EmTech Module 1 - Topic 1 Updated 3

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 50

EmTech

EMPOWERMENT TECHNOLOGIES

Holy Infant Academy


Empowerment Technologies
 contents

Current State of The evolution and Differences and The use of


ICT. features of the Nuances in Social Hashtag
Web. Media Platforms
TOPIC #1 TOPIC #2 TOPIC #3 TOPIC #4
 o b j e c t i v eWITHIN
s THE TOPIC

HE LEARNERS CAN:

• Explain the importance of ICT in your everyday life


• Determine how ICT can be used in a specific profession
• Compose a reflection paper on the nature of ICT.
I .C.T.
ON and COMMUNICATION TECHNOLOGY
DEFINITION:
“Information and Communication
Technology deals with the use of different
communication technologies such as mobile
phones, telephone, internet and others to locate,
save send and edit information.”
- IT Works, Inc, Empowerment
Technologies (Manila: Rex Book
Store, 2016), p.5
I .C .T.
RMATION and COMMUNICATION TECHNOLOGY
Basically if we follow that definition:

anything that HOLDS, LOCATES, SAVES and EDITS information is a technology o


information and communication
#1
SOFTWARE-CENTRIC EXPERIENCE
YOUR APP IS YOUR BRAND
Digital
displaces
physical in the
connected
#2
CONNECTED AUGMENTED
INTELLIGENCE
FROM MOBILE – FIRST TO `AI - FIRST

DIGITA MOBI AI
L LE
#2
CONNECTED AUGMENTED INTELLIGENCE
FROM MOBILE – FIRST TO `AI - FIRST

AI FIRST –
an assistant needs to be
more accurate, and thus
more intelligent, more
aware of the situation.
#3
INFRASTRACTURE AS CODE
CONNECTED, INTUITIVE INFRASTRACTURE

When programs
or applications
becomes behavior
modifiers.
#4
TECH REAILITY BITES
Economic dislocation-understanding implications to society
The capability of
understanding a societal
status through detailed
information
#5
EXPANDING TO CLOUD
Telemetry, policy and AI usage.

Dropbo Google Drive One Drive


x
iCloud Huawei Mobile
Cloud
#6
CYBER DEFENSE
As a System and Culture, NOT A PRODUCT
As there is social security in our citizenship there
is Cyber Security that protects the integrity of a
computer’s internet-connected systems, hardware,
software and data from cyber attacks
The security and resilience of this critical
infrastructure is vital to our society’s safety 03
Electricity and well-being Traffic Lights
This is very important to
Power
Gridplants that are dependent on
computers properly control the flow of
traffic
01
Hospitals
#1 On employee and 04
Critical patient information.

Infrastruct 02 Water Supply


Institutions that are dependent on AI
ure and programs for their system of
delivery
Antivirus Programs Firewalls
Fending off malwares and This is your
software harmful programs personal defense
01 against the large
02 world of the Interet
#2
Applicati Encryption Programs 03

on To protect confidential and


personal data and messages
Security
Changing-Passwords
Day-to-day change Support
#3 of password. In-case of a retrieval and serve
asAccounts
a secondary security.
Network 01

Security **** 03

i Extra Logins
Additional information
02
and confirmation
#4 User Terms Agreement
Cloud On-premise environment
users experience
Security i
01
02
****

Service Provider Security


The strength of your service
providers security system
Security is a Prerequisite
Security is one of the biggest
barriers to great IoT adoption
01
****
#5
i Internet of
02 Things (IoT)
Age of Information
This is the pinnacle of the
“Information Age”
#7
FASTER AND WIDER CONNECTIONS
5G and Nano Satellites
#7
FASTER AND WIDER CONNECTIONS
5G and Nano Satellites
#8
THE VALUE OF DATA
The need to control and monetize
There is an increasing demand
for information and it is
overwhelming. This is easily
proven in your day-to-day
lifestyle.
#9
DECENTRALIZED WEB
The Internet of Blockchains

It is the uprising trend of going back to the


promise of the internet: a creation “that should be
in the hands of the people” (Tim Bereners-Lee)
CONNECTED AND AUTONOMOUS #10
VEHICLES
Anywhere, anytime, any mode transport as-a-service
Tesla, Toyota, BMW, Nissan, Volvo, Lexus,
Marcedes-Benz, Audi are just some of car
companies that are spearheading this. This has a
massive impact in our lives when normalized.
 contents

Current State of The evolution and Differences and The use of


ICT. features of the Nuances in Social Hashtag
Web. Media Platforms
TOPIC #1 TOPIC #2 TOPIC #3 TOPIC #4
How do you connect to
the world?

Holy Infant Academy


Empowerment Technologies | SHS
World
Web
Wide
Evolution
Web 1.0 vs Web
Holy Infant Academy
Empowerment Technologies | SHS
2.0
S TAT I C W E B S I T E S

WEB 1.0:
When the World Wide Web was invented,
most web pages were static. Static (also
known as flat page or stationary page) in the
sense that the page is “as is” and cannot be
manipulated by the user. The content is also
the same for all users.

Holy Infant Academy


Empowerment Technologies | SHS
DYNAMIC WEBSITES

WEB 2.0:
Web 2.0 is the evolution of Web 1.0 by
adding dynamic web pages—the user is able to
see a website differently than others. Examples
of Web 2.0 include social networking sites,
blogs, wikis, video sharing sites, hosted
services, and web applications.

Holy Infant Academy


Empowerment Technologies | SHS
S TAT I C W E B S I T E S

WEB 2.0:
Web 2.0 allows users to interact with the page:
instead of just reading a page, the user may be able
to comment or create a user account. Web 2.0 also
allows users to use web browsers instead of just
using their operating system. Browsers can now be
used for their user interface, application software
(or web applications), and even for file storage.
Holy Infant Academy
Empowerment Technologies | SHS
FEATURES OF WEB
These are features from which you are already familiar with because
2.0
you have been using them every time you connect to the internet.

Folksonomy
Allows users to categorize and
classify/arrange information
using freely chosen keywords. 1

Rich user Experience Software as Service


content is dynamic and is users will subscribe to a software
responsive to user’s input. only when needed rather
2 than purchasing them 5

User Participation Mass Participation


the owner of the website is not diverse information sharing
the only one who is able through universal web access.
to put content 3 6
SEMANTIC/DECENTRALICED WEBSITES

WEB 3.0
The Semantic Web is a movement led by the World Wide
Web Consortium (W3C).

The W3C standard encourages web


developers to include semantic content
in their web pages.

Holy Infant Academy


Empowerment Technologies | SHS
SEMANTIC/DECENTRALICED WEBSITES

WEB 3.0
According to the W3C, “The Semantic Web provides a
common framework that allows data to be shared and
reused across application, enterprise, and community
boundaries.”
The aim of Web 3.0 is to have machines (or servers)
understand the user’s preferences to be able to deliver web
content specifically targeting the user.
Holy Infant Academy
Empowerment Technologies | SHS
PROBLEMS WITH
Decentralized web is not yet in its peak but surely it is already in
WEB 3.0
existence. Here are some problems encountered why it is not yet a trend.

Compatibility Vagueness
HTML files and current web certain words are imprecise
browsers could not support
Web 3.0 1 4
Security Logic
user security is also in question there are certain limitations for a
computer to be able to predict
2 the user needs at a time 5

Vastness
the WWW already contains
billions of web pages
3
 contents

Current State of The evolution and Differences and The use of


ICT. features of the Nuances in Social Hashtag
Web. Media Platforms
TOPIC #1 TOPIC #2 TOPIC #3 TOPIC #4
G E N E R A L A N D E N C O M PA S S I N G

TRENDS IN
I.C.T
CONVERGENCE ASSISTIVE MOBILE SOCIAL MEDIA
Using several MEDIA
Non-profit service TECHNOLOGIES
Smartphones, Tablets, Online Channel that
technologies to designed to help people Smartwatch, iOS, enables web users to
accomplish a task who have visual and Symbian, Windows create, co-create, modify,
conveniently. reading impairments. Mobile, Blackberry, and exchange user
Android generated content.

Holy Infant Academy


Empowerment Technologies | SHS
SIX TYPES OF SOCIAL
MEDIA
Social Network
Allows you to connect to people with
the same interest.

Bookmarking Site
Allows you to manage links to various
websites and resources.

Social News
Allows users to post their own news
items of links to other news sources

Holy Infant Academy


Empowerment Technologies | SHS
SIX TYPES OF SOCIAL
MEDIA
Media Sharing
Allows you to upload and share media
content like images, music and video.

Microblogging
Sites that focus on updates from user. Those
subscribed will receive these updates.

Blogs and Forums


Websites that allow users to post their content.

Holy Infant Academy


Empowerment Technologies | SHS
ICT IN THE
PHILIPPINES
“ICT Hub of Asia”
ICT-related jobs around the country (BPOs)

106.8 cellphones for every 100 Filipinos in the year


2012
(2013 edition of Measuring the Information Society
by the International Telecommunication Union)
Holy Infant Academy
Empowerment Technologies | SHS
ICT IN THE
PHILIPPINES
ICT industry shares 19.3% of the
total employment population in the
country
(Annual Survey of the Philippine Business and
Industries, NSO, 2010

Time Magazine’s “The Selfiest Cities


around the World” of 2013
Top 1 – Pasig City | Top 10 – Makati City
Holy Infant Academy
Empowerment Technologies | SHS
Al l y o u n eed t o
k n o w abo u t
hashtags
So… what’s the rave about
those
# symbols all over the internet?

41
WHAT IS
HASHTAG
What exactly is hashtag?

hash∙tag /’haSHtag/ noun


1. A symbol used on social networking sites to group
comments about particular topics.
2. Hashtags make it easy for people to discuss and
exchange ideas throughout social media.
How do you use them?

Discuss topics
E x p r e s s ideas
S h a r e experie

nces
How can they help your brand?

Create appearance Grow


on Search Engines Participation
Trends Google, Yahoo! and Hashtags can expand
41% of users Bing display the audience of a
share personal #hashtag results. conference
ideas and 200% beyond physical
A recent Marketingland survey found

Brand p r o m o t i o n
41%
Users who claimed they would
click on a hashtag to learn more
...

about a brand or product.


34%
Respondents who used
hashtags primarily for
searching or following their
45
Now that you know about
hashtags, the next step is to
use them correctly.
Need a hand? Here are some
tips!
46
HA S H TA G L IK E A
PR O

Use o n l y o n e o r t w o
h a s h t a g s a t a t ime
Think of hashtags as
categories/takeaway points. No
one wants to read a tweet full of 47

blue, clickable words!


HA S H TA G L IK E A
PR O

Has h t a g s m u s t b e
u s e f u l and memorab l e
Hashtags are not inside jokes. Others
should be able to use them, too! If your
tag cannot be used by someone else to
further discuss a particular topic, you’ve
gone too specific.
10
HA S H TA G L IK E A
PR O

Hype y o u r has h t a g s !

Repeat your hashtags at the end of


blog posts and comments you
contribute to partner sites.
Eventually when readers see the
hashtags often enough, they will 49

investigate.
HER E ’S A L I T T L E
EX T R A …
#tbt, as in Throwback
Thursday, is to share photos or
crazy fads from back in the
day.
In 2011 #Egypt became the rallying
cry and a way to organize
communications around the
protests in Egypt.was mistaken by
#nowthatcherisdead
many as
#nowThatC herIsDead indicating the
singer C her had passed – which was
later debunked. 50

You might also like