Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tagging: People-powered Metadata for the Social Web (Voices That Matter)

Buy
Tagging is fast becoming one of the primary ways people organize and manage digital information. Tagging complements traditional organizational tools like folders and search on users desktops as well as on the web. These developments mean that tagging has broad implications for information management, information architecture and interface design. And its reach extends beyond these technical domains to our culture at large. We can imagine, for example, the scrapbookers of the future curating their digital photos, emails, ticket stubs and other mementos with tags. This book explains the value of tagging, explores why people tag, how tagging works and when it can be used to improve the user experience. It exposes tagging's superficial simplicity to reveal interesting issues related to usability, information architecture, online community and collective intelligence.

About the Author

Gene Smith is a consultant specializing in information architecture strategy, social classification like tagging and folksonomies, emergent information architecture and interaction design. As a principal at nForm User Experience, he's advised clients like Comcast, Ancestry.com and the Canadian Patient Safety Institute. Through conference presentations and online publication Gene has helped define social information architecture, an emerging field that looks at how user interactions create structure in information spaces.
(HTML tags aren't allowed.)

Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services: An Advanced Guide for VPLS and VLL

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone

Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like...

Psychiatric Aspects of HIV/AIDS
Psychiatric Aspects of HIV/AIDS
This comprehensive text focuses on psychiatric issues associated with HIV/AIDS and provides clinicians with a basic understanding of epidemiology, virology, transmission, and medical treatments inclusive of occupational exposures. Psychosocial, spiritual, and sociocultural aspects of HIV/AIDS are covered, describing implications of HIV/AIDS across...

Music Theory For Dummies, with Audio CD-ROM
Music Theory For Dummies, with Audio CD-ROM
Welcome to Music Theory For Dummies!

What do you think of when you hear the phrase music theory? Does the image of your elementary school music teacher scowling at you from behind the piano pop into your head? Or perhaps a later image of fellow college students in theory classes determinedly trying to notate
...
International Marketing
International Marketing
Thank you for reading our book! Practicing international marketing and writing a text on the subject have much in common. The focus is on delighting the customer; it is a lot of work; the competition is tough; and it’s fun to succeed. It is therefore with great pleasure that we present the eighth edition of International...
Information Theory and Statistics: A Tutorial
Information Theory and Statistics: A Tutorial
Information Theory and Statistics: A Tutorial is concerned with applications of information theory concepts in statistics, in the finite alphabet setting. The topics covered include large deviations, hypothesis testing, maximum likelihood estimation in exponential families, analysis of contingency tables, and iterative algorithms with an...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy