Remove Applications Remove Content management systems Remove Mobile Remove Survey
article thumbnail

10 Quotes on the Apple iPad and the Business of News

Adam Sherk

The question, then, is whether newspaper publishers will do any better at monetizing mobile advertising than they have online. On the iPhone, you can sell news apps through the App Store; you can upsell specific pieces of content to people within your apps; and you can sell advertising within those applications.

iPad 129
article thumbnail

eLearning & Deliberative Moments: The present and future of Personal Learning Environments (PLE)

Buzz Marketing for Technology

So organising ones personal learning through a variety of web-based services involves managing multiple login names and passwords. A PLE could alleviate the daily problem of login identification by storing and safeguarding the data for automatic application. Third-party modules may be added (eg KNotes weblog). Vuorikari, R.

Web 2.0 165
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Computer Security for NGOs

Little Web Giants

It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. As we collect more data, in more forms, and in more locations, it becomes increasingly hard to safely manage. Think of it as herd immunity from surveillance.”.

article thumbnail

Computer Security for NGOs

Little Web Giants

It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. As we collect more data, in more forms, and in more locations, it becomes increasingly hard to safely manage. Think of it as herd immunity from surveillance.”.

article thumbnail

Computer Security for NGOs

Little Web Giants

It includes research, surveys, mailing lists, meeting records such as agendas, minutes and attendance lists, audio and video recordings, emails and social media conversations. As we collect more data, in more forms, and in more locations, it becomes increasingly hard to safely manage. Think of it as herd immunity from surveillance.”.