Skip to main content

Home/ Flat Classroom Project/ Group items tagged the

Rss Feed Group items tagged

Vicki Davis

MOOCs, Large Courses Open to All, Topple Campus Walls - NYTimes.com - 2 views

  •  
    Massively Open Online Courses are the discussion in Open Education -- I think the important thing is that students want to CONNECT around content - it is the relationships and connections that are so amazing more than just the content. People with a common passion are connecting through the content. The content becomes a conduit.  "Consider Stanford's experience: Last fall, 160,000 students in 190 countries enrolled in an Artificial Intelligence course taught by Mr. Thrun and Peter Norvig, a Google colleague. An additional 200 registered for the course on campus, but a few weeks into the semester, attendance at Stanford dwindled to about 30, as those who had the option of seeing their professors in person decided they preferred the online videos, with their simple views of a hand holding a pen, working through the problems. Mr. Thrun was enraptured by the scale of the course, and how it spawned its own culture, including a Facebook group, online discussions and an army of volunteer translators who made it available in 44 languages. "Having done this, I can't teach at Stanford again," he said at a digital conference in Germany in January. "I feel like there's a red pill and a blue pill, and you can take the blue pill and go back to your classroom and lecture your 20 students. But I've taken the red pill, and I've seen Wonderland."
Erin B

Flatclassroom: Emerg - 0 views

Flatclassroom: Emergence of the World Wide Web In the 1990's the emergence of the Internet as a tool of low-cost global connectivity; the emergence, on top of the Internet, of the World Wibe Web en...

www_world

started by Erin B on 27 Sep 10 no follow-up yet
Kunjan P

National Center for Supercomputing Applications - Wikipedia, the free encyclopedia - 0 views

  • The National Center for Supercomputing Applications (NCSA) is a state-federal partnership to develop and deploy national-scale cyberinfrastructure that advances science and engineering. NCSA operates as a unit of the University of Illinois at Urbana-Champaign but it provides high-performance computing resources to researchers across the country. Support for NCSA comes from the National Science Foundation, the state of Illinois, the University of Illinois, business and industry partners, and other federal agencies.
  • These centers were founded when a group of University of Illinois faculty, led by Larry Smarr, sent an unsolicited proposal to the National Science Foundation in 1983. The foundation announced funding for the supercomputer centers in 1985; the first supercomputer at NCSA came online in January 1986.
  • NCSA provides leading-edge computing, data storage, and visualization resources. NCSA computational and data environment implements a multi-architecture hardware strategy, deploying both clusters and shared memory systems to support high-end users and communities on the architectures best-suited to their requirements. Nearly 1,360 scientists, engineers and students used the computing and data systems at NCSA to support research in more than 830 projects. A list of NCSA hardware is available at NCSA Capabilities
  • ...3 more annotations...
  • Today NCSA is collaborating with IBM, under a grant from the National Science Foundation, to build [1] "Blue Waters," a supercomputer capable of performing 1 quadrillion calculations per second, a measure known as a petaflop. Blue Waters is due to come online in 2011.
  • The Mosaic web browser, the first popular graphical Web browser which played an important part in expanding the growth of the World Wide Web, was written by Marc Andreessen and Eric Bina at NCSA. Andreessen and Bina went on to develop the Netscape Web browser. Mosaic was later licensed to Spyglass,_Inc. which provided the foundation for Internet Explorer.
  • Initially, NCSA's administrative offices were in the Water Resources Building and employees were scattered across the campus. NCSA is now headquartered within its own building directly north of the Siebel Center for Computer Science, on the site of a former baseball field, Illini Field. NCSA's supercomputers remain at the Advanced Computation Building, but construction is now under way on a Petascale Computing Facility to house Blue Waters.
  •  
    The NCSA is a great stepping stone to the evolution of Web 2.0.
Toni H.

NTT DoCoMo - Wikipedia, the free encyclopedia - 0 views

  • NTT Docomo, Inc.[1] (株式会社エヌ・ティ・ティ・ドコモ, Kabushiki Gaisha Enu Ti Ti Dokomo?, TYO: 9437, NYSE: DCM, LSE: NDCM) is the predominant mobile phone operator in Japan. The name is officially an abbreviation of the phrase, "do communications over the mobile network", and is also from a compound word dokomo, meaning "everywhere" in Japanese. Docomo provides phone, video phone (FOMA and Some PHS), i-mode (internet), and mail (i-mode mail, Short Mail, and SMS) services. The company has its headquarters in the Sanno Park Tower, Nagatachō, Chiyoda, Tokyo.[2] Docomo was spun off from Nippon Telegraph and Telephone (NTT) in August 1991 to take over the mobile cellular operations. It provides 2G (mova) PDC cellular services on the 800 MHz band, and 3G FOMA W-CDMA services on the 2 GHz (UMTS2100) and 800 MHz(UMTS800(Band VI)) and 1800 MHz(UMTS1800(Band IX)) bands. Its businesses also included PHS (Paldio), paging, and satellite. Docomo ceased offering a PHS service on January 7, 2008.
  •  
    NTT Docomo, Inc.[1] (株式会社エヌ・ティ・ティ・ドコモ, Kabushiki Gaisha Enu Ti Ti Dokomo?, TYO: 9437, NYSE: DCM, LSE: NDCM) is the predominant mobile phone operator in Japan. The name is officially an abbreviation of the phrase, "do communications over the mobile network", and is also from a compound word dokomo, meaning "everywhere" in Japanese. Docomo provides phone, video phone (FOMA and Some PHS), i-mode (internet), and mail (i-mode mail, Short Mail, and SMS) services. The company has its headquarters in the Sanno Park Tower, Nagatachō, Chiyoda, Tokyo.[2] Docomo was spun off from Nippon Telegraph and Telephone (NTT) in August 1991 to take over the mobile cellular operations. It provides 2G (mova) PDC cellular services on the 800 MHz band, and 3G FOMA W-CDMA services on the 2 GHz (UMTS2100) and 800 MHz(UMTS800(Band VI)) and 1800 MHz(UMTS1800(Band IX)) bands. Its businesses also included PHS (Paldio), paging, and satellite. Docomo ceased offering a PHS service on January 7, 2008. Contents [hide]
mitch g

Scott Hyten - LinkedIn - 0 views

  • CEO at Wild Brain
  • the largest independent animation studio at Wild Brain
  • building more than 100 computer-generated television shows and music videos for the Walt Disney Company, Hyten has pioneered the use and integration of technology utilizing a worldwide supply chain while producing product for a global market.
  • ...4 more annotations...
  • He is featured in Pulitzer Prize-winning author Tom Friedman’s book, “The
  • World is Flat.
  • Indonesia
  • Over the last 25 years, Scott Hyten has either been a founding employee, founded, co-founded or provided startup capital for some of the world’s leading companies and practices, including technology practice Computer Sciences Corporation (NYSE:CSC) (Continuum outsourcing), the world’s leading healthcare technology practice at Perot Systems (NYSE:PER);
  •  
    worked for wild brain, an animation studio that created stuff for the Disney channel.
  •  
    Over the last 25 years, Scott Hyten has either been a founding employee, founded, co-founded or provided startup capital for some of the world's leading companies and practices, including technology practice Computer Sciences Corporation (NYSE:CSC) (Continuum outsourcing), the world's leading healthcare technology practice at Perot Systems (NYSE:PER); the largest independent animation studio at Wild Brain; and the world's leading managed hosting and internet broadcast compan at ThePlanet.com. Whether through managing 3-D Seismic exploration in the North Sea, Indonesia and Africa for Mobil Oil or building more than 100 computer-generated television shows and music videos for the Walt Disney Company, Hyten has pioneered the use and integration of technology utilizing a worldwide supply chain while producing product for a global market. He is featured in Pulitzer Prize-winning author Tom Friedman's book, "The World is Flat." and has latterly received the Albert Einstein Award for technology, Scott Hyten's Specialties: Technology, Entertainment, Digital Content Distribution and Music
Becca B.

IL Toolkit - Virtual Communications: 5 - How do we use Virtual Communications Tools? - 0 views

  •  
    "There are some special rules that apply to communicating virtually. The most important is to remember that you are communicating with real people, not a computer. Don't spam. That is, don't send unsolicited e-mail. Remember that the Internet is a pull system, where people can request information, rather than one where you send them information without being asked. A wise person once suggested you treat the Internet like a foreign culture; study it for a month or more, as an anthropologist would, before you participate. Using this example, it would also be advisable to strongly consider cultural differences of the people with whom we communicate. This entails avoiding profanity and slurs or criticisms against any group of people. It means respecting differences and striving for political correctness in all forms of communication and action. The CD-ROM "Information Literacy Toolkit" provides definitions of legal considerations included in dealing with virtual communications. Below are some ethical considerations for handling them. As with security considerations, ethics in dealing with material handled via virtual communication is rooted in traditional communications. That which applies to the paper world also applies in the virtual world. The fact that information is easily available does not remove traditional requirements for attribution, for the avoidance of plagiarism or for the appropriate use the information. The anonymity provided by the ability to surf and search a large number of documents provides a temptation to use material in an unauthorized way. This temptation must be avoided. The same browsing tools that allow wide access also provide a tool for proper attribution. The writer may simply insert a link (URL) to direct the reader to the source of the information cited. Privacy should be safeguarded and observed. Those who control their own information should establish systems to keep information that they do not want disclosed protected. Owners of
Ivey Carden

Telemedicine: Where It Is and Where It's Going - 1 views

  •  
    "The term telemedicine encompasses a wide range of telecommunications and information technologies and many clinical applications, although interactive video may be the most common medium.The first telemedicine programs were established almost 40 years ago, but the technology has grown considerably in the past decade. Despite the expansion of telemedicine, the volume of patients receiving services that use the technology remains relatively low (about 21 000 in 1996). In part, this reflects the lack of a consistent coverage and payment policy and concerns about licensure, liability, and other issues. A considerable amount of federal funding has supported telemedicine in recent years, and legislators and federal, regional, and state policymakers are struggling with several crucial policy matters. Research on the effectiveness of telemedicine is somewhat limited, although the work that has been done thus far supports the hypothesis that, in general, the technology is medically effective. The cost-effectiveness of specific telemedicine applications has not yet been rigorously demonstrated. " This talks about what telemedicine started out as and what it is going to become.
  •  
    Ivy - can you put this into your own words please?
TaylorJ j

Resource #1 - 0 views

  • In the 2000s the Internet grew to an astounding level not only in the number of people who regularly logged on to the World Wide Web (WWW) but in the speed and capability of its technology. By December 2009, 26 percent of the world’s population used the Internet and “surfed the web.
  • The rapid growth of Internet technology and usage had a drastic cultural effect on the United States. Although that impact was mostly positive, the WWW caused many social concerns. With financial transactions and personal information being stored on computer databases, credit-card fraud and identity theft were frighteningly common.
  • Hackers accessed private and personal information and used it for personal gain. Hate groups and terrorist organizations actively recruited online, and the threat remained of online terrorist activities ranging from planting computer viruses to potentially blowing up power stations by hacking computers that ran the machinery. Copyright infringement was a growing concern
  • ...8 more annotations...
  • At the turn of the century, most users accessed the Internet by a dial-up connection in which computers used modems to connect to other computers using existing telephone lines. Typical dial-up connections ran at 56 kilobytes per second.
  • raditional communications media such as telephone and television services were redefined by technologies such as instant messaging, Voice over Internet Protocol (VoIP), mobile smartphones, and streaming video.
  • The Internet changed the production, sale, and distribution of print publications, software, news, music, film, video, photography, and everyday products from soap to automobiles.
  • With broadband, Internet users could download and watch videos in a matter of seconds, media companies could offer live streaming-video newsfeeds, and peer-to-peer file sharing became efficient and commonplace. News was delivered on websites, blogs, and webfeeds, and e-commerce changed the way people shopped. Television shows, home movies, and feature films were viewed on desktop or laptop computers and even on cell phones. Students researched online, and many parents began working from home for their employers or started their own online businesses.
  • It was also becoming increasingly easy for users to access it from Internet cafés, Internet kiosks, access terminals, and web pay phones. With the advent of wireless, customers could connect to the Internet from virtually any place that offered remote service in the form of a wireless local area network (WLAN) or Wi-Fi router.
  • In January 2001 Apple launched the iPod digital music player, and then in April 2003 it opened the iTunes Store, allowing customers to legally purchase songs for 99 cents. Although federal courts ordered that music-sharing services such as Napster could be held liable if they were used to steal copyrighted works, Fanning’s brainchild realized the power of peer-to-peer file sharing and the potential success of user-generated Internet services.
  • Email was the general form of internet communication and allowed users to send electronic text messages. Users could also attach additional files containing text, pictures, or videos. Chat rooms and instant-messaging systems were also popular methods of online communication and were even quicker than traditional email. Broadband made other popular forms of Internet communication possible, including video chat rooms and video conferencing. Internet telephony or VoIP became increasingly popular f
  • or gaming applications.
mitch g

Kevin Kelly - 0 views

  • Kevin Kelly is Senior Maverick at Wired magazine. He co-founded Wired in 1993, and served as its Executive Editor from its inception until 1999. He is currently completing a book for Viking/Penguin publishers called "What Technology Wants," due out in the Fall 2010. He is also editor and publisher of the Cool Tools website, which gets half a million unique visitors per month. From 1984-1990 Kelly was publisher and editor of the Whole Earth Review, a journal of unorthodox technical news. He co-founded the ongoing Hackers' Conference, and was involved with the launch of the WELL, a pioneering online service started in 1985. He authored the best-selling New Rules for the New Economy and the classic book on decentralized eme
  •  
    Kevin Kelly is Senior Maverick at Wired magazine. He co-founded Wired in 1993, and served as its Executive Editor from its inception until 1999. He is currently completing a book for Viking/Penguin publishers called "What Technology Wants," due out in the Fall 2010. He is also editor and publisher of the Cool Tools website, which gets half a million unique visitors per month. From 1984-1990 Kelly was publisher and editor of the Whole Earth Review, a journal of unorthodox technical news. He co-founded the ongoing Hackers' Conference, and was involved with the launch of the WELL, a pioneering online service started in 1985. He authored the best-selling New Rules for the New Economy and the classic book on decentralized emergent systems, Out of Control.
tommy s

Outsourcing - Wikipedia, the free encyclopedia - 0 views

  • Outsourcing or sub-servicing often refers to the process of contracting to a third-party.
  • Cost savings — The lowering of the overall cost of the service to the business. This will involve reducing the scope, defining quality levels, re-pricing, re-negotiation, and cost re-structuring. Access to lower cost economies through offshoring called "labor arbitrage" generated by the wage gap between industrialized and developing nations.[10] Focus on Core Business — Resources (for example investment, people, infrastructure) are focused on developing the core business. For example often organizations outsource their IT support to specialised IT services companies. Cost restructuring — Operating leverage is a measure that compares fixed costs to variable costs. Outsourcing changes the balance of this ratio by offering a move from fixed to variable cost and also by making variable costs more predictable. Improve quality — Achieve a steep change in quality through contracting out the service with a new service level agreement. Knowledge — Access to intellectual property and wider experience and knowledge.[11] Contract — Services will be provided to a legally binding contract with financial penalties and legal redress. This is not the case with internal services.[12] Operational expertise — Access to operational best practice that would be too difficult or time consuming to develop in-house. Access to talent — Access to a larger talent pool and a sustainable source of skills, in particular in science and engineering.[13][14] Capacity management — An improved method of capacity management of services and technology where the risk in providing the excess capacity is borne by the supplier. Catalyst for change — An organization can use an outsourcing agreement as a catalyst for major step change that can not be achieved alone. The outsourcer becomes a Change agent in the process. Enhance capacity for innovation — Companies increasingly use external knowledge service providers to supplement limited in-house capacity for product innovation.[14][15] Reduce time to market — The acceleration of the development or production of a product through the additional capability brought by the supplier.[16] Commodification — The trend of standardizing business processes, IT Services, and application services which enable to buy at the right price, allows businesses access to services which were only available to large corporations. Risk management — An approach to risk management for some types of risks is to partner with an outsourcer who is better able to provide the mitigation.[17] Venture Capital — Some countries match government funds venture capital with private venture capital for start-ups that start businesses in their country.[18] Tax Benefit — Countries offer tax incentives to move manufacturing operations to counter high corporate taxes within another country. Scalability — The outsourced company will usually be prepared to manage a temporary or permanent increase or decrease in production. Creating leisure time — Individuals may wish to outsource their work in order to optimise their work-leisure balance.[19] Liability — Organizations choose to transfer liabilities inherent to specific business processes or services that are outside of their core competencies. [edit] Implications
  •  
    Definition of outsourcing: "Outsourcing or sub-servicing often refers to the process of contracting to a third-party."
  •  
    wikipedia on outsourcing
  •  
    overview of outsourcing
hannah h

Digitizing - Wikipedia, the free encyclopedia - 0 views

  • Digitizing or digitization[1] is the representation of an object, image, sound, document or a signal (usually an analog signal) by a discrete set of its points or samples. The result is called digital representation or, more specifically, a digital image, for the object, and digital form, for the signal. Strictly speaking, digitizing means simply capturing an analog signal in digital form. For a document the term means to trace the document image or capture the "corners" where the lines end or change direction.
  •  
    Definition of digitization"Digitizing or digitization[1] is the representation of an object, image, sound, document or a signal (usually an analog signal) by a discrete set of its points or samples. The result is called digital representation or, more specifically, a digital image, for the object, and digital form, for the signal. Strictly speaking, digitizing means simply capturing an analog signal in digital form. For a document the term means to trace the document image or capture the "corners" where the lines end or change direction."
hannah h

Mosaic (web browser) - Wikipedia, the free encyclopedia - 0 views

  • Mosaic is the web browser credited with popularizing the World Wide Web. It was also a client for earlier protocols such as FTP, NNTP, and gopher. Its clean, easily understood user interface, reliability, Windows port and simple installation all contributed to making it the application that opened up the Web to the general public.[2] Mosaic was also the first browser to display images inline with text instead of displaying images in a separate window.[3] While often described as the first graphical web browser, Mosaic was preceded by the lesser-known Erwise[4] and ViolaWWW.
  •  
    difinition of Mosaic "Mosaic is the web browser credited with popularizing the World Wide Web. It was also a client for earlier protocols such as FTP, NNTP, and gopher. Its clean, easily understood user interface, reliability, Windows port and simple installation all contributed to making it the application that opened up the Web to the general public.[2] Mosaic was also the first browser to display images inline with text instead of displaying images in a separate window.[3] While often described as the first graphical web browser, Mosaic was preceded by the lesser-known Erwise[4] and ViolaWWW."
Toni H.

Microsoft Windows - Wikipedia, the free encyclopedia - 0 views

  • Microsoft Windows is a series of software operating systems and graphical user interfaces produced by Microsoft. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs).[2] Microsoft Windows came to dominate the world's personal computer market, overtaking Mac OS, which had been introduced in 1984. As of October 2009, Windows had approximately 91% of the market share of the client operating systems for usage on the Internet.[3][4][5] The most recent client version of Windows is Windows 7; the most recent server version is Windows Server 2008 R2; the most recent mobile OS version is Windows Phone 7.
  •  
    Microsoft Windows is a series of software operating systems and graphical user interfaces produced by Microsoft. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs).[2] Microsoft Windows came to dominate the world's personal computer market, overtaking Mac OS, which had been introduced in 1984. As of October 2009, Windows had approximately 91% of the market share of the client operating systems for usage on the Internet.[3][4][5] The most recent client version of Windows is Windows 7; the most recent server version is Windows Server 2008 R2; the most recent mobile OS version is Windows Phone 7. Contents [hide]
Toni H.

Radio-frequency identification - Wikipedia, the free encyclopedia - 0 views

  • Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels). Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission, and battery assisted passive (BAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range. There are a variety of groups defining standards and regulating the use of RFID, including: International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), ASTM International, DASH7 Alliance, EPCglobal. (Refer to Regulation and standardization below.) RFID has many applications; for example, it is used in enterprise supply chain management to improve the efficiency of inventory tracking and management. Contents [hide]
  •  
    Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels). Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. There are generally three types of RFID tags: active RFID tags, which contain a battery and can transmit signals autonomously, passive RFID tags, which have no battery and require an external source to provoke signal transmission, and battery assisted passive (BAP) RFID tags, which require an external source to wake up but have significant higher forward link capability providing greater range. There are a variety of groups defining standards and regulating the use of RFID, including: International Organization for Standardization (ISO), International Electrotechnical Commission (IEC), ASTM International, DASH7 Alliance, EPCglobal. (Refer to Regulation and standardization below.) RFID has many applications; for example, it is used in enterprise supply chain management to improve the efficiency of inventory tracking and management.
Kreslyn C

Production Workflow Software Market Trends - 0 views

  • dvancements in technology and changing communication methods are among the growth drivers in this market. New software provides vast improvements in workflow efficiency as well as increased personalization of communications materials. The creative layout, variable data, and Web-to-print segments are expected to show high single-digit growth rates while multi-channel communications has the highest growth expectation at 22% average yearly growth rate.
  •  
    "Like many industries, the print production workflow software market was affected by the recent economic decline. Many segments of the print production workflow market came near to a standstill during the first six months of 2009. Vendors were faced with lower demand due to market consolidation; high exit rates and bankruptcies of print service providers; as well as the postponement of investments due to the economic uncertainty, credit scarcity, and customers being in survival mode. However, the good news is the situation stabilized after the summer and sales picked up again in the third quarter, with the U.S. leading and Western Europe following according to InfoTrends' Global & North American Print Production Workflow Market Forecast: 2009-2014 and Global & Western Europe Print Production Workflow Market Forecast: 2009-2014."
Vicki Davis

Amazon Kindle Fire could Burn Up iPad's Lead | ITProPortal.com - 0 views

  •  
    This survey shows that iPad with the $199 price tag is a 'serious" contender for the ipad. I had someone ask me about Kindle fire vs. iPad. Definitely people are comparing it.  Many people are definitely comparing the ipad to the Kindle fire although the Kindle fire has two issues that don't have anything to do with Amazon: the droid OS and the Droid app store. The droid OS still lacks in touch responsiveness from the reviews I read. The Droid app store is a lot more open but also includes more "junk" and even some privacy and virus laden things from what I hear. Does this matter to the average person who just wants a smaller device and a $199 price tag - we'll see. Tablets are definitely in our future. You can see the redesign of women's pocketbooks reflecting this!
mitch g

Mike McCue | CrunchBase Profile - 0 views

  • Mike McCue founded Tellme Networks in 1999 as the CEO. He joined Microsoft as the General Manager of the Tellme subsidiary after its acquisition. In 2000, Mike led Tellme to launch one of the world’s first Internet platforms to deliver web data to anyone over any telephone. Starting with simple Web services, Tellme’s innovative platform inspired the migration of large-scale phone services from proprietary applications to open standards applications and drove the global adoption of VoiceXML. Before founding Tellme, Mike worked at Netscape as Vice President of Technology. He joined Netscape after their successful acquisition of the first company he founded, Paper Software, a leader in 3-D browser technology. Mike was honored with a Kilby International Award as a Young Innovator for his work bringing 3-D technology to the world through Netscape’s Web browser.
  •  
    Mike McCue founded Tellme Networks in 1999 as the CEO. He joined Microsoft as the General Manager of the Tellme subsidiary after its acquisition. In 2000, Mike led Tellme to launch one of the world's first Internet platforms to deliver web data to anyone over any telephone. Starting with simple Web services, Tellme's innovative platform inspired the migration of large-scale phone services from proprietary applications to open standards applications and drove the global adoption of VoiceXML. Before founding Tellme, Mike worked at Netscape as Vice President of Technology. He joined Netscape after their successful acquisition of the first company he founded, Paper Software, a leader in 3-D browser technology. Mike was honored with a Kilby International Award as a Young Innovator for his work bringing 3-D technology to the world through Netscape's Web browser.
Thomas H

Mobile phone - Wikipedia, the free encyclopedia - 1 views

  • A mobile phone (also called mobile, cellular phone, cell phone or handphone)[1] is an electronic device used for full duplex two-way radio telecommunications over a cellular network of base stations known as cell sites. Mobile phones differ from cordless telephones, which only offer telephone service within limited range through a single base station attached to a fixed land line, for example within a home or an office.
  • In addition to being a telephone, modern mobile phones also support many additional services, and accessories, such as SMS (or text) messages, e-mail, Internet access, gaming, Bluetooth and infrared short range wireless communication, camera, MMS messaging, MP3 player, radio and GPS. Low-end mobile phones are often referred to as feature phones, whereas high-end mobile phones that offer more advanced computing ability are referred to as smartphones.
  • A mobile phone (also called mobile, cellular telephone, or cell phone) is an electronic device used to make mobile telephone calls across a wide geographic area. Mobile phones are different from cordless telephones, which only offer telephone service within a limited range of a fixed land line, for example within a home or an office
  •  
    "A mobile phone (also known as a cellular phone, cell phone and a hand phone) is a device which can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile network operator. The calls are to and from the public telephone network which includes other mobiles and fixed-line phones across the world. By contrast, a cordless telephone is used only within the short range of a single, private base station. In addition to telephony, modern mobile phones also support a wide variety of other services such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming and photography. Mobile phones that offer these more general computing capabilities are referred to as smartphones. The first hand-held mobile phone was demonstrated by Dr Martin Cooper of Motorola in 1973, using a handset weighing 2 1/2 lbs (about 1 kg).[1] In 1983, the DynaTAC 8000x was the first to be commercially available. In the twenty years from 1990 to 2010, worldwide mobile phone subscriptions grew from 12.4 million to over 4.6 billion, penetrating the developing economies and reaching the bottom of the economic pyramid"
Jon Cavalier

Workflow - Wikipedia, the free encyclopedia - 1 views

shared by Jon Cavalier on 13 Oct 08 - Cached
  • A workflow consists of a sequence of connected steps. It is a depiction of a sequence of operations, declared as work of a person, a group of persons,[1]
  • A workflow is a model to represent real work for further assessment, e.g., for describing a reliably repeatable sequence of operations. More abstractly, a workflow is a pattern of activity enabled by a systematic organization of resources, defined roles and mass, energy and information flows, into a work process that can be documented and learned.[3][4] Workflows are designed to achieve processing intents of some sort, such as physical transformation, service provision, or information processing.
  • The cultural impact of workflow optimization during this era can be understood through films such as Chaplin's classic Modern Times. These concepts did not stay confined to the shop floor. One magazine invited housewives to puzzle over the fastest way to toast three slices of bread on a one-side, two-slice grill. The book Cheaper by the Dozen introduced the emerging concepts to the context of family life.
  •  
    This is the definition of our topic and helps explain exactly what Workflow Software is.
  • ...7 more comments...
  •  
    when computers became interoperable, it paved the way for work flow software.
  •  
    Definition of Workflow: "A workflow consists of a sequence of connected steps. It is a depiction of a sequence of operations, declared as work of a person, a group of persons,[1] an organization of staff, or one or more simple or complex mechanisms. Workflow may be seen as any abstraction of real work, segregated in workshare."
  •  
    A workflow consists of a sequence of connected steps. It is a depiction of a sequence of operations, declared as work of a person, a group of persons,[1]
  •  
    Shows the meaning of what "workflow" means.
  •  
    "Workflow concepts are closely related to other concepts used to describe organizational structure, such as silos, functions, teams, projects, policies and hierarchies. Workflows may be viewed as one primitive building block of organizations. The relationships among these concepts are described later in this entry."
  •  
    "A workflow consists of a sequence of connected steps. It is a depiction of a sequence of operations, declared as work of a person, a group of persons,["
  •  
    "The term workflow is used in computer programming to capture and develop human-to-machine interaction." Workflow- is the process of using computers to interact with humans, it helps people interact and work together more fluently.
  •  
    From Wikipedia, the free encyclopedia A workflow consists of a sequence of concatenated (connected) steps. Emphasis is on the flow paradigm, where each step follows the precedent without delay or gap and ends just before the subsequent step may begin. This concept is related to non overlapping tasks of single resources.
  •  
    From Wikipedia, the free encyclopedia A workflow consists of a sequence of concatenated (connected) steps. Emphasis is on the flow paradigm, where each step follows the precedent without delay or gap and ends just before the subsequent step may begin. This concept is related to non overlapping tasks of single resources.
stephanie jones

The world is flat: a brief history ... - Thomas L. Friedman - Google Books - 0 views

  •  
    Thomas Friedman wrote about the tv series, Higglytown Heroes, which uses an all-world supply chain to record every voice for the character for the show. It is inspired by the 9/11 heroes. The recording session is in New York or L.A. The design and direction is done in San Fransisco. The animation of the characters is done in Bangalore with edits from San Fransisco. The workflow used in the making of this show allow the recording/writing/animation sessions to record an artist for an entire show in less than half a day, including retakes and edits.
‹ Previous 21 - 40 of 1345 Next › Last »
Showing 20 items per page