SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Melissa Cardenas-Dow                                                                                         April 28, 2009
                                                                    Slides @ Slideshare: http://www.slideshare.net/micdow
melissa.cardenasdow@gmail.com

                                           Web 2.0 in 30 Minutes or Less:
                                            Concepts & Tools Overview

                                              List for Further Learning

What is Web 2.0?

Hof, R. (2006, June 5). Web 2.0 has corporate America spinning. BusinessWeek. Retrieved April 27, 2009, from
         BusinessWeek.com Web site:
         http://www.businessweek.com/technology/content/jun2006/tc20060605_424102.htm

Kelly, B. (2006, November 22). Web 2.0: what is it, how can I use it, how can I deploy it? Retrieved April 27, 2009,
         from UKOLN Web site: http://www.ukoln.ac.uk/web-focus/events/seminars/aslib-2006-11/

Madden, M., & Fox, S. (2006, October 5). Riding the waves of “Web 2.0.” Retrieved Pew Research Center Web
      site: http://pewresearch.org/pubs/71/riding-the-waves-of-web-20

O’Reilly, T. (2005). What is Web 2.0: Design patterns and business models for the next generation of software.
         Retrieved April 27, 2009, from O’Reilly Media Web site:
         http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html



Library 2.0

Abram, S., & Luther, J. (2004). Born with a chip. Library Journal, 129, 34-37. Retrieved April 27, 2009, from
       LibraryJournal.com Web site: http://www.libraryjournal.com/article/CA411572.html

Casey, M., & Savastinuk, L. (2006). Library 2.0. Library Journal, 131, 40-42. Retrieved April 27, 2009, from Library
        Journal.com Web site: http://www.libraryjournal.com/article/CA6365200.html



Cultural, Academic, Historic Ramifications

Shirky, C. (2003, February 10). Power laws, weblogs, and inequality. Clay Shirky’s Writings About the Internet.
         Retrieved April 27, 2009, from http://www.shirky.com/writings/powerlaw_weblog.html

Weinberger, D. (n.d.). Everything is miscellaneous: The power of the new digital disorder. Retrieved April 27, 2009,
      from Everything is Miscellaneous Web site: http://www.everythingismiscellaneous.com/

Weinberger, D. (Presenter). Everything is miscellaneous. (2007, May 11). [Streaming video]. Retrieved April 27,
      2009, from Google Video Web site: http://video.google.com/videoplay?docid=2159021324062223592

Wesch, M. (Creator). Information r/evolution. (2007, October 12). [Streaming video]. Retrieved April 27, 2009,
       from YouTube Web site: http://www.youtube.com/watch?v=-4CV05HyAbM

Wesch, M. (Creator). The machine is us/ing us (final version). (2007, March 8). [Streaming video]. Retrieved April
       27, 2009, from YouTube Web site: http://www.youtube.com/watch?v=NLlGopyXT_g

Más contenido relacionado

Similar a Web2.0 Reading List

Web20for parentsfinal
Web20for parentsfinalWeb20for parentsfinal
Web20for parentsfinalKaren Brooks
 
Web 2.0, A Gentle Overview
Web 2.0, A Gentle OverviewWeb 2.0, A Gentle Overview
Web 2.0, A Gentle OverviewBrian Gray
 
Ng Learning Styles Final
Ng Learning Styles FinalNg Learning Styles Final
Ng Learning Styles Finalcclark3
 
Living…and Thriving!…in a Library 2.0+ World
Living…and Thriving!…in a Library 2.0+ WorldLiving…and Thriving!…in a Library 2.0+ World
Living…and Thriving!…in a Library 2.0+ WorldPaula Ellis
 
Web 2.0 Setting The Stage For Extending Our Reach: Resource Guide
Web 2.0 Setting The Stage For Extending Our Reach: Resource GuideWeb 2.0 Setting The Stage For Extending Our Reach: Resource Guide
Web 2.0 Setting The Stage For Extending Our Reach: Resource Guidekennbicknell
 
RRLC 2007 - Library 2.0 Technologies
RRLC 2007 - Library 2.0 TechnologiesRRLC 2007 - Library 2.0 Technologies
RRLC 2007 - Library 2.0 Technologiessgreenleaf
 
Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Bryan Alexander
 
Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Bryan Alexander
 
Social software in education: an early 2007 overview
Social software in education: an early 2007 overviewSocial software in education: an early 2007 overview
Social software in education: an early 2007 overviewBryan Alexander
 
Web 2.0 and pedagogy overview, 2007
Web 2.0 and pedagogy overview, 2007Web 2.0 and pedagogy overview, 2007
Web 2.0 and pedagogy overview, 2007Bryan Alexander
 

Similar a Web2.0 Reading List (15)

Web20for parentsfinal
Web20for parentsfinalWeb20for parentsfinal
Web20for parentsfinal
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Web 2.0, A Gentle Overview
Web 2.0, A Gentle OverviewWeb 2.0, A Gentle Overview
Web 2.0, A Gentle Overview
 
Ng Learning Styles Final
Ng Learning Styles FinalNg Learning Styles Final
Ng Learning Styles Final
 
2.0 @ The #CSULib
2.0 @ The #CSULib2.0 @ The #CSULib
2.0 @ The #CSULib
 
Neccpics: Library Remix--Valenza
Neccpics: Library Remix--ValenzaNeccpics: Library Remix--Valenza
Neccpics: Library Remix--Valenza
 
Living…and Thriving!…in a Library 2.0+ World
Living…and Thriving!…in a Library 2.0+ WorldLiving…and Thriving!…in a Library 2.0+ World
Living…and Thriving!…in a Library 2.0+ World
 
Books For Web 2.0 A-Z
Books For Web 2.0 A-ZBooks For Web 2.0 A-Z
Books For Web 2.0 A-Z
 
Web 2.0 Setting The Stage For Extending Our Reach: Resource Guide
Web 2.0 Setting The Stage For Extending Our Reach: Resource GuideWeb 2.0 Setting The Stage For Extending Our Reach: Resource Guide
Web 2.0 Setting The Stage For Extending Our Reach: Resource Guide
 
Esc net
Esc netEsc net
Esc net
 
RRLC 2007 - Library 2.0 Technologies
RRLC 2007 - Library 2.0 TechnologiesRRLC 2007 - Library 2.0 Technologies
RRLC 2007 - Library 2.0 Technologies
 
Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006
 
Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006Web 2.0 and pedagogy overview, Wesleyan 2006
Web 2.0 and pedagogy overview, Wesleyan 2006
 
Social software in education: an early 2007 overview
Social software in education: an early 2007 overviewSocial software in education: an early 2007 overview
Social software in education: an early 2007 overview
 
Web 2.0 and pedagogy overview, 2007
Web 2.0 and pedagogy overview, 2007Web 2.0 and pedagogy overview, 2007
Web 2.0 and pedagogy overview, 2007
 

Más de Melissa Cardenas-Dow

Questioning Normality Through Disability Studies
Questioning Normality Through Disability StudiesQuestioning Normality Through Disability Studies
Questioning Normality Through Disability StudiesMelissa Cardenas-Dow
 
LIS590SJL: Social Justice in Information Professions: Catching Up to the Present
LIS590SJL: Social Justice in Information Professions: Catching Up to the PresentLIS590SJL: Social Justice in Information Professions: Catching Up to the Present
LIS590SJL: Social Justice in Information Professions: Catching Up to the PresentMelissa Cardenas-Dow
 

Más de Melissa Cardenas-Dow (8)

Questioning Normality Through Disability Studies
Questioning Normality Through Disability StudiesQuestioning Normality Through Disability Studies
Questioning Normality Through Disability Studies
 
Ageism Or, Age Discrimination
Ageism Or, Age DiscriminationAgeism Or, Age Discrimination
Ageism Or, Age Discrimination
 
LIS590SJL: Social Justice in Information Professions: Catching Up to the Present
LIS590SJL: Social Justice in Information Professions: Catching Up to the PresentLIS590SJL: Social Justice in Information Professions: Catching Up to the Present
LIS590SJL: Social Justice in Information Professions: Catching Up to the Present
 
Hidden disabilities
Hidden disabilitiesHidden disabilities
Hidden disabilities
 
I rpresentation ppt2010final
I rpresentation ppt2010finalI rpresentation ppt2010final
I rpresentation ppt2010final
 
Digital Curation Intro
Digital Curation IntroDigital Curation Intro
Digital Curation Intro
 
Race & ethnic studies
Race & ethnic studiesRace & ethnic studies
Race & ethnic studies
 
Web 2.0 in 30 Minutes or Less
Web 2.0 in 30 Minutes or LessWeb 2.0 in 30 Minutes or Less
Web 2.0 in 30 Minutes or Less
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Web2.0 Reading List

  • 1. Melissa Cardenas-Dow April 28, 2009 Slides @ Slideshare: http://www.slideshare.net/micdow melissa.cardenasdow@gmail.com Web 2.0 in 30 Minutes or Less: Concepts & Tools Overview List for Further Learning What is Web 2.0? Hof, R. (2006, June 5). Web 2.0 has corporate America spinning. BusinessWeek. Retrieved April 27, 2009, from BusinessWeek.com Web site: http://www.businessweek.com/technology/content/jun2006/tc20060605_424102.htm Kelly, B. (2006, November 22). Web 2.0: what is it, how can I use it, how can I deploy it? Retrieved April 27, 2009, from UKOLN Web site: http://www.ukoln.ac.uk/web-focus/events/seminars/aslib-2006-11/ Madden, M., & Fox, S. (2006, October 5). Riding the waves of “Web 2.0.” Retrieved Pew Research Center Web site: http://pewresearch.org/pubs/71/riding-the-waves-of-web-20 O’Reilly, T. (2005). What is Web 2.0: Design patterns and business models for the next generation of software. Retrieved April 27, 2009, from O’Reilly Media Web site: http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html Library 2.0 Abram, S., & Luther, J. (2004). Born with a chip. Library Journal, 129, 34-37. Retrieved April 27, 2009, from LibraryJournal.com Web site: http://www.libraryjournal.com/article/CA411572.html Casey, M., & Savastinuk, L. (2006). Library 2.0. Library Journal, 131, 40-42. Retrieved April 27, 2009, from Library Journal.com Web site: http://www.libraryjournal.com/article/CA6365200.html Cultural, Academic, Historic Ramifications Shirky, C. (2003, February 10). Power laws, weblogs, and inequality. Clay Shirky’s Writings About the Internet. Retrieved April 27, 2009, from http://www.shirky.com/writings/powerlaw_weblog.html Weinberger, D. (n.d.). Everything is miscellaneous: The power of the new digital disorder. Retrieved April 27, 2009, from Everything is Miscellaneous Web site: http://www.everythingismiscellaneous.com/ Weinberger, D. (Presenter). Everything is miscellaneous. (2007, May 11). [Streaming video]. Retrieved April 27, 2009, from Google Video Web site: http://video.google.com/videoplay?docid=2159021324062223592 Wesch, M. (Creator). Information r/evolution. (2007, October 12). [Streaming video]. Retrieved April 27, 2009, from YouTube Web site: http://www.youtube.com/watch?v=-4CV05HyAbM Wesch, M. (Creator). The machine is us/ing us (final version). (2007, March 8). [Streaming video]. Retrieved April 27, 2009, from YouTube Web site: http://www.youtube.com/watch?v=NLlGopyXT_g