The document discusses how social software can enhance collaboration and interactions between people by facilitating the sharing of information and objects. It explores different models of social networks, including those centered around objects, personal tools for mediating access to information, and facilitating knowledge sharing and trust between groups. Emergent networks are described as being reproducible, with parallel communities and no overarching mission, providing high individual value.
Social computing has the potential to be much more than just web 2.0 for business. It shifts value from ownership and institutions to experience and communities. Social computing empowers individuals through one-to-many and many-to-many connections. When adopted, it can increase productivity, engagement, collaboration and knowledge sharing among employees. Companies should embrace social computing by understanding individuals' needs, nurturing enthusiasts, and allowing participation to drive critical mass in communities.
The document discusses information ecologies using the metaphor of the 1927 film Metropolis. It explores how technology impacts lives and defines an information ecology as a system of people, practices, values and technologies in a local environment focused on serving human activities. Different views on technology are discussed, from those who welcome its inevitability to those who see its invasive effects, with many perspectives in between. Examples of information ecologies in libraries, virtual worlds, classrooms, and hospitals are provided.
Social computing is an area of computer science concerned with how social behavior and computational systems intersect. It involves creating or recreating social conventions using software and technology. Social computing systems contain components that support social constructs like identity, reputation, trust, accountability, presence, social roles, and ownership. While one-way communications from untrusted sources are usually useless, social media provides value through trust. Social computing will gradually impact most roles in companies worldwide as it is not a passing fad.
Social computing and knowledge creationMiia Kosonen
This document discusses knowledge creation through social computing and the role of tacit knowledge in online communication. It addresses two research questions: 1) What are the processes underlying knowledge creation online? 2) What is the role of tacit knowledge in online communication? The document reviews literature on knowledge creation, virtual communities, social computing, and tacit knowledge. It finds that tacit knowledge plays a role in online communication by enabling individuals to communicate, build knowledge through interpretation, and develop shared understanding and norms within online communities.
Knowledge Sharing over social networking systemstanguy
1. The document discusses knowledge sharing over social networking systems and analyzes data from the social networking site Ecademy.
2. The Ecademy data showed a power law distribution structure typical of social networks and small world properties with short paths between users.
3. A survey of Ecademy users found that face-to-face relationships positively influenced relationship strength and knowledge sharing, though the site mainly facilitated weak relationships.
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
This document discusses social computing, including its theoretical underpinnings, infrastructure, applications, and research issues. Social computing is a new paradigm that facilitates collaboration and social interactions using computing technology. It draws from fields like social informatics, human computer interaction, and social and psychological theories. Major application areas include online communities, intelligent interactive entertainment, and business/public sector systems. Key research issues involve representing social information and knowledge, modeling social behavior at individual and group levels, and analyzing and predicting social systems. Agent-based modeling and simulation are important approaches used in social computing.
Yap robben networked learning may 2010 v4Joost Robben
Presentation of Robin Yap and Joost Robben at the Networked Learning Conference, may 2010, Aalborg. Presenting paper on leveraging social technologies. See also www.joostrobben.nl or www.robinyap.com
John Cook, LTRI, London Metropolitan University
Norbert Pachler, Institute of Education, University of London
SoMobNet International Roundtable on “Social Mobile Networking for Informal Learning” Institute of Education, Nov 21 2011: http://cloudworks.ac.uk/cloudscape/view/2363
Cloudworks is a place for sharing and discussing learning and teaching ideas across professional boundaries. It applies best practices of Web 2.0 and since its 2009 launch has nearly 3,000 registered users and over 80,000 visitors. The document discusses how Cloudworks serves as a "pedagogical wrapper" to support idea sharing and recommends developing functions to allow sequences uploaded to other systems to be embedded in Cloudworks to promote discussion and collaboration.
Cloudworks is a place for sharing and discussing learning and teaching ideas across professional boundaries. It applies best practices of Web 2.0 and since its 2009 launch has nearly 3,000 registered users and over 80,000 visitors. The document discusses how Cloudworks serves as a "pedagogical wrapper" to support idea sharing and recommends including information like prompts for key details and a shared language when uploading sequences to encourage discussion and collaboration.
- An e-portfolio is a personal digital collection of information that describes a person's learning, experiences, achievements, and allows them to reflect on their learning over time.
- E-portfolios can be used for learning, assessment, experience, and personal development planning. They allow users to collect artifacts, receive feedback, and showcase their work to potential employers.
- Blackboard e-portfolios provide a simple interface for users to create, edit, share, and collaborate on portfolio entries containing text, media, and links between artifacts.
The document discusses building an online learning community. It defines an online learning community as a destination on the internet that facilitates peer-to-peer learning to achieve shared learning objectives. Benefits of an online learning community include supporting borderless education, distance learning, enhancing the social and collaborative learning experience, and building professional learning communities. Within an online learning community, members communicate, collaborate, engage in cooperative discovery and sharing of content and knowledge. A variety of tools can be used to build an online learning community, including blogs, wikis, social networking sites, and learning management systems. It is important to nurture and maintain an online learning community over time through personal engagement, clear guidelines, self-moderation, and encouraging participation without
This document discusses technology-enabled learning communities. It defines key terms like technology-enabled, learning community, and social learning. It explores the varieties of communities that exist, both physical and virtual, as well as hybrid models. It examines aspects that define communities, like boundaries, norms, reciprocity and trust. It provides examples of technology-enabled learning communities like ForestConnect, OLPC-Uruguay, and Ithaca-Afghanistan videoconferencing. While technology can help capture and share learning, issues around exclusion, superficial participation, and democratic technologies need attention to ensure communities are inclusive.
Cloud computing offers potential benefits for adult literacy programs by providing access to computing resources and services at lower costs. However, adult literacy in Canada currently faces challenges including a lack of coordinated policy and funding instability. While some programs utilize basic IT like websites and online courses, adoption of cloud computing has been limited due to issues like lack of access, trainer skills, and studies on effectiveness. For cloud computing to benefit adult literacy, strategies are needed to address concerns regarding security, infrastructure, and control by large companies.
The document discusses DGroups, a web-based platform that facilitates online knowledge networking among development professionals. It allows for the creation of email-based discussion lists and workspaces to support collaboration. DGroups aims to enable large-scale meaningful discourse and help people improve their lives through shared learning. With over 2,000 active communities and 151,000 members, DGroups provides a way for development organizations and professionals to communicate and exchange knowledge through email, which remains an important tool, especially in low-bandwidth environments.
The digital marketing plan for Gatorade outlines a three step process involving social media, internet marketing, and targeting audiences. Step one focuses on using social media platforms like Facebook, Instagram, and Twitter to create conversations and engage blogs. Step two emphasizes search engine optimization, entertaining and informing consumers online. The main goal is to attract customers. Step three targets fitness enthusiasts, while step four allocates the budget to bring the overall plan together.
Sarah Bild, Sr. Marketing Manager - Gatorade, PepsiCo, and Kim Luegers, Director of Mobile, Pandora, share how they reached Millennials through music to help launch the new G Series product line.
This document provides an overview of Pandora's business and strategy. It summarizes Pandora's dominance in streaming audio, with 55% of streaming audio market share. It also discusses Pandora's growing connected home and car platforms, which saw 30% and 76% year-over-year growth in monthly unique visitors, respectively. Finally, it outlines Pandora's strategies around experiential engagement, including using data to align advertisers with trending artists and developing custom live events and branded content.
Here is a business analysis of Pandora in 2014. We considered Pandora's financial stability, SWOT analysis, internal and external analysis, business strategy. Prognosis is based on above factors. Comments are very welcome.
Spotify offers several strengths as a music streaming service including its small, portable device size, large music library and cheaper price than iTunes. However, it also has weaknesses such as relying on internet access and being restricted to the Spotify software and streaming only. There are opportunities for Spotify to take market share from Apple and expand its product offerings. But threats include competition from other music companies and platforms, technical problems reducing interest, and advertisers struggling with limited space.
This report was created as part of my Social Media Marketing Certification project which I completed in Jan 2013. It looks into current approach for customer conversion of the Website, and suggests strategic improvements necessary for the company.
This document provides a strategic analysis and recommendations for Pandora Radio. It summarizes Pandora's business model, history, financial performance, competitors, challenges, and opportunities. Key points include: Pandora was founded in 2000 and launched as a public company in 2011. It has struggled with significant net losses each year due to high royalty fees. Recommendations include harnessing big data to better target ads, acquiring a local media company to expand advertising channels, and varying subscription content like the film industry.
This document provides an overview of Enterprise 2.0 and social computing in organizational settings. It defines social computing and discusses why organizations are embracing these tools. Examples are given of how companies like Starbucks, Best Buy, Booz Allen, and Electronic Arts have implemented Enterprise 2.0 solutions to encourage collaboration, knowledge sharing, and community building among employees. The challenges knowledge workers face and benefits of social collaboration are also summarized.
The document discusses knowledge management and how Web 2.0 tools can be used to share, innovate, reuse, collaborate and learn. It describes how knowledge exists everywhere and is impacted by different generations currently in the workforce. Web 2.0 allows knowledge to be decentralized, distributed and dynamic. Tools like blogs, wikis and social networking can help connect people and spread knowledge in new ways.
The document summarizes the key points from "The Horizon Report" which charts emerging technologies for teaching, learning, and creative expression. It identifies four technology areas that will impact education over the next 1-5 years: grassroots video, collaboration webs, mobile broadband, and data mashups. It also discusses two areas with impact in the next 5 years: collective intelligence and social operating systems. Examples are provided to illustrate how each technology could be applied to enhance teaching and learning.
The document summarizes the Horizon Report, an annual publication that examines emerging technologies likely to impact higher education. It discusses the research process, highlighting key trends and challenges in teaching and learning. Examples are provided for technologies that are likely to emerge within the next 1-2 years like grassroots video and collaboration tools, and within the next 3-5 years like mobile broadband, data mashups, collective intelligence, and social operating systems.
The document discusses using social networking tools internally within organizations. It describes how social media is commonly used for external engagement but is now being applied to internal processes. Emerging approaches include Enterprise 2.0 and Social Business which integrate social platforms into intranets and extranets. While benefits are difficult to measure due to new technologies, social tools may help with information gathering, canvassing opinions, understanding employee sentiment, boosting creativity, transforming processes, and self-development. The author's organization piloted an internal social network that reduced time finding answers, email levels, and improved meetings.
The document discusses the rise of Web 2.0 technologies and their role in collaborative knowledge building. It describes how Web 2.0 has shifted from a read-only web to a read-write web that allows users to publish content like blogs, wikis and share media. This has led to new problems around organizing information that are addressed through tagging and social tools. The document also discusses knowledge management in universities and how Web 2.0 tools can support distributed learning environments and community building.
First Firecat Friday presentation: tools, best practices and design insights we've put to work for organizations of all sizes to help groups and teams work on projects, share ideas, keep track of files, stay on top of tasks -- while feeling like a team.
- The document discusses Clearvale, an enterprise social network (ESN) platform that aims to connect employees, customers, and partners through intranet, extranet, and internet capabilities.
- It provides an overview of Clearvale's features for knowledge sharing, team collaboration, and relationship management across an organization.
- Clearvale takes an holistic approach to building an enterprise ecosystem and aims to drive productivity through increased communication, collaboration, and connections between users.
The document discusses collaboration technologies for business process experts (BPXs) and the role of community evangelists. It defines what a BPX is and their typical responsibilities, which involve understanding both business and technical aspects. It also explores how BPXs can leverage communities like the SAP Business Process Expert community to collaborate, gain expertise, and drive business process innovation.
presentation slides from my workshop about with Brad Carlin about SITI Extended Ensemble, a social network we're developing for SITI Company (http://siti.org), a New York-based theatre company which performs and trains actors internationally.
At the TCG (http://tcg.org) conference (6.9.07).
More information about the presentation is online at http://blockwork.org
Presentation given 04182011 at The Experts Conference in Las Vegas, Nevada. This presentation reviews the changing social informatics of technology, and compares the leading consumer platforms to SharePonit 2010 out-of-the-box.
This document discusses building a knowledge sharing network for the third sector. It describes knowledge as both an object and a process that is contained within people's minds and files. Effective knowledge sharing networks realize individual, group, and organizational potential. Knowledge permeates networks like honey flows through a beehive, with communities constantly forming and dispersing. While no single application can meet all network needs, integrated solutions are emerging that combine discussion forums, repositories, project management, and other tools to add value to both online and in-person knowledge sharing.
The document introduces the Knowledge Hub, an online platform for collaboration within the UK local government sector. The Knowledge Hub aims to connect people across local authorities to share knowledge, best practices, ask questions, and benchmark performance. It aggregates content from multiple sources and enables new forms of collaboration through features like blogs, wikis, forums and workspaces. The Knowledge Hub seeks to foster organizational learning, knowledge retention, and innovation within UK local government.
The next generation of collaborative work will be defined by a shift from information handling to interaction management and socialization. Social software seems an unlikely example for enterprise collaboration initially, but networks allow tapping into collective coworker knowledge better than previous approaches. Communities form organically in social networks, connections are stronger, and adoption is faster due to ease of use. While past technologies like groupware and portals improved collaboration, social software facilitates user-driven interaction and knowledge-sharing.
Email was once the transformative technology that made it easier for people to work together, but email created silos. Intranets attempted to bridge these silos, but the technology did not fundamentally transform the enterprise. What’s the missing link? Social. The result? A secure social networking platforms designed for the enterprise.
Download “When Collaboration Meets Community” and discover why enterprise collaboration must be social. Inside this two-page eBrief, discover how enterprise social:
Enables faster innovation
Creates better group dynamics
Puts power in knowledge
For more information, please visit http://www.tibbr.com/
This document summarizes a presentation about Web 2.0 and what it means for business. It discusses key concepts of Web 2.0 like user participation, collective intelligence, and lightweight software. Examples are given of how these concepts are implemented on sites like Wikipedia, Flickr, and Google. The presentation also covers implications for business, including embracing a Web 2.0 mentality, using analytics, and designing applications that leverage networked resources and user contributions.
Actors are autonomous, intentional, social & rational; their actions are not defined by system specifications.
Human actors have relationships with others in their network and exchange tangible & intangible goods/value.
Static & Dynamic modeling framework fall short of capturing these dependencies and rationale of the social actors.
Social Modeling can compliment Static & Dynamic Modeling and prepare your systems to be social from the ground up.
This deck aims at piquing your interest and take a look at social modeling and a few other concepts.
The document discusses the goals and plans for developing "The Knowledge Hub", which is a project aimed at facilitating knowledge sharing across local governments in the UK. The key goals are to make it easier for local governments to access experiences from other councils, encourage collaboration and problem solving, and help councils improve performance. The project will involve developing web and social media platforms to better aggregate, filter and share knowledge. It will focus on user-generated content and narratives over static documents. Challenges include incentivizing contribution and ensuring staff have needed training.
This document summarizes key aspects of social media and online marketing. It discusses how providing shareable social objects can help brands build momentum and become a reference point. Examples of social objects include photos, videos, profiles and documents shared on platforms like Flickr and Wikipedia. The document also emphasizes the importance of listening to conversations on social media through monitoring tools and engaging by contributing valuable content.
Ein Buch über die Entwicklung des Arztstandes im 19. Jahrhundert in der Habsburg-Monarchie. (inspiriert von Ivan Illich und Michel Foucault und).
Basierend auf meiner Diplomarbeit aus dem Jahr 1992, Universität Wien, Institut für Wirtschafts- und Sozialgeschichte
1) Social media is shifting communication from broadcast to bidirectional and communities will create 25% of content.
2) By 2012, companies are predicted to spend more on word-of-mouth ("conversational media") than traditional media.
3) To succeed, brands must start by asking "what can my brand do for social media communities?" rather than what communities can do for the brand. Providing value to communities will be the new cost of distribution.
This document discusses the shift from traditional one-way marketing communication to two-way engagement and conversation through social media. It notes that customers now want brands to treat them as friends by providing value and participating in communities. It also suggests that brands focus less on what social media can do for them and more on what they can do for social media communities. Finally, it outlines some of the key elements of a social media communication strategy, including listening, participating, adding value, being peer-level, experimenting, and letting go of traditional controls.
This presentation is about innovation and its phenomenology with respect to Social Software. I will present that at http://www.e-weekvic.cat/2006/index.php Setmana digital a Vic.
Uncharted Together- Navigating AI's New Frontiers in LibrariesBrian Pichman
Journey into the heart of innovation where the collaborative spirit between information professionals, technologists, and researchers illuminates the path forward through AI's uncharted territories. This opening keynote celebrates the unique potential of special libraries to spearhead AI-driven transformations. Join Brian Pichman as we saddle up to ride into the history of Artificial Intelligence, how its evolved over the years, and how its transforming today's frontiers. We will explore a variety of tools and strategies that leverage AI including some new ideas that may enhance cataloging, unlock personalized user experiences, or pioneer new ways to access specialized research. As with any frontier exploration, we will confront shared ethical challenges and explore how joint efforts can not only navigate but also shape AI's impact on equitable access and information integrity in special libraries. For the remainder of the conference, we will equip you with a "digital compass" where you can submit ideas and thoughts of what you've learned in sessions for a final reveal in the closing keynote.
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingDianaGray10
The power of Snowflake analytics enables CRM systems to improve operational efficiency, while gaining deeper insights into closed/won opportunities.
In this webinar, learn how infusing Snowflake into your CRM can quickly provide analysis for sales wins by region, product, customer segmentation, customer lifecycle—and more!
Using prebuilt connectors, we’ll show how workflows using Snowflake, Salesforce, and Zendesk tickets can significantly impact future sales.
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...Snarky Security
How wonderful it is that in our modern age, every bit of our biological data can be digitized, stored, and potentially pilfered by cyber thieves! Isn't it just splendid to think that while scientists are busy pushing the boundaries of biotechnology, hackers could be plotting the next big bio-data heist? This delightful scenario is brought to you by the ever-expanding digital landscape of biology and biotechnology, where the integration of computer science, engineering, and data science transforms our understanding and manipulation of biological systems.
While the fusion of technology and biology offers immense benefits, it also necessitates a careful consideration of the ethical, security, and associated social implications. But let's be honest, in the grand scheme of things, what's a little risk compared to potential scientific achievements? After all, progress in biotechnology waits for no one, and we're just along for the ride in this thrilling, slightly terrifying, adventure.
So, as we continue to navigate this complex landscape, let's not forget the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. After all, what could possibly go wrong?
-------------------------
This document provides a comprehensive analysis of the security implications biological data use. The analysis explores various aspects of biological data security, including the vulnerabilities associated with data access, the potential for misuse by state and non-state actors, and the implications for national and transnational security. Key aspects considered include the impact of technological advancements on data security, the role of international policies in data governance, and the strategies for mitigating risks associated with unauthorized data access.
This view offers valuable insights for security professionals, policymakers, and industry leaders across various sectors, highlighting the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. The analysis serves as a crucial resource for understanding the complex dynamics at the intersection of biotechnology and security, providing actionable recommendations to enhance biosecurity in an digital and interconnected world.
The evolving landscape of biology and biotechnology, significantly influenced by advancements in computer science, engineering, and data science, is reshaping our understanding and manipulation of biological systems. The integration of these disciplines has led to the development of fields such as computational biology and synthetic biology, which utilize computational power and engineering principles to solve complex biological problems and innovate new biotechnological applications. This interdisciplinary approach has not only accelerated research and development but also introduced new capabilities such as gene editing and biomanufact
Keynote : AI & Future Of Offensive SecurityPriyanka Aash
In the presentation, the focus is on the transformative impact of artificial intelligence (AI) in cybersecurity, particularly in the context of malware generation and adversarial attacks. AI promises to revolutionize the field by enabling scalable solutions to historically challenging problems such as continuous threat simulation, autonomous attack path generation, and the creation of sophisticated attack payloads. The discussions underscore how AI-powered tools like AI-based penetration testing can outpace traditional methods, enhancing security posture by efficiently identifying and mitigating vulnerabilities across complex attack surfaces. The use of AI in red teaming further amplifies these capabilities, allowing organizations to validate security controls effectively against diverse adversarial scenarios. These advancements not only streamline testing processes but also bolster defense strategies, ensuring readiness against evolving cyber threats.
Challenges and Strategies of Digital Transformation.pptxwisdomfishlee
In an era where digital innovation is ubiquitous, executives from various corporations frequently seek insights into the tangible benefits that digital transformation can offer. This document outlines a comprehensive framework that elucidates the concept of digital transformation, highlighting its multifaceted dimensions and the pivotal roles it plays in enhancing business competitiveness.
The Zaitechno Handheld Raman Spectrometer is a powerful and portable tool for rapid, non-destructive chemical analysis. It utilizes Raman spectroscopy, a technique that analyzes the vibrational fingerprint of molecules to identify their chemical composition. This handheld instrument allows for on-site analysis of materials, making it ideal for a variety of applications, including:
Material identification: Identify unknown materials, minerals, and contaminants.
Quality control: Ensure the quality and consistency of raw materials and finished products.
Pharmaceutical analysis: Verify the identity and purity of pharmaceutical compounds.
Food safety testing: Detect contaminants and adulterants in food products.
Field analysis: Analyze materials in the field, such as during environmental monitoring or forensic investigations.
The Zaitechno Handheld Raman Spectrometer is easy to use and features a user-friendly interface. It is compact and lightweight, making it ideal for field applications. With its rapid analysis capabilities, the Zaitechno Handheld Raman Spectrometer can help you improve efficiency and productivity in your research or quality control workflows.
Intel Unveils Core Ultra 200V Lunar chip .pdfTech Guru
Intel has made a significant breakthrough in the world of processors with the introduction of its Core Ultra 200V mobile processor series, codenamed Lunar Lake. This innovative processor marks a fundamental shift in the way Intel creates processors, with a high degree of aggregation, including memory-on-package (MoP). The Core Ultra 300 MX series is designed to power thin-and-light devices that are capable of handling the latest AI applications, including Microsoft's Copilot+ experiences.
Demystifying Neural Networks And Building Cybersecurity ApplicationsPriyanka Aash
In today's rapidly evolving technological landscape, Artificial Neural Networks (ANNs) have emerged as a cornerstone of artificial intelligence, revolutionizing various fields including cybersecurity. Inspired by the intricacies of the human brain, ANNs have a rich history and a complex structure that enables them to learn and make decisions. This blog aims to unravel the mysteries of neural networks, explore their mathematical foundations, and demonstrate their practical applications, particularly in building robust malware detection systems using Convolutional Neural Networks (CNNs).
Mastering OnlyFans Clone App Development: Key Strategies for SuccessDavid Wilson
Dive into the critical elements of OnlyFans clone app development, from understanding user needs and designing engaging platforms to implementing robust monetization strategies and ensuring scalability. Discover how RichestSoft can guide you through the development process, offering expert insights and proven strategies to help you succeed in the competitive market of content monetization.
Develop Secure Enterprise Solutions with iOS Mobile App Development ServicesDamco Solutions
The security of enterprise apps should not be overlooked by organizations. Since these apps handle confidential finance/user data and business operations, ensuring greater security is crucial. That’s why, businesses should hire dedicated iOS mobile application development services providers for creating super-secured enterprise apps. By incorporating sophisticated security mechanisms, these developers make enterprise apps resistant to a range of cyber threats.
Content source - https://www.bizbangboom.com/articles/enterprise-mobile-app-development-with-ios-augmenting-business-security
Read more - https://www.damcogroup.com/ios-application-development-services
Retrieval Augmented Generation Evaluation with RagasZilliz
Retrieval Augmented Generation (RAG) enhances chatbots by incorporating custom data in the prompt. Using large language models (LLMs) as judge has gained prominence in modern RAG systems. This talk will demo Ragas, an open-source automation tool for RAG evaluations. Christy will talk about and demo evaluating a RAG pipeline using Milvus and RAG metrics like context F1-score and answer correctness.
"Hands-on development experience using wasm Blazor", Furdak Vladyslav.pptxFwdays
I will share my personal experience of full-time development on wasm Blazor
What difficulties our team faced: life hacks with Blazor app routing, whether it is necessary to write JavaScript, which technology stack and architectural patterns we chose
What conclusions we made and what mistakes we committed
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Zilliz
Enterprises have traditionally prioritized data quantity, assuming more is better for AI performance. However, a new reality is setting in: high-quality data, not just volume, is the key. This shift exposes a critical gap – many organizations struggle to understand their existing data and lack effective curation strategies and tools. This talk dives into these data challenges and explores the methods of automating data curation.
BLOCKCHAIN TECHNOLOGY - Advantages and DisadvantagesSAI KAILASH R
Explore the advantages and disadvantages of blockchain technology in this comprehensive SlideShare presentation. Blockchain, the backbone of cryptocurrencies like Bitcoin, is revolutionizing various industries by offering enhanced security, transparency, and efficiency. However, it also comes with challenges such as scalability issues and energy consumption. This presentation provides an in-depth analysis of the key benefits and drawbacks of blockchain, helping you understand its potential impact on the future of technology and business.
3. the middleman Using software to enhance our social and collaborative abilities through structured mediation
4. Object-centered sociality Soziale Netzwerke werden auch durch Objekte vermittelt. Job, Termin, Urlaub, Hobby, Themen, Personen, Orte, Fotos, ... Interaktion ist dadurch aber nicht determiniert
5. Individual Group Data Augmented Social Intelligence I comp. D. Engelbart & Lee Bryant Personal Tools that mediate the access between
12. Sebastian Fiedler [...] I yet have to hear a story about a young professional who felt the terrible need to install and run his own LMS platfrom to support his or her personal change project. But I know loads who use an array of small, simple and (increasingly networked) personal tools to their advantage. And guess what? It is usually a pretty messy sight... no integrated interfaces, no single-sign-on mechanisms, no careful workflow management. [...] Technologies of Cooperation http://Seblogging.cognitivearchitects.com/2006/08/23#a1785
13. Klassische Dichotomie wobei „Distributed“ nicht notwendigerweise heisst, dass es kein zentrales Service dafür gibt.
24. Stand der Dinge Learning objects (course + delivery) LMS Modules Quizzes Tests Discussions Grading Integration Informations System Distance or Blended Learning Instructor
25. Trends (...platform) Demografie Cluetrain Manifesto conversation prosumer Learner/User-centered design (Wer hat Kontrolle?) Disintermediation (firms, government, education) Aggregate & Remix Connectivism vs. Constructivism (es geht nicht um Fakten, sondern um das Navigieren in dynamischen Systemen) WWW: Distribution => Communication (Read-Write-Web [W2.0])
27. Stephen Downes „ ... It's about enabling and encouraging participation through open applications and services. By open I mean technically open with appropriate APIs but also, more importantly, socially open, with rights granted to use the content in new and exciting contexts.“
28. E-Learning 2.0 Role model: Etienne Wenger‘s „Communities Of Practice“ "a shared domain of interest" where "members interact and learn together" and "develop a shared repertoire of resources." Learning is created/syndicated vs. delivered and consumed Beyond the task/course Networks across institutions E-Portfolio Workflow Learning