Skip to main content

Home/ Web 2.0 Tools/ Group items tagged has

Rss Feed Group items tagged

awqi zar

Automated Filtering vs Human-Powered Curation » Browse My Stuff - 4 views

  •  
    With solutions like Paper.li and Browse My Stuff grabbing attention, and with people like Robin Good doing a series on Real-Time News Curation, and Ross Dawson tells us has curation has hit the tipping point, it seems like the concepts of curation, aggregation, filtering are suddenly a central conversation.  Of course, this has long been a conversation as Robin, Ross or I could tell you.  However, what has really changed here is first the explosion of content sources.  As Robin put it: "You cannot follow and keep yourself updated in an effective way by simply subscribing to as many sources as possible." I would also say that what has really changed is the sophistication of automated filtering to deal with extracting value from the noise.  I had an interesting exchange with Robin around the question of what constitutes filtering and how that differs from curation.  I'll get to that in a bit.  Let' me first provide some background on filtering.
writerjack777

Download McAfee with activation code | www.mcafee.com/activate - 0 views

  •  
    McAfee, a computer security software company started by John McAfee used to be known for its nicely performing antivirus software. After certain years it was found to be lagging in its performance and during that time Intel, a leading brand known for its processors, acquired it by the name of Intel security. Though, due to some legal bondage between the founder of McAfee and Intel, it has to retain its name as it is with the tagline of Intel Security. This is the reason why it is known as McAfee, Intel Security now. Since the time, it has been acquired by Intel, its performance is being improved in some measures. Though Intel has not made any big changes to it the changes that Intel has applied are sufficient to improve its performance than that was earlier. McAfee is trying to compete with other security brands.
arjunsir

Dr. Vape: A New Era in Vaping - 5 views

CBD Pen are portable, convenient devices that allow users to enjoy the benefits of cannabidiol (CBD) in a discreet and easy-to-use manner. Unlike traditional CBD oil tinctures or capsules, CBD pens...

Dr. Vape Dr DrVape

Muslim Academy

Iran getting national internet network - 0 views

  •  
    After the series of attacks on Islamists, internet has been made a platform to attack and bounce back. Lately, in Iran, there have been going on the modifications with the internet attacks which are the sole way of influencing the people and attack their religion. In Iran, they are setting up the modifications in a way that whatever the information will be, it will be filtered by the national online network in Iran. Although the concept is not new, they talks are going on over the decade about the settlement of the flow of information which has been influencing the people in Iran, moreover, there are doubts that country has been under many cyber-attacks due to the Nuclear program. As if some forces are trying hard to steal their information. Iran is working on gathering infrastructure and security. Regarding the security measures, Iran communication and other government officials proclaimed key government agencies and military outfits offline and onto the new network by the end of September. But as per the U.S. beliefs, it's nothing more than publicity by Iranians.
  •  
    if you want best news like this. Or follow. Your article in here www.killdo.de.gg
anonymous

BAZAAR SMS | Transactional SMS Provider in Patna | Bulk Transactional SMS Service in Pa... - 0 views

  •  
    The facility of Promotional Bulk SMS has brought a drastic revolution in the way businesses were conducted until a few years back. Gone are the days of traditional advertising SMS Marketing.Now you can promote your Product/Services at just a click directly to thousands of Mobile Phone users through promotional SMS. This has only opened attractive new arena of communication mode. Mobiles have become the most common communication mode(Bulk SMS). Every other individual, today, has a mobile. Nothing can be better than sending Bulk SMS to the prospective customers. We are Intenext Solutions, one of the leading Bulk Sms Providers in Patna of this amazing facility. We are based in Patna and offer effective and efficient services to clients' spread across the country. We provide SMS/email to OPT-IN Subscribers Only.
anonymous

BAZAAR SMS | Promotional SMS Provider in Patna | Bulk Promotional SMS in Patna | Bazaar... - 0 views

  •  
    The facility of Promotional Bulk SMS has brought a drastic revolution in the way businesses were conducted until a few years back. Gone are the days of traditional advertising SMS Marketing.Now you can promote your Product/Services at just a click directly to thousands of Mobile Phone users through promotional SMS. This has only opened attractive new arena of communication mode. Mobiles have become the most common communication mode(Bulk SMS). Every other individual, today, has a mobile. Nothing can be better than sending Bulk SMS to the prospective customers. We are Intenext Solutions, one of the leading Bulk Sms Providers in Patna of this amazing facility. We are based in Patna and offer effective and efficient services to clients' spread across the country. We provide SMS/email to OPT-IN Subscribers Only.
awqi zar

How Wikileaks has woken up journalism. « Emily Bell(wether) - 5 views

  •  
    The idea that this is the first real battleground between the political establishment and the open web is very arresting. It also forces journalists and news organisations to demonstrate to what extent they are now part of an establishment it is their duty to report. Some like the Guardian, which has a long tradition of free speech attached to it, has been at the heart of disseminating Wikileaks cablegate information.
anonymous

The Past and Future of Plagiarism - Plagiarism Checker - 0 views

  •  
    The internet has been the greatest breeding ground for creativity in human history, acting as the medium through which a unfathomable number of new works are published every day; from the shortest and most informal 'tweets' to 1000 page USPTO patents. Although this boom in creative work has been a blessing, it also has created a large problem in detecting and preventing plagiarism.
qualitypoint Tech

Why should I use timesheet - 15 views

  •  
    An important thing is the timesheet record is written proof for a particular person has worked during a particular duration for a particular amount of time . In case if the employee claims he has over worked and not paid for it the company can use this timesheet to disprove him saying that he has worked only this and the entry is made correctly.
hatientrong886

lap dat camera gia re tai ha noi - 0 views

firozcosmolance

Breaking All Records, Avengers: Endgame Pulls in $1.2 Billion in the First Week - 0 views

  •  
    All the Marvel lovers out there! We have got good news for you. Avengers: Endgame, the latest blockbuster from the Marvel franchise has broken the box office records by earning a whopping $1.2 billion at the global level in its opening weekend. This is the 8th film of the Marvel Cinematic Universe that has crossed the mark of a billion dollar and is the fastest any movie has earned ever so far.
writerjack777

Activate your McAfee | www.mcafee.com/activate - 0 views

  •  
    Initially launched by some other company, McAfee has now been acquired by Intel and so it is known as Intel Security while keeping the McAfee brand name intact along with this new tag. Acquisition of McAfee has bestowed it with a new feature which proves that it has undoubtedly improved its quality or must say the ability to detect and correct threats.
joshuamadrid

Omaha Nebraska news - 0 views

image

Omaha Nebraska news

started by joshuamadrid on 09 Sep 22 no follow-up yet
awqi zar

Rescuing Nokia? A former exec has a radical plan * The Register - 5 views

  •  
    A couple of months ago, a book appeared in Finland which has become a minor sensation. In the book, a former senior Nokia executive gives his diagnosis of the company, and prescribes some radical and surprising solutions. Up until now, the book has not been covered at all in the English language. This is the first review of the proposals outlined in Uusi Nokia (New Nokia - the manuscript) and draws on three hours of interviews with its author, Juhani Risku.
chelfyn Baxter

Management and Virtual Decentralised Networks: The Linux Project - 0 views

  • A mechanistic management system is appropriate to stable conditions. It is characterised by:The Organismic form is appropriate to changing conditions. It is characterised by: Hierarchic structure of control, authority and communicationNetwork structure of control A reinforcement of the hierarchic structure by the location of knowledge of actualities exclusively at the top of the hierarchyOmniscience no longer imputed to the head of the concern; knowledge may be located anywhere in the network; the location becoming the centre of authority Vertical interaction between the members of the concern, ie. between superior and subordinateLateral rather than vertical direction of communication through the organisation  A content of communication which consists of information and advice rather than instructions and decisions
    • chelfyn Baxter
       
      This is very similar to many Web 1.0/2.0 analogies
  • Structurehierarchicalnetworked Scopeinternal/closedexternal/open Resource focuscapitalhuman, information Statestabledynamic, changing Directionmanagement commandsself-management Basis of actioncontrolempowerment to act Basis for compensationposition in hierarchycompetency level
  • However, "the Linux movement did not and still does not have a formal hierarchy whereby important tasks can be handled out ... a kind of self-selection takes place instead: anyone who cares enough about a particular program is welcomed to try" [54]. But if his work is not good enough, another hacker will immediately fill the gap. In this way, this 'self-selection' ensures that the work done is of superb quality. Moreover this "decentralisation leads to more efficient allocation of resources (programmers' time and work) because each developer is free to work on any particular program of his choice as his skills, experience and interest best dictate" (Kuwabara, 2000). In contrast, "under centralised mode of software development, people are assigned to tasks out of economic considerations and might end up spending time on a feature that the marketing department has decided is vital to their ad campaign, but that no actual users care about" [55].
  • ...4 more annotations...
  • Industrial AgeInformation Age Focus on measurable outcomesFocus on strategic issues using participation and empowerment Individual accountabilityTeam accountability Clearly differentiated-segmented organisational roles, positions and responsibilitiesMatrix arrangement - flexible positions and responsibilities Hierarchical, linear information flowsMultiple interface, 'boundaryless' information networking Initiatives for improvement emanate from a management eliteInitiatives for improvement emanate from all directions
  • There is only one layer between the community of Linux developers and Linus: the "trusted lieutenants". They are a dozen hackers that have done considerably extended work on a particular part of the kernel to gain Linus' trust. The "trusted lieutenants" are responsible to maintain a part of the Linux Kernel and lots of developers sent their patches (their code) directly to them, instead of Linus. Of course, apart from Linus that has encouraged this to happen, this informal mechanism represents a natural selection by the community since the "trusted lieutenants" are recognised [by the community] as being not owners but simple experts in particular areas [57] and thus, their 'authority' can always be openly challenged. This does not mean that Linus has more influence than they have. Recently, "Alan Cox (one of the "trusted" ones) disagreed with Linus over some obscure technical issue and it looks like the community really does get to judge by backing Alan and making Linus to acknowledge that he made a bad choice" [58].
  • In 1991, Linus Torvalds made a free Unix-like kernel (a core part of the operating system) available on the Internet and invited all hackers interested to participate. Within the next two months, the first version 1.0 of Linux was released. From that point, tens of thousands of developers, dispersed globally and communicating via the Internet, contributed code, so that early in 1993, Linux had grown to be a stable, reliable and very powerful operating system. The Linux kernel is 'copylefted' software, patented under the GNU GPL, and thus, nobody actually owns it. But more significantly, Linux is sheltered by the Open Source (hacker) community. From its very birth, Linux as a project has mobilised an incredible number of developers offering enhancements, modifications/improvements and bug fixes without any financial incentive. Despite the fact that an operating system is supposed to be developed only by a closely-knit team to avoid rising complexity and communication costs of coordination (Brook's Law), Linux is being developed in a massive decentralised mode under no central planning, an amazing feat given that it has not evolved into chaos. Innovation release early and often: Linus put into practice an innovative and paradox model of developing software. Frequent releases and updates (several times in a week) are typical throughout the entire development period of Linux. In this way, Linus kept the community constantly stimulated by the rapid growth of the project and provided an extraordinary effective mechanism of psychologically rewarding his co-developers for their contributions that were implemented in the last version. On top of this, in every released version, there is a file attached which lists all those who have contributed (code). Credit attribution if neglected, is a cardinal sin that will breed bitterness within the community and discourage developers from further contributing to the project. According to conventional software-building wisdom, early versions are by definition buggy and you do not want to wear out the patience of your users. But as far as the Linux development stage is concerned, developers are the users themselves and this is where most innovation is created (Figure 8). "The greatest innovation of Linux is that treating your users as co-developers is your least-hassle route to rapid code improvement and effective debugging" (Raymond, 1998a).
  •  
    It's a great article
sayedhok

Enhance Your Viewing with Digital Planet: Buy IPTV Now - 2 views

Digital Planet IPTV is revolutionizing the way people consume entertainment offering a comprehensive and seamless streaming experience that caters to viewers worldwide. With over 33000 live channel...

BUY IPTV tools webapps web social software collaboration media AI Artificial-Intelligence Web2.0

started by sayedhok on 06 Mar 25 no follow-up yet
Soniya Patel

Joomla Web Designing Applications - The Best you can Choose - 0 views

  •  
    Joomla has been voted as the most user friendly and suitable open source content management system of all time. This CMS has been used in numerous web development and corporate applications. This is a system that anyone can rely on and it can be easily installed and managed quite easily even by a non-technical person.
awqi zar

Does Mark Zuckerberg Need Adult Supervision Like Sergey and Larry? - SVW - 6 views

  •  
    Mark Zuckerberg, CEO of Facebook, is just 26 and has done very well but his young age does often show itself in various ways. He's put his foot in his mouth several times over privacy and has had mixed reviews on his performance in high profile interviews.
1 - 20 of 440 Next › Last »
Showing 20 items per page