Buzz Marketing for Technology

article thumbnail

Your say: Personal knowledge management - Inside Knowledge

Buzz Marketing for Technology

Advertise Privacy policy. If they stopped spending so much time and money on process and technology solutions and uncovered the latent potential in employees, then real value and differentiation would be harnessed through PKM.? Enterprise Search. Intranets & portals. Taxonomies. Case study archive. E-newsletter. Inside Knowledge.

article thumbnail

Social Media U: Take a Class in Social Media - ReadWriteWeb

Buzz Marketing for Technology

And they mean it, too, saying "At TCBN we respect your privacy. Im at the crossroads of this discussion: 1) I teach differentiation to MBA students, 2) I work for an ad agency and 3) Im a boomer. Think of it as Facebook for bloggers (well, before Facebook was for everyone.) Thanks Facebook." Lesson # 5 Use Social Networks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gmail Superstars

Buzz Marketing for Technology

The unfortunate thing is that, as Atul was pointing out, when Im using the Blackberry (or any GMail Mobile, I believe), the lack of QuickLinks *and* Superstars means that I cant differentiate between, say, Red and Green stars. #. Privacy policy. Ionut Alex Chitu said on July 14, 2008 6:48 AM PDT: @Gil: > Thats what I said.

article thumbnail

Research Methods 'Beyond Google' :: Inside Higher Ed :: Higher Education's Source for News, Views and Jobs

Buzz Marketing for Technology

differentiated instruction). Privacy. | Google won!We We can all go home now. Scrawed , at 9:15 am EDT on June 18, 2008. FIxed for k-12. Good news is we have fixed this problem for the K-12 market with netTrekker d.i. www.nettrekker.com. wmiller , at 11:30 am EDT on June 18, 2008. Macalester is. Sign up | Log in. Work for Us.

Education 100
article thumbnail

IBM SJ 45-4 | Ethnographic study of collaborative knowledge work

Buzz Marketing for Technology

About IBM Privacy Contact. It was up to the participant to find all the relevant e-mail, attachments, and supporting documents and place the artifacts in the proper sequence. The challenge was to ensure that the most up-to-date information was available. Cited references.