SlideShare una empresa de Scribd logo
1 de 12
From  W orld  W ide  W eb to C loud  C omputing  C onnections Jean Louis LEQUEUX http://weltram.eu   V 2.1 – May 17 th , 2011  Le Village Internet va sur le  N uage  N umérique
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is eSociety ,[object Object],[object Object],[object Object],[object Object],[object Object]
Technological point of view ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Economical point of view ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Y Generation’s point of view ,[object Object],[object Object],[object Object]
Three steps to heaven ,[object Object],[object Object],[object Object],[object Object]
Eco system or  Ego system? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networks ,[object Object],[object Object],[object Object],[object Object]
History of Social Networks… in short! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Just another communication media? ,[object Object]
… /…  More on:  ,[object Object]

Más contenido relacionado

Similar a The Internet Village goes on the cloud!

Virtual Powers, Wordly Powers
Virtual Powers, Wordly PowersVirtual Powers, Wordly Powers
Virtual Powers, Wordly PowersJean Lequeux
 
BEGIN BLOCKCHAIN - Module 1 FINAL.pptx
BEGIN BLOCKCHAIN - Module 1 FINAL.pptxBEGIN BLOCKCHAIN - Module 1 FINAL.pptx
BEGIN BLOCKCHAIN - Module 1 FINAL.pptxcaniceconsulting
 
Social media and social work
Social media and social workSocial media and social work
Social media and social workSuran Maharjan
 
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...Twittercrisis
 
Kaplan -- What is social media
Kaplan -- What is social mediaKaplan -- What is social media
Kaplan -- What is social mediaNikki Usher
 
Empowerment technology lesson 1
Empowerment technology  lesson 1 Empowerment technology  lesson 1
Empowerment technology lesson 1 JeffreyMetrillo
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic mediaMuhammad Ahmad
 
Social Media For Public Libraries: Basics and Beyond
Social Media For Public Libraries: Basics and BeyondSocial Media For Public Libraries: Basics and Beyond
Social Media For Public Libraries: Basics and BeyondElise C. Cole
 
Online Communities Lecture
Online Communities LectureOnline Communities Lecture
Online Communities Lecturemrjtpants
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptx2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptxLeopoldoJrLaset
 
Intro to Cyber Security in Computer Science
Intro to Cyber Security in Computer ScienceIntro to Cyber Security in Computer Science
Intro to Cyber Security in Computer ScienceIrfanUllahKhan70
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 EditedJuvywen
 

Similar a The Internet Village goes on the cloud! (20)

Virtual Powers, Wordly Powers
Virtual Powers, Wordly PowersVirtual Powers, Wordly Powers
Virtual Powers, Wordly Powers
 
BEGIN BLOCKCHAIN - Module 1 FINAL.pptx
BEGIN BLOCKCHAIN - Module 1 FINAL.pptxBEGIN BLOCKCHAIN - Module 1 FINAL.pptx
BEGIN BLOCKCHAIN - Module 1 FINAL.pptx
 
Cwc Meets Web 2.0 Mb
Cwc Meets Web 2.0 MbCwc Meets Web 2.0 Mb
Cwc Meets Web 2.0 Mb
 
Social media and social work
Social media and social workSocial media and social work
Social media and social work
 
UFI Focus Meeting on Social Media - Paris 2010 - Maria Martinez
UFI Focus Meeting on Social Media - Paris 2010 - Maria MartinezUFI Focus Meeting on Social Media - Paris 2010 - Maria Martinez
UFI Focus Meeting on Social Media - Paris 2010 - Maria Martinez
 
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
 
Kaplan -- What is social media
Kaplan -- What is social mediaKaplan -- What is social media
Kaplan -- What is social media
 
web 2.0
web 2.0web 2.0
web 2.0
 
Empowerment technology lesson 1
Empowerment technology  lesson 1 Empowerment technology  lesson 1
Empowerment technology lesson 1
 
Social media vs electronic media
Social media vs electronic mediaSocial media vs electronic media
Social media vs electronic media
 
Social Media For Public Libraries: Basics and Beyond
Social Media For Public Libraries: Basics and BeyondSocial Media For Public Libraries: Basics and Beyond
Social Media For Public Libraries: Basics and Beyond
 
Online Communities Lecture
Online Communities LectureOnline Communities Lecture
Online Communities Lecture
 
etech.pptx
etech.pptxetech.pptx
etech.pptx
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
unit1-181110135541.pptx
unit1-181110135541.pptxunit1-181110135541.pptx
unit1-181110135541.pptx
 
2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptx2 - The Current State of ICT Technologies.pptx
2 - The Current State of ICT Technologies.pptx
 
E-Governance – Some Challenges Ahead: Social Media Spurring Participation
E-Governance – Some Challenges Ahead: Social Media Spurring ParticipationE-Governance – Some Challenges Ahead: Social Media Spurring Participation
E-Governance – Some Challenges Ahead: Social Media Spurring Participation
 
Intro to Cyber Security in Computer Science
Intro to Cyber Security in Computer ScienceIntro to Cyber Security in Computer Science
Intro to Cyber Security in Computer Science
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 

Más de Jean Lequeux

Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social NetworkingJean Lequeux
 
Lean Management for IT Functional Specifications
Lean Management for IT Functional SpecificationsLean Management for IT Functional Specifications
Lean Management for IT Functional SpecificationsJean Lequeux
 
Swarm Intelligence of Social Networks
Swarm Intelligence of Social NetworksSwarm Intelligence of Social Networks
Swarm Intelligence of Social NetworksJean Lequeux
 
Urbanization of the Cloud
Urbanization of the CloudUrbanization of the Cloud
Urbanization of the CloudJean Lequeux
 
On the clouds, who owns what ?
On the clouds, who owns what ?On the clouds, who owns what ?
On the clouds, who owns what ?Jean Lequeux
 
Just a matter of Psychology
Just a matter of PsychologyJust a matter of Psychology
Just a matter of PsychologyJean Lequeux
 
A Universe of Virtual Powers
A Universe of Virtual PowersA Universe of Virtual Powers
A Universe of Virtual PowersJean Lequeux
 
Legal Issues for the Electronic Society
Legal Issues for the  Electronic SocietyLegal Issues for the  Electronic Society
Legal Issues for the Electronic SocietyJean Lequeux
 
Cloud Computing, nomadisme, documents électroniqueet continuité de service
Cloud Computing, nomadisme, documents électroniqueet continuité de serviceCloud Computing, nomadisme, documents électroniqueet continuité de service
Cloud Computing, nomadisme, documents électroniqueet continuité de serviceJean Lequeux
 
Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...
Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...
Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...Jean Lequeux
 

Más de Jean Lequeux (12)

Bilan2012Afisi
Bilan2012AfisiBilan2012Afisi
Bilan2012Afisi
 
Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social Networking
 
Lean Management for IT Functional Specifications
Lean Management for IT Functional SpecificationsLean Management for IT Functional Specifications
Lean Management for IT Functional Specifications
 
Swarm Intelligence of Social Networks
Swarm Intelligence of Social NetworksSwarm Intelligence of Social Networks
Swarm Intelligence of Social Networks
 
Urbanization of the Cloud
Urbanization of the CloudUrbanization of the Cloud
Urbanization of the Cloud
 
On the clouds, who owns what ?
On the clouds, who owns what ?On the clouds, who owns what ?
On the clouds, who owns what ?
 
Just a matter of Psychology
Just a matter of PsychologyJust a matter of Psychology
Just a matter of Psychology
 
A Universe of Virtual Powers
A Universe of Virtual PowersA Universe of Virtual Powers
A Universe of Virtual Powers
 
Legal Issues for the Electronic Society
Legal Issues for the  Electronic SocietyLegal Issues for the  Electronic Society
Legal Issues for the Electronic Society
 
Lean testing
Lean testingLean testing
Lean testing
 
Cloud Computing, nomadisme, documents électroniqueet continuité de service
Cloud Computing, nomadisme, documents électroniqueet continuité de serviceCloud Computing, nomadisme, documents électroniqueet continuité de service
Cloud Computing, nomadisme, documents électroniqueet continuité de service
 
Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...
Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...
Influences des langues indo-européennes sur le Japonais moderne et le Vietnam...
 

Último

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 

Último (20)

الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

The Internet Village goes on the cloud!

  • 1. From W orld W ide W eb to C loud C omputing C onnections Jean Louis LEQUEUX http://weltram.eu V 2.1 – May 17 th , 2011 Le Village Internet va sur le N uage N umérique
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.