SlideShare a Scribd company logo
Using your
computer to
talk to other
people,
exchange
pictures,
videos and so
forth.
Blogger
Enter data, upload
pictures and videos.
Facebook
Upload pictures, videos, play
games, private messages.
Twitter
Follow
people,re-tweet
interesting things.
Flickr
Upload, dowload and
share pictures.
 LinkedIn
Contacting
people you know(friends
or friends of friends).
 Gloogle +
Create “circles”
of people, such as work
colleagues.
 LinkedIn
Contacting
people you know(friends
or friends of friends).
 Gloogle +
Create “circles”
of people, such as work
colleagues.

More Related Content

What's hot

A Blogging Primer: Getting Started Today
A Blogging Primer: Getting Started TodayA Blogging Primer: Getting Started Today
A Blogging Primer: Getting Started Today
Bryan Person
 
Google Tools & Tips
Google Tools & TipsGoogle Tools & Tips
Google Tools & TipsGlenn Wiebe
 
Building Community Through Social Media
Building Community Through Social MediaBuilding Community Through Social Media
Building Community Through Social Media
Dr. Ed Cabellon
 
Finding your next job in digital journalism
Finding your next job in digital journalismFinding your next job in digital journalism
Finding your next job in digital journalism
Steve Buttry
 
Building Your Whuffie
Building Your WhuffieBuilding Your Whuffie
Building Your Whuffie
Dr. Ed Cabellon
 
Contextual identity w2sp
Contextual identity  w2spContextual identity  w2sp
Contextual identity w2spmonicachew
 
Looking at Facebook: Friending, Privacy, and "Is it bad?"
Looking at Facebook: Friending, Privacy, and "Is it bad?"Looking at Facebook: Friending, Privacy, and "Is it bad?"
Looking at Facebook: Friending, Privacy, and "Is it bad?"Tod Baker
 
Breaking Down Facebook Edgerank
Breaking Down Facebook EdgerankBreaking Down Facebook Edgerank
Breaking Down Facebook EdgerankBruce Floyd
 
2014 08-13--online facilitation3--preparing[v3]
2014 08-13--online facilitation3--preparing[v3]2014 08-13--online facilitation3--preparing[v3]
2014 08-13--online facilitation3--preparing[v3]
Paul Signorelli
 
Online identity tutorial
Online identity tutorialOnline identity tutorial
Online identity tutorial
CMHSL
 
Tweetajob | Intern Match Jobseeker Workshop
Tweetajob | Intern Match Jobseeker WorkshopTweetajob | Intern Match Jobseeker Workshop
Tweetajob | Intern Match Jobseeker WorkshopCarmen Hudson
 
2010 leadership-ethics-social networking
2010   leadership-ethics-social networking2010   leadership-ethics-social networking
2010 leadership-ethics-social networking
SchoolTechPolicies.com
 
Building a Social Media Audience
Building a Social Media AudienceBuilding a Social Media Audience
Building a Social Media Audience
angelinat
 
Supper club speech fb twitter cartoons only cd april19
Supper club speech fb twitter cartoons only cd april19Supper club speech fb twitter cartoons only cd april19
Supper club speech fb twitter cartoons only cd april19
Cherie Dargan
 
Social media by. treasure gordon
Social media by. treasure gordonSocial media by. treasure gordon
Social media by. treasure gordon
Treasure Gordon
 

What's hot (20)

Brevity ecoo2012
Brevity ecoo2012Brevity ecoo2012
Brevity ecoo2012
 
A Blogging Primer: Getting Started Today
A Blogging Primer: Getting Started TodayA Blogging Primer: Getting Started Today
A Blogging Primer: Getting Started Today
 
Google Tools & Tips
Google Tools & TipsGoogle Tools & Tips
Google Tools & Tips
 
Building Community Through Social Media
Building Community Through Social MediaBuilding Community Through Social Media
Building Community Through Social Media
 
Finding your next job in digital journalism
Finding your next job in digital journalismFinding your next job in digital journalism
Finding your next job in digital journalism
 
Building Your Whuffie
Building Your WhuffieBuilding Your Whuffie
Building Your Whuffie
 
Presentation1
Presentation1Presentation1
Presentation1
 
Contextual identity w2sp
Contextual identity  w2spContextual identity  w2sp
Contextual identity w2sp
 
Looking at Facebook: Friending, Privacy, and "Is it bad?"
Looking at Facebook: Friending, Privacy, and "Is it bad?"Looking at Facebook: Friending, Privacy, and "Is it bad?"
Looking at Facebook: Friending, Privacy, and "Is it bad?"
 
Breaking Down Facebook Edgerank
Breaking Down Facebook EdgerankBreaking Down Facebook Edgerank
Breaking Down Facebook Edgerank
 
Tlt pp directions
Tlt pp directionsTlt pp directions
Tlt pp directions
 
2014 08-13--online facilitation3--preparing[v3]
2014 08-13--online facilitation3--preparing[v3]2014 08-13--online facilitation3--preparing[v3]
2014 08-13--online facilitation3--preparing[v3]
 
MAR - Understanding Social Media
MAR - Understanding Social MediaMAR - Understanding Social Media
MAR - Understanding Social Media
 
Online identity tutorial
Online identity tutorialOnline identity tutorial
Online identity tutorial
 
Tweetajob | Intern Match Jobseeker Workshop
Tweetajob | Intern Match Jobseeker WorkshopTweetajob | Intern Match Jobseeker Workshop
Tweetajob | Intern Match Jobseeker Workshop
 
2010 leadership-ethics-social networking
2010   leadership-ethics-social networking2010   leadership-ethics-social networking
2010 leadership-ethics-social networking
 
Building a Social Media Audience
Building a Social Media AudienceBuilding a Social Media Audience
Building a Social Media Audience
 
Digital footprints fetc13
Digital footprints fetc13Digital footprints fetc13
Digital footprints fetc13
 
Supper club speech fb twitter cartoons only cd april19
Supper club speech fb twitter cartoons only cd april19Supper club speech fb twitter cartoons only cd april19
Supper club speech fb twitter cartoons only cd april19
 
Social media by. treasure gordon
Social media by. treasure gordonSocial media by. treasure gordon
Social media by. treasure gordon
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Social network