Skip to main content

Home/ Flat Classroom Project/ Group items tagged information

Rss Feed Group items tagged

Erin B

Tim Berners-Lee - Wikipedia, the free encyclopedia - 0 views

  • Sir Timothy John "Tim" Berners-Lee, OM, KBE, FRS, FREng, FRSA (born 8 June 1955,[1] also known as "TimBL"), is a British engineer and computer scientist and MIT professor credited with inventing the World Wide Web, making the first proposal for it in March 1989.
  • While an independent contractor at CERN from June to December 1980, Berners-Lee proposed a project based on the concept of hypertext, to facilitate sharing and updating information among researchers.[9] While there, he built a prototype system named ENQUIRE
  • In November 2009, Berners-Lee launched the World Wide Web Foundation in order to "Advance the Web to empower humanity by launching transformative programs that build local capacity to leverage the Web as a medium for positive change."
  •  
    Who Tim Berners-Lee is.
  •  
    While an independent contractor at CERN from June to December 1980, Berners-Lee proposed a project based on the concept of hypertext, to facilitate sharing and updating information among researchers.[9] While there, he built a prototype system named ENQUIRE.[
wildcat wildcat

File sharing - 0 views

  • File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books
  •  
    File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video), documents, or electronic books
mitch g

What is workflow? - Definition from Whatis.com - 1 views

  • definition - Workflow is a term used to describe the tasks, procedural steps,
  • organizations or people involved, required input and output information, and tools needed for each step in a business process. A workflow approach to analyzing and managing a business process can be combined with an object-oriented programming approach, which tends to focus on documents and data. In general, workflow management focuses on processes rather than documents. A number of companies make workflow automation products that allow a company to create a workflow model and components such as online forms and then to use this product as a way to manage and enforce the consistent handling of work. For example, an insurance company could use a workflow automation application to ensure that a claim was handled consistently from initial call to final settlement. The workflow application would ensure that each person handling the claim used the correct online form and successfully completed their step before allowing the process to proceed to the next person and procedural step. A workflow engine is the component in a workflow automation program that knows all the procedures, steps in a procedure, and rules for each step. The workflow engine determines whether the process is ready to move to the next step. Some vendors sell workflow automation products for particular industries such as insurance and banking or for commonly-used processes such as handling computer service calls. Proponents of the workflow approach believe that task analysis and workflow modeling in themselves are likely to improve business operations.
  •  
    Workflow is a term used to describe the tasks, procedural steps, organizations or people involved, required input and output information, and tools needed for each step in a business process. A workflow approach to analyzing and managing a business process can be combined with an object-oriented programming approach, which tends to focus on documents and data. In general, workflow management focuses on processes rather than documents. A number of companies make workflow automation products that allow a company to create a workflow model and components such as online forms and then to use this product as a way to manage and enforce the consistent handling of work. For example, an insurance company could use a workflow automation application to ensure that a claim was handled consistently from initial call to final settlement. The workflow application would ensure that each person handling the claim used the correct online form and successfully completed their step before allowing the process to proceed to the next person and procedural step. A workflow engine is the component in a workflow automation program that knows all the procedures, steps in a procedure, and rules for each step. The workflow engine determines whether the process is ready to move to the next step. Some vendors sell workflow automation products for particular industries such as insurance and banking or for commonly-used processes such as handling computer service calls. Proponents of the workflow approach believe that task analysis and workflow modeling in themselves are likely to improve business operations.
mitch g

Workflow Software White Papers ( Workflow Automation, Work Flow Software, Workflow Mana... - 0 views

  • DEFINITION: Workflow is a term used to describe the tasks, procedural steps, organizations or people involved, required input and output information, and tools needed for each step in a business process. A workflow approach to analyzing and managing a business process can be combined with an object-oriented programming approach, which tends to focus on documents and data. In general, workflow management focuses  …  Definition continues below.
  •  
    DEFINITION: Workflow is a term used to describe the tasks, procedural steps, organizations or people involved, required input and output information, and tools needed for each step in a business process. A workflow approach to analyzing and managing a business process can be combined with an object-oriented programming approach, which tends to focus on documents and data. In general, workflow management focuses  …  Definition continues below.
Toni H.

Radio-frequency identification - Wikipedia, the free encyclopedia - 0 views

  • Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels). Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission, and battery assisted passive (BAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range. There are a variety of groups defining standards and regulating the use of RFID, including: International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), ASTM International, DASH7 Alliance, EPCglobal. (Refer to Regulation and standardization below.) RFID has many applications; for example, it is used in enterprise supply chain management to improve the efficiency of inventory tracking and management. Contents [hide]
  •  
    Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels). Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission, and battery assisted passive (BAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range. There are a variety of groups defining standards and regulating the use of RFID, including: International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), ASTM International, DASH7 Alliance, EPCglobal. (Refer to Regulation and standardization below.) RFID has many applications; for example, it is used in enterprise supply chain management to improve the efficiency of inventory tracking and management.
MICHAEL A

Internet - Wikipedia, the free encyclopedia - 0 views

  •  
    "The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail."
  •  
    Some great information on the internet and how it has evolved and connected the world.
Rhiannon V

Flat Classroom Project 10-3b - Changing Shape of Information - 1 views

  •  
    project subject page
Vicki Davis

project > "FanVision" > Title Page - 0 views

  •  
    Interesting information on virtual reality.
  •  
    Fascinating study that sounds like it is for just commercial use, but some great information on virtual reality is embedded. I'll be blogging some reflections on this this week.
Vicki Davis

BLUE MEN - Inconvenient Youth - 1 views

  •  
    In this case, arts, entertainment and leisure influences science and health -- viral videos and the new way that information spreads is fundamentally changing activism and promoting change. Talk about something to another person and just have a "jab session" -- make a video that goes viral and you can change the world.
  •  
    Interestingly, inconvenient youth is built on the Ning platform. Fascinating use. This video from the blue man group on the environment has been widely viewed around the world. Such videos spark social change -- these are not TV commercials but viral videos that spread from blog to blog and email to email. How information travels has fundamentally changed.
Vicki Davis

flatclassroomproject » Web 2.0 Tools for Sharing Information - 1 views

  •  
    Nice wiki about Web 2.0 tools and although underline is used improperly (you never use it unless it is a hyperlink), the page is sound and has some good information.
  •  
    2006 Web 2.0 Flat Classroom Project
Ismael G

Wireless communication | Article | World Book Student - 2 views

  •  
    This is article has some good information on what is wireless connection!
  •  
    I enjoyed reading this article it has some good information on what is wireless connection and communication and how it works!
Ivy F.

flatclassroom09-3 - Mobile and Ubiquitous - 1 views

  • er chips."
    • Tyler R
       
      You need to add a citation here
  • peer to peer
  • Instant messaging
  • ...12 more annotations...
  • , PDA.
  • making phone calls over the Internet
  • Skype
  • Skype
  • hen Skype
  • VoIP (Voice over Internet Protocal)
  • . Click here to go to the main article. Click here to have a look at my delicous.com acount to find what else i half got about ubiquitous technology.
    • Tyler R
       
      From Mrs. Davis - these need to be turned into contextual links and are an example of how we do not hyperlink.
  • Click Here to go to the main article.
  • According to some research, More than 740 billion text messages were sent in the US during the first half of 2009, a figure that breaks down to approximately 4.1 billion messages per day,
    • Mason J
       
      Source?
    •  Lisa Durff
       
      Where did you get this information? Was it biased information put out by a cell phone company? How does it compare to global averages?
  • GPS/GSM collars to track elephants
    • Mason J
       
      Find the source here.
  • A cell phone is a example of mobile and ubiquitous computing. A cell phone is mobile because it is able to be moved from one place to another. A cell phone is also ubiquitous because two people are able to communicate from different places by calling one another as well as SMS and video messaging. Lastly, a cell phone is classified as a computing device because it accepts input, processes that input into data that the cell phone can read, and produces output as information that a human can read.
  • Mobile and Ubiquitous Computing can be broken down into three separate words that can come together to make one topic. First, mobile means able to be moved. There are many technological mobile devices. There are cell phones, Ipods, portable DVD players, PDAs, laptops, and many other devices that can be moved or transported from one place to another. Second, ubiquitous means being present everywhere at once. Having the ability to stream live from a camera or cell phone to a website over the Internet makes that particular video ubiquitous.
  •  
    "The second steroid involves instant messaging and file sharing. Being able to share files from peer to peer is considered ubiquitous because the files can be everywhere and mobile because the files can be moved. Instant messaging is a huge breakthrough in the technological world. People can send instant messaging via cell phone, computer , PDA. This steroid revolutionized communication."
travis robertson

Internet TV & Web TV: News and Trends for Internet Television - 0 views

  •  
    This channel is focused on Internet TV (AKA Internet Television, Web TV, Online TV, etc…). Internet TV is essentially television content streamed and distributed via the Internet. Here we will cover news, trends, and general information about Internet TV technology. Stay informed with the latest in Internet television - including up-to-date news information on Google TV, Apple TV, Roku, Boxee, Netflix, Hulu and other emerging alternatives to traditional cable & broadcast television. Source: Internet TV & Web TV: News and Trends for Internet Television http://www.reelseo.com/video/internet-tv/#ixzz1bLTMzUxe ©2008-2011 ReelSEO.com Online Video Guide
Susan D

Business Communication - 0 views

  • Business communication involves any kind of communication that foster strong partnerships, promote products or services, as well as relay information within a particular organization.
  • imperative therefore that communications should be done clearly, efficiently, and accurately
  • it can have a great impact on a company’s reputation and credibility, and will definitely say a lot about its level of professionalism.
  •  
    "Business communication involves any kind of communication that foster strong partnerships, promote products or services, as well as relay information within a particular organization. It is imperative therefore that communications should be done clearly, efficiently, and accurately because it can have a great impact on a company's reputation and credibility, and will definitely say a lot about its level of professionalism. There are many types of business communication, including electronic communication, employment communication, verbal and non-verbal communication, as well as written communication and all these must be done properly in order to reap good results."
Marcelle B

BBC NEWS | Have Your Say | How has information technology changed your life? - 0 views

  •  
    This is an article with peoples opinions from all around the world on how sharing information ha evolved on the internet.
  •  
    This is a good article Marcelle.
J.T. E

Mobile, Social, Crowd, Cloud: Why These Concepts Matter - Forbes - 0 views

  • ASSIST’s most powerful application to date is called Tactical Ground Reporting System or TIGR (why not TGRS?), which is being used by soldiers in Iraq and Afghanistan.
  • Maeda set the stage by telling us of how intelligence in the military traditionally flows.  Soldiers observe something (e.g., men in keffiyeh with Kalashnikovs coming from and going to a mud-walled compound) and write up a report, which is passed up the chain of command to someone with the authority to decide whether or not to initiate an activity (e.g., call in an airstrike).  The information moves upward in the organization, and the soldier who made the observation may never know how it was used.
  • It’s the soldiers who need to know what’s happening in the compound, knowledge that could mean the difference between life and death.
  •  
    ASSIST's most powerful application to date is called Tactical Ground Reporting System or TIGR, which is being used by soldiers in Iraq and Afghanistan. This helps the soldier be able to get the information to his commander and then to the head person to decide if they will need to make a move on the threat.
TaylorJ j

Resource #1 - 0 views

  • In the 2000s the Internet grew to an astounding level not only in the number of people who regularly logged on to the World Wide Web (WWW) but in the speed and capability of its technology. By December 2009, 26 percent of the world’s population used the Internet and “surfed the web.
  • The rapid growth of Internet technology and usage had a drastic cultural effect on the United States. Although that impact was mostly positive, the WWW caused many social concerns. With financial transactions and personal information being stored on computer databases, credit-card fraud and identity theft were frighteningly common.
  • Hackers accessed private and personal information and used it for personal gain. Hate groups and terrorist organizations actively recruited online, and the threat remained of online terrorist activities ranging from planting computer viruses to potentially blowing up power stations by hacking computers that ran the machinery. Copyright infringement was a growing concern
  • ...8 more annotations...
  • At the turn of the century, most users accessed the Internet by a dial-up connection in which computers used modems to connect to other computers using existing telephone lines. Typical dial-up connections ran at 56 kilobytes per second.
  • raditional communications media such as telephone and television services were redefined by technologies such as instant messaging, Voice over Internet Protocol (VoIP), mobile smartphones, and streaming video.
  • The Internet changed the production, sale, and distribution of print publications, software, news, music, film, video, photography, and everyday products from soap to automobiles.
  • With broadband, Internet users could download and watch videos in a matter of seconds, media companies could offer live streaming-video newsfeeds, and peer-to-peer file sharing became efficient and commonplace. News was delivered on websites, blogs, and webfeeds, and e-commerce changed the way people shopped. Television shows, home movies, and feature films were viewed on desktop or laptop computers and even on cell phones. Students researched online, and many parents began working from home for their employers or started their own online businesses.
  • It was also becoming increasingly easy for users to access it from Internet cafés, Internet kiosks, access terminals, and web pay phones. With the advent of wireless, customers could connect to the Internet from virtually any place that offered remote service in the form of a wireless local area network (WLAN) or Wi-Fi router.
  • In January 2001 Apple launched the iPod digital music player, and then in April 2003 it opened the iTunes Store, allowing customers to legally purchase songs for 99 cents. Although federal courts ordered that music-sharing services such as Napster could be held liable if they were used to steal copyrighted works, Fanning’s brainchild realized the power of peer-to-peer file sharing and the potential success of user-generated Internet services.
  • Email was the general form of internet communication and allowed users to send electronic text messages. Users could also attach additional files containing text, pictures, or videos. Chat rooms and instant-messaging systems were also popular methods of online communication and were even quicker than traditional email. Broadband made other popular forms of Internet communication possible, including video chat rooms and video conferencing. Internet telephony or VoIP became increasingly popular f
  • or gaming applications.
TaylorJ j

Resource #3 - 0 views

  • The blog is a publishing innovation, a digital newswire that, due to the proliferation of the Internet, low production and distribution costs, ease of use and really simple syndication (RSS), creates a new and powerful push-pull publishing concept. As such, it changes the power structures in journalism, giving yesterday's readers the option of being today's journalists and tomorrow's preferred news aggregators.
  • Blogging is a concept whereas publishing text on the web is combined with its syndication. Users or other bloggers subscribe to these syndication feeds (RSS-feeds), which automatically appear on the subscriber's website, blog or in a newsreader.
  • Though Mooney calls the blogosphere a marketplace, blogging is also the roaming—as in cellular network—of ideas in marketplaces or networks. These roaming networks are growing and gaining importance. Blogs number 30 million worldwide, promoted by the often-free blogging service providers like Blogger and Wordpress.
  • ...4 more annotations...
  • The marketplace for technological ideas is not dissimilar from the marketplace for political ones. Lessig's reasoning applies, maybe even more so, to the technology arena where blogging is more common than in any other space, except maybe in politics.
  • Blogs are goldmines for journalists doing professional and crafted work. The blogosphere is a huge source to tap, using services like Tecnorati.com (a blog search engine) and Googlenews, for new ideas, arguments and leads to new stories and for follow-ups on stories on other sites.
  • raditional printing is an expensive process, especially in metropolitan areas. And as sites like Craigslist.org, free after text ads, demolish the traditional revenue model for papers, the cost of printing will be harder to justify. Papers are slow and money-sucking operations, or as Shel Israel, author of the book Naked Conversations, put it "In the Information Age, the newspaper has become a cumbersome and inefficient distribution mechanism. If you want fast delivery of news, paper is a stage coach competing with jet planes." By blogging some beats or sections that normally run in print, publications would expand their audience as well [as] attract new readers through blogging using fewer resources.
  • Blogs are also a way of using journalists more effectively. All information, given that it is relevant, that actually does not fit into the paper can be channeled through blogs, allowing the readers to choose what to read or not. This enables a dialogue, a sense of ownership and participation that is essential in creating communities.
Jake Snead

Online Piracy Alert System to Begin This Week - NYTimes.com - 0 views

  •  
    This week the Copyright Alert System is being put into effect on the Internet. The system is used as an alert to companies about copyright infringement on their websites. Now when people on the Internet attempt to copy and paste a company's work onto their own work, they will receive a series of warnings. Media companies will observe online traffic and report to Internet providers if they think work has been downloaded illegally. The person who did this will receive up to six warnings and after that service providers can stop their Internet flow or give them up to a $35 fine. This relates to the sharing of information through Web 2.0 because people's work that they upload can be stolen or plagiarized, and this is helping to prevent that by discouraging the stealing of work.
Megan Smeltzer

Why Google Has Too Much Power Over Your Private Life - NYTimes.com - 1 views

  •  
    This article talks about how Google is giving an unbelievable amount of information out through its search engines, and how its competitors can't even compare to its usage. 
« First ‹ Previous 41 - 60 of 220 Next › Last »
Showing 20 items per page