the dark web using Tor and other browsers
How to locate common hubs and resources on the dark web and explore what they have to offer
How to bring leads from the dark web to the surface in an investigation
The document discusses the different layers of the web, including the surface web, deep web, and dark web. The dark web is a small portion of the deep web that can only be accessed through specialized browsers like TOR that aim to conceal users' identities and locations. The dark web is known as a place for illegal activities like drug trafficking and weapons sales, and uses bitcoin as its currency to facilitate anonymous transactions.
This presentation teaches effective internet research skills. It discusses different types of search engines such as regular engines like Google and Yahoo compared to metasearch engines that search multiple engines. It recommends advanced searches to narrow results and Boolean operators like AND and OR. Finally, it stresses the importance of properly citing internet sources in a bibliography with the author, title, URL, copyright date and date accessed.
All content not indexed by traditional web-based search engines is known
as the DeepWeb. Wrongly been associated only with the Onion Routing
(TOR), the DeepWeb's ecosystem comprises a number of other anonymous and
decentralized networks. The Invisible Internet Project (I2P), FreeNET,
and Alternative Domain Names (like Name.Space and OpenNic) are examples
of networks leveraged by bad actors to host malware, high-resilient
botnets, underground forums and bitcoin-based cashout systems (e.g., for
cryptolockers).
We designed and implemented a prototype system called DeWA for the
automated collection and analysis of the DeepWeb, with the goal of
quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect,
e.g., trading of illicit and counterfeit goods, underground forums,
privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
This document discusses online safety, security, ethics, and etiquette when using the internet. It defines online safety, also called cyber safety or digital safety, as the practices and precautions users take when online. The document also discusses internet security, ethics, and netiquette. It provides tips for staying safe online such as using strong passwords, being wary of phishing scams, keeping security software up to date, using privacy settings, and not posting personal details. Users are advised to leave any website that makes them feel unsafe or uncomfortable.
The document discusses mass media and the internet. It defines the internet as an international network of connected computers that has become necessary for everyday life. The internet provides a great source of information on many topics and can be used for activities like social networking, shopping, banking, education, and entertainment. However, it also presents some dangers like viruses, identity theft, and exposure to inappropriate content.
Google's search engine works through three main processes:
1. Google web crawlers follow links throughout websites and grab content to add to search indexes. Crawlers only follow links between pages and sites.
2. Google indexers take the full text of pages from crawlers and store them in Google's database.
3. Google query processors consider over 100 factors to determine the most relevant documents for a search query and return results in under half a second.
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowAhmed Bouzid
This document discusses social media monitoring and provides information on why, where, what, and how to monitor social media. It outlines basic concepts like influence, sentiments, and workflow processes. It recommends monitoring company names, products, executives, and competition. Popular social media sites and tools for monitoring are listed. The document observes that companies are not taking advantage of customer information and should focus on engaging customers and becoming a resource to others through content marketing. Various dimensions for analyzing social media conversations are presented, as well as options for tracking and analyzing audio and video content.
This document provides a timeline of key events in the history of the Internet from 1857 to 2012. It outlines early developments like the first transatlantic cable in 1857, ARPANET connecting four universities in 1969, and the addition of the "@" symbol to emails in 1972. Major milestones are noted such as the first international ARPANET connection in 1973, the establishment of BITNET in 1981 providing file transfer and email, and the World providing dial-up access in 1989. The timeline also highlights the introduction of web browsers in 1994, the founding of Google in 1998, and the creation of Wikipedia in 2001.
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
What is Penetration & Penetration test ?Bhavin Shah
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
This presentation includes a short overview of the history of internet. also to get a virtual display with better quality checkout my youtube channel SPARKLE SLIDES. Do ckek it out!!
The document discusses the challenges that social media presents for media educators. It notes that most social media users are young students and discusses both the positive and negative impacts of social media. On one hand, social media allows widespread sharing of information and helped enable socio-political movements, but it also risks the spread of misinformation and can enable bullying, privacy breaches, and the loss of professional journalism standards. The document suggests that educators need to teach students and citizen journalists to take a mindful approach to social media and that governments and media organizations need systems to regulate information flows while preserving freedom of expression online.
This document discusses current ethical issues in social media. It outlines five ethical sins of social media according to Forbes which are unreported endorsements, improper anonymity, compromising consumer privacy, overly enthusiastic employees, and using social media to get free work. It also discusses ethics around social media use in the workplace and by corporations. Specific cases examined include the fake Twitter hack by MTV/BET and privacy issues with sharing information on Facebook. Throughout, it raises questions about how to balance social media use, anonymity, and privacy with ethical standards and responsibilities.
The document discusses the deep web and dark web. The deep web contains information not indexed by typical search engines, while the dark web can only be accessed through specialized browsers and allows for anonymous activity. Though the dark web has illegal activities like drugs and weapons, it also provides alternatives for dissidents and those in oppressive countries by protecting freedom of information and human rights. It can be accessed through the Tor network which encrypts internet activity.
The document discusses the history and evolution of the Internet. It began as a precursor technology called ARPANET, developed by the US Department of Defense in the 1960s. In the 1990s, Tim Berners-Lee invented the World Wide Web, introducing hyperlinks and URLs that allowed information to be shared over the Internet in a more interactive way. The introduction of graphical web browsers in the mid-1990s, such as Mosaic and Netscape, helped popularize the Internet. Internet usage then exploded from 1994-2000 as major websites like Amazon were launched and people began shopping and browsing online. The future of the Internet will focus on high-speed academic networks to support continued innovation.
This document provides a history of social media beginning with pre-internet platforms like message boards and AOL chat rooms. It outlines the evolution of major social media platforms from Friendster and Myspace in the early 2000s to the current dominance of Facebook, Twitter, LinkedIn, and Instagram. It discusses how smartphones fueled further growth of social media through location-based check-ins and photo sharing. The document also covers potential hazards of social media like privacy issues and cyberbullying, as well as newer developments like crowdfunding and short video platforms.
The document discusses the darknet, which is a collection of webpages not indexed by search engines and often hidden, requiring special software like Tor to access. While primarily used for legal purposes, the darknet's anonymity has also enabled some criminal activity, including drug markets, child pornography, and sites offering assassination services. Law enforcement finds it very difficult to police the darknet due to its scale and tight security. The document raises questions about whether a platform enabling both freedom and crime should exist, and if Tor's creators should do more to control the software's use.
The document discusses the deep/dark web and its history. It defines the deep web as content not indexed by standard search engines, comprising 96% of the digital universe. The surface web is the visible web accessed through sites like Google and Facebook. The dark web requires tools like TOR to access and aims to conceal users' identities and activities. It describes the deep web's early use for military communication and research and how sites like Silk Road later used bitcoin for anonymous transactions of illegal goods.
Email marketing is an effective tool for promoting events. MailChimp is recommended as it easily integrates with social media and Eventbrite, allows learning about audience habits, and has a mobile app and options for customization and resources, with a free tier for up to 2,000 subscribers and 12,000 emails per month. The document provides tips on using email marketing for events and highlights features of MailChimp for building email campaigns.
Pacific Island art from Polynesia embodies rich traditions and history rather than being viewed as primitive from a Western perspective. Key art forms include wood carvings, tattoos, and greenstone pendants and figures which were imbued with mana or spiritual power. The Maori people of New Zealand were skilled navigators and traders with a warrior culture evidenced through wooden clubs, feathered cloaks, and elaborate facial tattoos denoting status and ancestry.
County records provide valuable genealogical information. The County Clerk's office houses vital records like birth, death, marriage, probate, and real estate records. Other records can be found with the District Clerk, Justices of the Peace, and Tax Assessor. Records are available on microfilm and some digitally. Staff can help with searches for a fee. The public research rooms provide access to records and research assistance.
This document discusses the technology tools and instructional approaches that will be needed for learning spaces in 2025. It outlines that laptops, tablets, cameras, and wireless internet capable of supporting hundreds of devices simultaneously will be required from a technology hardware perspective. Various software like word processing, video chatting, and interactive learning games will also be needed. Learning will be blended between home, school, and other locations. Instructional approaches will include the 3P learning model, workshop model, and learning by doing through project-based learning while adhering to constructivist principles and meeting student needs.
The document discusses Cubist works by Pablo Picasso and George Braque that focused on depicting multiple perspectives that can exist in one moment and finding a more "real" truth. It also provides context on how artistic movements build upon previous ideas and react to conventions, and are influenced by both internal and external factors.
Este documento describe diferentes tipos de abortos, incluyendo succión, dilatación o curetaje, aborto por cesárea y aborto por parto parcial. Explica los procedimientos de cada método, como la succión de los restos del feto, el corte del feto en pedazos con un cuchillo, y la extracción parcial del feto antes de atravesar su nuca con tijeras. El documento también incluye imágenes gráficas de fetos abortados y pregunta retóricamente si alguien querría someter a una vida a
This document provides writing prompts for summarizing an image from different perspectives within the frame. Readers are first asked to describe what they see from looking at an image from the outside. They are then instructed to write from the perspective of elements within the picture, including the forest from the viewpoint of the leaves, a wild thing, and Max himself, to understand the image from the inside out in first person narrative form.
The document discusses Cubist works by Pablo Picasso and George Braque that focused on depicting multiple perspectives and a more realistic "truth" that can exist in a single moment. It focuses on how Impressionist artists like Claude Monet painted fleeting moments using light, color, and brushstrokes to illustrate the passing of time. Post-Impressionism expanded on these techniques, allowing more experimentation and personal expression through compositions, colors, and techniques like cropping by artists such as Van Gogh, Toulouse-Lautrec, Cezanne, Gauguin, and Degas.
The indigenous people of Australia, also known as Aborigines, have the oldest surviving culture in the world dating back over 60,000 years. Their culture and beliefs are deeply connected to the land, as they see themselves as being derived from ancestral beings that created the land's significant geographical features. They passed down their cultural knowledge through oral storytelling traditions like Dreamtime myths. While their technology did not progress in the same way as other parts of the world, their spiritual beliefs and ceremonies, like initiation rituals and rock art, have endured for thousands of years and maintain an important link to their history and connection to the land.
View slide show to learn about our boot camp!STL_Body_Coach
This document describes a fitness program that provides accountability, encouragement, motivation, simple nutrition planning, and supervised, safe workouts to help people achieve their health and fitness goals. The program includes dynamic resistance training, cardiovascular exercise, flexibility training, recovery techniques, and customized nutrition and meal planning to promote optimum health and develop a better, trimmer physique through sustainable lifestyle changes. It compares more favorable to other options like exercising alone, weight loss centers, or pills through its emphasis on building lifelong healthy habits and support systems.
This document discusses a new paradigm for education that leverages technology to break down traditional barriers between teachers and students. It argues that technology allows for more flexible, self-paced learning outside of traditional classrooms. It then provides over 60 recommendations for websites that can be used by both teachers and students for language education online. These websites offer tools for communication, content creation, practice, and interactive learning.
Development Education; A creative paradigm for the new challenges facing high...linioti
This document summarizes a presentation given by Dr. Martin Fitzgerald from the Limerick Institute of Technology. The presentation discusses several topics: [1] making the familiar strange in order to gain new perspectives; [2] the role of creative discourse and whether wisdom and creativity have diminished in higher education; [3] a development education model for the future. It also addresses blocks to creativity, challenges facing higher education, and qualities like tolerance and integrity that can help address these challenges.
Mobility for Education: The new paradigm in learning[x]cube LABS
Our whitepaper focuses on Mobility for Education and endeavors to explore the transformation, approaches, benefits, opportunities and challenges of adopting mobility solutions in the learning sphere.
This document discusses using social media and online tools to market energy efficiency programs. It provides an overview of the Energy Center of Wisconsin's (ECW) use of webinars, websites, email marketing and social media like Twitter and Facebook to educate customers. ECW has found success using these channels to reach broad audiences about topics like plug loads and building energy modeling. The document also covers best practices utilities can use for social media, including setting goals and measuring success, being transparent, and designating support teams.
The document discusses Cubist artists Pablo Picasso and Georges Braque and their attempts to depict multiple perspectives and a more realistic "truth" in one moment through their works. It focuses on how Cubism built upon past artistic movements by further pushing conventions through manipulating perspectives and composition. The main idea behind Cubism was finding a more real "truth" by depicting various perspectives in a single moment.
INTRODUCING THE NEW PARADIGM AND THE LEAPFROG PRINCIPLE@cristobalcobo
The document introduces the concepts of a new paradigm driven by globalization, the rise of the knowledge society, and accelerating change. It argues that leadership must embrace the concept of "leapfrogging" to stay ahead of rapid technological advances. Leapfrogging means using new technologies to instantly upgrade human performance and allow students of all ages to be innovative and creative. If applied to education through technologies like smart glasses, leapfrogging could transform schools into global leaders in sustainable innovation within a decade.
The document discusses various aspects of using social media for business purposes. It covers setting up user-friendly websites, using platforms like Facebook, Twitter and YouTube, creating business newsletters, potential dangers of social media, and using blogs to build authority and engage customers. Exercises are provided throughout to apply the concepts, like revising a website, creating social media profiles, building a newsletter, and developing a social media content calendar.
This document discusses social media in business. It defines social media as tools that allow sharing of information and creation of online communities. It outlines the history and evolution of social media from the 1970s to today. It discusses internal and external social media platforms and how businesses can use social media for communication, marketing and collaboration. The document also covers infrastructure requirements, pros and cons, facts and statistics about social media usage. It concludes with an offer to demonstrate social media platforms.
This document discusses social media strategies for running organizations. It outlines how social media usage has increased, with mobile social media seeing the largest growth. It then discusses various mobile social media platforms like Foursquare and Yelp that allow location sharing and reviews. The document proposes a 3 step social media strategy of listening and learning about target audiences, planning an appropriate strategy, and actively engaging through platforms where audiences interact. It provides examples of energizing influencers by identifying bloggers to partner with and supporting them. The key is focusing on building relationships and conversations rather than just eyeballs or clicks.
This document provides guidance on leveraging LinkedIn for career development. It begins by outlining the benefits of using LinkedIn for both businesses and job seekers in terms of exposure, traffic, partnerships and leads. It then provides steps to maximize the return on investment from using LinkedIn, which include writing an engaging profile, connecting deliberately with contacts, mining one's network, sharing useful content, joining relevant groups, and following companies of interest while always adding value to others.
This document provides an overview of social media and how to develop an effective social media strategy. It defines social media and the differences between Web 1.0 and Web 2.0. Popular social media tools are described like blogs, microblogging, online platforms, Facebook, SlideShare, bookmarks, and strategies for developing a social media presence, evaluating success, and safety tips. Resources for further information are also included. The document aims to educate about using social media for knowledge mobilization.
This document provides an overview of social media and how to develop an effective social media strategy. It defines social media and the differences between Web 1.0 and Web 2.0. Popular social media tools are described such as blogs, microblogging, online platforms, Facebook, SlideShare, bookmarks, and developing a strategy. Tips are provided for each tool and safety measures are discussed. Resources for further information are listed. The presentation aims to educate about using social media for knowledge mobilization.
Using Social Media in the Commercial Real Estate Industry
LinkedIn, Facebook, Twitter - what does any of this have to do with real estate development? Plenty, once you know how to use these and other social media tools to expand your professional network, communicate with co-workers, and engage with the community.
* Which are the top applications and when and how should you use them?
* Is there a measurable ROI on social media?
* What are the ground rules for social networking, and how can you avoid the dangers of "over-sharing"?
Speakers:
Julie Hall
Executive Vice President
Schneider Associates
Phil Pennellatore
Executive Vice President
Schneider Associates
01 Social Media to Promote Your Global Destinationmeagburnt
The document discusses using social media to promote global destinations. It defines social media and discusses key platforms like Facebook, Twitter, and Instagram. It emphasizes developing a personal brand and creating social media accounts for businesses. The document provides tips on personal branding, creating effective Facebook business pages, using hashtags on Twitter, and developing a social media content and listening strategy.
This document discusses how businesses can engage with customers through social media. It covers the main social media platforms like blogs, social networking sites, wikis, and communities. It emphasizes listening to what customers say online, starting a business blog to share news and offers, and creating profiles on sites where the target audience spends time like Facebook. The key is to provide valuable content, participate in discussions, and engage with customers in an ethical way rather than hard selling. Done correctly, social media can help businesses better understand and connect with the people formerly known as their audience.
A presentation introducing various social media tools and their application in a university research environment. This presentation was given at York University, Toronto, Canada
This document provides an overview of social media marketing. It discusses the basics and benefits of social media, highlighting key networks like Facebook, Twitter, YouTube and LinkedIn. It also covers opportunities for video marketing on YouTube and using various social networks to syndicate content. Measurement of social media efforts is discussed as well as resources for additional learning. The webinar aims to help businesses understand social media and how to leverage different platforms for online advertising.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Today the Internet is the place to go if you want to connect with others. There you’ll find a revolution in the way people are interacting, dubbed the social Web. The social Web isn’t just for socializing with friends. Businesses, charities, governments, and others are going social in a big way.Next slide
Chapter 7 covers several topics related to the social Web, including:Bullet 1: How social technologies came into being and evolved over the last several decades, and the impact they’re having on societies all over the world.Bullet 2: The terminology of the social Web is pretty new and sometimes confusing. This chapter will help you understand the difference between a blog, social networking site, and social bookmarking site, for example, and educate yourself about other terms such as wiki and open content.Bullet 3: You’ll learn how social sites and technologies are being used by all sorts of organizations and people to communicate, learn, buy and sell, and more.Bullet 4:You’ll learn how what media sharing is and how media sharing sites are changing the way we share knowledge and get our news.Bullet 5: You’ll discover what ethical challenges the social Web presents to us in the form of how we treat intellectual property and personal information of others that we find online.Next slide
The main topics covered in Chapter 7 are:Bullet 1: The Social Web PhenomenonBullet 2:Social Technology Comes of AgeBullet 3: Blogging: The Internet Gets PersonalBullet 4: Social NetworkingBullet 5: Social BookmarkingBullet 6: WikisBullet 7: Media SharingNext slide
What difference might the social Web make to your work and personal life? Consider this:Bullet 1: The growth of social networking sites has been amazing. In a single year (2008) Facebook grew 153 percent. Facebook itself has over 175 million members—that’s a lot of audience for information and a lot of buying power. Bullet 2: These sites are changing the way we communicate with people in our lives, from friends and family to strangers who share our interests.Bullet 3: But social doesn’t just mean personal. Social sites are being used by businesses to run projects that may have teams spread around the globe. They’re also used by many schools to help students interact with each other on projects.Bullet 4: Businesses are also using the social Web to sell and market to potential customers, provide customer support, and build brand awareness among customers.Bullet 5: Finally, non-profit or political groups who want to educate or gain support for their causes are using the social Web. The reality today is that the social Web is beginning to take over just about every area of our lives to make communicating easier and expose everybody to new people and ideas.Next slide
Next slide
Bullet 1: Social sites include social networking sites (think Facebook) and social journaling sites(Twitter) sites, media sharing sites such as YouTube and Flickr, and more. They are first and foremost a way for people to connect, communicate, and share. Taken together these sites form the social Web. Bullet 2: Beyond connecting people, the social Web is changing how the world and individual groups build a collective knowledge base, and how news is created and delivered. Journalism is being turned on its head by the social Web. It’s important to understand that most social sites have their content driven by members, not by the owners of the sites.Bullet 3: The two-way nature of social Web communication means that, rather than getting news and information from experts, people like you and I are sharing our knowledge and experiences with others in an exciting live dialog. Next slide
Bullet 1:Any site that allows users to interact with each other and share information or content could be considered, on some level, a social site. Bullet 2: One characteristic of a social site is that its content is almost entirely driven by its members. The site owners essentially provide the infrastructure for the content and exchanges.Bullet 3: Social networking is one type of social website. A social networking site such as MySpace or Bebo allows you to share contacts and build networks of friends, as well as use features of the site to post or comment on blogs and share media such as photos. Microblog services, such as Twitter, let you share your ideas in short bursts. This is also referred to as social journaling.Bullet 4: Services that focus on letting you share media such as photos or video with others are referred to as media sharing sites. They, too, are part of the social Web. The lines do blur, as social networking sites add media sharing to their toolkit, and media sharing sites begin to allow you to build lists of friends.Bullet 5: If you use an online dating site or participate in a discussion on a sports site, you’re also part of the social Web. Many, many sites of all kinds are now using social networking types of tools in a variety of settings and for a variety of reasons.Next slide
The section 7.1 terms to know are:social Web:The collective description of websites that offer the ability to communicate, interact, and network with others.social networking site:A site that offers the ability to share contacts and build a network of “friends” along with tools that allow individuals and groups to connect and communicate.Next slide
Bullet 1: As you learned in Chapter 2, Web 2.0 is a phase of the Web in which users don’t just read and view online content, but contribute to the Web and interact with others. The social Web is one of the most important examples of the power of Web 2.0.Bullet 2: Even before it was used by the general public, the Internet was used for communicating with others. But over the years various technologies and tools have appeared to form the socialWeb as we know it today. In the late 1990s the idea of open content—content contributed and shared by users, began to appear. Wikipedia is a great example of this. It’s an online encyclopedia whose content is contributed by users. In 1997 SixDegrees.com appeared. It was one of the first true social networking sites.Bullet 3: SixDegrees.com combined two very important features in one site: the ability to create user profiles, and the ability to assemble searchable lists of contacts called friends. Bullet 4: Another feature of social networking sites appeared when blogging got going around 1999. Blog is a term derived from Web and log, and it represents a kind of online journal offered by all major social networking sites today. When blogging first appeared, it was a standalone feature.Bullet 5: When social networking sites began exploding on the scene in late 2003 and early 2004, blogging was part of their mix. MySpace, Flicker, Facebook, and LinkedIn are just some of the sites that appeared within months of each other in this timeframe.Next slide
Here you can see the timeline of social networking sites. Notice that Six Degrees, though one of the first of these, didn’t succeed in the end. Also, did you know that Facebook launched as a Harvard student-only social network in 2004, opened up to include high school students in 2005, and opened to the general public in 2006?Next slide
Bullet 1: One of the most significant trends today is the ability to access social networking sites through a variety of devices, including your cell phone and some gaming devices. This makes socializing online available from just about anywhere, anytime.Bullet 2: Social sites are now being used by nonprofit organizations to spread the word about their causes. When disaster hits, the social Web is a way to reach out to its many millions of users for donations and to provide updates.Bullet 3: Businesses are also jumping on the social Web with social marketing. Some have their own Facebook or Twitter accounts that help them stay visible to their customers. Others use blogs to promote their products.Bullet 4: Schools such as Harvard and MIT host classes online, sometimes in virtual worlds like Second Life. On these sites each member has a virtual identity known as an avatar that they can dress, accessorize, and move around the world.Bullet 5: Today the social Web includes a variety of sites where you can blog, build, and interact with lists of friends. You can share bookmarks of sites or content that interest you using services such as Digg or Reddit. You can also share media such as videos on sites such as YouTube and photos on sites like Flickr.Next slide
Bullet 1: Social sites and technologies morph daily, so it’s hard to predict the future. Still, we can speculate on some trends. For example, right now most social sites have you build a profile and establish your preferences on their site, but you have to rebuild your identity on each site. One trend appearing today is the ability to carry your identity from site to site.Bullet 2: In addition, services such as TweetDeck are enabling users of the social Web to gather all their social site information in one place. Some believe that in the future you won’t have to visit particular sites to interact, but that the social Web will be everywhere.Bullet 3: Even today you can begin to see social networking features popping up on many sites you wouldn’t consider social. For example, you may be able to build a list of friends on an online news site or share media on a genealogy site.Next slide
The section 7.2 terms to know are:open content:A creative work or other content that anybody can copy or edit online.profile: A blogger or social networking user’s information such as name, location, and interests.friends list:The people you have allowed to access your profile on a social network.blog: An online journal; short for Web + log.identity: The profile you create when you join a social networking service.preferences: Settings on your social networking page, including privacy settings.Next slide
Bullet 1: A blog is an online journal where people can record their thoughts, opinions, and activities. Those who read blogs can post their own responses, creating a kind of dialog. Bullet 2: Blogging really started getting the public’s attention in 1999. It began as a tool for journalists to get news out from war zones, but was quickly adopted by individuals as a form of online diary on blog sites such as LiveJournal.com and Blogger.com.Bullet 3: Today blogs appear on social networking sites, individual’s websites, news sites, and more. Companies often host blogs on their websites to share information with customers. Political commentary, such as the columns you can read on The Huffington Post website, is a popular use of blogs.Bullet 4: But blogs aren’t just text-based. Artblogs, sketchblogs, and photoblogs, for example, allow people to express themselves in a more visual way.Next slide
Bullet 1: If you’re interested in journalism, blogging is a mixed blessing. Instead of the traditional one reporter speaking to many readers model, today many people are speaking to each other. Bullet 2: Often the first person on the scene when news breaks is not a reporter but someone like you or me. The ability to report or discuss our experiences with others online enables us to be the bearers or spreaders of news that we can send around the world in seconds.Bullet 3: In fact, many print newspapers are going out of business as more and more people look to the Internet for their news. Some are finding ways to embrace this change, including Tweets in TV newscasts, or hyperlinking stories from many sources to build topical news features. So, if your interest is journalism, be aware that your chosen field is in serious flux.Next slide
Bullet 1: Many people are still using blogs to record their personal opinions and thoughts, but there are many more uses of blogs today.Bullet 2: Blogs provide a platform for sharing information or opinions about news stories. Blogs also allow people in more repressed countries to get the truth out to the world.Bullet 3: Not to be left behind, many governments use blogs to get the official word out to citizens. Israel, for example, hosts a blog where citizens voice their opinions about issues of the day.Bullet 4: Entertainers from Oprah to movie stars use blogging to keep in touch with fans and promote their latest projects.Bullet 5: Microblogging on sites such as Tumblr or Plurk allow people to communicate in shorthand about their feelings, experiences, or opinions. Twitter, for example, keeps you to 140 characters maximum for your messages. Twitter is one of the most popular microblogging sites, which now has over 1.78 million users, from politicians to rock stars and people like you and me.Next slide
Bullet 1: Many people fail to protect themselves when they blog. They reveal personal information and make their blogs available to the general public. Although most sites monitor their members’ behavior, it’s impossible for them to know how posted information might be misused for illegal activities such as ID theft. Bullet 2: Cyberbullying sometimes occurs on social sites. On interactive gaming sites, for example, those who abuse others are called griefers. It’s a good idea to use sites that have strong regulations about cyberbullying behavior and enforce those rules when abuses occur.Bullet 3: You can also use site settings to protect yourself, by making your blog private and blocking abusive users. Next slide
Thesection 7.3 terms to know are:microblogging :A form of blogging where brief comments rather than personal blogs are the main form of interaction, as on Twitter; also called social journaling. social journaling:See microblogging.artblog: A blog where people post creative works such as music, photos, or paintings.sketchblog: A blog consisting of drawings and sketches.photoblog: A blog used to share amateur or professional photography.video blog :A blog where people post video content. Also called vlog.MP3 blog:A blog where people post audio or music files.Next slide
Bullet 1: Although MySpace and Facebook are two of the best known social networking sites, there are many more, such as Ning; LinkedIn (focused on career networking); Bebo; and Eons, a senior social network. Today social networking sites typically include features such as blogging and media sharing, but what really defines a social networking site is the ability to build and share a network of friends.Bullet 2: Online socializing isn’t that new. It really began in the 1970s when Usenet, ListServe, and the online bulletin board system appeared. These services allowed people to post comments, just as you do on a physical bulletin board at your school or grocery store.Bullet 3: In the 1980s, discussion forums evolved from bulletin boards, providing tools to build discussion strings of postings and responses. This allowed people to hold asynchronous dialogs (asynchronous meaning that interaction doesn’t happen in real time, as a phone conversation does, but that responses might be delayed). Bullet 4: In 1995 Classmates.com started up to help people get in touch with people with whom they went to school, adding the idea of a set of contacts to the mix. AOL then made a leap towards social networking when it provided searchable member profiles which let members search for others with similar interests.Next slide
Bullet 1: Though some predict eventual tapering off of the social networking phenomenon in the next few years, the fact is that socializing tools such as blogging or friends lists are being built into many other types of sites. Perhaps instead of disappearing, social networking will end up being a feature of every website.Bullet 2: Mobile access to social networks, known as social mobile media, is a big trend today. New cell phones are coming out with built-in shortcuts to access social networking sites. People can post videos or photos they take using their cell phones instantly or add comments to their blogs using those tiny cell phone keyboards. A recent news story about a groom sending a tweet from the altar is an example of how pervasive social networking has become using cell phones.Bullet 3: Event sites such as Socializr and Evite are being used by people to post information about various kinds of events, send RSVPs, and even share photos of an event after it’s happened.Bullet 4: An interesting trend that may help social networks survive and grow is the fact that older folks are using them in increasing numbers. In fact between 2007 and 2008 there was a decrease in usage by people 17 and younger and a 9 percent increase in users over 65.Next slide
As you can see from this graph created from data provided by Nielsen Online, from December 2007 to December 2008, use of social networks by younger people decreased slightly even as use by seniors increased. Given the size of the Baby Boomer generation, their adoption of social networking could be what ensures its future growth and success.Next slide
Bullet 1: If you build a list of friends on a social networking site and you use a friends of friends feature, you may grow the list of people you interact with exponentially. Not all of those people are friends—many are complete strangers. Younger people especially feel that a large list of friends is impressive, but that list may simply open them up to cyberbullying or ID theft.Bullet 2: Always be careful not to post personal information such as your address, birthdate, or social security number on a social networking site—your friends know where you live and when your birthday falls, and strangers don’t need to know that information. Consider making your account private and use friends of friends features carefully.Next slide
Bullet 1: Today computers can be your career, or you can use computers to advance your career in any field. You can join career networking such as LinkedIn to keep up on trends in your industry and stay in touch with other professionals who may help you find that next great job.Bullet 2: Some people post their resumes or even video or music portfolios online so prospective clients or employers can take a look at their work. Graphic designers or writers might post a resume on a job hunting site with links to artworks or articles they’ve created, for example. Bullet 3: Consider building your own website, which is relatively easy to do with simple web design tools. In addition to your own site, consider posting to professional site blogs or contributing an online column to boost your career credentials.Next slide
The section 7.4 term to know is:social mobile media: Social services accessed from a mobile phone.Next slide
Bullet 1: There is a huge amount of content on the Internet, and there are some interesting ways to share that content. One way to let others know about content or sites you like is called social bookmarking. With social bookmarking you save a bookmark that points to content, such as an article, a video, a book review, or an entire website. Then you can share that bookmark with others on services such as Digg, StumbleUpon, and Reddit. Bullet 2: Social bookmarking services offer tools to organize bookmarks. For example, you can assemble bookmarked content on a particular topic to help you perform research. Bullet 3: Social bookmarking involves the use of metadata. Metadata describes the location or nature of data, allowing software such as a browser to organize and retrieve data easily.Bullet 4: Bookmarks are saved in the form of tags. Tags are keywords assigned to content that can be used to organize content references. You can sort through and organize tags, making referenced content easy to catalogue. Next slide
Bullet 1: There are many social bookmarking sites out there, and they allow individuals to influence what content and sites people value. This gives the general population more power to influence what sites and businesses succeed or fail. Bullet 2: Many sites today sport a “Share This” type of button you can click to share their content via social bookmarking sites. Try using this feature next time you spot it to share your favorite restaurant, book, or music with the general Internet population.Next slide
The section 7.5 terms to know are:social bookmarking: A method of sharing bookmarks with others using tags.bookmark: A way to save a reference to a website or web page so that it can be easily visited again.metadata: Data about other data, which describes that data and how to process it.tag: A keyword assigned to information on the Web used by social bookmarking sites to locate and organize content references. Next slide
Bullet 1: Wikis are collaborative tools typically used to build a body of knowledge, from an encyclopedia or an online dictionary to a company policy manual. Once a wiki is set up, people with access to it can both post and edit content. Think of a wiki as a large whiteboard that you and your classmates can walk up to use to add or modify its contents. Wiki technology allows people to hyperlink among pages in the wiki, and edit and organize content.Bullet 2: Wikis are also used for business or creative projects, and in educational settings for classroom projects. In addition there are mainstream wiki sites such as Wikipedia and Wikispaces where people from all over the world contribute their expertise. Bullet 3: Some wikis are monitored for accuracy. For example, Wikipedia editors may flag certain content as needing more substantiation or credentials. Some wikis are not monitored, and therefore their accuracy may be questionable. Next slide
Bullet 1: When you think about it, you could use a wiki to accomplish almost any kind of collaborative effort. Some people use wikis to plan events, such as a group vacation, contributing ideas and information to an online document. Bullet 2: Wikis are great for collaborating on creative ventures, such as writing a group novel or planning a documentary movie.Bullet 3: Everybody from scientists to people who have an interest in knitting may use a wiki to build their communal knowledge on a topic. Some wikis are set up to create a final product but some just continue to grow and change as knowledge is added to the wiki “pot.”Bullet 4: Educational settings are ideal for wikis. Instructors and students use them to cooperate on classroom projects or compile research on topics that are then made available to other classes and schools.Next slide
The section 7.6 term to know is:wiki: A technology which allows people to contribute and edit content in an online document, such as an encyclopedia or dictionary.Next slide
Bullet 1: Sites that focus on sharing of media such as photos, video, audio, or music are called media sharing sites. YouTube, Flickr, Picasa, and Slideshare are examples of such sites. You might record a video using your computer’s webcam, a cell phone, or a video camera. Then you can post the video as a digital file so others can view it. Bullet 2: MP3 file sharing programs such as Napster began in the 1990s; these were the beginning of today’s media sharing sites. Bullet 3: From the beginning MP3 file sharing programs raised issues of copyright, because people shared music without record companies or artists getting their due share from the exchange. Online copyright violations continue to be a concern of media sharing.Bullet 4: Today many social networking and social bookmarking sites also have a media sharing aspect. Many allow users to post and view videos using a technology called live media streaming, which allows them to send content over the Internet as live broadcasts.Next slide
Bullet 1: It might be better to ask how people aren’t using media sharing. Music and visual artists are promoting their art on media sharing sites. In fact, music companies that at first fought MP3 sharing are now using media sharing to promote their artists and recordings.Bullet 2: Schools allow students to post project content, but also post video tutorials and lectures online, as at lectr.com.Bullet 3: You can use various tools to gather and organize playlists of media by topic. Sites such as FriendFeed make it possible to import playlists from several media sharing services and share content through Twitter and Facebook.Next slide
Bullet 1: When people post media online, it’s not always free for the taking. You certainly should never use media posted by somebody else and present it as your own work.Bullet 2: Check the media sharing site’s policies. Some allow you to copy content, while others allow you to link to content but not copy an actual file. If you visit an artist’s site, there is likely to be a notice that you cannot copy or distribute the materials posted there. Read carefully to avoid violating copyright law.Next slide
Jeremiah Owyang, a technology researcher, describes a future “era of social commerce” in which consumers will gain buying power through online communities.
The section 7.7 terms to know are:media sharing:Sharing video, photos, music, or presentations with individuals or groups using the Internet.live media streaming:Live, or real-time, delivery of media over the Internet; also called live broadcast.Next slide