This document provides tips for developing an online community from Donny B.U., an ICT researcher and social entrepreneur. The tips include: [1] Give people something to believe in; [2] Supply content for specific interests; [3] Deliver clear messages through multiple channels; [4] Engage people face-to-face; [5] Respect local customs; [6] Think globally but start small; [7] Start taking action now; [8] Share and grow together; [9] Discuss ideas rather than people; [10] Leadership requires being, knowing and doing. The document promotes community building through empowering individuals and sharing ideas.
The document discusses the concept of Library 2.0 and how libraries are embracing new technologies and encouraging user participation. Some key aspects of Library 2.0 include delivering services to users online through various devices, making resources structured and accessible through APIs, and allowing users to actively participate through user-generated content and collaboration. Examples mentioned include Wikipedia, Flickr, YouTube, and how they demonstrate themes of participation, remixing of data, and community.
Web 2.0 is a term used to define today's interactive Internet, where users are active contributors and creators through social media, blogs, wikis and other participatory online platforms. This evolution from a primarily passive, retrieval-based use of the early Internet allows information to be accessed in a more personalized way, making the vast resources of the World Wide Web feel intimate and accessible at users' fingertips.
Web 2.0 allows users to combine and share content in new ways, emphasizes user participation and user-generated content, and enables two-way interaction and communication between users on the web. It represents a shift to more social and collaborative applications of the web where people can both consume and produce information. Experts define Web 2.0 by features like social networking sites, user reviews, media sharing, blogging, and the ability for rich collaboration between users.
Web 2.0 allows users to combine and share content in new ways, emphasizes user participation and user-generated content, and enables two-way interaction and communication on the social web. It represents a shift to more interactive and collaborative online experiences where users can both consume and contribute information. Definitions of Web 2.0 focus on how it facilitates social connections, interactions, and sharing between users.
Creative commons and Open Design Tongji University ShanghaiIsjah Koppejan
The document summarizes Creative Commons Netherlands, which is a cooperation between three organizations: Creative Commons, Waag Society, and Isjah Koppejan. It discusses sharing creative works through co-creation sessions and developing projects like an alternative glucose meter and low-cost prosthetics. It also covers topics like copyright in the digital era, Creative Commons licenses that allow sharing while reserving some rights, and choosing an appropriate license through their website.
This document discusses Web 2.0 and the characteristics of the social web. It was presented in April 2008 by Eddie Byrne, a senior librarian, and Anthony Mc Guinness, a technical consultant. Web 2.0 refers to online services that allow people to collaborate and share information, with key characteristics including users actively creating content on read/write websites through activities like social networking and information gathering.
CC and TAACCCT for MCCA Conference 2013 (St. Louis)Billy Meinke
Billy Meinke presented on Creative Commons and the U.S. DOL TAACCCT Program. Creative Commons develops legal and technical tools to enable sharing of creativity and knowledge through open licenses. The TAACCCT program requires that all materials produced with its $2 billion in grants be openly licensed with Creative Commons Attribution (CC BY) licenses to ensure they can be freely reused and improved by others. This will allow sharing, updates, and customization of the materials to impact broader populations beyond the original groups served. Participants in the TAACCCT program are joining the growing open education movement of organizations producing openly licensed educational resources.
This document provides tips for developing an online community from Donny B.U., an ICT researcher and social entrepreneur. The tips include: [1] Give people something to believe in; [2] Supply content for specific interests; [3] Deliver clear messages through multiple channels; [4] Engage people face-to-face; [5] Respect local customs; [6] Think globally but start small; [7] Start taking action now; [8] Share and grow together; [9] Discuss ideas rather than people; [10] Leadership requires being, knowing and doing. The document promotes community building through empowering individuals and sharing ideas.
The document discusses the concept of Library 2.0 and how libraries are embracing new technologies and encouraging user participation. Some key aspects of Library 2.0 include delivering services to users online through various devices, making resources structured and accessible through APIs, and allowing users to actively participate through user-generated content and collaboration. Examples mentioned include Wikipedia, Flickr, YouTube, and how they demonstrate themes of participation, remixing of data, and community.
Web 2.0 is a term used to define today's interactive Internet, where users are active contributors and creators through social media, blogs, wikis and other participatory online platforms. This evolution from a primarily passive, retrieval-based use of the early Internet allows information to be accessed in a more personalized way, making the vast resources of the World Wide Web feel intimate and accessible at users' fingertips.
Web 2.0 allows users to combine and share content in new ways, emphasizes user participation and user-generated content, and enables two-way interaction and communication between users on the web. It represents a shift to more social and collaborative applications of the web where people can both consume and produce information. Experts define Web 2.0 by features like social networking sites, user reviews, media sharing, blogging, and the ability for rich collaboration between users.
Web 2.0 allows users to combine and share content in new ways, emphasizes user participation and user-generated content, and enables two-way interaction and communication on the social web. It represents a shift to more interactive and collaborative online experiences where users can both consume and contribute information. Definitions of Web 2.0 focus on how it facilitates social connections, interactions, and sharing between users.
Creative commons and Open Design Tongji University ShanghaiIsjah Koppejan
The document summarizes Creative Commons Netherlands, which is a cooperation between three organizations: Creative Commons, Waag Society, and Isjah Koppejan. It discusses sharing creative works through co-creation sessions and developing projects like an alternative glucose meter and low-cost prosthetics. It also covers topics like copyright in the digital era, Creative Commons licenses that allow sharing while reserving some rights, and choosing an appropriate license through their website.
This document discusses Web 2.0 and the characteristics of the social web. It was presented in April 2008 by Eddie Byrne, a senior librarian, and Anthony Mc Guinness, a technical consultant. Web 2.0 refers to online services that allow people to collaborate and share information, with key characteristics including users actively creating content on read/write websites through activities like social networking and information gathering.
CC and TAACCCT for MCCA Conference 2013 (St. Louis)Billy Meinke
Billy Meinke presented on Creative Commons and the U.S. DOL TAACCCT Program. Creative Commons develops legal and technical tools to enable sharing of creativity and knowledge through open licenses. The TAACCCT program requires that all materials produced with its $2 billion in grants be openly licensed with Creative Commons Attribution (CC BY) licenses to ensure they can be freely reused and improved by others. This will allow sharing, updates, and customization of the materials to impact broader populations beyond the original groups served. Participants in the TAACCCT program are joining the growing open education movement of organizations producing openly licensed educational resources.
The document discusses differing views on the impact of Web 2.0. David Gauntlett argues that Web 2.0 has created a more democratic media by empowering prosumers and challenging the dominance of media institutions. Andrew Keen counters that Web 2.0 has created cultural chaos by fostering a "cult of the amateur" that devalues professionals and expertise, with internet oligarchs replacing old media oligarchs. They disagree on whether the removal of gatekeepers will open media to greater democracy or devalue talent.
Northwest eLearning Community Conference Keynote (10-07)Cable Green
The document discusses trends in higher education in light of participatory culture and Web 2.0 technologies. It argues that higher education needs to embrace openness, participation, and networks to better prepare students for a world where knowledge is distributed and co-created. Key lessons include embracing perpetual beta models, leveraging student contributions, and providing open platforms for content development and sharing.
Northwest Elearning Community Conference Keynote webstu
The document discusses the opportunities and challenges of participatory culture and Web 2.0 technologies for higher education. It notes that students are now producers, not just consumers, of content. Institutions need to provide open systems and architectures that leverage collective student contributions and harness the network effect. Content development must now be Web 2.0, with students able to manipulate and mash up data as they see fit using open APIs and widgets.
Using the recent Digiteen global collaborative project as a catalyst (http://digiteen.wikispaces.com) this session explores what it means to be a digital citizen and how your school community can become actively engaged in promoting best practice use of online learning. Forget the fear factor, embrace safe practices and informed pedagogical approaches to teaching and learning online with educational networking and collaborative websites.
This document discusses the definition and evolution of Web 2.0 and social networking sites. It defines Web 2.0 as internet-based services that allow users to collaborate and share information online through tools like blogs, wikis, and social networks. These technologies enabled a shift from passive consumption of information to active participation and user-generated content. The document also examines blogs, what they are and how to set them up, as well as social networking sites and their impact, advantages, and disadvantages.
This document summarizes a presentation given at the Balkans Inter-Community Meetup 2010 about Drumbeat, a movement to keep the web open for the next 100 years. It discusses how the open web benefits from being remixable, decentralized, transparent, and participatory. It explains that the internet is increasingly a global public resource that must remain open to all. Drumbeat hosts projects and events to involve everyday users in building the open web and protecting it from those who would make it less free. People are encouraged to get involved by joining projects, attending local events, or spreading awareness of the open web cause.
Web 2.0 describes websites that use more advanced technology than earlier static websites, allowing users to create and share their own content. This movement towards user-generated content has both advantages and disadvantages. The "power of the crowd" concept suggests that large groups of people can collectively decide what is best through crowd-sourcing and folksonomy techniques. Web 2.0 encourages community, collaboration and sharing through features like social media platforms. As more people use Web 2.0 tools, their value and ability to connect people increases - boosting the online economy and access to information. Content is generally open for people to share freely on the web.
There are nine core elements of digital citizenship: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital rights and responsibilities, digital health and well-being, digital security, and collaboration, creative, information, solution, and media fluencies. Digital citizenship also involves teaching and learning about appropriate technology use, ethics, and participation in an online society.
The document summarizes Community Media Workshop, a nonprofit organization founded in 1989 that provides training and resources to over 2,000 nonprofit communicators per year with a $700,000 budget. It lists the board members and awards received, describes their mission to diversify voices in the news and projects like e-notes, NPCommunicator, and Community Media Summit. It also shows registration sources for workshops and quotes Seth Godin about using new tools to support organizational change rather than just existing structures.
New Signals provides telecommunications engineering services including wireless, digital networks, fiber optics, and SCADA. They have over 100 years of combined experience across telecommunications, mobile radio, microwave transmission, and fiber optic and digital networks. New Signals designs and implements end-to-end telecommunication solutions for clients in industry, business, and government.
Two-hour workshop for Chicago Cabaret Professionals group of singers seeking to improve their communications strategy and planning, pitching, press release writing, and giving good email.
Kind of your standard, what do all those tools do kind of workshop geared for nonprofit fundraisers, this opens with an overview of tweetups, platforms, competitions, and causes.
The document provides instructions for an assignment related to an augmented reality learning event taking place in Livadia, Greece. Participants are asked to walk around and experience augmented reality. The location and name of the event are given to provide context for the assignment.
The document provides an overview and outline of the biblical book of 2 Thessalonians. It discusses that Paul wrote the letter to encourage the church in Thessalonica and correct false teachings about the second coming of Christ. Key points include that Jesus will not return until a great falling away and the man of lawlessness is revealed. Paul encourages the believers to continue working, waiting, praying and watching until Christ's return.
Donny BU is an expert in digital media and online freedom of expression. He currently serves as the Executive Director of ICT Watch, a lecturer in digital media and e-business, and a researcher at Citizen Lab at the University of Toronto. He has a background in journalism, editing, and as the former Vice President of Detikcom. He holds degrees from the University of Indonesia in Communication Management and Gunadarma University in Computer Science. The document discusses various aspects of online identity, anonymity, censorship and freedom of expression on the internet.
The document discusses social selling as a must-have skill for salespeople. It notes that 60% of senior executives use social media to influence buying decisions and 57% of the buying process is now completed before engaging a sales rep. It then outlines how buyers now behave online by self-educating, having more people involved in the buying process, and going through different stages when committing to a purchase. The document advocates for social selling skills like building personal profiles, joining discussions, sharing content, engaging prospects, and connecting to influencers in order to reach decision makers earlier, build relationships, and influence the buying process. It provides examples of what great social selling looks like and emphasizes the need for sales leaders to help salespeople learn social
This document profiles Donny B.U., an ICT researcher, social entrepreneur, and cyber journalist lecturer in Indonesia. It provides information on his current and past roles researching ICT and activism, as well as his educational background. It also includes brief quotes and sayings on topics like information warfare, responsibility and authority, consistency in messaging, the importance of human affection, coherence and credibility, and social media and social movements.
The documents summarize bell ringer assignments from an Earth and Environmental Science class. The assignments covered topics like the chemical formula of water, phases of matter, cloud formation, and mountain weather patterns. Students were asked to define terms, describe diagrams, write paragraphs summarizing concepts, and identify types of cloud images. The documents provide examples of daily warm-up questions, responses, and brief lectures on various environmental science topics.
Indonesian “Internet Censorship” Brief Report for OpenNet Initiative (ONI) Global Summit - 2010, Ottawa - Canada. Prepared and presented by Donny B.U. / ICT Watch, 29th June 2010. Updated ver.3 / 29th July 2010.
The document discusses test planning for automated testing using QuickTest. It provides guidance on extracting necessary information from test cases, distinguishing different types of test data, and identifying strategies for creating test data. The key steps are to:
1. Gather relevant test information such as user actions, expected results, and valid data.
2. Determine the types of data needed - master, input, or prepared data - and strategies for obtaining them.
3. Prepare for automated testing by verifying the application and test case steps before recording tests.
The document discusses differing views on the impact of Web 2.0. David Gauntlett argues that Web 2.0 has created a more democratic media by empowering prosumers and challenging the dominance of media institutions. Andrew Keen counters that Web 2.0 has created cultural chaos by fostering a "cult of the amateur" that devalues professionals and expertise, with internet oligarchs replacing old media oligarchs. They disagree on whether the removal of gatekeepers will open media to greater democracy or devalue talent.
Northwest eLearning Community Conference Keynote (10-07)Cable Green
The document discusses trends in higher education in light of participatory culture and Web 2.0 technologies. It argues that higher education needs to embrace openness, participation, and networks to better prepare students for a world where knowledge is distributed and co-created. Key lessons include embracing perpetual beta models, leveraging student contributions, and providing open platforms for content development and sharing.
Northwest Elearning Community Conference Keynote webstu
The document discusses the opportunities and challenges of participatory culture and Web 2.0 technologies for higher education. It notes that students are now producers, not just consumers, of content. Institutions need to provide open systems and architectures that leverage collective student contributions and harness the network effect. Content development must now be Web 2.0, with students able to manipulate and mash up data as they see fit using open APIs and widgets.
Using the recent Digiteen global collaborative project as a catalyst (http://digiteen.wikispaces.com) this session explores what it means to be a digital citizen and how your school community can become actively engaged in promoting best practice use of online learning. Forget the fear factor, embrace safe practices and informed pedagogical approaches to teaching and learning online with educational networking and collaborative websites.
This document discusses the definition and evolution of Web 2.0 and social networking sites. It defines Web 2.0 as internet-based services that allow users to collaborate and share information online through tools like blogs, wikis, and social networks. These technologies enabled a shift from passive consumption of information to active participation and user-generated content. The document also examines blogs, what they are and how to set them up, as well as social networking sites and their impact, advantages, and disadvantages.
This document summarizes a presentation given at the Balkans Inter-Community Meetup 2010 about Drumbeat, a movement to keep the web open for the next 100 years. It discusses how the open web benefits from being remixable, decentralized, transparent, and participatory. It explains that the internet is increasingly a global public resource that must remain open to all. Drumbeat hosts projects and events to involve everyday users in building the open web and protecting it from those who would make it less free. People are encouraged to get involved by joining projects, attending local events, or spreading awareness of the open web cause.
Web 2.0 describes websites that use more advanced technology than earlier static websites, allowing users to create and share their own content. This movement towards user-generated content has both advantages and disadvantages. The "power of the crowd" concept suggests that large groups of people can collectively decide what is best through crowd-sourcing and folksonomy techniques. Web 2.0 encourages community, collaboration and sharing through features like social media platforms. As more people use Web 2.0 tools, their value and ability to connect people increases - boosting the online economy and access to information. Content is generally open for people to share freely on the web.
There are nine core elements of digital citizenship: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital rights and responsibilities, digital health and well-being, digital security, and collaboration, creative, information, solution, and media fluencies. Digital citizenship also involves teaching and learning about appropriate technology use, ethics, and participation in an online society.
The document summarizes Community Media Workshop, a nonprofit organization founded in 1989 that provides training and resources to over 2,000 nonprofit communicators per year with a $700,000 budget. It lists the board members and awards received, describes their mission to diversify voices in the news and projects like e-notes, NPCommunicator, and Community Media Summit. It also shows registration sources for workshops and quotes Seth Godin about using new tools to support organizational change rather than just existing structures.
New Signals provides telecommunications engineering services including wireless, digital networks, fiber optics, and SCADA. They have over 100 years of combined experience across telecommunications, mobile radio, microwave transmission, and fiber optic and digital networks. New Signals designs and implements end-to-end telecommunication solutions for clients in industry, business, and government.
Two-hour workshop for Chicago Cabaret Professionals group of singers seeking to improve their communications strategy and planning, pitching, press release writing, and giving good email.
Kind of your standard, what do all those tools do kind of workshop geared for nonprofit fundraisers, this opens with an overview of tweetups, platforms, competitions, and causes.
The document provides instructions for an assignment related to an augmented reality learning event taking place in Livadia, Greece. Participants are asked to walk around and experience augmented reality. The location and name of the event are given to provide context for the assignment.
The document provides an overview and outline of the biblical book of 2 Thessalonians. It discusses that Paul wrote the letter to encourage the church in Thessalonica and correct false teachings about the second coming of Christ. Key points include that Jesus will not return until a great falling away and the man of lawlessness is revealed. Paul encourages the believers to continue working, waiting, praying and watching until Christ's return.
Donny BU is an expert in digital media and online freedom of expression. He currently serves as the Executive Director of ICT Watch, a lecturer in digital media and e-business, and a researcher at Citizen Lab at the University of Toronto. He has a background in journalism, editing, and as the former Vice President of Detikcom. He holds degrees from the University of Indonesia in Communication Management and Gunadarma University in Computer Science. The document discusses various aspects of online identity, anonymity, censorship and freedom of expression on the internet.
The document discusses social selling as a must-have skill for salespeople. It notes that 60% of senior executives use social media to influence buying decisions and 57% of the buying process is now completed before engaging a sales rep. It then outlines how buyers now behave online by self-educating, having more people involved in the buying process, and going through different stages when committing to a purchase. The document advocates for social selling skills like building personal profiles, joining discussions, sharing content, engaging prospects, and connecting to influencers in order to reach decision makers earlier, build relationships, and influence the buying process. It provides examples of what great social selling looks like and emphasizes the need for sales leaders to help salespeople learn social
This document profiles Donny B.U., an ICT researcher, social entrepreneur, and cyber journalist lecturer in Indonesia. It provides information on his current and past roles researching ICT and activism, as well as his educational background. It also includes brief quotes and sayings on topics like information warfare, responsibility and authority, consistency in messaging, the importance of human affection, coherence and credibility, and social media and social movements.
The documents summarize bell ringer assignments from an Earth and Environmental Science class. The assignments covered topics like the chemical formula of water, phases of matter, cloud formation, and mountain weather patterns. Students were asked to define terms, describe diagrams, write paragraphs summarizing concepts, and identify types of cloud images. The documents provide examples of daily warm-up questions, responses, and brief lectures on various environmental science topics.
Indonesian “Internet Censorship” Brief Report for OpenNet Initiative (ONI) Global Summit - 2010, Ottawa - Canada. Prepared and presented by Donny B.U. / ICT Watch, 29th June 2010. Updated ver.3 / 29th July 2010.
The document discusses test planning for automated testing using QuickTest. It provides guidance on extracting necessary information from test cases, distinguishing different types of test data, and identifying strategies for creating test data. The key steps are to:
1. Gather relevant test information such as user actions, expected results, and valid data.
2. Determine the types of data needed - master, input, or prepared data - and strategies for obtaining them.
3. Prepare for automated testing by verifying the application and test case steps before recording tests.
Internet governance in Southeast Asia faces challenges in ensuring transparency, accountability, and egalitarian and multi-stakeholder dialogue. The region has high internet usage but lacks coordination across stakeholders such as governments, private sector, technical community, civil society, and international organizations in determining internet policy and development. Images and sources are provided from organizations focused on internet policy, governance, usage statistics, and news related to Asia.
slides from several presenters on using social media in a hands-on way for nonprofits and grassroots folks.
A production of the Office of LGBT Health and the Office of Substance Abuse and Tobacco Control Programs at the Chicago Department of Public Health in collaboration with the National LGBT Tobacco Control Network.
The document provides guidance on effective communication strategies to promote an organization called the Alliance for Research in Chicago Communities (ARCC). It emphasizes using stories and metaphors to engage audiences and convey key messages in concise elevator speeches. The document outlines determining goals, target audiences, and crafting compelling messages that highlight what's in it for others (WIFM) to learn about and support an organization's work.
El Archivo Militar de Puerto Rico se encuentra ubicado en Calle Norzagaray 501 en el Castillo San Cristóbal en San Juan. Contiene documentos históricos sobre asuntos militares en la isla y está a cargo del Programa de Recursos Culturales. La biblioteca y sala de investigación Julio Marrero Núñez brindan acceso a los archivos.
Communications Network Social Media Game presentationnewstips
Playing the social media game, created by Beth Kanter and David Wilcox and here remixed by Community Media Workshop can help with social media adoption and thinking through how to integrate Web 2.0 tools into your overall communications work. (hint: download the cards here: bit.ly/15IB3g)
The document discusses the development of social and mobile applications for a wireless campus. It describes several applications currently under development, including a mobile museum guide, a multimodal group communication hub, and a sensor-based navigation system. It emphasizes that the wireless campus aims to be a test bed for new mobile services and applications in domains like education, culture, and social networks. The focus is on providing a living lab environment to build, test, and evaluate innovative mobile technologies.
presented in Nu-Substance Festival 2010
July 20, 2010 @ Centre Culturel Français de Bandung
Nu-Substance Festival 2010
Festival for Open Culture, Technology, and Urban Ecology
http://nusubstance.commonroom.info/
Citizen (Digital) Media Ethics for Blogger, Citizen Journalist and Informatio...ICT Watch - Indonesia
Citizen (Digital) Media Ethics for Blogger, Citizen Journalist and Information Activist.
This is presentation about the citizen and digital (online) media fundamental ethics which is divided into 4 main cases: identity of self, context of communication, copyright-copyleft and freedom of expression.
The document discusses how libraries are adopting social media and web 2.0 technologies to better serve patrons and remain relevant, as outlined in the Library 2.0 concept. It examines challenges libraries face in implementing these new services, such as choosing which technologies to adopt from the many options and ensuring sites are constantly updated. The document also notes privacy concerns that arise from users sharing information online and the need for libraries to protect patron privacy. Adopting social media allows libraries to connect with users in their online communities.
Reference Services & Social Networking - Being on the cutting edge of engagmentAriel Dagan
An analysis of current Reference Services trends in use of Social Networking by libraries in North America and Canada. This is part of a presentation of graduate work in Reference and Information Services at University of Rhode Island with Professor Amanda Izenstark.
The document discusses the use of social networking sites and Web 2.0 tools in academic libraries. It defines social networking and outlines the growth of popular sites. Libraries are now using these tools to exchange information, market services, and connect with users. Common Web 2.0 applications for libraries include wikis, blogs, social networking, tagging, and RSS feeds. The document provides several examples of academic libraries leveraging Facebook, Twitter, and blogs. It concludes that libraries are becoming more interactive and accessible through the adoption of social media.
Update for social media (facebook, twitter, blog) number of users in Indonesia. Little info about Internet Sehat / internetsehat campaign program online & offline, from-by-for the society.
The document summarizes the core values and principles of the Internet Society (ISOC), an international nonprofit organization that promotes an open, globally-connected and secure Internet. Some key points:
- ISOC believes the Internet should be accessible to everyone and supports principles like openness, transparency, freedom of information and innovation.
- It works to promote these values through advocacy, education and partnerships with governments, organizations and the private sector.
- The document outlines regulations in Cambodia that could impact Internet freedom and access, such as requiring extensive user data collection.
- ISOC promotes a multi-stakeholder approach where all groups cooperate in Internet governance.
Jadi infrastruktur TI berjalan diatas infrastruktur publik seperti listrik, gedung dll. Dalam infrastruktur TI dapat dilihat tidak hanya terdiri dari perngakta keras tapi juga terdiri dari perangkat lunak seperti OS, aplikasi middleware dan database.
Kecenderungan infrastruktur semakin hari semakin merambat naik. Semakin banyak komponen perangkat lunak yang menjadi dasar bagi komponen perangkat lunak yang lain untuk dapat bekerja. Contohnya adalah library bahasa pemrograman. Template template design (theme) yang dapat digunakan oleh banyak aplikasi.
Bahkan trend sekarang ada yang disebut SOA (Service Oriented Architecture) yang menyediakan dirinya (aplikasi) untuk dapat digunakan secara bersama oleh aplikasi yang lain. Pengertian infrastruktur dalam TI sudah tidak lagi berarti sesuatu yang statik (hardware) tapi sudah menjadi sesuatu yang lebih fleksible (software).
next generation technologies to build sustainable communities of practiceGeorge Roberts
The document discusses using next generation technologies to build sustainable communities of practice. It describes the Emerge project which used Web 2.0 technologies and appreciative inquiry to foster positive change among individuals. Realizing benefits requires recognizing that communities are multi-modal and not defined by any single platform. Sustainable community practice involves negotiating control between individuals and institutions.
From Headphones to Microphones: Mobile 2.0 and the Museum as Distributed NetworkNancy Proctor
The document discusses how mobile devices are transforming museums from physical spaces into distributed networks. It notes that over half of museum platforms are already mobile. Mobile allows museums to meet audiences where they are and take them to new places. While apps may not be profitable, mobile offers new tools for communication, learning, and content distribution. The document advocates for using mobile to recruit the world and increase knowledge diffusion by enlisting global collaborators. It presents the Smithsonian's mobile strategy of integrating mobile into all efforts to achieve strategic goals of accessibility, quality, relevance, sustainability and accountability.
eLearning Consortium Jan 2011, London sharingErwin Huang
The document outlines the vision, values, initiatives and organization of the eLearning Consortium. It discusses the Consortium's work over the past year to promote open, student-centric eLearning through conferences, exhibitions, pilots and technology projects focusing on mobile applications and cloud-based learning. Going forward, the Consortium aims to increase resources and visibility, and further drive innovation through additional conferences, pilots and partnerships focusing on areas like social learning, gaming in education, and bridging the digital divide.
Trust between inhabitants in a neighbourhood is not something that is naturally anymore.
People in the neighbourhood know each other less, move more often, have different
backgrounds and spend more time in places other then the neighbourhood...
Introduction to UGCinfonet , INFLIBNET & ERNET 2021 by Anish Mohammad is innovative and knowledgeable information for stakeholders in library & information field. These PPTs will be covered to basic aspects in same fields like UGC infonet, INFLIBNET ( All projects and programmes) and ERNET. The following contents are cover in presentation mentioned below,
UGCinfonet
O A E-Resources@UGC-Infonet Digital Library Consortium
e-ShodhSindhu
e-Resources
INFLIBNET
Open Access Initiatives
All Projects
Activities
INFLIBNET Centre Library
ERNET
Vision/Mission/ Objectives
Research & Development ( R & D).
Based on the recommendation of an Expert Committee, the MHRD has formed e-ShodhSindhu merging three consortia initiatives, namely UGC-INFONET Digital Library Consortium, NLIST and INDEST-AICTE Consortium.
Twist is an Open World Information Sharing Network which provides a platform to the users searching information on the same project that directly publishes the new updates for a desired category or group of categories to the people who had enrolled as that category for their Personal interest.
Brian Kelly gave a presentation on new digital technologies and their uses. He discussed concepts like Web 2.0, social media, mobile access, and cloud computing. He acknowledged challenges like sustainability, privacy, and organizational barriers, but argued against overly simplistic or fundamentalist approaches. A balanced, managed approach was needed to harness new technologies while mitigating risks.
Trends NEtwork and Critical thinking in the 21st Century Unit 7: Neural and S...alexisneilmacni
This document discusses neural networks, social networks, and different types of networks. It defines neural networks as computer systems modeled after the human brain, and social networks as connections made through social media. The document then provides examples of different kinds of networks, including human networks, knowledge networks, and trade networks. It also discusses the importance of linkages and networking in establishing connections between groups.
Ringkasan Dialog Nasional ID-IGF 2014 - Bahasa Indonesia (tata kelola interne...ICT Watch - Indonesia
Ringkasan Dialog Nasional ID-IGF 2014 - Bahasa Indonesia (tata kelola internet / internet governance). Situs: igf.id. E-mail: contact [at] igf.id. Pengunggah: donnybu.id
Ringkasan Dialog Nasional IGF Asia Tenggara 2021 Bali - Bahasa Indonesia (tat...ICT Watch - Indonesia
Ringkasan Dialog Nasional IGF Asia Tenggara 2021 Bali - Bahasa Indonesia (tata kelola internet / internet governance). Situs: igf.id. E-mail: contact [at] igf.id. Pengunggah: donnybu.id
Summary South East Asia (SEA) IGF 2021 Bali - English (tata kelola internet /...ICT Watch - Indonesia
Summary South East Asia (SEA) IGF 2021 Bali - English (tata kelola internet / internet governance). Site: igf.id. E-mail: contact [at] igf.id. Uploader: donnybu.id
Ringkasan Dialog Nasional ID-IGF 2012 - Bahasa Indonesia (tata kelola interne...ICT Watch - Indonesia
Ringkasan Dialog Nasional ID-IGF 2012 - Bahasa Indonesia (tata kelola internet / internet governance). Situs: igf.id. E-mail: contact [at] igf.id. Pengunggah: donnybu.id
Ringkasan Dialog Nasional ID-IGF 2017 - Bahasa Indonesia (tata kelola interne...ICT Watch - Indonesia
Ringkasan Dialog Nasional ID-IGF 2017 - Bahasa Indonesia (tata kelola internet / internet governance). Situs: igf.id. E-mail: contact [at] igf.id. Pengunggah: donnybu.id
Ringkasan Dialog Nasional ID-IGF 2018 - Bahasa Indonesia (tata kelola interne...ICT Watch - Indonesia
Ringkasan Dialog Nasional ID-IGF 2018 - Bahasa Indonesia (tata kelola internet / internet governance). Situs: igf.id. E-mail: contact [at] igf.id. Pengunggah: donnybu.id
Ringkasan Dialog Nasional ID-IGF 2019 - Bahasa Indonesia (tata kelola interne...ICT Watch - Indonesia
Ringkasan Dialog Nasional ID-IGF 2019 - Bahasa Indonesia (tata kelola internet / internet governance). Situs: igf.id. E-mail: contact [at] igf.id. Pengunggah: donnybu.id
Ringkasan Dialog Nasional ID-IGF 2022 - Bahasa Indonesia (tata kelola interne...ICT Watch - Indonesia
Ringkasan Dialog Nasional ID-IGF 2022 - Bahasa Indonesia (tata kelola internet / internet governance). Situs: igf.id. E-mail: contact [at] igf.id. Pengunggah: donnybu.id
The document provides a summary of Donny B.U. S.T., M.Si.'s professional experience and qualifications. It details his current roles as an expert advisor to the Indonesian Ministry of Communications and Informatics and membership in organizations promoting digital literacy and child protection. It also lists his extensive past experience in technology journalism, research, and education as well as involvement in international internet governance forums.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
2. International Workshop / Conferences :
News & Civic Media, 2011 – MIT Cambridge
e-mail: dbu @donnybu.com Ashoka–Knight Journalist, 2011 – Wash. DC
twitter: @donnybu OpenNet Initiative Summit, 2010 – Ottawa
mobile: +62-818-930932 Internet Gov Forum, 2009 – Sharm El Sheikh
OpenNet Initiative, 2009 – Sharm El Sheikh
Daily Activities : PAN All Asia Network, 2009 – Penang
ICT Watch Researcher Access to Knowledge, 2009 – Kuala Lumpur
Ashoka Social Entrepreneur Fellow OpenNet Initiative, 2008 – Chiang Mai
E-Business & Digital Media Lecturer World Mobile Congress, 2008 – Barcelona
(UPH, LSPR, Binus, Paramadina) Digital Review Asia Pacific, 2008 – Singapore
Internet Sehat Activist Global Knowledge, 2007 – Kuala Lumpur
Before: Journalist to Vice President University ICT for Dev, 2007 –Vietnam
at Detikcom (‘99 – ‘10)
Formal Educations :
Master: University of Indonesia,
Communication Management‘02
Bsc: Gunadarma University,
Computer Science‘98
Donny B.U. (brief CV)
3. 55 million
1998 - 2011
500 thousand
photo credit: internet
Indonesian Internet User
8. Total UV:
26,520,000 / month
1.1M 1.3M
120K* 15M
9M
Source:
Google Ad Planner (Sept. 2011)
*) small number might be caused by error
Indonesian Blog Visitors Monthly
9. The Big Six:
Jakarta, Law & Government, Economics, Parenting,
Social Sciences, Web Design & Development
Source: Google Ad Planner (September 2011)
Indonesian Blog Content Interests
10. Generally: Male, Has Children, Browsing at Home/School, Java Island
Source: Alexa & Google Trends (November 2011)
Indonesian Blog Visitors Demography
11. Source: (26,520,000 x 20%) / 2
- “26,520.000” = total estimated unique visitors of 5 most visited blogsites
- “20% “ = Pareto Principle, “2” = estimated average number of blogs that are owned per user
Indonesia has 2.7M bloggers!
12. 5.3M+ blogs or Contents
25+ local blogger Communities
5+ national blogger Conferences
Dozens of blogging Competitions
Source for ”Contents”: SalingSilang (November 2011)
We also have big 4C !
19. Bahwa kegiatan penggunaan Internet dapat membantu mencari, mendapatkan, Tebet Principals of Online Ethics
mengelola dan mendistribusikan banyak informasi yang positif dan bermanfaat bagi
individu maupun masyarakat luas.
Bahwa kegiatan penggunaan Internet ternyata membuka peluang bagi diri sendiri
terkena dampak negatif ataupun menghadapi perkara dari pihak lain yang dirugikan
atau merasa dirugikan.
Bahwa dampak negatif ataupun perkara yang timbul akibat penggunaan Internet,
dalam batas-batas tertentu dapat diselesaikan secara musyawarah, namun seseorang
tetap dapat terkena konsekuensi hukum secara perdata dan/atau pidana.
Untuk itu maka kami, atas nama perwakilan organisasi/komunitas berjejaring (network
society) dari berbagai kota di Indonesia bersepakat menyerukan kepada seluruh
masyarakat luas pada umumnya dan pengguna Internet pada khususnya, agar bijak
dalam pengunaan Internet.
Untuk itu pula maka kami secara bersama telah merumuskan acuan etika online
(menggunakan Internet) yang bersifat konsep umum, tidak mengikat, bebas diadopsi http://bit.ly/etikaonline
siapapun dan diadaptasi sesuai kebutuhan masing-masing, yang berbunyi:
Siapapun tanpa terkecuali, ketika online (menggunakan Internet), harus
menjunjung tinggi dan menghormati:
Tebet, 16 September 2011
Tertanda,
• •
photo credit: internet
nilai kemanusiaan hak individu atau lembaga
• kebebasan berekspresi • hasil karya pihak lain
• perbedaan dan keragaman • norma masyarakat
• keterbukaan dan kejujuran • tanggung-jawab (Tim Perumus)
8 “Tebet Principals” of Online Ethics