SlideShare a Scribd company logo
1 of 33
We are Family How the iPad can Bridge the (Information) Generation Gap Presented by  Melissa Kiser, Information Technology Librarian Allen County Public Library ACPL Library Camp September 23, 2010
Four generations
Four generations [Photo of my son] [Photo of my mom]
I am the link,  especially between these two. [Photo of my son] [Photo of my mom]
My mom lives in Lexington, Kentucky, which is 4-5 hours away
I post things on Facebook every day. We just had a family reunion in August and a lot of pictures were taken.
I want to share these things with my mom, BUT… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We do things differently
 
The present is a present
I repeat:  I want to share these things with my mom. More than anything, sometimes! [photo of my son]
iPad to the Rescue!
iPad is like a TV
iPad is more than a TV
iPad is more than a TV
iPad is more than a TV
iPad is more than a TV
iPad is more than a TV
iPad is more than a TV
What does an iPad require?
But I don’t have Wi-Fi at home.
Wi-Fi hotspots are everywhere
Or subscribe to a data plan
What does an iPad require? Your finger You
 
 
 
 
 
 
 
 
We are Family How the iPad can Bridge the (Information) Generation Gap Presented by  Melissa Kiser, Information Technology Librarian Allen County Public Library ACPL Library Camp September 23, 2010

More Related Content

Viewers also liked

Ibm Think Pad T43
Ibm Think Pad T43Ibm Think Pad T43
Ibm Think Pad T43
guest1ce836
 
Disney Channel Ppt
Disney Channel PptDisney Channel Ppt
Disney Channel Ppt
mariannewal
 

Viewers also liked (15)

Library Camp: How to Run an Unconference at Your Library
Library Camp: How to Run an Unconference at Your LibraryLibrary Camp: How to Run an Unconference at Your Library
Library Camp: How to Run an Unconference at Your Library
 
Libraries As Microcelebrities Pecha Kucha
Libraries As Microcelebrities Pecha KuchaLibraries As Microcelebrities Pecha Kucha
Libraries As Microcelebrities Pecha Kucha
 
Ibm Think Pad T43
Ibm Think Pad T43Ibm Think Pad T43
Ibm Think Pad T43
 
Traverse the ILS Borderlands
Traverse the ILS BorderlandsTraverse the ILS Borderlands
Traverse the ILS Borderlands
 
BookMyne: Sirsi/Dynix iPhone app
BookMyne: Sirsi/Dynix iPhone appBookMyne: Sirsi/Dynix iPhone app
BookMyne: Sirsi/Dynix iPhone app
 
Why I Love Twitter
Why I Love TwitterWhy I Love Twitter
Why I Love Twitter
 
Using Screenr To Create Instructional Videos For Library
Using Screenr To Create Instructional Videos For LibraryUsing Screenr To Create Instructional Videos For Library
Using Screenr To Create Instructional Videos For Library
 
Workplace Writing Chapter 1
Workplace Writing Chapter 1Workplace Writing Chapter 1
Workplace Writing Chapter 1
 
What Makes it news?
What Makes it news?What Makes it news?
What Makes it news?
 
Using Videos to Build Community in Your Library
Using Videos to Build Community in Your LibraryUsing Videos to Build Community in Your Library
Using Videos to Build Community in Your Library
 
Readers advisory
Readers advisoryReaders advisory
Readers advisory
 
Value Chain Road Map General Approach
Value Chain Road Map General ApproachValue Chain Road Map General Approach
Value Chain Road Map General Approach
 
How to write the summary
How to write the summaryHow to write the summary
How to write the summary
 
Spark & Yarn better together 1.2
Spark & Yarn better together 1.2Spark & Yarn better together 1.2
Spark & Yarn better together 1.2
 
Disney Channel Ppt
Disney Channel PptDisney Channel Ppt
Disney Channel Ppt
 

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

We are Family: How the iPad can Bridge the (Information) Generation Gap