Flylib.com
Secrets of Podcasting, Second Edition: Audio Blogging for the Masses (2nd Edition)
Secrets of Podcasting, Second Edition: Audio Blogging for the Masses (2nd Edition)
ISBN: 0321438434
EAN: 2147483647
Year: 2004
Pages: 89
Authors:
Bart G. Farkas
BUY ON AMAZON
Secrets of Podcasting, Second Edition: Audio Blogging for the Masses
Table of Contents
Copyright
Acknowledgments
Foreword
Chapter 1. Podcasting Basics
What Is Podcasting?
How It Works
Why Podcast?
Commercial Podcasting
The Podcasting Echo
A Brief History of Podcasting
Chapter 2. Jumping In
Getting Started
Podscope: Google for Podcasts
Finding Commercial Podcasts
Finding Free Commercial Podcasts
Finding Educational Podcasts
Listening to Podcasts
Chapter 3. Creating a Podcast
Content
Before the Podcast
Equipment
Software
Sound Recording and Editing Tips
Music
Tutorial: Creating a Podcast
Chapter 4. Video Podcasting
Defining Video Podcasting
Exploring Video Podcasts
Watching Video Podcasts
Creating a Video Podcast
Creating a Video Podcast on a Windows PC
Creating a Video Podcast on a Macintosh
Chapter 5. Podcast Distribution
RSS
Alternative Podcasting Distribution Options
RSS Feed Software Options
Publishing a Podcast with iWeb
Web-Site Packagers
A Talk with Swoopy of Skepticality
Appendix A. Resources
Podcasting-Related Web Sites
Glossary
A
B
C
D
F
H
I
L
M
N
O
P
R
S
U
V
W
X
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
V
W
X
Z
Secrets of Podcasting, Second Edition: Audio Blogging for the Masses (2nd Edition)
ISBN: 0321438434
EAN: 2147483647
Year: 2004
Pages: 89
Authors:
Bart G. Farkas
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Conceptual Model Reports
Editing Logical Models”Advanced Aspects
Reverse Engineering Physical Schemas to Logical Models
Logical Database Model Reports
Change Propagation and Round Trip Engineering
Java I/O
File Streams
Reading and Writing Objects
Sealed Objects
Converting Between Byte Arrays and Strings
Pipes
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
Making Sure You Are Ready to Begin
Who Are the Attackers?
What Do Attackers Do?
Procurement Best Practices
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Cisco CallManager User Configuration
Time-of-Day Routing Usage Scenario
What Is Cryptography?
Trace Analysis
Quality Report Tool
Introduction to 80x86 Assembly Language and Computer Architecture
Branching and Looping
String Operations
The Assembly Process
Floating-Point Arithmetic
Decimal Arithmetic
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies