DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Data & Analytics Nuanced graph representation to improve recommendation: The case of browsing and social networks

1. Nuanced graph representation toimprove recommendationThe case of browsing and social networksLuca Maria Aiello1st International Workshop on Social Personalisation (SP…

Business Ning & iGoogle Tutorial

1.   2. GROUP 1 MargaritaSheila Patti Angel 3. TUTORIAL 4. What is iGoogle? “ iGoogle gives you an at a glance access to key information from Google and across the web.”…

Documents Oco usability

1. B Y C A M I L L A M A H O N G A B Y K A V A N A G H H A N N A H R O G E R S E R I K A F I S H E R „Optimising Children‟s Outcomes‟ (OCO) 2. Overview of Application…

Social Media Twitter for Teachers

1. Twitter for Teachers Presented by: @classtechie 2. What is Twitter?  Microblogging 140 characters 3. My Twitter Story 4. Creating your Profile User name…

Documents Employment Branding: Using Social Media to attract better candidates

1. EMPLOYMENT BRANDING: USING SOCIAL NETWORKING TO ATTRACT BETTER CANDIDATES Cathy Henesey, SPHR Talent Acquisition Leader – Ingersoll Rand 2.  A $13 billion diversified…

Education Contextual IR: Participations in TREC Contextual Suggestion Tracks 2012 and 2013

1. Wolverhampton Talk December 2013Contextual IR: Participations in TREC Contextual Suggestion Tracks 2012 and 2013 Gilles Hubert http://bit.ly/wlvHubert2013 2. Summary 1.Information…

Design #Selfie360 ux ui prez

1. home challenge photo share profile 2. home 3. Latest feed • Sends user to ongoing feed of photos being submitted 4. Latest feed • Sends user to ongoing…

Technology Designing Data Pipelines Using Hadoop

1. Rocket Fuel Big Data and Artificial Intelligence for Digital Advertising Abhijit Pol Marilson Campos Designing Data Pipelines July, 2013 2. What We Do? Data Partners*…

Software Lawson Security

1. Lawson Security The basics to get you started 2. Are you on Lawson Security? 48% 42% 10% Poll Lawson Sec LAUA No 3. What is covered • Overview of security past and present…