article thumbnail

Facebook Filed for a Trademark on the Word Meta. You Should See the Description.

Bill Hartzer

G & S: Downloadable software in the nature of a mobile application; Computer hardware; Downloadable software for social networking and creating and interacting with online communities; Downloadable software for creating, managing and accessing groups within virtual communities; Software development tools; Downloadable software to enable development, (..)

article thumbnail

The FASTForward Blog " Managing Personal Knowledge: Setting a Foundation for Transformation? : Enterprise 2.0 Blog: News, Coverage, and Commentary

Buzz Marketing for Technology

open source. Among the topics discussed between host Jerry Michalski and the speakers, panelists, attendees, and contributors to this blog: enterprise 2.0, Measurement. Messy World. Michael Rosenblum. Michael Skoler. Michael Wesch. Michael Yon. Microblogging. MicroBrand. Mobile Messaging 2.0. Mobile Phones. New Realities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FedRAMP Certification: What Is It, Why It Matters, and Who Has It

Hootsuite

the flow of information and metadata. For “systems that are low risk for uses like collaboration tools, project management applications, and tools that help develop open-source code.” Find an agency partner – one that is using your product or is committed to doing so. Spend time accurately defining your boundary.

article thumbnail

eLearning & Deliberative Moments: The present and future of Personal Learning Environments (PLE)

Buzz Marketing for Technology

PLEs are meant to simplify managing these artefacts, creating meaning through aggregation, linking and metadata tagging (eg comments, keywords). On the other hand, in Europe more sites use inhouse and open source implementations (Vuorikari, 2003). But a PLE could host a searchable index to metadata about offline resources.

Web 2.0 165
article thumbnail

Computer Security for NGOs

Little Web Giants

They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata. Metadata is sometimes described as “data about data” – for example, the metadata from an email might include the subject line, sender, recipient and date and time it was sent.

article thumbnail

Computer Security for NGOs

Little Web Giants

They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata. Metadata is sometimes described as “data about data” – for example, the metadata from an email might include the subject line, sender, recipient and date and time it was sent.

article thumbnail

Computer Security for NGOs

Little Web Giants

They may deliberately attempt to gather data on known individuals, but many also collect mass data indiscriminately in the form of metadata. Metadata is sometimes described as “data about data” – for example, the metadata from an email might include the subject line, sender, recipient and date and time it was sent.