article thumbnail

Intranet Blog :: E-mail fatigue

Buzz Marketing for Technology

Previous: Open source solutions. The Enterprise Strategy Group (ESG) reports that as much as 75 percent of most companiesâ?? intellectual property is contained in the messages and attachments they send through their e-mail systems (source: Message Therapy, CIO Magazine, January, 2005). User name: Password: Remember me.

article thumbnail

Facebook Filed for a Trademark on the Word Meta. You Should See the Description.

Bill Hartzer

G & S: Downloadable software in the nature of a mobile application; Computer hardware; Downloadable software for social networking and creating and interacting with online communities; Downloadable software for creating, managing and accessing groups within virtual communities; Software development tools; Downloadable software to enable development, (..)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The FASTForward Blog " Managing Personal Knowledge: Setting a Foundation for Transformation? : Enterprise 2.0 Blog: News, Coverage, and Commentary

Buzz Marketing for Technology

open source. Gilbane Group. Measurement. Messy World. Michael Rosenblum. Michael Skoler. Michael Wesch. Michael Yon. Microblogging. MicroBrand. Mobile Messaging 2.0. Mobile Phones. New Realities. News Corporation. Personal Branding. David Tebbutt. David Terrar. David Weinberger. Dennis Howlett. Dennis McDonald. Dion Hinchcliffe.

article thumbnail

eLearning & Deliberative Moments: The present and future of Personal Learning Environments (PLE)

Buzz Marketing for Technology

PLEs are meant to simplify managing these artefacts, creating meaning through aggregation, linking and metadata tagging (eg comments, keywords). On the other hand, in Europe more sites use inhouse and open source implementations (Vuorikari, 2003). services like social bookmarking or photo sharing. In March 2006, Blackboard Inc.

Web 2.0 165
article thumbnail

Computer Security for NGOs

Little Web Giants

This could include groups such as refugees, activists, or the homeless. All of this data adds up and can be used to build up an effective profile of an individual or group. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

This could include groups such as refugees, activists, or the homeless. All of this data adds up and can be used to build up an effective profile of an individual or group. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

This could include groups such as refugees, activists, or the homeless. All of this data adds up and can be used to build up an effective profile of an individual or group. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.