Computer-mediated communication

Results: 7675



#Item
871Personal information managers / Calendaring software / Outlook Web App / Password / Software / Login / Email client / Computing / Email / Computer-mediated communication

Outlook Web Access OWA 1 HOW CAN I ACCESS MY EMAIL OWA allows you to connect to your work email wherever you can get to an internet connection.

Add to Reading List

Source URL: www.burges-salmon.com

Language: English - Date: 2015-05-06 12:08:11
872Internet / Spamming / Web 2.0 / Webmail / Cross-platform software / HTML email / Gmail / Hotmail / Message transfer agent / Email / Computer-mediated communication / Computing

Microsoft Word - h2emailmissy.doc

Add to Reading List

Source URL: www.eldrbarry.net

Language: English - Date: 2005-08-02 14:19:12
873Construction / Internet / Computer-mediated communication / Address / Data Protection Act / Email address harvesting / Anti-spam techniques / Email / Computing / Civil engineering

Notification of construction project The Data Protection Act 1998 requires the Health and Safety Executive for Northern Ireland (HSENI) to inform you that this form may include information about you (this is called ‘pe

Add to Reading List

Source URL: www.hseni.gov.uk

Language: English - Date: 2009-12-15 11:53:10
874English singers / John Lennon / Paul McCartney / Members of the Order of the British Empire / Computer-mediated communication / Collaborative software / Lennon–McCartney / Collaborative fiction / Collaborative learning / Collaboration / Music / The Beatles

Writing “Eyeball To Eyeball”: Building A Successful Collaboration by Rebecca Ingalls This essay is a chapter in Writing Spaces: Readings on Writing, Volume 2, a

Add to Reading List

Source URL: wac.colostate.edu

Language: English - Date: 2010-12-31 15:23:24
875Videotelephony / Electronics / Electronic engineering / Communication software / Call-recording software / VoIP VPN / Voice over IP / Computer-mediated communication / Broadband

International Journal of Innovative Computing, Information and Control Volume 5, Number 7, July 2009 c ICIC International °2009

Add to Reading List

Source URL: www.ijicic.org

Language: English - Date: 2009-05-31 22:47:39
876Internet / Electronic mailing list / Gmail / LISTSERV / Bounce address / Internet forum / Anti-spam techniques / Email / Computer-mediated communication / Computing

Welcome to VICTORIA, the online discussion forum for Victorian Studies. VICTORIA is a community devoted to the sharing of scholarly information and ideas about all aspects of 19th-century British culture and society. We

Add to Reading List

Source URL: www.victorianresearch.org

Language: English - Date: 2012-09-07 19:58:08
877Spamming / Internet / Gmail / Message transfer agent / Anti-spam techniques / Email authentication / Email / Computer-mediated communication / Computing

Trend Micro Incorporated reserves the right to make changes to this document and to Hosted Email Security described herein without notice. Before installing and using Hosted Email Security, please review the readme fil

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2013-09-10 04:21:37
878GoToMeeting / Citrix Online / Gototraining / Citrix Systems / GoToMyPC / GoToAssist / Web conferencing / Technical support / Remote desktop / Computing / Computer-mediated communication

PDF Document

Add to Reading List

Source URL: l1.osdimg.com

Language: English - Date: 2013-06-20 17:55:24
879Computer-mediated communication / Human–computer interaction / Groupware / Multimodal interaction / Virtual reality / Usability / Collaborative software / E-learning / Prototype / Science / Human–computer interaction / Technology

Towards a user-centred method for studying CVLEs Daphne Economou, William L. Mitchell and Tom Boyle* Department of Computing and Mathematics, Manchester Metropolitan University, John Dalton Building, Chester Street, Manc

Add to Reading List

Source URL: ui4all.ics.forth.gr

Language: English - Date: 2007-11-27 14:01:51
880Computer-mediated communication / Notification system / Spam / Personal digital assistant / Email / Computing / Internet

Information Services Using University IT securely and responsibly: a guide to reporting issues, loss and inappropriate use

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2013-08-20 06:45:09
UPDATE