SlideShare a Scribd company logo
What are some of the benefits and challenges 
of using Slideshare? 
 Uploading presentations 
 Easy embedding in other websites (such as LinkedIn) 
 Large file friendly 
 Share audio and video 
 Customize privacy settings 
 File conversion for viewing (PDF, .ppt and etc) 
 No built in way to track views 
 Must use other program to create and edit material 
 Cannot have transitions (i.e PPT) 
 Challenges when uploading video file types

More Related Content

What's hot

Vocabulary Theory
Vocabulary TheoryVocabulary Theory
Vocabulary Theory
Min-Hsun Chiang
 
KINDS OF TEST
KINDS OF TESTKINDS OF TEST
KINDS OF TEST
yamih 88
 
Slides for deped order no.42 s. 2016
Slides for deped order no.42 s. 2016Slides for deped order no.42 s. 2016
Slides for deped order no.42 s. 2016
belindasagun
 
Contextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengContextualized Online Search and search skills zeng
Contextualized Online Search and search skills zeng
Rose Yanna
 
Student Diversity - Individual Differences
Student Diversity - Individual DifferencesStudent Diversity - Individual Differences
Student Diversity - Individual Differences
Rommel Luis III Israel
 
21st Century Education
21st Century Education21st Century Education
21st Century Education
Fadzliaton Zainudin
 
Grasps examples
Grasps examplesGrasps examples
Grasps examples
CHRISTINEKTO12
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
Aubrey Mae Antonio
 
Education for 21st Century
Education for 21st CenturyEducation for 21st Century
Education for 21st Century
M. S. Rahman
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
Angelito Quiambao
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
JazzyNF
 
6 Developing Transformative Education
6   Developing Transformative Education6   Developing Transformative Education
6 Developing Transformative Education
Grev Jung
 
7 Types of Curriculum Operating in Schools
7 Types of Curriculum Operating in Schools7 Types of Curriculum Operating in Schools
7 Types of Curriculum Operating in Schools
Ezr Acelar
 
Types of performance tasks
Types of performance tasksTypes of performance tasks
Types of performance tasks
khelko
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
Angelito Quiambao
 
The teaching profession.pptx[1]
The teaching profession.pptx[1]The teaching profession.pptx[1]
The teaching profession.pptx[1]
Nadine Cabasisi-matondo
 
Detailed Lesson Plan in English 2 (Verbs)
Detailed Lesson Plan in English 2 (Verbs)Detailed Lesson Plan in English 2 (Verbs)
Detailed Lesson Plan in English 2 (Verbs)
Princess Piñero
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
Pearl Maxine Jimena
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
How to use Canva in the classroom
How to use Canva in the classroomHow to use Canva in the classroom
How to use Canva in the classroom
Fiona Beal
 

What's hot (20)

Vocabulary Theory
Vocabulary TheoryVocabulary Theory
Vocabulary Theory
 
KINDS OF TEST
KINDS OF TESTKINDS OF TEST
KINDS OF TEST
 
Slides for deped order no.42 s. 2016
Slides for deped order no.42 s. 2016Slides for deped order no.42 s. 2016
Slides for deped order no.42 s. 2016
 
Contextualized Online Search and search skills zeng
Contextualized Online Search and search skills zengContextualized Online Search and search skills zeng
Contextualized Online Search and search skills zeng
 
Student Diversity - Individual Differences
Student Diversity - Individual DifferencesStudent Diversity - Individual Differences
Student Diversity - Individual Differences
 
21st Century Education
21st Century Education21st Century Education
21st Century Education
 
Grasps examples
Grasps examplesGrasps examples
Grasps examples
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
 
Education for 21st Century
Education for 21st CenturyEducation for 21st Century
Education for 21st Century
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
[EMPOWERMENT TECHNOLOGIES] - ADVANCED WORD PROCESSING SKILLS
 
6 Developing Transformative Education
6   Developing Transformative Education6   Developing Transformative Education
6 Developing Transformative Education
 
7 Types of Curriculum Operating in Schools
7 Types of Curriculum Operating in Schools7 Types of Curriculum Operating in Schools
7 Types of Curriculum Operating in Schools
 
Types of performance tasks
Types of performance tasksTypes of performance tasks
Types of performance tasks
 
Online platforms for ICT Content Development
Online platforms for ICT Content DevelopmentOnline platforms for ICT Content Development
Online platforms for ICT Content Development
 
The teaching profession.pptx[1]
The teaching profession.pptx[1]The teaching profession.pptx[1]
The teaching profession.pptx[1]
 
Detailed Lesson Plan in English 2 (Verbs)
Detailed Lesson Plan in English 2 (Verbs)Detailed Lesson Plan in English 2 (Verbs)
Detailed Lesson Plan in English 2 (Verbs)
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
How to use Canva in the classroom
How to use Canva in the classroomHow to use Canva in the classroom
How to use Canva in the classroom
 

Viewers also liked

Blended Learning Implementation for Elementary Schools
Blended Learning Implementation for Elementary SchoolsBlended Learning Implementation for Elementary Schools
Blended Learning Implementation for Elementary Schools
DreamBox Learning
 
Blended Learning in the Elementary Classroom
Blended Learning in the Elementary ClassroomBlended Learning in the Elementary Classroom
Blended Learning in the Elementary Classroom
Emily W. Schmidt
 
20 Warning Signs That you are Falling Behind the Times with Technology as a T...
20 Warning Signs That you are Falling Behind the Times with Technology as a T...20 Warning Signs That you are Falling Behind the Times with Technology as a T...
20 Warning Signs That you are Falling Behind the Times with Technology as a T...
Kelly Walsh
 
10 Awesome Things You Can do With PowerPoint
10 Awesome Things You Can do With PowerPoint10 Awesome Things You Can do With PowerPoint
10 Awesome Things You Can do With PowerPoint
Kelly Walsh
 
8 Examples of Transforming Lessons Through the SAMR Model
8 Examples of Transforming Lessons Through the SAMR Model8 Examples of Transforming Lessons Through the SAMR Model
8 Examples of Transforming Lessons Through the SAMR Model
Kelly Walsh
 
Exploring how technology caters to your students multiple intelligences
Exploring how technology caters to your students multiple intelligencesExploring how technology caters to your students multiple intelligences
Exploring how technology caters to your students multiple intelligences
Kelly Walsh
 
Classroom management powerpoint
Classroom management powerpointClassroom management powerpoint
Classroom management powerpoint
jlm083
 
Classroom Management Presentation
Classroom Management PresentationClassroom Management Presentation
Classroom Management Presentation
lorenwilliams
 
24 Books You've Never Heard Of - But Will Change Your Life
24 Books You've Never Heard Of - But Will Change Your Life24 Books You've Never Heard Of - But Will Change Your Life
24 Books You've Never Heard Of - But Will Change Your Life
Ryan Holiday
 

Viewers also liked (9)

Blended Learning Implementation for Elementary Schools
Blended Learning Implementation for Elementary SchoolsBlended Learning Implementation for Elementary Schools
Blended Learning Implementation for Elementary Schools
 
Blended Learning in the Elementary Classroom
Blended Learning in the Elementary ClassroomBlended Learning in the Elementary Classroom
Blended Learning in the Elementary Classroom
 
20 Warning Signs That you are Falling Behind the Times with Technology as a T...
20 Warning Signs That you are Falling Behind the Times with Technology as a T...20 Warning Signs That you are Falling Behind the Times with Technology as a T...
20 Warning Signs That you are Falling Behind the Times with Technology as a T...
 
10 Awesome Things You Can do With PowerPoint
10 Awesome Things You Can do With PowerPoint10 Awesome Things You Can do With PowerPoint
10 Awesome Things You Can do With PowerPoint
 
8 Examples of Transforming Lessons Through the SAMR Model
8 Examples of Transforming Lessons Through the SAMR Model8 Examples of Transforming Lessons Through the SAMR Model
8 Examples of Transforming Lessons Through the SAMR Model
 
Exploring how technology caters to your students multiple intelligences
Exploring how technology caters to your students multiple intelligencesExploring how technology caters to your students multiple intelligences
Exploring how technology caters to your students multiple intelligences
 
Classroom management powerpoint
Classroom management powerpointClassroom management powerpoint
Classroom management powerpoint
 
Classroom Management Presentation
Classroom Management PresentationClassroom Management Presentation
Classroom Management Presentation
 
24 Books You've Never Heard Of - But Will Change Your Life
24 Books You've Never Heard Of - But Will Change Your Life24 Books You've Never Heard Of - But Will Change Your Life
24 Books You've Never Heard Of - But Will Change Your Life
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Pros cons slideshare

  • 1. What are some of the benefits and challenges of using Slideshare?  Uploading presentations  Easy embedding in other websites (such as LinkedIn)  Large file friendly  Share audio and video  Customize privacy settings  File conversion for viewing (PDF, .ppt and etc)  No built in way to track views  Must use other program to create and edit material  Cannot have transitions (i.e PPT)  Challenges when uploading video file types