TITLE

A tweety pie

AUTHOR(S)
Flaschen, Matthew
PUB. DATE
December 2008
SOURCE
Network World;12/1/2008, Vol. 25 Issue 46, p6
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information about the similarity of twittering and blogging. One can only understand how twitter works if he enters into twitter. The twitter is like the Ackerman function of blogging. It is stated that twitter is analogous to the acceptable blogging about blogging in which an individual is not only allowed to twitter about twittering, but also urged to twitter about his foray into twittering. It seems to be a foolish idea to write about an entry into twitter, but that is the whole idea is all about.
ACCESSION #
35575502

 

Related Articles

  • So you want to be a... UX designer? Andrews, Stuart // PC Pro;Mar2013, Issue 221, p078 

    The article offers a look at the business of improving the user experience (UX) of websites and applications. UX design is considered as one of the hottest careers in the field of information technology (IT), with the responsibility of ensuring that everything works logically and intuitively....

  • Similarity-based web clip matching. Baczkiewicz, Małgorzata; Łuczak, Danuta; Zakrzewicz, Maciej // Control & Cybernetics;2011, Vol. 40 Issue 3, p715 

    The research areas of extraction and integration of web data aim at delivery of tools and methods to extract pieces of information from third-party web sites and then to integrate them into profiled, domain-specific, custom web pages. Existing solutions rely on specialized APIs or XPath querying...

  • THE SCOPE AND DEPTH OF PRIVACY STATEMENTS ON BUSINESS-TO-CONSUMER WEB SITES. Pollach, Irene // Proceedings of the IADIS International Conference on WWW/Interne;Jan2003, p1171 

    Online privacy statements are capable of dispelling users' fears of data misuse and enhance their trust in Web sites, if their message is communicated effectively. This work-in-progress study examines the textual and hypertextual peculiarities of online privacy statements of 30 well-known...

  • Click here to infect.  // APC (Bauer Media Group);May2008, Vol. 28 Issue 5, p20 

    The article reports on "APC" magazine readers' experiences of dealing with new computer users or incompetent IT administrators. Didier Stevens, a U.S. blogger, recently placed an advertisement asking users if they wanted to infect their PCs with a virus, and 409 end users clicked on the...

  • A Short-From Measure of User Information Satisfaction: A Psychometric Evaluation and Notes on Use. Baroudi, Jack J.; Orlikowski, Wanda J. // Journal of Management Information Systems;Spring88, Vol. 4 Issue 4, p44 

    This study examines the psychometric properties of the short-form measure of user information satisfaction (UIS) proposed by Ives, Olson, and Baroudi [7]. Based on extensive testing, the questionnaire appears to be a reasonably valid and reliable measure. A framework for how this measure can be...

  • Do the right thing. Donston, Deb // eWeek;1/18/2010, Vol. 27 Issue 2, p8 

    The author reflects on the importance of doing the right thing in the information technology (IT) industry in the U.S. The author highlights a blog on Internet security and fake phishing emails. She stresses that despite the obvious false content of such emails, end users still would indulge....

  • Information Integration System and Its Implementation Based on Semantic. Huang Gang; Wu Xiu Ying; Yuan Man // Applied Mechanics & Materials;2014, Issue 533, p440 

    Due to information integration system is a need to focus on different periods independently designed data sources and a unified information system to provide their data to the end user, so it will inevitably encounter data changes over time to bring the knowledge of information contained, the...

  • Prosumption, Property and Public Policy in the Digital Realm. WATKINS, REBECCA; MOLESWORTH, MIKE // Issues;Sep2013, Issue 104, p45 

    The article focuses on consumer culture and market relations within the digital technology sector. It discusses the ownership and use of digital content as well as the implication of end user licence agreement (EULA) on digital possessions. The article also tackles the user access in social...

  • The Importance of Learning Style in End-User Training. Bostrom, Robert P.; Olfman, Lorne; Sein, Maung K. // MIS Quarterly;Mar90, Vol. 14 Issue 1, p101 

    The importance of effective training in ensuring the success of end-user computing (EUC) has been emphasized by several researchers in information systems. A vast amount of evidence from research in related areas such as educational psychology suggests that individual differences such as reaming...

Share

Other Topics