Skip to main content

Home/ elearning 2.0/ Group items tagged Asset

Rss Feed Group items tagged

Jaxon Smith

Provisions in AASB 138 for Intangible Assets Management - 0 views

  •  
    The AASB 138 serves the primary objective of describing the treatment and consideration of intangible assets which is not explicitly laid down by any other standards.
John Onwuegbu

Special Report: 7 Trends Impacting How We Use Digital Assets | Questechie - 9 views

  •  
    Nowadays, customers demand engaging visual content whenever they interact with brands - whether through traditional media such as billboards and catalogs or through mobile apps and websites.
  •  
    http://treehousecottages.co.in/ Tree House resort- World's largest, most unique, 5 Star & Luxury Tree House Resort. Located atop "trees", the tree have several live branches running through the rooms making nature universal in the Lap of luxury. Jaipur Airport is 40 km from Tree House resort Jaipur
Weekend Payday Loans

Weekend Payday Loans - No Pressure Of Risking Your Hard Asset! - Medium - 0 views

  •  
    Weekend Payday Loans - One can find this financial service an absolutely quick and confidential way to access the immedi…
Ihering Alcoforado

Digitisation Perspectives - Review | Subject Centre for Information and Computer Sciences - 2 views

  •  
    Book Reviews Book title: Digitisation Perspectives Type: book Author: Ruth Rikowski Year: 2010 Edition: 1st ISBN: 9460912982 Publisher: Sense Publishers Publisher's Description: This book examines various views and perspectives on digitisation. As Simon Tanner, Director Digital Consultancy, King's College London says in the Foreword: "Digitisation has become a cultural, scholastic, economic and political imperative and raises many issues for our consideration." Furthermore, that the book: "...seeks to address and answer some of the big questions of digitisation... It succeeds on many levels..." There are 22 contributors in the book, all experts in their fields. The book is divided into six parts: Part 1: 'Background and Overview to Digitisation and Digital Libraries' Part 2: 'Digitisation and Higher Education' Part 3: 'Digitisation and Inequalities' Part 4: 'Digital Libraries, Reference Services and Citation Indexing' Part 5: 'Digitisation of Rare, Valued and Scholarly Works' Part 6: 'Futuristic Developments of Digitisation' Topics covered include electronic theses, search engine technology, digitisation in Africa, citation indexing, reference services, the Scholarly Publishing and Academic Resources Coalition, new media and scholarly publishing. The final chapter explores virtual libraries, and poses some interesting questions for possible futures. The book will be of particular interest to information professionals, educators, librarians, academics and I.T. and knowledge experts. Ruth Rikowski concludes by indicating that: "...hopefully, the book will provide a source of inspiration for further research, leading to some more effective ways to proceed with the digitisation process. Also, that it will be possible to do this within a framework that can be used for good rather than ill, and for the benefit of many." Reviewer: Eric Jukes (Formerly of College of Haringey, Enfield and North East London) Book Rating: 5/5 Buy this book from Amazon  Review Summary
Jim Karter

Celebrity Smartphones That Made a Splash in 2009 - 0 views

  •  
    The smartphone market is growing very healthily, as expected, 72% year on year. And 2009 is considered as the year of smartphones. When the Palm Pre arrived in June, the iPhone was its natural competitor. While Apple's most precious asset still continue to rule the market, the battle field has since become considerably more crowded. Google's Android operating system, new Windows phones from Microsoft, enhanced BlackBerry devices are also enticing the users. In addition, PC maker Dell has also join the hot competition this year.
Gregory Culpin

Using Enterprise 2.0 to prepare for recovery (part II) - Whitepaper to download - 0 views

  •  
    In a business world where change is constant, knowledge becomes an essential asset for any organization. Survival and growth require the development of solutions that will optimize collaboration and knowledge management.\n\nFocussing on this topic we recently produced our first whitepaper. It analyses the benefits associated with the introduction of Enterprise 2.0 solutions, and positions the collaborative management of knowledge as a stable and lasting solution, especially in these times of economic tumult.
Martin Burrett

http://illuminations.nctm.org/assets/0/77/77570ffc-98f8-46b5-b4d1-aa8043e88c49.swf - 0 views

  •  
    This is a wonderful resource for teaching the area of 2D shapes. Move and resize the shapes to change the values. It's a great resource to use on an interactive whiteboard. http://ictmagic.wikispaces.com/Maths
nolanhout

How is HR Leading the Future of Work Transformation? - 0 views

  •  
    Driving human capital transformation is the need for companies that are planning to succeed and also entails supporting their most valuable asset - PEOPLE!
Antwak Short videos

What is Cyber Threat Intelligence? - 0 views

  •  
    Cyber threats aimed at business are identified by Threat Intelligence. IT specialists and complex tools can read and analyze the threats. This information is utilized to plan, forestall, and recognize cyber threats hoping to exploit important organization's assets. Threat Intelligence collects and compiles the raw data about the threats emerging from different sources. Cyber threats can be truly terrifying. Cyber threat knowledge can help associations obtain important information about these threats, build successful defense equipment and relieve the threats that could harm their reputation. People often get confused with Cyber Security terms such as Threat Intelligence and Threat Data. Threat data is a list of likely threats. For instance, Facebook feeds are like a running list of possible issues. It is Threat Intelligence when IT specialists and exclusive complex tools can read and analyze the threats/attacks. Why is threat intelligence important for businesses? Threat Intelligence is a vital part of any cybersecurity. A cyber threat intelligence program sometimes called CTI, can: Prevent data loss With a very much organized CTI program set up, your organization can spot cyber threats and keep data breaches from leaking critical information. Give guidance on security measures By distinguishing and dissecting threats, CTI spots designs utilized by hackers. CTI assists organizations with setting up security standards to protect against future cyber assaults and threats. Educate others Hackers are smarter than before. To keep up, cybersecurity specialists share the strategies they've seen with the IT people group to make a communal database to battle cybercrimes and cybersecurity threats. Kinds of Threat Intelligence The four kinds of threat intelligence are strategic, tactical, technical, and operational Strategic cyber threat intelligence is generally dedicated to a non-technical audience. It utilizes nitty-gritty analyses of patterns and arising t
Antwak Short videos

Different projects that a Cybersecurity consultant works upon? - 0 views

  •  
    Cybersecurity consultants are accountable for safeguarding valuable and critical information that comes from these various parts of the digital world. They identify security threats and protect their company assets from digital assaults. Our Cyber Security professionals share some projects that they have worked on: Parul Khedwal - Cyber Security Consultant shares that she has worked with a reputed e-commerce company where she dealt with Data security and data breaches. According to her Cybersecurity is about dealing with various kinds of data breaches and cyber attacks on a day-to-day basis. Her role was to protect the company's data by performing data analysis, researching cyber signs and anonymous patterns. She worked for an e-commerce platform where her responsibility was to deal with data security, email security. Highs of Cybersecurity: She also shares that there are a lot of highs involved in the Cybersecurity role, the first reason being it is very dynamic and challenging. The subject is evolving every day which demands constant learning. The best aspect is it keeps you motivated due to the good learning opportunities involved in it. This role will never go out of the market because it's a niche skill. Cybersecurity roles have good career scope in the market. Lows of Cyber Security: Cybersecurity being very dynamic and we know that hackers can attack anytime and any day. One needs to be on their toes protecting the data as an attack may happen anytime. The cyber consultant needs to be very flexible working in odd shifts which impact the health (both physical and emotional) in the longer run. Who does a Cyber Security consultant work with? Parul is leading the Security operations team which involves working closely with her team members helping them with investigations, the client's as per their requirements, the SIM team, and various other team members which make this role a very diverse role to deal with. To summarise, a Cyber Security Consulta
Antwak Short videos

The Future of Work - 0 views

  •  
    How are current socio technological changes impacting the future of work? New technology, global trends, and the effect of Covid-19 on the job force have fundamentally altered the way firms operate and the kinds of expertise their workers require to compete in this emerging period of employment. Despite the fact that we cannot foresee what the future has in store, certain adjustments are inevitable. You must brace for such developments as a forward-thinking professional or aspirant. Gig Economy Gig Economy: The term 'gig' refers to a job model in which contractors are recruited and paid on a project-by-project basis. Gone are the days of doing a strap task from 9 a.m. to 5 p.m. The gig economy helps people to save multiple hours per day to make the most of the one and only scarce asset that they have time. Employee Well-Being Employee Well-Being is the topmost priority: While more people are operating remotely for extended periods of time, organisations can concentrate on ways to improve relationships and reduce mental tension. As organizations adapt, building mentally healthy workplaces will become even more relevant and complex. Also, working remotely and loneliness could have a detrimental impact on workers' mental wellbeing. Employee morale will suffer if they are not in good health. Several anal believe that employers will put a stronger emphasis on mental wellbeing and employee welfare. Intuitive and Appropriate Strategy Intuitive and Appropriate Strategy: Although meetings through online platforms like Zoom and Google Meet have been a constant throughout the pandemic but this restricted mode of communication the essence of being connected to colleagues and friends has indeed been cruelly exposed. As a result, software companies often rose to the situation, implementing innovative methods to ensure workers involved when working remotely. Nvidia, for example, has prioritized human speech over the context of video calls, resulting in substantial data s
Antwak Short videos

What is Identity and Access Management? - 0 views

  •  
    IDENTITY AND ACCESS MANAGEMENT Identity and access management (IAM) is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company. Access and User are two very important IAM theories. Access refers to the permission or authorization given to access a file (read, create or modify a doc). Users can be employers, auditors, suppliers, contractors or customers. How Identity and Access Management works IAM systems are intended to perform three key undertakings: identity, authenticate, and authorise. This means, just the right people ought to access PCs, equipment, software applications, any IT assets, or perform certain tasks. IAM components forming up an IAM system include: 1. A data set containing users identities and access privileges. 2. IAM instruments for creating, observing, modifying, and deleting access advantages. 3. A system for inspecting login and access history. 4. The list of access privileges needs to be updated including new entry users and for users whose roles are ever-changing. 5. IAM works generally fall under IT divisions or sectors that handle Cybersecurity and data management. Examples of Identity and Access management Here are instances of IAM at work. When a user tries to log in to the system, the system checks his identity with the data saved in the database. Once the user is identified after authentication as the right user, he's permitted to post his work. A person who works as a contributor to content management has full access to make changes in the database. A production operator can see an online work process however may not be permitted to modify it. Through IAM, specific clients in the association are permitted to access and deal with sensitive data. And if there's no IAM, anybody (like unauthorised ) could get to confidential organization records, prompting a potential data breach. In this viewpoint, IAM assists organizations with meeting rigid
covid_12

Top reasons why you need workplace safety training in your business - 0 views

  •  
    If you are a business leader or manager looking to manage a safe work environment, then training for safety is a cost-effective way to protect the company's most valuable asset: Your Workforce.
Martin Burrett

Canvastic - 0 views

  •  
    A useful, simple drawing site with pen, line tool and shapes. It also records all the strokes you make and you can replay this and add a message. Then download the result to your computer. http://ictmagic.wikispaces.com/Photos+%26+Images
minato lee

Easy Method To Make Marriage Never Divorced! - 0 views

  •  
    Healthy Relationship - Easy Method To Make Marriage Never Divorced! Times on here the latest paradigm in a lifelong relationship. During the 20th century, it was clear that what was to be a model and structure that lifelong monogamy is NOT WORKING! I am referring to the known dysfunctional relationship "marriage" as defined and established by state lawmakers. Relationship is not problem, it's the financial structure of the institution of marriage as designed by lawmakers that reducing individual dreams to marry.
Shannon Panzo

Mental Photography (ZOXing) Report - 3 views

Mental Photography Brain Management ZOXing ZOX Pro Training Knowledge is Power 1. Are you overworked and stressed out? 2...

father of mental photography Digital Product Brain Management

started by Shannon Panzo on 09 Jul 15 no follow-up yet
1 - 20 of 28 Next ›
Showing 20 items per page