CONNECTING with COMMUNITIES How Local Government Is Using Social Media to Engage with Citizens ANNE E HOWARD
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Case Profile: Ellen Hampton Filgo
Chapter 4 Case Profile: Ellen Hampton Filgo Buffy J. Hamilton Abstract learning environment in which they would “acquire crucial technical skills for their digital lives but also Ellen Hampton Filgo, an academic librarian at Baylor Uni- would engage in work that provides richly teach- versity, conceptualizes her work as an embedded librarian able moments ranging from multimodal writing to as improvisational, like jazz, as her instructional help and information science, knowledge management, biblio- interaction with students plays off the class discussion in graphic instruction, and social networking. Fascinat- which she participates through Twitter and blogs. This case ing and important innovations would emerge as stu- study outlines how Filgo became a vital resource for class dents are able to shape their own cognition, learning, discussions and research on a weekly basis in a first-year expression, and reflection in a digital age, in a digital university honors course exploring new media studies. medium. Students would frame, curate, share, and direct their own ‘engagement streams’ throughout the llen Hampton Filgo is the e-learning librarian in learning environment.”2 the reference and instruction department of Bay- The class blog (see figure 6) was the virtual cen- Elor University Libraries. Her work as an embedded terpiece for students in the new media studies course. librarian at Baylor reflects her interests in the instruc- Because the course blog included RSS feeds for the tional uses of social networking media and ways librar- course hashtag Tweets, student blogs, the course book- ies can use and adapt Web 2.0 tools to improve access marks via Delicious, and Filgo’s course librarian blog, to online resources. -
Uila Supported Apps
Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage. -
Walker Sands Public Relations Team Wins Four Awards Does The
June 2 0 1 1 ... N E W S ... Walker Sands Public Relations Team Wins Four Awards I am happy to begin this month's newsletter with exciting news. Walker Sands is the recipient of four awards for our outstanding public relations work. The Acquity Group Mobile Audit Campaign and the Alterian Social Media Hot Topic Campaign collectively received several awards: Award of Excellence from the Chicago Chapter of the Public Relations Society of America (PRSA), Gold and Bronze Tower Award from the Business Marketing Association (BMA) of Chicago, and the Silver Trumpet Award from the Publicity Club of Chicago (PCC). These awards recognize the best and brightest in public relations, and we are honored to be included in this group. Lauren Eichmann and Jackie Lampugnano headed the teams for these campaigns, and I applaud both their creativity and detailed execution required to win these awards. As always, a great deal of thanks goes to Acquity Group and Alterian who not only trusted us with their accounts, but allowed us to push them in new and innovative ways to achieve these goals. We are happy to share this recognition with their marketing teams, who were just as instrumental in the execution of these campaigns. While the statues and award logos are nice, what really matters is the results we achieve for our clients. All of these awards place a heavy emphasis on proving measurable results and showing an actual business impact. That's what we are focused on. It feels good to have the praise given by clients echoed by the larger PR community. -
The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use -
Cloud Computing
International Journal on Applications in Electrical and Electronics Engineering Volume 1: Issue 8: August 2015, pp 1-5. www.aetsjournal.com ISSN (Online) : 2395-3527 ----------------------------------------------------------------------------------------------------------------------------- ------------------------------ Cloud Computing R.Ramya, K.Ramya These cloud applications use large data centers and Abstract— Cloud computing is location independent computing, powerful services that host Web applications and Web whereby shared servers provide resources, software, and data to services. computers and other devices on demand, as with the electricity grid. Anyone with a suitable Internet connection and a Or more simply, remote computing. Cloud computing is a natural standard browser can access a cloud application. evolution of the widespread adoption of virtualization, service- oriented architecture and utility computing. Details are abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them.. A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic -- a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider (the consumer needs nothing but a personal computer and Internet access). Significant innovations in virtualization and distributed computing, as well as improved access User of the cloud only care about the service or information to high-speed Internet and a weak economy, have accelerated interest they are accessing – be it from their PCs, mobile devices, or in cloud computing. anything else connected to the Internet – not about the In this paper we are also going to discuss the advantages, underlying details of how the cloud works. -
A Review on Cloud Computing: Design Challenges in Architecture and Security
Journal of Computing and Information Technology - CIT 19, 2011, 1, 25–55 25 doi:10.2498/cit.1001864 A Review on Cloud Computing: Design Challenges in Architecture and Security Fei Hu1, Meikang Qiu2,JiayinLi2, Travis Grant1, Draw Tylor1, Seth McCaleb1, Lee Butler1 and Richard Hamner 1 1 Department of Electrical and Computer Engineering, University of Alabama, Tuscaloosa, AL, USA 2 Department of Electrical and Computer Engineering, University of Kentucky, Lexington, KY, USA Cloud computing is becoming a powerful network archi- Rather than hard-wire data circuits between the tecture to perform large-scale and complex computing. provider and customers, telephone companies In this paper, we will comprehensively survey the concepts and architecture of cloud computing, as well began using VPN-based services to transmit as its security and privacy issues. We will compare data. This allowed providers to offer the same different cloud models, trust/reputation models and amount of bandwidth at a lower cost by rerout- privacy-preservation schemes. Their pros and cons ing network traffic in real-time to accommo- are discussed for each cloud computing security and architecture strategy. date ever-changing network utilization. Thus, it was not possible to accurately predict which Keywords: cloud computing, security, privacy, computer path data would take between the provider and networks, models customer. As a result, the service provider’s network responsibilities were represented by a cloud symbol to symbolize the black box of sorts from the end-users’ perspective. It is in 1. Introduction this sense that the term “cloud” in the phrase cloud computing metaphorically refers to the Cloud computing is quickly becoming one of Internet and its underlying infrastructure. -
Data Protection and Collaboration in Cloud Storage
Technical Report 1210 Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B.H. Kaiser J.E. Coll W.W. Smith R.K. Cunningham 7 July 2016 Lincoln Laboratory MASSACHUSETTS INSTITUTE OF TECHNOLOGY LEXINGTON, MASSACHUSETTS This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Approved for public release: distribution unlimited. This report is the result of studies performed at Lincoln Laboratory, a federally funded research and development center operated by Massachusetts Institute of Technology. This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05- C-0002 and/or FA8702-15-D-0001. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of Department of Homeland Security. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. Massachusetts Institute of Technology Lincoln Laboratory Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B. Kaiser J. Coll W. Smith R. -
Media Cloud Application for Android
PERSONAL MEDIA CLOUD APPLICATION FOR ANDROID Prajakta Sarurkar B.E., Nagpur University, 2000 PROJECT Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in COMPUTER SCIENCE at CALIFORNIA STATE UNIVERSITY, SACRAMENTO SPRING 2012 © 2012 Prajakta Sarurkar ALL RIGHTS RESERVED ii PERSONAL MEDIA CLOUD APPLICATION FOR ANDROID A Project by Prajakta Sarurkar Approved by: __________________________________, Committee Chair Du Zhang, Ph.D. __________________________________, Second Reader Mary Jane Lee, Ph.D. ____________________________ Date iii Student: Prajakta Sarurkar I certify that this student has met the requirements for format contained in the University format manual, and that this project is suitable for shelving in the Library and credit is to be awarded for the project. __________________________, Graduate Coordinator ___________________ Nikrouz Faroughi, Ph.D. Date Department of Computer Science iv Abstract of PERSONAL MEDIA CLOUD APPLICATION FOR ANDROID by Prajakta Sarurkar Recent advances in communication technologies have enabled an exponential growth in connected devices like Android smart phones and tablets. These devices are mainly used for content consumption. However, limited resources available on these devices, as well as always connected internet accessibility makes these devices ideal platforms for cloud computing. This project is an attempt at creating personal media cloud player app for Android smart phone devices. The project uses off the shelf hardware components for private cloud -
Online Research Tools
Online Research Tools A White Paper Alphabetical URL DataSet Link Compilation By Marcus P. Zillman, M.S., A.M.H.A. Executive Director – Virtual Private Library [email protected] Online Research Tools is a white paper link compilation of various online tools that will aid your research and searching of the Internet. These tools come in all types and descriptions and many are web applications without the need to download software to your computer. This white paper link compilation is constantly updated and is available online in the Research Tools section of the Virtual Private Library’s Subject Tracer™ Information Blog: http://www.ResearchResources.info/ If you know of other online research tools both free and fee based feel free to contact me so I may place them in this ongoing work as the goal is to make research and searching more efficient and productive both for the professional as well as the lay person. Figure 1: Research Resources – Online Research Tools 1 Online Research Tools – A White Paper Alpabetical URL DataSet Link Compilation [Updated: August 26, 2013] http://www.OnlineResearchTools.info/ [email protected] eVoice: 800-858-1462 © 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 Marcus P. Zillman, M.S., A.M.H.A. Online Research Tools: 12VPN - Unblock Websites and Improve Privacy http://12vpn.com/ 123Do – Simple Task Queues To Help Your Work Flow http://iqdo.com/ 15Five - Know the Pulse of Your Company http://www.15five.com/ 1000 Genomes - A Deep Catalog of Human Genetic Variation http://www.1000genomes.org/ -
WO 2015/089171 Al 18 June 2015 (18.06.2015) W P O P C T
(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (10) International Publication Number (43) International Publication Date WO 2015/089171 Al 18 June 2015 (18.06.2015) W P O P C T (51) International Patent Classification: ACHARYA, Visal Chandrakant; 39 Parlin Street #407, G06F 21/10 (2013.01) G06F 15/16 (2006.01) Everett, Massachusetts 02149 (US). DSILVA, Benedict Robert; 155 5th Street, Apt. 1, Cambridge, Massachusetts (21) International Application Number: 02141 (US). TEARNEN, Paul; 3221 Point Place SW, PCT/US20 14/0695 19 Seattle, Washington 981 16 (US). WENZEL, Peter; 2245 (22) International Filing Date: E. Colorado Blvd. #104-168, Pasadena, California 9 1107 10 December 2014 (10. 12.2014) (US). HELD, John; 2713 McDuffee Circle, North Aurora, Illinois 60542 (US). WEIBLEN, Charlie; 169 Franklin (25) Filing Language: English Street, Wrentham, Massachusetts 02093 (US). KANNAN, (26) Publication Language: English Ganesh; 2 Bent Avenue, Wayland, Massachusetts 01778 (US). PARIMI, Madhavi; 74 Presidential Drive, Apt 5, (30) Priority Data: Quincy, Massachusetts 02169 (US). AZUMA, Selom 61/914,682 11 December 201 3 ( 11. 12.2013) US Harry; 25 Church Street, Suite 1, Boston, Massachusetts 61/944,756 26 February 2014 (26.02.2014) US 021 16 (US). MAHAJAN, Himali; 30 Revere Beach Pkwy, (71) Applicant: INTRALINKS, INC. [US/US]; 150 East 42nd Apt# 312, Medford, Massachusetts 02155 (US). LIRIO, Street, New York, New York 10017 (US). Dario R.; 11 Goddard Street, Newton, Massachusetts 02461 (US). WALUK, Michael Joseph; 18 Mariah's Path, (72) Inventors: MCCARTHY, Kevin L.; 251 Gray Street, Ar Pembroke, Massachusetts 02359 (US). -
Amy Laban (212) 842-7126 [email protected]
60 Broad Street, 38th Floor New York, NY 10004 (212) 842-6020 Fax (212) 842-6039 www.petskyprunier.com [email protected] FOR IMMEDIATE RELEASE Contact: Amy LaBan (212) 842-7126 [email protected] 2012 Review of M&A and Investment Activity in the Marketing, Media & Technology Industries: 2,425 Transactions Totaling a Reported $58.5 Billion, including Eight +$1 Billion Transactions During the Year Digital Media/Commerce was the Most Active and Highest Value Segment Overall in 2012 with 1,030 Transactions and a Reported $24.7 Billion in Aggregate Deal Value Marketing Technology was the Second-Most Active Segment with 756 Deals Announced, of which 500 Reported Value Totaling $11.3 Billion December 28, 2012 (New York, NY) – During 2012, Petsky Prunier tracked 2,425 M&A and investment transactions for a total of $58.5 billion across six broad segments: Digital Media/Commerce, Digital Advertising, Marketing Technology, Agency/Consulting, Marketing Services and Out-of-Home & Specialty Media. Digital Media/Commerce was the most active segment with 1,030 transactions, of which 708 reported value totaling $24.7 billion. Of eight +$1 billion transactions during the year, three acquisitions worth $6.5 billion were reported in the Digital Media/Commerce segment. MARKETING, MEDIA, TECHNOLOGY AND SERVICE INDUSTRIES MARKETING, MEDIA, TECHNOLOGY AND SERVICE INDUSTRIES MARKETING,MARKETING, MEDIA, MEDIA TECHNOLOGY & TECHNOLOGY AND SERVICE INDUSTRIES INDUSTRIES MARKETING, MEDIA & TECHNOLOGY INDUSTRIES M&A1H12 AND M&A INVESTMENT AND INVESTMENT -
Quick Hardware Tips Ground Running
Apps & Software for Law Practice Efficiency & Security Presented by Matt Edmonds of Edmonds Legal Solutions on behalf of the Lawyers’ Insurance Association of Nova Scotia 20 May 2015 via webinar and in person at the NSBS & LIANS offices in Halifax, NS Below, I have included links to online resources related to the content of Apps & Software each slide, along with some of my own comments. If you have any questions, for Law Practice Efficiency & Security please don’t hesitate to contact me at [email protected]. Matt Edmonds These materials are available for download at edmondslegal.ca/cpd. Lawyer & Legal IT Consultant For best results, view this document digitally or print in colour. Presented on behalf of: 20 May 2015 [email protected] Edmonds Legal Solutions helps legal professionals discover and implement the right software to make their practices efficient and secure. If you'd like to use any of the tools mentioned in this presentation, and need some help deploying them, I can set things up for everyone at your firm and provide training so you can hit the Quick hardware tips ground running. Email: [email protected] Phone: 902-441-8432 Web: edmondslegal.com Twitter: @MatthewEdmonds LinkedIn: ca.linkedin.com/in/edmondsmatt [email protected] Materials available at edmondslegal.com/cpd 2015-05-20 Apps & Software for Law Practice Efficiency & Security 2 As a lawyer, your computer is probably your most important tool. Inexpensive business desktops may meet the needs of some staff, but The next computer you buy should be lawyers should think about investing in the best a MacBook, MacBook Air, or MacBook Pro machine for their own workflow.