Scott Heiferman, founder of Meetup.com, explains how Meetup works, and how it can be used to set up face-to-face meetings for your own local volunteers.
This session teaches participants the essentials of successful blogging. What works. What doesn't. How to track the conversation flow and measure the impact of your own contributions using tools like Feedster, Technorati, Blogdex and Daypop.
Dan Gillmor, columnist, San Jose Mercury News, Jeff Jarvis, president & creative director, Advance.net, Jay Rosen, associate professor of journalism, NYU
The vote counting problems of the election in 2000 created much interest in improved voting systems. The natural inclination of many technologists would be to apply computer technology to the problem, but whether this can be done in a reliable and trustworthy way is a controversial subject. Many respected computer scientists don't think it can be done at all.
MoveOn.Org has become one of the largest and most effective advocacy organizations in the world, with more than two million members and a unique bottom-up style that allows the members to set the organization's priorities. Co-founder Wes Boyd explains the principles and internet-based tools that make MoveOn so effective.
How do we ensure that the "Second Superpower" Jim Moore proposes includes the poor as well as the rich? When a new democratic structure emerges from highly-wired westerners, how do we ensure it's fair and just for those currently unwired?
The man whose ground-breaking use of Internet-based campaigning propelled Howard Dean from obscurity to early front-runner, takes Teach-In participants inside the campaign's unconventional experiment in Internet politics.
Hear why David believes the Dean campaign has been so successful with its use of the Internet.
The Digital Millennium Copyright Act makes reverse engineering illegal in the U.S., and that's a bad thing for IT. Do recent changes in copyright law mean we need to police our employees for infringement? How about our customers? Are you responsible for traffic from anonymous users on your WiFi LANs? And what about those new data-retention regulations? (What's a CIO to do?)