Remove Metadata Remove Open Source Remove Policies Remove Survey
article thumbnail

Intranet Blog :: E-mail fatigue

Buzz Marketing for Technology

Previous: Open source solutions. With no metadata or search, shared drives become un-navigable. The study culminates a great deal of analysis including a survey of more than 1000 e-mail managers (mostly IT managers and executives, and records and document management specialists). User name: Password: Remember me.

article thumbnail

eLearning & Deliberative Moments: The present and future of Personal Learning Environments (PLE)

Buzz Marketing for Technology

PLEs are meant to simplify managing these artefacts, creating meaning through aggregation, linking and metadata tagging (eg comments, keywords). The structure, features and policies of most VLE implementations tend to perpetuate the traditional instructivist models of education. services like social bookmarking or photo sharing.

Web 2.0 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Computer Security for NGOs

Little Web Giants

It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.

article thumbnail

Computer Security for NGOs

Little Web Giants

It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata.