SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
RESEARCHING WORK,
   ORGANIZATION AND
PUBLICPRESENTATION ABOUT
 THE TOPIC “INFORMATION
        SOCIETY”
An information society is a society where the
creation, distribution, diffusion, use, integration and
manipulation of information is a significant economic,
            political, and cultural activity.

   The aim of the information society is to gain
competitive advantage internationally, through using
            information technology (IT)

The knowledge economy is its economic counterpart,
  whereby wealth is created through the economic
 exploitation of understanding. People who have the
means to partake or participate in this form of society
  are sometimes called digital citizens. This is one of
    many dozen labels that have been identified to
  suggest that humans are entering a new phase of
                       society.
2. Expectations and realities of Information Technology. Applications of information
             technology in the scientific, technical and communications fields.



Applications of Information Technology
Every day, people use computers in new ways.
Computers and other electronic devices are
becoming increasingly affordable. They continue
to be more powerful as information-processing
tools as well as easier to use. Humans are
continually becoming dependant on IT-enabled
devices for carrying out simple tasks like
remembering a phone number to complex ones
like flying a fighter plane.

Information Technology has applications in almost
all aspects of our life. Some of the important ones
are:
                                                                Science and Engineering
                                                           Bunisses and Commerce, Education,
                                                                 Governance Medicine,
                                                                     Entertainment
A virtual community is a social network of
individuals who interact through specific social
  media, potentially crossing geographical and
 political boundaries in order to pursue mutual
    interests or goals. The purpose of virtual
communities is used for a variety of social and
               professional groups.
Types of virtual communities


                               Internet message boards
    An online message board is a forum where people
       can discuss thoughts or ideas on various topics.
                                      Online chat rooms
   Shortly after the rise of interest in message boards
          and forums, people started to want a way of
communicating with their "communities" in real time.
                                          Virtual worlds
   Virtual worlds are the most interactive of all virtual
  community forms. In this type of virtual community,
       people are connected by living as an avatar in a
                                 computer-based world.
                                 Social network services
   Social networking services are the most prominent
 type of virtual community. They are either a website
    or software platform that focuses on creating and
                              maintaining relationships.
                                           Ex.: Facebook.
                                                        .
4.SOCIAL NETWORKING ON THE INTERNET.
EVOLUTION,FEATURES AND TOOLS AVAILABLE ON THE SOCIAL WEB, TENDENCIES.
DEFINITION
A social networking is a online
platform
that focus in social relations
among the people who share
interest or activities.


 It is consists of a representation of
 each social links and variety of
 additional services.
The most social network is
    e-mail and instant
       messaging
THE MAIN TYPES
The main types are the ones that
  are connected with friends

                                   Facebook ,Twitter, Google
                                   + are worldwide and then
                                     for example Tuenti in
                                             Spain
TYPICAL FEATURES                               La parte de imagen con el identificador de relación rId2 no se encontró en el archiv o.




Social networking sites share a variety of
technical features that allows individuals to:

•Construct a public/semi-public profile.
                                                                                                                                            La parte de imagen con el identificador de relación rId3 no se encontró en el archiv o.




•Articulate list of other users that they share
 Articulate
a connection with.

•View their list of connections within the
system.
ADDITIONAL FEATURES
                                                                            La parte de imagen con el identificador de relación rId2 no se encontró en el archiv o.




Some social networks have
additional features, such as

•The ability to create groups that
share common interests or
affiliations .

•Upload or stream live videos.       La parte de imagen con el identificador de relación rId3 no se encontró en el archiv o.




•Hold discussions in forums.
TENDENCES
In most mobile communities, mobile phone users can now:

•Create their own profiles.

•Make friends.

•Participate in chat rooms.

•Create chat rooms.

•Hold private conversations.

•Share photos and videos.

•Share blogs by using their mobile phone.
Intranet is an internal private
computer network or connection
of one or more computer
networks, whose use and access is
restricted to an organization and
its employees or members.
The structure of an intranet is similar in principle to the
Internet. Both use a server-client structure and both networks
transfer data using Internet protocols. However, they
fundamentally differ due to the vast difference in networking
scale and complexity.
An intranet is built in an
organization, to enable
resource sharing and
provide a rapid
communication channel
that efficiently connects
team members and peers.
Corporate intranets have
restricted access controlled
by user ids and passwords,
which are not accessible to
anybody on the outside.
The Internet, sometimes
called simply "the Net," is a
worldwide system of
computer networks - a
network of networks in
which users at any one
computer can, if they have
permission, get information
from any other computer
(and sometimes talk directly
to users at other
computers).
Internet is a global network which has information
sharing on a global level as its goal. Internet is more
  open in the sense, that everything shared here, is
 accessible to every person connected to it, all over
                       the world.

Mais conteúdo relacionado

Mais procurados

Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionFaindra Jabbar
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsMaria Eloisa Blanza
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelFaindra Jabbar
 
Social networking workshop
Social networking workshopSocial networking workshop
Social networking workshopViljenka Savli
 
Web 2 And Social Networking Ithaca
Web 2 And Social Networking IthacaWeb 2 And Social Networking Ithaca
Web 2 And Social Networking Ithacaguest1b3477
 
Web 2 And Social Networking
Web 2 And Social NetworkingWeb 2 And Social Networking
Web 2 And Social NetworkingDavid Jakes
 
Lecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerceLecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerceMubashir Ali
 
Web 2.0 Social Media Presentation
Web 2.0 Social Media PresentationWeb 2.0 Social Media Presentation
Web 2.0 Social Media PresentationBobby Gill
 
Digital Humanities @ Miriam College
Digital Humanities @ Miriam CollegeDigital Humanities @ Miriam College
Digital Humanities @ Miriam CollegeeKindling.org
 
Vandercook Preso
Vandercook PresoVandercook Preso
Vandercook PresoDavid Jakes
 

Mais procurados (18)

Social network
Social networkSocial network
Social network
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Red Etech
Red EtechRed Etech
Red Etech
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interaction
 
Online Systems, Functions, and Platforms
Online Systems, Functions, and PlatformsOnline Systems, Functions, and Platforms
Online Systems, Functions, and Platforms
 
A roble rico
A roble ricoA roble rico
A roble rico
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction Channel
 
Social networking workshop
Social networking workshopSocial networking workshop
Social networking workshop
 
Unplug to Connect
Unplug to ConnectUnplug to Connect
Unplug to Connect
 
Chapter1a McHaney
Chapter1a McHaneyChapter1a McHaney
Chapter1a McHaney
 
Web 2 And Social Networking Ithaca
Web 2 And Social Networking IthacaWeb 2 And Social Networking Ithaca
Web 2 And Social Networking Ithaca
 
Web 2 And Social Networking
Web 2 And Social NetworkingWeb 2 And Social Networking
Web 2 And Social Networking
 
Lecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerceLecture-7: World Wide Web (WWW) & ECommerce
Lecture-7: World Wide Web (WWW) & ECommerce
 
Web 2.0 Social Media Presentation
Web 2.0 Social Media PresentationWeb 2.0 Social Media Presentation
Web 2.0 Social Media Presentation
 
Internet
InternetInternet
Internet
 
Digital Humanities @ Miriam College
Digital Humanities @ Miriam CollegeDigital Humanities @ Miriam College
Digital Humanities @ Miriam College
 
Sclnwk
SclnwkSclnwk
Sclnwk
 
Vandercook Preso
Vandercook PresoVandercook Preso
Vandercook Preso
 

Destaque

Destaque (6)

Presentation1
Presentation1Presentation1
Presentation1
 
wp-n00b.php
wp-n00b.phpwp-n00b.php
wp-n00b.php
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentacion
PresentacionPresentacion
Presentacion
 
Presentation1
Presentation1Presentation1
Presentation1
 
Belgacom
Belgacom Belgacom
Belgacom
 

Semelhante a Presentacion

Trabajo final informatica
Trabajo final informaticaTrabajo final informatica
Trabajo final informaticacalderonmaria15
 
The Current State of ICT Technologies.pptx
The Current State of ICT Technologies.pptxThe Current State of ICT Technologies.pptx
The Current State of ICT Technologies.pptxJasonFernandez48
 
Social media toolkit
Social media toolkitSocial media toolkit
Social media toolkitKella Price
 
empowerment technology
empowerment technologyempowerment technology
empowerment technologyrheagido
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Empowerment technology( Information and communication technology)
Empowerment technology( Information and communication technology)Empowerment technology( Information and communication technology)
Empowerment technology( Information and communication technology)AlessandraCantilaBat
 
Empowerment Technologies 1.pptx
Empowerment Technologies 1.pptxEmpowerment Technologies 1.pptx
Empowerment Technologies 1.pptxJerryHalibas
 
2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptx2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptxLeopoldoJrLaset
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic mediaMuhammad Ahmad
 
Social Media Speaks Out - July 2014
Social Media Speaks Out - July 2014Social Media Speaks Out - July 2014
Social Media Speaks Out - July 2014Stephen Andriole
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxJoyceNolos
 
Trabajo final informatica
Trabajo final informaticaTrabajo final informatica
Trabajo final informaticacalderonmaria15
 
Social Media Glossary
Social Media GlossarySocial Media Glossary
Social Media GlossaryJames Kane
 
Social media and social work
Social media and social workSocial media and social work
Social media and social workSuran Maharjan
 

Semelhante a Presentacion (20)

Presentacion
PresentacionPresentacion
Presentacion
 
SOCIAL NETWORKS AND ONLINE COMMUNITIES
SOCIAL NETWORKS AND ONLINE COMMUNITIES SOCIAL NETWORKS AND ONLINE COMMUNITIES
SOCIAL NETWORKS AND ONLINE COMMUNITIES
 
Trabajo final informatica
Trabajo final informaticaTrabajo final informatica
Trabajo final informatica
 
Social Networks
Social NetworksSocial Networks
Social Networks
 
The Current State of ICT Technologies.pptx
The Current State of ICT Technologies.pptxThe Current State of ICT Technologies.pptx
The Current State of ICT Technologies.pptx
 
Social media toolkit
Social media toolkitSocial media toolkit
Social media toolkit
 
empowerment technology
empowerment technologyempowerment technology
empowerment technology
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Empowerment technology( Information and communication technology)
Empowerment technology( Information and communication technology)Empowerment technology( Information and communication technology)
Empowerment technology( Information and communication technology)
 
Social media technologies and tools
Social media technologies and toolsSocial media technologies and tools
Social media technologies and tools
 
Empowerment Technologies 1.pptx
Empowerment Technologies 1.pptxEmpowerment Technologies 1.pptx
Empowerment Technologies 1.pptx
 
Privacy on SNS II
Privacy on SNS IIPrivacy on SNS II
Privacy on SNS II
 
Privacy on SNS
Privacy on SNSPrivacy on SNS
Privacy on SNS
 
2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptx2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptx
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic media
 
Social Media Speaks Out - July 2014
Social Media Speaks Out - July 2014Social Media Speaks Out - July 2014
Social Media Speaks Out - July 2014
 
ICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptxICT-EMPOWERMENT.pptx
ICT-EMPOWERMENT.pptx
 
Trabajo final informatica
Trabajo final informaticaTrabajo final informatica
Trabajo final informatica
 
Social Media Glossary
Social Media GlossarySocial Media Glossary
Social Media Glossary
 
Social media and social work
Social media and social workSocial media and social work
Social media and social work
 

Último

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 

Último (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 

Presentacion

  • 1. RESEARCHING WORK, ORGANIZATION AND PUBLICPRESENTATION ABOUT THE TOPIC “INFORMATION SOCIETY”
  • 2. An information society is a society where the creation, distribution, diffusion, use, integration and manipulation of information is a significant economic, political, and cultural activity. The aim of the information society is to gain competitive advantage internationally, through using information technology (IT) The knowledge economy is its economic counterpart, whereby wealth is created through the economic exploitation of understanding. People who have the means to partake or participate in this form of society are sometimes called digital citizens. This is one of many dozen labels that have been identified to suggest that humans are entering a new phase of society.
  • 3. 2. Expectations and realities of Information Technology. Applications of information technology in the scientific, technical and communications fields. Applications of Information Technology Every day, people use computers in new ways. Computers and other electronic devices are becoming increasingly affordable. They continue to be more powerful as information-processing tools as well as easier to use. Humans are continually becoming dependant on IT-enabled devices for carrying out simple tasks like remembering a phone number to complex ones like flying a fighter plane. Information Technology has applications in almost all aspects of our life. Some of the important ones are: Science and Engineering Bunisses and Commerce, Education, Governance Medicine, Entertainment
  • 4. A virtual community is a social network of individuals who interact through specific social media, potentially crossing geographical and political boundaries in order to pursue mutual interests or goals. The purpose of virtual communities is used for a variety of social and professional groups.
  • 5. Types of virtual communities Internet message boards An online message board is a forum where people can discuss thoughts or ideas on various topics. Online chat rooms Shortly after the rise of interest in message boards and forums, people started to want a way of communicating with their "communities" in real time. Virtual worlds Virtual worlds are the most interactive of all virtual community forms. In this type of virtual community, people are connected by living as an avatar in a computer-based world. Social network services Social networking services are the most prominent type of virtual community. They are either a website or software platform that focuses on creating and maintaining relationships. Ex.: Facebook. .
  • 6. 4.SOCIAL NETWORKING ON THE INTERNET. EVOLUTION,FEATURES AND TOOLS AVAILABLE ON THE SOCIAL WEB, TENDENCIES.
  • 7. DEFINITION A social networking is a online platform that focus in social relations among the people who share interest or activities. It is consists of a representation of each social links and variety of additional services.
  • 8. The most social network is e-mail and instant messaging
  • 9. THE MAIN TYPES The main types are the ones that are connected with friends Facebook ,Twitter, Google + are worldwide and then for example Tuenti in Spain
  • 10. TYPICAL FEATURES La parte de imagen con el identificador de relación rId2 no se encontró en el archiv o. Social networking sites share a variety of technical features that allows individuals to: •Construct a public/semi-public profile. La parte de imagen con el identificador de relación rId3 no se encontró en el archiv o. •Articulate list of other users that they share Articulate a connection with. •View their list of connections within the system.
  • 11. ADDITIONAL FEATURES La parte de imagen con el identificador de relación rId2 no se encontró en el archiv o. Some social networks have additional features, such as •The ability to create groups that share common interests or affiliations . •Upload or stream live videos. La parte de imagen con el identificador de relación rId3 no se encontró en el archiv o. •Hold discussions in forums.
  • 12. TENDENCES In most mobile communities, mobile phone users can now: •Create their own profiles. •Make friends. •Participate in chat rooms. •Create chat rooms. •Hold private conversations. •Share photos and videos. •Share blogs by using their mobile phone.
  • 13.
  • 14. Intranet is an internal private computer network or connection of one or more computer networks, whose use and access is restricted to an organization and its employees or members.
  • 15. The structure of an intranet is similar in principle to the Internet. Both use a server-client structure and both networks transfer data using Internet protocols. However, they fundamentally differ due to the vast difference in networking scale and complexity.
  • 16. An intranet is built in an organization, to enable resource sharing and provide a rapid communication channel that efficiently connects team members and peers. Corporate intranets have restricted access controlled by user ids and passwords, which are not accessible to anybody on the outside.
  • 17. The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
  • 18. Internet is a global network which has information sharing on a global level as its goal. Internet is more open in the sense, that everything shared here, is accessible to every person connected to it, all over the world.