Web 2.0 has enabled new forms of social interaction and user participation online. This has changed how people share information and experiences. Early internet platforms in the 1980s like Usenet allowed people to share text-based information but had limitations. The rise of the World Wide Web in the 1990s made it easier to set up websites focused on specific interests, and discussion forums became popular areas for sharing experiences and expertise within communities.
This presentation was developed to help a client address best practices for building an online community within the workplace. It was based upon a great deal of research and study of the topic and should help those who are seeking information or wish to start an online community, as it pulls together a great amount of data and resources on the topic.
The document discusses the future of data and access to information. It notes that while the internet has enabled more access to information, less than a quarter of people globally have internet access. It argues that making data access fast, cheap, and ubiquitous worldwide would be an important challenge. The document also discusses how emerging technologies may improve access, such as mobile phones and cloud computing, but connectivity issues still exist in some areas. Overall it frames increased access to data and information as empowering and beneficial.
The document provides a historical overview of major events and developments in digital media from 1969 to 2006, including the creation of ARPANET which led to the internet, the invention of email, MP3s, the world wide web, search engines like Google, social networks like MySpace and Facebook, mobile technologies like smartphones, and the rise of digital distribution of music, videos, and other media through platforms like iTunes, YouTube, and online streaming. It traces how these innovations disrupted existing industries and transformed how people access and share information and media.
Social Media: an Obligation, an Opportunity, or a ThreatNinetyTen
Is online social media really a threat, or a great opportunity.
This presentation aims to:
1) Discuss the social media landscape as it stands with reference to public networks and common conceptions
2) Show how a social network resonates as a model for associations and their goals
3) Look at how private and public social networks can become a threat to an association, with examples
4) Cover using a private social network for an association and how to get the best from it
5) Show how to use the best of both (private & public social networks)
Case studies from outside of the membership sector will include:
- Channel 4
- Nokia
This document discusses the social web and its pros and cons. It begins by explaining how the social web represents a fundamental change from using the internet as an information tool to inserting ourselves and connecting with others. It then discusses how new technologies can both positively and negatively impact development of new knowledge and social interaction. Next, it provides a guide to social networking sites and their features. It outlines pros like creating relationships and cons like spending less time with real connections. Finally, it discusses internet addiction and compulsive internet use that can interfere with life, work and relationships.
Social Media & Its Implications For Education Part 2Kate Carruthers
This document discusses the implications of social media and technology for education. It outlines three relevant areas: the current landscape, social implications, and changing educational models. Regarding the landscape, it highlights trends like social computing and next generation internet that are driving changes impacting education. Socially, technology is enabling new forms of widespread connection and community. However, human cognitive limits remain. This is changing educational models by challenging traditional boundaries and teacher authority, requiring educators to facilitate sensemaking and become co-participants in learning. Overall, opportunities and challenges exist in adapting to this new connected, transparent world.
The document discusses social media and provides an overview of Twitter and Facebook. It defines social media as online conversations and interactions between people. Twitter is described as a microblogging service that allows users to send and read short messages called tweets. Statistics are provided on the growth of Twitter usage. Facebook is summarized as a social network that allows users to create profiles, connect with friends, and join interest groups.
This document provides an overview of several popular social media platforms, including their key features and statistics. It discusses Twitter, noting that it allows users to post short messages called tweets. It outlines Facebook's core features of user profiles and connections between friends. Usage statistics for Facebook in Hungary are presented. Foursquare is described as a location-based social app where users check-in at venues. YouTube is summarized as a video sharing site where users can upload, view and share videos. FarmVille is characterized as a social farming game on Facebook. Wikipedia is defined as a free, collaborative online encyclopedia. Flickr is noted as an image and video hosting site. In closing, the document states there are many other social media services beyond
This presentation was developed to help a client address best practices for building an online community within the workplace. It was based upon a great deal of research and study of the topic and should help those who are seeking information or wish to start an online community, as it pulls together a great amount of data and resources on the topic.
The document discusses the future of data and access to information. It notes that while the internet has enabled more access to information, less than a quarter of people globally have internet access. It argues that making data access fast, cheap, and ubiquitous worldwide would be an important challenge. The document also discusses how emerging technologies may improve access, such as mobile phones and cloud computing, but connectivity issues still exist in some areas. Overall it frames increased access to data and information as empowering and beneficial.
The document provides a historical overview of major events and developments in digital media from 1969 to 2006, including the creation of ARPANET which led to the internet, the invention of email, MP3s, the world wide web, search engines like Google, social networks like MySpace and Facebook, mobile technologies like smartphones, and the rise of digital distribution of music, videos, and other media through platforms like iTunes, YouTube, and online streaming. It traces how these innovations disrupted existing industries and transformed how people access and share information and media.
Social Media: an Obligation, an Opportunity, or a ThreatNinetyTen
Is online social media really a threat, or a great opportunity.
This presentation aims to:
1) Discuss the social media landscape as it stands with reference to public networks and common conceptions
2) Show how a social network resonates as a model for associations and their goals
3) Look at how private and public social networks can become a threat to an association, with examples
4) Cover using a private social network for an association and how to get the best from it
5) Show how to use the best of both (private & public social networks)
Case studies from outside of the membership sector will include:
- Channel 4
- Nokia
This document discusses the social web and its pros and cons. It begins by explaining how the social web represents a fundamental change from using the internet as an information tool to inserting ourselves and connecting with others. It then discusses how new technologies can both positively and negatively impact development of new knowledge and social interaction. Next, it provides a guide to social networking sites and their features. It outlines pros like creating relationships and cons like spending less time with real connections. Finally, it discusses internet addiction and compulsive internet use that can interfere with life, work and relationships.
Social Media & Its Implications For Education Part 2Kate Carruthers
This document discusses the implications of social media and technology for education. It outlines three relevant areas: the current landscape, social implications, and changing educational models. Regarding the landscape, it highlights trends like social computing and next generation internet that are driving changes impacting education. Socially, technology is enabling new forms of widespread connection and community. However, human cognitive limits remain. This is changing educational models by challenging traditional boundaries and teacher authority, requiring educators to facilitate sensemaking and become co-participants in learning. Overall, opportunities and challenges exist in adapting to this new connected, transparent world.
The document discusses social media and provides an overview of Twitter and Facebook. It defines social media as online conversations and interactions between people. Twitter is described as a microblogging service that allows users to send and read short messages called tweets. Statistics are provided on the growth of Twitter usage. Facebook is summarized as a social network that allows users to create profiles, connect with friends, and join interest groups.
This document provides an overview of several popular social media platforms, including their key features and statistics. It discusses Twitter, noting that it allows users to post short messages called tweets. It outlines Facebook's core features of user profiles and connections between friends. Usage statistics for Facebook in Hungary are presented. Foursquare is described as a location-based social app where users check-in at venues. YouTube is summarized as a video sharing site where users can upload, view and share videos. FarmVille is characterized as a social farming game on Facebook. Wikipedia is defined as a free, collaborative online encyclopedia. Flickr is noted as an image and video hosting site. In closing, the document states there are many other social media services beyond
The document discusses building collaboration within the HimGlo movement through the use of technology. It proposes that an online platform could help foster relationships, share resources, and build a shared identity. The platform would allow participants to communicate, share ideas and testimonies, coordinate events, and collaborate on projects from a central online location. The goal is to inspire and empower Nepali/Himalayan Christian leaders through greater connectivity and partnership.
The document discusses how social networks and media have changed in the digital age. It notes that information is now abundant, cheap, and personally oriented rather than institutionally oriented. People's media ecologies have expanded to include many new devices and platforms. This has led to changes in how people access and share information, including more content creation and social networking. The document provides tips on how libraries can act as nodes in social networks by helping people find, assess, and act on information in this new media landscape.
Web 2.0 and the Enterprise: A Symbiotic RelationshipShiv Singh
The document discusses how Web 2.0 and social media have created a symbiotic relationship with enterprises. It outlines 5 reasons for this relationship: 1) social tools like Facebook are increasingly being used in the workplace, 2) principles of trust that make social tools successful personally also apply professionally, 3) small ideas can be as powerful as big ideas in driving change, 4) social graphs can bridge professional and personal networks, and 5) organizations have changed and are allowing all employees to participate in branding and conversations online. The relationship will only strengthen as walls between work and personal lives continue to blur with the rise of social media.
The document discusses the history of social networking from its origins on bulletin board systems (BBS) in the 1970s-1990s to early social networking sites like Classmates.com, SixDegrees.com, and AsianAvenue.com in the late 1990s. It then covers the launch and popularity of seminal social networks from the early 2000s onward, including Friendster, LinkedIn, MySpace, and Facebook. The history shows how social networking evolved from text-based computer discussions to profile-based networking on prominent today.
The document discusses how blogging has become mainstream and profitable. It provides statistics that show the large portion of the population that reads and creates blogs. Specifically, it states that by 2013, 128.2 million people in the US will get news from blogs, and over 37 million will have blogs they update weekly. The document then asks questions about what facilitates blogging and how the landscape for monetizing blogs is changing, such as through affiliate marketing. It argues that with influence over other influencers, blogging can be profitable without much time investment.
Cyber Unions, Web 2.0 [Using New Technology to Organize]Prakash Neupane
This document discusses how unions can use new technologies like social media, blogs, and microblogging to organize members. It explains that Web 2.0 allows for more dynamic and participatory websites. Tools like Facebook, Twitter, and dedicated sites like Unionbook help improve communications between unions and members. While technology must be appropriate for the audience, free and open-source options exist for organizing even in areas with low internet access through text messaging. The document recommends unions embrace these new technologies to create more open and engaged structures.
Diane Coyle discusses the challenges of authenticity in the digital age. New technologies have made it easy to create multiple online identities and copies of digital content. This has increased the value of authenticity while also enabling the spread of inauthentic information. Maintaining authentic identities and verifying information online will require credible digital identities, intellectual property protections, and widespread access to communications. Technology can both restrict and enable authentic experiences, so balancing these issues will be important going forward.
The document discusses the evolution of mass communication and new media technologies. It provides an overview of how communication technologies have developed from traditional mass media like newspapers, radio and television to modern platforms on the internet. This includes the rise of social media, user-generated content, and two-way interactive communication through blogs, social networking sites, and other applications. The document also discusses some of the opportunities and challenges of new communication technologies for both individuals and organizations.
The document discusses how new media and web-based technologies are being used by both mainstream and fringe groups for organizing, propaganda, and mobilization purposes. It provides examples of how Barack Obama's 2008 presidential campaign effectively utilized new media, while also examining how the French National Front party, American white supremacist groups like Stormfront, and others are tapping into new media's potential to spread their messages and recruit new members.
A lot has changed in digital media from 1969 to 2006:
- The internet was invented in 1969 and email was created in 1971. The World Wide Web was launched in 1989.
- MP3s and CD burning in the 1990s disrupted the music industry. File sharing services like Napster in the late 1990s and early 2000s had a major impact.
- Social media like MySpace and Facebook launched in the 2000s and changed how people interacted and shared content online. YouTube launched in 2005 and was acquired by Google in 2006.
The document discusses openness and sharing in technology and culture. It summarizes that people are freely sharing knowledge and connections online through social media and citizen journalism. It advocates for freely distributing your work online through various platforms to build an audience. It also promotes participatory group culture through open collaboration and sharing to empower communities.
Presentation for Texas Municipal League entitled "The Train Has Left the Station: Harnessing the Electronic Energy"
For more information on "Government 2.0", please visit http://topics.govloop.com/gov20.
To connect with other municipal innovators, please visit http://www.govloop.com/group/munigov.
Assignment 12 (ii) planning for documentary draft twoksumbland
This document outlines a proposed structure for a documentary series examining social media and its influence. The series would consist of four 15-minute episodes: 1) an introduction discussing the rise of social media and how it may control the information people receive; 2) how the internet and social media have evolved and revolutionized communication; 3) how social media users are generating their own content in response but are still subject to algorithms that filter information; 4) how technology enables both control and democratic expression and whether social media's influence is hegemonic or democratic. Each episode section covers the topic through interviews, statistics, and footage illustrating key points.
The document provides an overview of the internet and the world wide web through a series of questions and answers:
1) It describes how the internet was invented by an American computer scientist to allow computers to share information. It works by connecting millions of computers around the world to instantly send and receive information.
2) By 2020, it is estimated there will be over 2 billion internet users, reaching 30% of the world's population. While convenient for accessing information quickly, there are safety concerns about not knowing who people actually are online.
3) The document outlines some tips for staying safe online, such as avoiding disturbing images, not giving out personal details to strangers, and not participating in cyberbullying.
Future Agenda Initial Perspectives Full TextFuture Agenda
The full text of all 16 initial expert perspectives used to kick off the future agenda programme. Covering the future of authenticity, choice, cities, currency, data, energy, food, health, identity, migration, money, transport, waster, water and work, these provide a great perspective which we invite you to build on via the futureagenda.org website
Technology has transformed over the past century through innovations like the telephone, television, computer, and car. These devices started as large and basic but now offer countless capabilities through internet connectivity and apps. Social media also changed how people interact and get information by allowing users to easily connect and share content globally. Businesses now utilize social media for effective marketing to reach more consumers in multiple languages.
Cours sur les fondements des réseaux sociaux. Découverte et première approche. Présentation des outils de veille et de gestion des réseaux sociaux dans le cadre des ressources humaines et de la vente.
The document discusses the history and impact of the internet. It describes how the internet began with the development of computers in the 1950s and early computer networks like ARPANET. It then outlines some key advantages and disadvantages of internet use, such as faster communication, access to vast information resources, entertainment options, and risks like viruses and theft of personal information. Finally, it argues that the internet has fundamentally changed human life and development in a way that it has become essentially obligatory for modern society.
صور للجدار العازل.. المكان باجة.. المتضرر مواطن تونسي الإسم إبراهيم الكوكي معاق على مستوى السمع مقيم بالخارج رجع المتضرر فوجد الغرباء قد أقاموا جدارهم العازل..لا يخافون لا القانون..ولا ..المؤسسات..يمتلكون المال و السلطة..كاتب لمحكمة بمع...ية أخيه يعمل بالسجون والإصلاح يحكمون بالحديد و النار مدينة باجة..قال عنهم سكان المدينة أن لهم "أيادي طائلة"..لا يخشون في المدينة أحد..بالعربدة و تجاوزهم للقانون حتي زمن الثورة..هنا باجة مدينة الجمر..أين يناضل إبراهيم الكوكي دفاعا عن أرضه و عرضه هذا الرجل الأعزل..أمام صمت قاتل لهيبة الدولة
This document provides information about trade relations between the Czech Republic and the Baltic states of Estonia, Latvia, and Lithuania. It includes forewords from Czech ambassadors to each country emphasizing historical connections and optimistic outlooks for economic cooperation despite recent downturns. The document also lists Czech companies and the sectors they operate in, with the goal of expanding exports to the Baltic region. Key information includes economic overviews of each country-relationship and directories of relevant Czech institutions and contacts.
The document discusses building collaboration within the HimGlo movement through the use of technology. It proposes that an online platform could help foster relationships, share resources, and build a shared identity. The platform would allow participants to communicate, share ideas and testimonies, coordinate events, and collaborate on projects from a central online location. The goal is to inspire and empower Nepali/Himalayan Christian leaders through greater connectivity and partnership.
The document discusses how social networks and media have changed in the digital age. It notes that information is now abundant, cheap, and personally oriented rather than institutionally oriented. People's media ecologies have expanded to include many new devices and platforms. This has led to changes in how people access and share information, including more content creation and social networking. The document provides tips on how libraries can act as nodes in social networks by helping people find, assess, and act on information in this new media landscape.
Web 2.0 and the Enterprise: A Symbiotic RelationshipShiv Singh
The document discusses how Web 2.0 and social media have created a symbiotic relationship with enterprises. It outlines 5 reasons for this relationship: 1) social tools like Facebook are increasingly being used in the workplace, 2) principles of trust that make social tools successful personally also apply professionally, 3) small ideas can be as powerful as big ideas in driving change, 4) social graphs can bridge professional and personal networks, and 5) organizations have changed and are allowing all employees to participate in branding and conversations online. The relationship will only strengthen as walls between work and personal lives continue to blur with the rise of social media.
The document discusses the history of social networking from its origins on bulletin board systems (BBS) in the 1970s-1990s to early social networking sites like Classmates.com, SixDegrees.com, and AsianAvenue.com in the late 1990s. It then covers the launch and popularity of seminal social networks from the early 2000s onward, including Friendster, LinkedIn, MySpace, and Facebook. The history shows how social networking evolved from text-based computer discussions to profile-based networking on prominent today.
The document discusses how blogging has become mainstream and profitable. It provides statistics that show the large portion of the population that reads and creates blogs. Specifically, it states that by 2013, 128.2 million people in the US will get news from blogs, and over 37 million will have blogs they update weekly. The document then asks questions about what facilitates blogging and how the landscape for monetizing blogs is changing, such as through affiliate marketing. It argues that with influence over other influencers, blogging can be profitable without much time investment.
Cyber Unions, Web 2.0 [Using New Technology to Organize]Prakash Neupane
This document discusses how unions can use new technologies like social media, blogs, and microblogging to organize members. It explains that Web 2.0 allows for more dynamic and participatory websites. Tools like Facebook, Twitter, and dedicated sites like Unionbook help improve communications between unions and members. While technology must be appropriate for the audience, free and open-source options exist for organizing even in areas with low internet access through text messaging. The document recommends unions embrace these new technologies to create more open and engaged structures.
Diane Coyle discusses the challenges of authenticity in the digital age. New technologies have made it easy to create multiple online identities and copies of digital content. This has increased the value of authenticity while also enabling the spread of inauthentic information. Maintaining authentic identities and verifying information online will require credible digital identities, intellectual property protections, and widespread access to communications. Technology can both restrict and enable authentic experiences, so balancing these issues will be important going forward.
The document discusses the evolution of mass communication and new media technologies. It provides an overview of how communication technologies have developed from traditional mass media like newspapers, radio and television to modern platforms on the internet. This includes the rise of social media, user-generated content, and two-way interactive communication through blogs, social networking sites, and other applications. The document also discusses some of the opportunities and challenges of new communication technologies for both individuals and organizations.
The document discusses how new media and web-based technologies are being used by both mainstream and fringe groups for organizing, propaganda, and mobilization purposes. It provides examples of how Barack Obama's 2008 presidential campaign effectively utilized new media, while also examining how the French National Front party, American white supremacist groups like Stormfront, and others are tapping into new media's potential to spread their messages and recruit new members.
A lot has changed in digital media from 1969 to 2006:
- The internet was invented in 1969 and email was created in 1971. The World Wide Web was launched in 1989.
- MP3s and CD burning in the 1990s disrupted the music industry. File sharing services like Napster in the late 1990s and early 2000s had a major impact.
- Social media like MySpace and Facebook launched in the 2000s and changed how people interacted and shared content online. YouTube launched in 2005 and was acquired by Google in 2006.
The document discusses openness and sharing in technology and culture. It summarizes that people are freely sharing knowledge and connections online through social media and citizen journalism. It advocates for freely distributing your work online through various platforms to build an audience. It also promotes participatory group culture through open collaboration and sharing to empower communities.
Presentation for Texas Municipal League entitled "The Train Has Left the Station: Harnessing the Electronic Energy"
For more information on "Government 2.0", please visit http://topics.govloop.com/gov20.
To connect with other municipal innovators, please visit http://www.govloop.com/group/munigov.
Assignment 12 (ii) planning for documentary draft twoksumbland
This document outlines a proposed structure for a documentary series examining social media and its influence. The series would consist of four 15-minute episodes: 1) an introduction discussing the rise of social media and how it may control the information people receive; 2) how the internet and social media have evolved and revolutionized communication; 3) how social media users are generating their own content in response but are still subject to algorithms that filter information; 4) how technology enables both control and democratic expression and whether social media's influence is hegemonic or democratic. Each episode section covers the topic through interviews, statistics, and footage illustrating key points.
The document provides an overview of the internet and the world wide web through a series of questions and answers:
1) It describes how the internet was invented by an American computer scientist to allow computers to share information. It works by connecting millions of computers around the world to instantly send and receive information.
2) By 2020, it is estimated there will be over 2 billion internet users, reaching 30% of the world's population. While convenient for accessing information quickly, there are safety concerns about not knowing who people actually are online.
3) The document outlines some tips for staying safe online, such as avoiding disturbing images, not giving out personal details to strangers, and not participating in cyberbullying.
Future Agenda Initial Perspectives Full TextFuture Agenda
The full text of all 16 initial expert perspectives used to kick off the future agenda programme. Covering the future of authenticity, choice, cities, currency, data, energy, food, health, identity, migration, money, transport, waster, water and work, these provide a great perspective which we invite you to build on via the futureagenda.org website
Technology has transformed over the past century through innovations like the telephone, television, computer, and car. These devices started as large and basic but now offer countless capabilities through internet connectivity and apps. Social media also changed how people interact and get information by allowing users to easily connect and share content globally. Businesses now utilize social media for effective marketing to reach more consumers in multiple languages.
Cours sur les fondements des réseaux sociaux. Découverte et première approche. Présentation des outils de veille et de gestion des réseaux sociaux dans le cadre des ressources humaines et de la vente.
The document discusses the history and impact of the internet. It describes how the internet began with the development of computers in the 1950s and early computer networks like ARPANET. It then outlines some key advantages and disadvantages of internet use, such as faster communication, access to vast information resources, entertainment options, and risks like viruses and theft of personal information. Finally, it argues that the internet has fundamentally changed human life and development in a way that it has become essentially obligatory for modern society.
صور للجدار العازل.. المكان باجة.. المتضرر مواطن تونسي الإسم إبراهيم الكوكي معاق على مستوى السمع مقيم بالخارج رجع المتضرر فوجد الغرباء قد أقاموا جدارهم العازل..لا يخافون لا القانون..ولا ..المؤسسات..يمتلكون المال و السلطة..كاتب لمحكمة بمع...ية أخيه يعمل بالسجون والإصلاح يحكمون بالحديد و النار مدينة باجة..قال عنهم سكان المدينة أن لهم "أيادي طائلة"..لا يخشون في المدينة أحد..بالعربدة و تجاوزهم للقانون حتي زمن الثورة..هنا باجة مدينة الجمر..أين يناضل إبراهيم الكوكي دفاعا عن أرضه و عرضه هذا الرجل الأعزل..أمام صمت قاتل لهيبة الدولة
This document provides information about trade relations between the Czech Republic and the Baltic states of Estonia, Latvia, and Lithuania. It includes forewords from Czech ambassadors to each country emphasizing historical connections and optimistic outlooks for economic cooperation despite recent downturns. The document also lists Czech companies and the sectors they operate in, with the goal of expanding exports to the Baltic region. Key information includes economic overviews of each country-relationship and directories of relevant Czech institutions and contacts.
C2B, Committed To The Business Music Conference. This yearly event is designed to enable a critical dialogue about the current challenges facing emerging sectors of the music industry.
icEurope Project & Web Collaboration IntroClaudia Warth
Presentation on the Comenius project icEurope
Gives a general project overview, its main theoretical and methodological aspects (intercult. communication, language learning, strategies and e-learning/Moodle), introduces web collaboration and presents main achievements during 1st year; also some views of the pilot Moodle course and materials
AMS is a provider of photonics, thermal management, and power technologies solutions with 30 years of experience. Their mission is to help innovative companies apply these technologies for success. They partner with OEMs and end users like research institutes to offer leading edge solutions and local support. With offices across Europe, AMS aims to accelerate their customers' success through interdisciplinary expertise.
The document provides an overview of the Hope Foundation, an organization working in India. Some key points:
- The Hope Foundation was founded in 1999 in Kolkata, India and works to support sustainable development for poor communities in Kolkata and surrounding areas.
- It operates various projects focused on health care, education, child protection, gender issues, and income generation to help address issues like high child mortality, lack of sanitation, and poverty.
- The director notes that while the organization was able to meet its commitments in 2009 despite the economic downturn, cuts to foreign aid due to the ongoing financial crisis could threaten its work going forward. Continued support is needed to help the most vulnerable children.
The CIS countries' EU-related interests are very heterogeneous. The countries themselves differ not only in terms of their geopolitical and geo-economic situations, and how those affect their relations with the EU, but also in their levels of ambition in relation to the Union, as well as their specific sectoral interests. Some Eastern Partners have set full EU membership as their strategic goal; others want to enjoy the benefits of the common free market, and the ambitions of others are limited to developing cooperation in selected areas. Similarly, the EU's policy towards its Eastern neighbourhood is multi-level and very diverse, considering as it must the different characters of mutual relations. The EU and most of its Eastern partners have a sufficient number of common or converging interests to expect reasonable cooperation between the two sides to develop and deepen. However, serious challenges and problems exist that may prevent this positive scenario from being realised.
Authored by: Marcin Kaczmarski, Wojciech Kononczuk, Marek Menkiszak
Published in 2008
The pastor's letter summarizes the church's efforts to welcome a new Korean language congregation that holds services on Sunday evenings. It describes how the first communion service went, including the diverse languages used in prayer for a congregant. The pastor hopes more church members will attend the Korean services to experience the meaningful worship.
The document summarizes the rights of photographers in Malaysia and the laws relating to photography. It discusses that photographers generally have the right to take photographs in public places without permission. However, certain private property owners can prohibit photography on their premises. Photographers may face objections from security guards but their right to freedom of expression is protected under the Federal Constitution. The document also briefly discusses the rights of subjects in photographs.
The document provides information about Enventa Group, which manufactures, sells, and services UPS systems under various brands. It details the company's history starting in 1993, facilities, products, engineering capabilities, and customer support. Enventa Group has grown over the years and now has multiple manufacturing facilities and a wide range of UPS products ranging from 1kVA to over 100kVA.
This document is the official journal of the Patent Office published on August 9, 2013. It provides an introduction stating that the journal will be published weekly as required by the Patents Act to cover patent proceedings. It lists the various patent office jurisdictions and their contact information. The bulk of the document then lists the various sections and page numbers for Notices, Applications, Grants, Designs, and other patent information.
This document discusses how different Ruby implementations like MRI, Rubinius, and JRuby handle method dispatch and execution. It explains how MRI searches for and executes methods, and how Rubinius and JRuby optimize this using techniques like inline caches, just-in-time compilation, and invokedynamic. It provides code examples and compares the bytecode generated by each implementation.
The document discusses three major communication trends: 1) The rise of digital media that is available online and on-demand, 2) Increased collaboration and communication through cloud-based services, and 3) The rapid growth of wireless devices and their impact on how people access information. These trends are changing how people live, learn, work and socialize.
ADTELLIGENCE_White Paper_Monetization of Social Networks_Chapter2ADTELLIGENCE GmbH
The document discusses the global market for social networks. It notes that six of the top 15 websites in the world are social networks, and that social networks have grown faster than other types of websites. In Germany, over half of the top 15 sites are social networks as well. The largest social networks worldwide are dominated by US and Chinese sites like Facebook, QQ, and Baidu Space. In Germany, "student directory" networks like StudiVZ and SchülerVZ are most popular, along with Facebook. Asia also has significant social networks that have arisen independently due to cultural differences from Western sites.
This chapter is quite a different read from the balance of the book..pdfjacquelynjessicap166
This chapter is quite a different read from the balance of the book. I think it is a pleasant way to
end this 2nd edition. Shubert tackles a discussion I know I have had my my colleagues many
times, namely, the value of social networking at work. Shubert writes (288): \"It is the delivery
of technology and capability to business and society that lies at the heart of the dilemma for
CIOs and CTOs today; Businesses want and need access to networks (electronic communities) to
reach... their current and potential customers. Businesses are concerned that access to these same
networks by their employees could pose a security or competitive risk... .\" The ability to spill
one\'s guts then used to be isolated to the bar; now you can do so at every opportunity. It is true
that some employees are addicted to staying in touch, and Facebook is the rage. I would hazard
the guess that these same slackers are IM\'ing their friends or on the phone yacking it up with
momma. I don\'t think Facebook or for that matter Smart phones have made people more secure
in their social networks. There is simply a pathology that manifests itself when the conditions are
ripe. Excuse me. I see some practical marketing uses for product simulation, touring the plant,
getting to know folks; Second Life has shown itself to be useful in a variety of settings, even
organizational development where you want everyone to get together anonymously. But the part
of the chapter that intrigues me the most is the discussion on democratization and socialization of
information. Has the boundary between expert and amateur blurred? My answer to this would be
yes, if all the experts agree but the amateurs do not. For many of the problems facing the
corporation, crowdsourcing probably works as well as formal expertise. Given sufficient
monkeys, sufficient time, Shakespeare. Any of you who have had to endure the vendor pitch
knows that truth is relative to the need for profit. So we come to the a practical discussion of the
role of the CIO in moderating access to social media, framing what stands as truth in the
information world of the corporation, and the extent to which the explosion of personal authority
on the Internet has diminished our ability to sort out truth from hyperbole.
Solution
Over the past years, networks that is, communications, computational, data, and business
networks have become an increasingly developed important part of our professional lives. Over
just the past ten years they have become critical as they have woven themselves into the fabric of
our day-to-day lives of magnitude as have corporate and personal bandwidth access needs, but
the cost of using this bandwidth has also diminished significantly.communications have changed
significantly over this same period—from use of \"land lines\" to cell phones, where nearly
anyone can own a telephone number of their choosing that permanently belongs to the them,
regardless of where they live. The explosion of voice communicat.
Social computing has the potential to be much more than just web 2.0 for business. It shifts value from ownership and institutions to experience and communities. Social computing empowers individuals through one-to-many and many-to-many connections. When adopted, it can increase productivity, engagement, collaboration and knowledge sharing among employees. Companies should embrace social computing by understanding individuals' needs, nurturing enthusiasts, and allowing participation to drive critical mass in communities.
"A World Of Connections" - Special Report on Social Networking (The Economist)Matthew Pantoja
1) Social networking sites have grown rapidly due to the "network effect" - the value of a network increases as more people join it. This has caused exponential growth, particularly once critical mass is reached.
2) Their growth has been amplified by the global reach of the internet. Sites like Facebook have made it easy to share photos, videos and other content online with flexible privacy controls.
3) Independent developers have created many applications that run on social networks and enhance their value by tapping into user data, driving further participation.
A world of connections. A special report on social networking. January. 30th....Dmytro Lysiuk
A world of connections. A special report on social networking from "The Economist". January. 30th. 2010:
Global swap shops
- Why social networks have grown so fast and how Facebook has become so dominant.
Twitter’s transmitters
- The magic of 140 characters.
Proting from friendship
- Social networks have a better chance of making money than their critics think.
A peach of an opportunity
- Small businesses are using networks to become bigger.
Yammering away at the oce
- A distraction or a bonus?
Social contracts
- The smart way to hire workers.
Privacy 2.0
- Give a little, take a little.
Towards a socialised state
- The joy of unlimited communication
This document provides an overview of the rise of social networking and its impact. It discusses how social networks have transformed communication and brought people together online on a massive global scale. The two largest social networks, Facebook and Google, now have hundreds of millions of users worldwide. While critics worry that social networks are an unsustainable bubble, proponents argue that networks have found ways to monetize users and will continue growing in importance for communication, business, and society.
This document discusses the rise of user-generated content on the internet, known as Web 2.0. It notes that as technology prices drop, more people are able to create and share digital content like blogs, photos, and videos online. This user-generated content provides a wealth of data about people's everyday lives and social interactions. However, publishing personal content publicly exposes it to a large, invisible online audience in a way that challenges traditional notions of public and private. The document examines some of the theoretical implications of this shift and how social scientists can study online social interactions and their impact.
The next generation of collaborative work will be defined by a shift from information handling to interaction management and socialization. Social software seems an unlikely example for enterprise collaboration initially, but networks allow tapping into collective coworker knowledge better than previous approaches. Communities form organically in social networks, connections are stronger, and adoption is faster due to ease of use. While past technologies like groupware and portals improved collaboration, social software facilitates user-driven interaction and knowledge-sharing.
The Social Media Spine: Building the backbone to your online presenceStacy Lukasavitz Steele
Slides for the presentation I gave to Leadership Genesee on social media - very bare-bones approach to building an online presence, doesn't go too deep.
New approaches to openness – beyond open educational resourcesGrainne Conole
This document discusses new approaches to openness beyond Open Educational Resources (OER). It begins by discussing characteristics of social and participatory media and their implications for learning, teaching, and research. It then considers different facets of open practices across learning, teaching, and research. Some key aspects discussed include open educational practices (OEP), definitions and characteristics of OER, and how social and participatory media enable more open practices with implications for education.
The document discusses social media and asks a series of questions about how people use social media platforms. It asks about which platforms people use most, how they use social media, potential limitations and problems of social media, how people define and represent themselves online, and thoughts on the future of social media.
Social Media in the Enterprise: Information Management ChallengeLisa Chow
The document discusses the rise of social media and its impact on businesses. It notes that while social networking is not new, the scale at which people are using it is unprecedented. It raises challenges for information management as the lines between personal and professional information blur online. The document advocates developing social media policies and strategies to mitigate risks, protect privacy, and recognize potential opportunities and costs for businesses. Regular reviews and education are suggested to manage the dynamic social media landscape.
This document provides an overview of key concepts in online communications and internet mediation. It examines developments such as strategic planning, monitoring, and evaluation. It explores how the internet has changed communication through various platforms and channels, including one-to-one, one-to-many, many-to-many, and many-to-one models. It also discusses how information and knowledge sharing online can create value for organizations.
Entrepreneur in the age of Web2.0 2014Lukas Ritzel
This document discusses the rise of new generations in the workplace and the transition to Web 2.0 technologies. It describes how each generation grew up with different technologies and how this shapes them. It then discusses the attributes of "Net Gen" employees and how knowledge is now decentralized and distributed on networks. It provides examples of how companies can use crowdsourcing and user-generated content. Throughout, it emphasizes how Web 2.0 allows knowledge to be shared, businesses to innovate, and new ideas to spread through online collaboration.
Social media what's going? v3 by Laurent François aka lilzeonLaurent François
The 3rd edition of "Social Media: what's going on?". 2011 trends on social media, insights. This presentation is used as an introduction to digital marketing in the era of Social Web.
Author: Laurent François aka lilzeon
"Social Media" is best considered, not in isolation, but as part of much larger technical and social movements (Trend Currents). Welcome to The New Normal: Networked Communications.
http://bit.ly/SMStartHere
Similar to The Evolving Opportunities Of Social Media (20)
Project YuvA provides career counseling and mentoring services to help students develop skills and prepare for their careers. It offers workshops on topics such as skill development, resume and cover letter writing, networking, interviewing, and career development. The workshops aim to equip students with both technical skills and soft skills, as employers are increasingly looking for strong communication, teamwork, and problem-solving abilities. Project YuvA also focuses on developing life skills for employability, entrepreneurship, and the workplace.
This document is from a company called iEntrepreneur that specializes in digital marketing strategies including social media, mobile solutions, analytics, and more. They help clients identify customers, extend their brand across digital and social platforms, advertise using social and mobile media, and analyze digital performance. The company aims to help small businesses leverage technology and marketing to grow through brand awareness, traffic, leads, and sales.
This document discusses measuring Facebook marketing campaigns and components. It provides details on measuring ads, posts, apps, tabs and other campaign elements. Metrics include tab views, referrals, conversions and other data available through the Facebook API, analytics providers or custom parameters. The document also outlines best practices for campaign measurement and optimization.
Social media is defined as media that allows for social interaction and sharing through accessible publishing techniques. The document then provides steps for companies to effectively utilize social media, including preplanning, listening to conversations, creating target profiles, setting goals, joining conversations, and measuring return on investment. Case studies demonstrate how companies have successfully used social media strategies to grow their business.
Social Media Metrics How To Listen, Understand And Predict The Social ...Rohit Kuttappan
This document provides a summary of a conference on social media metrics. It discusses how social media has changed marketing metrics from counting "eyeballs" to measuring "engagement." Effective social media measurement requires defining goals and audiences, choosing appropriate metrics, benchmarking, using analytical tools to analyze structured and unstructured data, and continuously improving the process. Text analysis tools can track sentiment, themes and influence across vast amounts of social media data to provide actionable insights.
The document discusses key aspects of developing a marketing strategy, including defining strategy, the need for strategizing due to finite resources and uncertainty, conducting a SWOT analysis, identifying growth opportunities, and formulating strategies around products, markets, and competition. It also covers drafting a marketing plan, making decisions about where and when to compete, and addressing common problems in implementation such as lack of focus on uniqueness and adaptability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
1. TOP STORY
Riding the Web 2.0 Wave
Without Web 2.0, Kate Nash would not be the shooting star she is today. Instead of gig-
ging relentlessly for several years to achieve the critical mass of fans required to convince
a label of her merit, she started her career on MySpace. And this is only one of the most
recent examples that show how the latest iteration of the internet – based on a new model
Dr. Stephanie Altemoeller, of social interaction – changes both our lives and the way we do business. Web 2.0
Practice Leader
has initiated the age of participation, creating new opportunities for PR and corporate
communications. And companies like IBM and Panasonic are already taking advantage of
these possibilities.
Content
Content
_ Interview with Senior Partner Joachim Klewes and European Practice Leader
_ The reason behind: Waves of social interaction l read more
Change & Transformation, Partner Ralf Langen. l read more
_ The Age of Participation: PR and Web 2.0 l read more
_ There is more to dialogue than just engaging: In times of change.
_ Panasonic Brings Lumix Digital Cameras to Light with
Talk it; then walk it! l read more
Online Photo Competition l read more
_ Collective learning via social software l read more
_ The next generation of the Web – insights from IBM l read more
_ Web 2.0 Tools in Change Management l read more
CONTACT:
Pleon GmbH
Dr. Stephanie Altemoeller
Bahnstrasse 2
D-40212 Duesseldorf
stephanie.altemoeller@pleon.com
Tel.: +49.211.9541-2124
1/11 Fax: +49.211.9541-2200
2. TOP STORY
The reason behind: Waves of social interaction
Consumer Generated Media, User Generated Content, Web 2.0, citizen journalism
– none of this would exist without the primordial drive of human beings to inter-
act with each other; it is important to remember that all the technology, which is
integral to the CGM phenomenon, does nothing but enable this urge.
No amount of smart technology can force ten of thousands of simple bulletin board-
people to interact if they are not interested; style communities where people would talk
you can lead the horse to water, but you of … just about anything, from politics to
can’t make it drink. This is true when com- public transportation to sex (would you
panies are wondering whether they should doubt it?). The user interface was crude and
“build a community” around a new product not very forgiving for the casual browser.
or service: sure, given enough resources All kinds of information could be exchanged,
you can build any community, but unless provided it was text only. Conversation
their raison d’être is endogenous; they will threading had to be hacked together almost
always remain on life-support, only too by hand; many, many reasons why it could
ready to wither into oblivion the minute the never fly, yet millions of people jumped at
plug is pulled. So, it is useful to look back at the opportunity.
the previous waves of Internet-based social
interaction. Of course, this was the only game in town,
– but thirty years later, with plenty of sexier
opportunities for social interaction, Usenet
and NewsGroups are still going strong. Ho-
wever, the platform limitations did influence
the type of social exchange supported: the
main limitation being the text-only nature of
the tools available. One can safely say this
first wave of social interaction was centred
around the SHARING OF INFORMATION.
Information is anything that fits in text form:
a paper, a manual, an article, minutes from a
scientific seminar and of course, free-form
thoughts, stories, etc.
Another very good reason to stick to bare
First Step – Usenet bones text-only was that this information
In the eighties someone decreed email as the had to travel. In the eighties, geeks who
killer app for the Internet; but even leaving had a 56k modem thought they owned the
email alone for a moment, the eighties saw world, but this meant a transfer speed at
2/11 the rise and establishment of the Usenet: least 40 times slower than today’s puniest
3. TOP STORY
ADSL. This is also the reason for unleashing away their knowledge for free is an es-
creativity in coining bandwith-saving acro- sential step to understanding what makes
nyms like LOL and BFF who remained in use communities tick.
and are also popular with people who at the
time wore diapers. But there is no denying Communities are essentially “gift cultures”,
that the unfriendliness of the platform where the status of each member is not
made it fit mostly for hardcore geeks willing determined by what each member owns,
to put up with technical challenges and user but by what he/she gives away. The more
interface quirks. knowledge you give away, the more street
creeds accumulated. The giver is anoin-
The rise of special interest ted as the “expert”, the “guru”, the “alpha
One day in 1989 Tim Berners-Lee, a re- male”. Peer respect is very important in
searcher working at the CERN in Geneva, gift cultures. It is also a very effective
invented the World Wide Web, dramatically driving force – see as an example the me-
changing the way ordinary blokes could teoric rise of phenomena like the Open
experience the Internet. This meant new Source Software movement. So the cen-
levels of interface control and sophisti- tral focus of forum-supported communi-
cation and the (relative) ease with which ties became the SHARING OF EXPERIENCE.
almost anybody could put up a site dedica- Newbies would ask for help, more expert
ted to anything. It is perhaps not surprising users would trade their secrets, recurring
that bikers put up sites about motorcycles, queries found their way in FAQs or do-
or that gadget freaks made sites about cuments for general use, which became
tech toys, photographers created photo- precious resources where fellow uses told
graphy sites and so on. you how to do things, whether it was
engine tweaking, software development,
These special-interest sites soon made hardware tips & tricks, alerting you of pit-
their appearance areas where site visi- falls or bugs and suggesting workarounds.
tors could discuss their topics of interest
with other visitors. Aptly, this area in the In general, a lively forum is an indispensa-
site was dubbed “discussion forum” short- ble companion to the official website and
handed in “forum”. The forum of a heal- the next best thing to having a friend who
thy community becomes very quickly the happens to be an expert in just what you
most interesting and lively area of the site. are attempting to do. But still, setting up
Having the full power of HTML to play a half-decent website was easy but not
with, a forum sported a sexier interface really idiot-proof. A forum was easy to
and supported a much richer assortment use, but still rather difficult to set up and
of content, attracting a wider audience of maintain,not to mention the underlying
people, far beyond the hardcore geeks that hardware, software and bandwidth: all in
previously populated the Internet. all, a rather expensive proposition. The new
phase started a couple of years ago, when
The growth of such aggregations meant people started noticing the rapid growth of
new users had a place to go and ask for traffic to places such as MySpace or You-
3/11 help. Understanding why expert users give Tube and other CGM properties, coupled
4. TOP STORY
with the ever increasing command Google rather boring and dull and featureless, and
demonstrated in finely targeting adverti- not a major motion picture; but not all the
sing to just about any content, turning it time – the secret lies in this. Nobody wants
into a potential revenue stream. These two to watch the whole life of the average Joe
circumstances created the background in to find the five interesting minutes worth
which somebody started to offer free of watching, and every Joe can write a witty
charge idiot-proof technology platforms post in a lifetime, every Joe can take one
to consumers in return for their content. unusual picture and claim their fifteen mi-
nutes of fame thanks to technology which
Just think how complicated it was to share gives us an array of tools (search, social
pictures on the web until things like Flickr tagging, XML and aggregators) making it
or Zoomr came about, not to mention full relatively easy to spot the interesting stuff
motion video. Now a computer is no longer and discard the rest. Every one of us has
necessary; One can just shoot a pic on a cell the potential to be the next Matt Harding,
phone and instantly upload it to a favou- so it is not Joe individually; it’s the collec-
rite photo sharing service. Setting up a site tion of those interesting bits from the 71
with proper discussion facilities becomes million Joes that makes CGM interesting.
the affair of a minute and costs nothing –
overnight 71 million blogs where born and, Where wave One traded in Information,
as the Technorati splash page says, some wave Two traded in Support and wave
of them GOT to be good! Three trades in Attention; these are the
only accepted currencies on CGM, and
All of this makes sharing easy, free and quick, anyone wishing to participate must accept
taking it to the next level, which is SHARING this rule.
YOUR LIFE. Of course, most of our lives are Author: Gianni Catalfamo
The Age of Participation: PR and Web 2.0
Web 2.0 has become a common buzzword widely known beyond the boundaries of
the virtual world. Yet what are the essential technologies and features buried beneath
all the hype around this metaphor? And how can PR agencies and companies utilize
and benefit from the techniques of Web 2.0?
What Web 2.0 means PR-stunt by web guru Tim O’Reilly, who
The term “Web 2.0” continues to be a sy- coined the term in 2004, undoubtedly
nonym for innovation, yet it has also star- has two basic principles: broadband con-
ted to stand for an array of almost arbitrary nections and user generated content. The
definitions and accompanying buzzwords. development of Web 2.0 software like
4/11 However, what more or less started as a YouTube, Flickr or Myspace has enabled
5. TOP STORY
even amateur internet aficionados to pre- More and more users base their buying
sent their self-created multimedia content decisions on virtual word-of-mouth re-
to the global web community. commendations. The internet is the force
behind the integration of formerly deta-
ched and self-contained communication
channels (TV, radio, print) and an increa-
sing number of net users actively engage in
the further development of this interactive
communication platform – by uploading
videos, rating products and joining com-
munities. Or by launching start-ups which
will eventually be bought by Google.
Many companies also benefit from the
opportunities provided by Web 2.0 tech-
Web 2.0 also transports a new perception nologies. The “participatory web” offers
of the internet accompanied and triggered unique chances to engage in direct com-
by a generational change as it has evolved munication with target groups and indivi-
from a simple digital data-storage me- dual customers. The changing role of the
dium into an easily accessible virtual public user from a passive consumer to an active
sphere which invites and relies on active “prosumer” also requires that companies
participation. To the current generation meet the challenges of the “age of partici-
of teenagers, the internet has never been pation”. Additionally, companies should push
anything else but a “participatory web”. systematic monitoring of the World Wide
Web to the top of their agenda and con-
Web 2.0: More than a trend stantly be on the virtual lookout for trends,
According to a study by the management innovations, the company’s image in blogs
consultancy Booz Allen Hamilton, more and communities, and potential communi-
than 12 Million Germans already use blogs, cation crises.
wikis, social communities and other dyna-
mic Web 2.0 features – and the upward Viral Marketing:
trend continues. Given the persistent sa- Web 2.0 for companies
lience of the World Wide Web, the pe- Viral marketing is a prime example of the
netration of Web 2.0 sites and services multi-faceted possibilities of online-com-
is consistently at a high level throughout munications. Viral marketing strategies use
Europe, as evident in the 2007 NetObser- social networks and communities to raise
ver study. In Spain and in the UK, the usage brand awareness and to instigate positive
of certain Web 2.0 technologies is even far word-of-mouth campaigns. One common
more widespread than in Germany. Another element is viral advertising: companies
very vivid example: 20% of all Norwegians produce short videos – funny and/or tech-
have a profile on Facebook, currently the nologically sophisticated – which they
fastest-growing social community with upload to popular online video platforms
5/11 tens of millions of users worldwide. such as YouTube. Their hope is to ride the
6. TOP STORY
two point zero wave by utilizing the un- state of flux. A single blog entry may scar-
canny speed of distribution inherent to cely create a stir – but a large number of
online communities. Several companies interlinked blogs which convey the same
have triggered highly successful viral mar- story or report on the same incident can
keting campaigns: Sixt recently launched a certainly have a measurable impact. Occa-
video-campaign featuring German crooner sionally, even single blog entries can wreak
Matthias Reim which spread beyond the havoc: When the popular technology blog
internet and proceeded to get media (and podcast) Engadget reported that the
coverage from newspapers and television delivery of the iPhone would be postponed,
outlets. An animated spot which placed the Apple’s stock plummeted. It did not matter
Toyota Tacoma within the popular online- that the report proved to be false – traditi-
game “World of Warcraft” got one million onal media outlets had already weaved the
views on YouTube – within 48 hours. story into their news coverage without any
fact-checking.
However, a complete reliance on videos or
games increases the risk that the blogos- This type of damage can happen to any
phere will focus on these and end up ne- company. Not surprisingly, blog- and com-
glecting or simply ignoring the company munity-monitoring has been at the top of
and its product. Companies should there- the agenda for many agencies in 2007.
fore embed viral marketing strategies into And only agencies which have identified
a communication mix and support their the current and future needs of their cus-
consumer communications with additional tomers and thus have established the
Web 2.0 features. relevant expert knowledge can meet the
growing demand of the market.
Blogs: From Online-Diaries to
Newspaper Substitutes Collective Intelligence:
Aside from online videos, weblogs (or Virtual Knowledge Management
blogs) are the most well-known feature of Web 2.0 also gives companies the oppor-
Web 2.0. What started as virtual diaries by tunity to tap into the collective intelligence
internet pioneers has become a mass trend. of their employees by implementing an ar-
Today more than 70 million weblogs exist chitecture of participation – expanding and
– techblogs, music blogs, corporate blogs, developing its internal business knowledge.
photoblogs, and purely personal blogs – Social software like wikis, tags, blogs, RSS
and this collection grows at a daily rate of feeds and intranet platforms are valuable
12,000. Some of the more popular blogs resources in the process of indexing know-
have far more visits than the websites of ledge by linking people. The accumulated
newspapers. It is then not surprising that expertise is not stored on a local server – the
for some people blogs have become a sub- network now is the server, and net-based
stitute for a daily newspaper. applications allow users to share and access
knowledge and information on the move.
Thanks to the interconnectedness of web- The early adaptation of Web 2.0 techno-
logs, every blogger is part of a huge and logies also promises to be a deciding com-
6/11 growing community which is in a constant petitive advantage, according to a 2007
7. TOP STORY
study conducted by the German software of Web 2.0 have changed the premise and
trade association Bitkom, which concludes the scope of communications within the
that the embrace of Web 2.0 software by World Wide Web. It has given net users
business companies will lead to a come- and consumers a powerful and indepen-
back of corporate knowledge manage- dent voice which continues to have a
ment. Harvard Business School professor lasting effect on how companies conduct
Andrew McAffee consequently coined the their business. It will be the task of agen-
umbrella term “Enterprise 2.0” to account cies to help its customers prepare to meet
for the emergence of Web 2.0 technolo- the challenges posed by the “participatory
gies within corporate intranets. web” and guide them safely through the
ever-changing and dynamic virtual space
The Task: Providing Guidance which determines Web 2.0.
in a Virtual World Authors:
The interactive technologies and features Adrian Rosenthal, Igor Schwarzmann, Frank Lehmann
Panasonic Brings Lumix Digital Cameras to Light
with Online Photo Competition
Web 2.0 offers corporate advertisers numerous options for reaching specific target
groups. One example is “engagement marketing”, which uses tools such as user-gene-
rated content, competitions, and user voting. Panasonic Germany has successfully
used this advertising strategy online to boost the image of its Lumix digital cameras.
Online photo competition increases consumers via their interests, to encourage
brand awareness them to engage, and thus increase their in-
“Engagement marketing” refers to dialogue- volvement and identification with the brand
based advertising strategies that motivate or product.
users to engage with a topic related to the
advertised product. Initially, the product At the same time, advertisers can occupy
itself is in the background. In the foreground product-related topics or trends, position
is the added value for the consumer, above themselves as experts, and so build up
and beyond the actual advertising message. brand awareness and brand image. Also,
interactions such as discussion forums,
This can be achieved through specially- uploads or competitions can provide va-
written, topic-related features that embed luable data about the target group. This
the product in a comprehensive offering of can later be used for further dialogue-
content: uploads and downloads, forums, based marketing measures. The Panasonic
blogs, competitions, background informa- Germany team in Hamburg is responsible
7/11 tion, tips and services. The goal is to reach for the sales and marketing in Germany of
8. TOP STORY
high-quality consumer electronics and pro- and lighting (including backlighting). A
fessional business systems. The electronic special judging panel, made up of repre-
experts’ marketing goal was to increase sentatives from the T-Online portal and
brand awareness for their Lumix digital Panasonic, and chaired by the chief editors
cameras, to anchor the Panasonic brand of National Geographic Germany, nomina-
in the target group’s ‘relevant set’, and ted the winners of the individual categories
to expand the existing address database. at the end of October. The winners were
In 2007 for the third successful year, announced online on 29 October 2007. In
Panasonic used an engagement marke- January 2008, the winners will appear in
ting concept based on their target group’s National Geographic Magazine.
enthusiasm for photography. Partners in-
cluded InteractiveMedia, T-Online.de, and The second piece allowed for a peer-
National Geographic.InteractiveMedia, a to-peer interaction in which users could
leading online marketer of digital advertising judge the art of other users. Photography
in Germany and Europe, developed an en- hobbyists could submit entries for the
gagement marketing concept for Panasonic “Users’ Prize”, which was adjudicated by re-
in the form of a cross-media digital photo gistered T-Online users. The main prize in
competitionthat focused on three areas. each category was a trip for two to South
Africa. For eight weeks, the public could allot
First, the competition targeted hobby pho- points and vote for their favourite pictures
tographers who could enter their best digital in a special vote organised by the T-Online
photos in the categories “People and Emo- photo department. A supporting newslet-
tions”, “Nature and Animals”, and “Architec- ter kept registered T-Online users updated
ture & Technology”. The competition ran each week on the current status of the vote,
on T-Online.de, Germany’s most-visited and notified them of upcoming events. The
portal, for ten weeks (20 August to 29 eight winners of the weekly users’ vote then
October 2007). In tandem, the competi- went head-to-head in a final playoff. There
tion was integrated into a specially-written was something in it for voters, too: those
feature at www.t-online.de/lumix, which casting votes for their favourite photos also
offered a range of tips and tricks for digi- opted into a further drawing to win attrac-
tal photography, daily photo shows with tive prizes.
the best pictures, and a photo simulator.
The photo simulator allowed users to prac- Finally, a comprehensive online media pa-
8/11 tice getting the right picture composition ckage with attention-grabbing forms of
9. TOP STORY
advertising was published on www.t-online. ideal marketing strategy for our product line
de/lumix to strengthen the long-term per- of Lumix cameras. We attribute the measu-
ception of the Lumix product range. rable success to four factors: being authen-
tic, being relevant, involving the consumers,
The photo competition was a successand and co-operating with optimal partners,”
put the high-quality Lumix series of digi- explains Thomas Dobberstein, Manager Di-
tal cameras in the right light. For the digi- gital Communication at Panasonic Germany.
tal photo competition 2007, over 20,300 “Also key to the concept’s success was the
photos were uploaded onto the T-Online high consumer activation, achieved through
portal, generating over 25 million page im- opportunities for interaction and dialo-
pressions and several thousand subscriptions gue, user-generated content with added
to the Lumix newsletter. “The cross-media value, and targetgroup-specific topics and
digital photo concept on T-Online.de, de- forums.”
veloped jointly with InteractiveMedia, is the Author: Daniela Jasenko
The next generation of the Web – insights from IBM
Since the very beginning, IBM has been pioneering new technologies and most cer-
tainly new web technologies. Ellis Zijlstra from IBM Corporate Communications talks
to Pleon about experiences, trends and future plans of IBMs Internet strategy.
Web 2.0 is a frequently used buzz word. IBM employees for example own an
How does IBM as a company make use avatar and use Second Life on a regu-
of the technology? lar basis. What are they doing there
Ellis Zijlstra: Web 2.0 is an attitude not a and what advantages does the virtual
technology. It is about enabling and en- world offer here at IBM?
couraging participation through open ap- EZ: People sometimes mistake gaming and
plications and services. Within IBM, Web virtual worlds for mere child‘s play. The rea-
2.0 technologies have become part of the lity is, with increased realism and immersive
way we operate. We use wiki’s, blogs, RSS, technologies, the possibilities are endless for
podcasts, movie libraries where people can other fields: science; engineering; health-
upload and share movies, and we even have care; business; financial markets, education,
a Bluepedia, the IBM internal version of the and government.
Wikipedia. Sharing information and working
with communities have become essential Within IBM, we have a very active user group
for the way we do business. of virtual worlds; the Virtual Universe Com-
munity. This community is experimenting to
IBM has been exploring 3D net techno- get insight into the technical and business
9/11 logy for a while now. More than 4000 possibilities of virtual worlds. Working with a
10. TOP STORY
broad community, and bringing to the table others. The 3D virtual worlds take co-cre-
IBM‘s decades of experience in supercom- ation to a higher level. Your virtual persona
puting, visualization and its work with the interacts with other virtual personas, which
three major game platforms (Microsoft‘s speeds up the creation process. The tech-
XBOX 360, Nintendo‘s Wii and Sony‘s Play- niques related to 3D virtual worlds make it
station 3), IBM aims to help drive and deve- possible to interact realtime and, therefore,
lop the 3D next generation Internet. design faster and at lower cost.
In addition to helping other companies apply
virtual worlds to their business problems, In November 2006, IBM allocated ten
IBM‘s vision is to allow virtual persona to million dollars for expanding its own
cross over from one world to another, like virtual presence as well as for develo-
moving between pages on the Internet wi- ping its own 3D intranet. How far have
thout losing any consistency, enabling all these projects proceeded? What ad-
sorts of new applications of this technology vantages does IBM expect?
EZ: In the summer of 2006, we did the
What does IBM consider the most stri- largest on-line brainstorming session ever.
king advantages of using 3D-worlds as InnovationJam brought together more than
a communication tool? 150,000 people from 104 countries, inclu-
EZ: We see three striking advantages; the ding IBM employees, family members, uni-
visual aspect, the social factor and co- versities, business partners and clients from
creation. Visual: The lifelike graphics can be 67 companies. Over two 72-hour sessi-
beneficial in so many ways, from diagnosing ons, participants posted more than 46,000
diseases to analyzing hotspots that occur in ideas. The result was 10 ideas which we
server rooms or data centers. We‘ll be able wanted to explore further and invest in, and
to use visualization technology to walk on one of them was the 3D Internet: partne-
the bottom of the ocean to investigate a ring with others to take the best of virtual
broken pipeline, visualize a huge 3D DNA worlds and gaming environments to build
protein structure for collaborative research a seamless, standards-based 3D Internet.
or even to walk through someone‘s brain to This is the next platform for global com-
look at structures. merce and day-to-day business operations.
Social: Within the 3D world, you can see From that day, IBM has been experimenting
who is in a virtual store, for example. Soon, on extending virtual worlds for business in
teenagers will be linking with their friends in three key areas: virtual commerce and wor-
a 3D world that more accurately represents king with clients to apply virtual worlds to
real life. Instead of simply text chatting with their business problems; driving new kinds
a friend online, they will be able to meet up in of collaboration and education; and experi-
a music store, browse the shelves and meet mentations on pushing the limits with a broad
other people with similar interests. Likewise, community on what might be possible in
you can easily have meetings, conferences virtual worlds. IBM is currently working with
and learning sessions in a 3D environment. dozens of clients, like Sears and Circuit City,
Co-creation: The Web 2.0 technique already to experiment and help them understand
10/11 allows you to design and create things with and apply virtual worlds to their business.
11. TOP STORY
The other aim of IBM is to collaborate with doctors a top requirement. The Anatomic
a community in an open source fashion to Symbolic Mapper Engine of IBM Research
develop the 3D Internet; a platform for allows doctors to click on, for example, the
„serious“ business. This is why we recen- spine of a 3D avatar of the human body
tly announced the intent to develop new and instantly see the medical history and all
technologies and methodologies based on available information. It allows healthcare
open standards that will help advance the professionals to navigate through a virtual
future of 3D virtual worlds together with map of the body.
Linden Labs. You can think of technologies
like Universal Avatars, Security-rich Trans- Let’s have a look into the future: What
actions, Platform stability, integration with role will 3D environments play in 2015?
existing Web and business processes, and EZ: The popular on-line immersive de-
open standards for interoperability with the stinations, such as Second Life and the
current Web. World of Warcraft, will evolve into the 3D
Internet, much like the early work by the
We have experienced how the Web likes of Darpa, AOL and Prodigy evolved into
changed business models with the in- the World Wide Web.
troduction of e-commerce. What new
business opportunities will 3D Internet Much of the early cutting edge experimen-
bring? tation takes place behind companies’ own
EZ: The early evolution of Virtual Worlds is firewalls, where confidential and secure
closely mimicking the evolution of the Web. business can be conducted. As tools be-
At first, people just published Web pages come available, these companies will build
with information. Then came commerce, 3D Intranets.
or e-commerce. We see the same with vir-
tual worlds. This goes beyond just holding In 2015, we will have a 3D Internet and it
a meeting or putting up some brand logos, will have a place in our lives, just like the In-
which is the equivalent of putting up an ternet has nowadays. You will walk the ais-
informational Web page. We see opportu- les of virtual supermarkets, bookstores and
nities for virtual commerce and virtual busi- DVD shops, where you‘ll encounter experts
ness, and applications beyond commerce, you‘d rarely find in your local store. The 3D
such as SIM hospitals, telemedicine, virtual Internet will enable new kinds of interactive
learning, and many, many more. And ideas education, remote medicine and consumer
and innovations that people haven‘t even experiences. It will transform how we in-
thought of yet. teract with our friends and family, doctors,
teachers, and others.
One example is the 3D Avatar helping doc-
tors to visualize patient records and improve The 3D Internet is one that is open, immer-
care. Providing patients with highly effective sive and makes new classes of applications
treatments often requires the integration of possible in commerce, government, health-
huge amounts of information in the best care, education and others that are yet to
possible way. These large amounts of infor- be imagined.
11/11 mation make medical decision support for Author: Stephanie Altemoeller