Skip to main content

Day Two : The 2008 Africa Media Leadership Conference: “Doing Digital Media in Africa: Prospects, Promise, Uganda 2008

How can African Traditional Media can tap into new Social media and blogs
Dave Duarte, leading South African Blogger

outline
1. Online attention economy
2. Social media and blogs
3. Value Creations in the WWW( Wild Wide World)

If every thing is free online, what is not free, according to Dave
a. Trust
b. Brand
c. Authenticity

He suggested that we are living in the area of the new 4ps
of
1. peer to peer
2. participation
3. predictive modeling
4. personalization

He said the elements value creation WWW are
- Revelation
- Plasticity
- Aggregation

POINTERS TO TWO SITES
MUTI

Muti is a community site, dedicated to African content, which is driven by users posting interesting links which are then rated and discussed by others.


AMATOMU

Amatomu www.amatomu.com/ is a blog search engine and article aggregator, focusing on blogs published in South Africa.




CONCLUSION
the more you share, the more you win

Comments

Dave said…
Thanks Kwami, this is an excellent summary. I look forward to keeping in touch.

Popular posts from this blog

Vincent Chukwuemeka Ike's The Potter's Wheel

Currently reading Chukwuemeka Ike's The Potter's Wheel very interesting paper pack written by a prolific Nigeria writer the story set during the second World War and the only means of modern entertainment was the The Mobile Cinema Van. the book is very rich is proverbs and a lot of wise words The main character is Obuechina Maduabuchi ( mouthful) who happened to be the only boy born to his parents Mama Obu( short form of Obuechina) and Papa Lazarus Maduabuchi among six older sisters. Due to the "value" placed on the male child, he become a totaly spoilt brat, though academically brilliam Obu was growing into a hopelessly spoilt child to reverse this trend, Papa Lazarus decided to send him away as a servant to a schoolmasster with a dragon of a wife Of course, Obu goes and comes back very different published by University Press PLC Ibadan Nigeria 1993 email address is unipress AT skannet.com.gh though first published by Harvill Press 1973 ISBN 9780302832 WORDS FROM TH...

Evidence : Success of Connecting Citizens to Parliament Project by @penplusbytes

"The Committee on Government Assurances was established to play an oversight role of the Executive arm of government in Ghana. We were faced with the challenge of interacting effectively with citizens and getting their valuable feedback on project delivery statuses. You can understand our excitement when we started the Connecting Citizens to Parliament Project in partnership with Penplusbytes to implement an innovative mechanism of connecting citizens to Parliament, using new digital technologies including SMS, an online portal, a Mobile App and WhatsApp. Our work was more efficient as, for the first time ever, we had a dedicated website on which citizens could report on projects within their communities and reach out to us via an integrated media system about other governance issues that they had concerns with. The project also equipped our committee members with technology, information and knowledge management skills. We call on all stakeholders to support us, sustain the succes...

Strategies for better password management : Key to your online security

KWAMI AHIABENU  11 JULY 2016 Passwords are the key to your online life. They are the most popular mechanism to enable authorised access to various online resources for users. At the basic level, this type of security is made up of two parameters; a user name and password. The user name is usually static while best security practices demand that passwords are changed periodically.  The genesis of passwords dates back to ancient times when watchmen would require those wanting to enter an area to supply a password or catchphrase. Only persons with the correct password gained access.  Fast forwarding to our modern days, user names and passwords (a word or a string of characters) are now required to get access to protected computer operating systems, networks, database, Internet access via Wifi, online resources, mobile phones, automated teller machines (ATMs) and cars, among others.  Fundamentally, passwords are used to identify and distinguish between users, determine...