Remove Applications Remove Comments Remove Metadata Remove Open Source
article thumbnail

Intranet Blog :: E-mail fatigue

Buzz Marketing for Technology

Applications. Previous: Open source solutions. E-mail is perhaps the biggest killer application in recent technology history. With no metadata or search, shared drives become un-navigable. More than 40% are testing, piloting or evaluating blog and wiki applications at the time of the survey. Post a comment.

Wiki 189
article thumbnail

Facebook Filed for a Trademark on the Word Meta. You Should See the Description.

Bill Hartzer

I’ve read quite a number of trademark applications over the years, as part of my expert witness work , but also as part of DNProtect , but when I looked at the Meta trademark application from Facebook, my jaw dropped. The screen capture above is only the beginning, it only shows a small part of the Meta trademark. Just think.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

eLearning & Deliberative Moments: The present and future of Personal Learning Environments (PLE)

Buzz Marketing for Technology

Conception about what should constitute a PLE depends on the perspective of the commentator. PLEs are meant to simplify managing these artefacts, creating meaning through aggregation, linking and metadata tagging (eg comments, keywords). eLearning & Deliberative Moments. services like social bookmarking or photo sharing.

Web 2.0 165
article thumbnail

Computer Security for NGOs

Little Web Giants

Spend time as a team exploring new tools and techniques – for example set aside an hour or so on a Friday afternoon for everyone to install a password manager, or an encrypted SMS application. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

Spend time as a team exploring new tools and techniques – for example set aside an hour or so on a Friday afternoon for everyone to install a password manager, or an encrypted SMS application. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

Spend time as a team exploring new tools and techniques – for example set aside an hour or so on a Friday afternoon for everyone to install a password manager, or an encrypted SMS application. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Toward a New Knowledge Society

Buzz Marketing for Technology

All Comments (3). Comments on Slide 1. Add a comment. « Next » All comments. Add a comment on Slide 1. If you have a SlideShare account, login to comment; else you can comment as a guest. Just include the embed code in the comment! 3 comments |. Like open source â??

Metadata 193