SlideShare a Scribd company logo
1 of 20
Download to read offline
Spoke builds enterprise applications that deliver
insight from--and access to--human capital through
      intra- and extra-enterprise relationships

   Connecting People to Knowledge Through Relationships


 Andrew Halliday
 VP Business Development
 Andy.Halliday@spoke.com


                                  1
                      Spoke Software - Confidential
Social Networks, and Social Network Analysis...Some
Terms of Art

•   Links are “arcs” between “nodes” in a “graph”
     – Links (arcs) between people can be:
          •   declared
          •   observed/recorded

•   “Degrees of separation” measures the number of arcs separating nodes
•   Most current web social networks are fashioned of declared arcs
     – Web interfaces for creating one’s node/profile, and workflow to collect arcs
     – Graph represents the “n degrees” of all inter-connected nodes
     – Users can typically navigate paths along arcs to friends-of-friends
•   Social Network Analysis...two distinct kinds
     1. simple mapping of declared social networks (arcs are undifferentiated)
     2. analysis of digital messaging to establish social networks and create measures
        of strength of relationships (arcs are quantified)


                                              2
                                  Spoke Software - Confidential
What if You could…



•   Discover and measure all the private relationships held within a
    company and its partners, without data entry?
•   Get everyone to participate because their personal relationship
    information is kept private, and under their control?
•   Deliver cooperative insight and access from all company
    relationships with active participation and permission, opt-in?
•   Bring any relationship the company, its partners, and affiliates
    have to bear on any business situation?
•   Discover the knowledge resources the enterprise is connected
    to through relationships?



                                      3
                          Spoke Software - Confidential
Discovering organizational relationship capital

Your workgroup network                              Human Resources inside
                                                    or outside the company



                                     Northeast Division                      West Division




                               “light up” all the channels of insight and access




 © 2003 Spoke Software, Inc.
                                           4
                               Spoke Software - Confidential
Networked Users




                                               + those known by users




Message analysis extends Network Comprehension and Reach to all those
known by networked users in email...with no data entry



                                     5
                         Spoke Software - Confidential
Reach in Social Networks, and Diversity

•   Constraints on reach in “declared arc” networks
     –   Limited to those who join
     –   Limited to the scope of user’s input effort
     –   Limited to memorable/comfortable connections
•   Automated discovery in electronic messaging enables broader reach, and
    comprehends many non-users
•   Including those known to users creates a comprehensive map of social networks, and
    rich data, but this demands etiquette and privacy controls for users, and especially
    non-users
     –   System Messaging to/through users only
     –   Freedom from social pressure for introductions
     –   Inclusion of thousands of user correspondents requires differentiation among various
         categories/levels of relationship
•   The benefit is Diversity
     –   inclusion of both strong ties and “the strength of weak ties”
     –   Innovations and information value come from as-yet-unexplored relationship capital



                                                   6
                                       Spoke Software - Confidential
Extra-enterprise reach is essential to creating value in
external and multi-company business alliances

•   Many if not most relationships of value to the enterprise are outside
    the firewall
•   Intra-enterprise discovery systems are limited to one degree beyond
    the firewall
     – Effective for intra-enterprise collaboration
     – Extra-enterprise collaboration depends on navigation beyond 1 degree
•   Federation with broad public networks enables discovery of external
    relationships many degrees beyond the firewall




                                           7
                               Spoke Software - Confidential
“Private information self-determination”
Maintaining privacy through individual control

•   Your information is yours, for your eyes only...and my information
    is mine
•   Never reveal contact information
•   Never allow anyone to discover who-knows-whom
•   Provide fine-grained control over movement of my data
•   Provide articulate control over who can access/message me
•   Allow permissioned disclosure of private information
•   Design Principle: Relationships are owned by the individual, not the
    enterprise...any other premise results in sabotage




                                        8
                            Spoke Software - Confidential
Future Impact of Social Networks


•   Search
    – by creating personalized context for results based on whom-you-know
•   Commerce
    – by facilitating relevant influencer effects on Tipping Points in societies
    – personally relevant peer reviews based on network proximity
•   Communities
    – by supporting flexible, personally-defined networks and subnetworks
•   Media
    – by promoting and coordinating content choices within cohorts, creating
      communal experience and keeping you au courant with your cohort




                                          9
                              Spoke Software - Confidential
Online Social Networks will have an impact on
internetworking...these are some possible developments


1. The emergence of extensive online registries with personal profiles
2. New model of relevance for peoplesearch...”Who matters most are
   those most connected, and/or those most connected to you”
3. Profiles derived from social cohorts will be used for content routing,
   search personalization, and alignment into communities-of-interest
4. The emergence of trusted messaging networks based on
   relationship managers can replace the polluted general emailbox
5. Social networks will be used for knowledge collection, collaboration,
   and dissemination, with higher personal relevance based on society




                                       10
                           Spoke Software - Confidential
Personal Context and Productivity: Managing the volume
          problem in the digital environment




                                 11
                     Spoke Software - Confidential
Person-centric knowledge assets are auto-generated in
  Social Network systems

Visualization of Personal Network                  Building Sharable Dossiers




  • Privacy maintained                             • Automated data collection on persons
  • Individual or organizational                   • Plus manual collection and annotation
  • Handles massive data organization              • Research asset accumulates

                                           12
                               Spoke Software - Confidential
1. Online registry of professional and personal profiles


•   Social Networks are providing a motive for personal self-profiling
•   Publish Profile with multi-tiered access permissions-management
    –   based on relationship levels and roles
    –   allows multiple perspectives of personal information
•   The role of profiles in the semantic web
    – Who is managing you as an entity on the web?
•   The value of self-declared interests, preferences, and expertise
•   The value of messaging-derived interests, preferences, and
    expertise
•   The inclusion of RSS and weblogs to circulate and collect content
    and context about individuals


                                         13
                             Spoke Software - Confidential
1. Profiles: example of self-attributed user profile




                                  14
                      Spoke Software - Confidential
2. Search: Comprehensive Search on People at
Companies




                               15
                   Spoke Software - Confidential
2. PeopleSearch relevance


•   Personalized results based on proximity in your network
     – The person you are looking for is more likely to be connected to your
       social network than not
•   Relevance based on number of connections
     – Google changed page rank relevance to “most connected”
     – People are more relevant the more connected they are...to you
•   Results based on match in profiles
     – Declared Interests, Preferences, and Needs
     – News and Event-related context sensitivity




                                          16
                              Spoke Software - Confidential
3. Social Network data about who-knows-whom
provides a new source of context about individuals

•   My Personal context is defined by my own relationship circles
•   My context can be derived from analysis of my social cohort
•   Profiling by association (whom you know defines your attributes)
•   Cohorts create indicators for content relevance
     – In information search
     – In semantic routing of content
     – Targeting of media and advertising
     – Suggested distribution in publish/subscribe networks
•   “Connectedness” to circles of experts can denote subject familiarity
•   All this governed by personal privacy rules with permissions



                                           17
                               Spoke Software - Confidential
4. Social Networks create New Models for Messaging
and Communication

•   Creates context for communication
     – Social networks cut through the chaos of large collectives and create
       stronger paths of connection and provide for the creation of subgroups
•   Trusted networks create implied endorsement even after crossing
    multiple degrees
•   Position in network may provide source qualification for new
    messages
•   Audit trails based on relationship or membership in topical
    communities qualifies contact and increases comfort with “strangers”
•   Declared connections provide the basis for two-way permissions
    and knowledge sharing



                                         18
                             Spoke Software - Confidential
Enabling Trusted Messaging and Collaboration


•   Like IM, pre-authorized two-way channels based on your SN circles
•   Unlike email, not openly accessible to anyone who can determine
    address
•   Validated senders=those in my network, or those who can pass
    through my network
•   Social Networks for Dissemination: allows discovery and validation
    of whom-to-message in extended trusted networks
•   The end of the General Inbox
     – Prioritization and organization by strength of relationship
     – Pre-qualification of new senders based on referral endorsements or ties
       to reference networks
     – Inboxes based on topical or community-of-interest networks


                                           19
                               Spoke Software - Confidential
Eventually, Social Network Analysis is applicable to
other messaging/data exchanges

1. SN currently focused on web interactions/transactions and email
2. Next: Instant Messaging
3. Then: Voice over IP
4. Social Network Analysis and the Semantic Web
   1. Auto-creation or nomination of RDF assertions about individuals
       •   Based on user profiles
       •   Based on cohorts
   2. Metadata about software systems interactions
       •   Relationship analysis of software systems’ behavior as nodes in the social
           network of web services (software agents analogous to humans as nodes in
           the graph)
       •   What is the SOR of this agent with all others like X, where SOR is a
           measure based on successful transactions?
       •   Finally, reputation tracking of software agents representing humans....


                                           20
                               Spoke Software - Confidential

More Related Content

What's hot

A Twitter for your Intranet
A Twitter for your IntranetA Twitter for your Intranet
A Twitter for your IntranetRoss Mayfield
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
The Future of the Intranet: Road to Enterprise 2.0
The Future of the Intranet: Road to Enterprise 2.0The Future of the Intranet: Road to Enterprise 2.0
The Future of the Intranet: Road to Enterprise 2.0Adis Jugo
 
Network Strategy Overview
Network Strategy OverviewNetwork Strategy Overview
Network Strategy OverviewJessica Gheiler
 
Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011Rob Garner
 
GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)OneEarthFuture
 
Intranets - Vision, Approach and Best Practices by Optimus BT
Intranets - Vision, Approach and Best Practices by Optimus BTIntranets - Vision, Approach and Best Practices by Optimus BT
Intranets - Vision, Approach and Best Practices by Optimus BTOptimus BT
 
Strategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessStrategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessMarco Brambilla
 
IE Masters in Management Admissions Presentation
IE Masters in Management Admissions PresentationIE Masters in Management Admissions Presentation
IE Masters in Management Admissions Presentationsahaana7
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksCharlene Li
 
Linking In-Game Events and Entities to Social Data on the Web
Linking In-Game Events and Entities to Social Data on the WebLinking In-Game Events and Entities to Social Data on the Web
Linking In-Game Events and Entities to Social Data on the WebJohn Breslin
 
Why Social Media Matters to You and Your Agency
Why Social Media Matters to You and Your AgencyWhy Social Media Matters to You and Your Agency
Why Social Media Matters to You and Your Agencygvaughan
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
 
Breaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsBreaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsJohn Breslin
 
Tools and Services for More Intelligent Meta Networks
Tools and Services for More Intelligent Meta NetworksTools and Services for More Intelligent Meta Networks
Tools and Services for More Intelligent Meta NetworksDuncan Work
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schoolsMichael Young
 

What's hot (17)

A Twitter for your Intranet
A Twitter for your IntranetA Twitter for your Intranet
A Twitter for your Intranet
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
The Future of the Intranet: Road to Enterprise 2.0
The Future of the Intranet: Road to Enterprise 2.0The Future of the Intranet: Road to Enterprise 2.0
The Future of the Intranet: Road to Enterprise 2.0
 
Network Strategy Overview
Network Strategy OverviewNetwork Strategy Overview
Network Strategy Overview
 
Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011Search and Social Signals Pubcon 2011
Search and Social Signals Pubcon 2011
 
GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)GOV-IT OEF's Governance Network (to be)
GOV-IT OEF's Governance Network (to be)
 
Intranets - Vision, Approach and Best Practices by Optimus BT
Intranets - Vision, Approach and Best Practices by Optimus BTIntranets - Vision, Approach and Best Practices by Optimus BT
Intranets - Vision, Approach and Best Practices by Optimus BT
 
Strategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessStrategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital business
 
IE Masters in Management Admissions Presentation
IE Masters in Management Admissions PresentationIE Masters in Management Admissions Presentation
IE Masters in Management Admissions Presentation
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social Networks
 
Linking In-Game Events and Entities to Social Data on the Web
Linking In-Game Events and Entities to Social Data on the WebLinking In-Game Events and Entities to Social Data on the Web
Linking In-Game Events and Entities to Social Data on the Web
 
Why Social Media Matters to You and Your Agency
Why Social Media Matters to You and Your AgencyWhy Social Media Matters to You and Your Agency
Why Social Media Matters to You and Your Agency
 
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...
 
Creating Knowledge Sharing Networks
Creating Knowledge Sharing NetworksCreating Knowledge Sharing Networks
Creating Knowledge Sharing Networks
 
Breaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsBreaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social Semantics
 
Tools and Services for More Intelligent Meta Networks
Tools and Services for More Intelligent Meta NetworksTools and Services for More Intelligent Meta Networks
Tools and Services for More Intelligent Meta Networks
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schools
 

Viewers also liked

The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuationipspat
 
Blogs, Wikis and Enterprise Social Networking Software
Blogs, Wikis and Enterprise Social Networking SoftwareBlogs, Wikis and Enterprise Social Networking Software
Blogs, Wikis and Enterprise Social Networking SoftwareCédric Hüsler
 
Experience Manager 6 Developer Features - Highlights
Experience Manager 6 Developer Features - HighlightsExperience Manager 6 Developer Features - Highlights
Experience Manager 6 Developer Features - HighlightsCédric Hüsler
 
SAP mobile platform & mobile apps
SAP mobile platform & mobile appsSAP mobile platform & mobile apps
SAP mobile platform & mobile appsCapgemini
 
SAP Kapsel Plugins For Cordova
SAP Kapsel Plugins For CordovaSAP Kapsel Plugins For Cordova
SAP Kapsel Plugins For CordovaChris Whealy
 

Viewers also liked (7)

The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuation
 
Blogs, Wikis and Enterprise Social Networking Software
Blogs, Wikis and Enterprise Social Networking SoftwareBlogs, Wikis and Enterprise Social Networking Software
Blogs, Wikis and Enterprise Social Networking Software
 
клінічна імунологія та алергологія г.м. дранік, о.с. прилуцький, ю.і. бажора ...
клінічна імунологія та алергологія г.м. дранік, о.с. прилуцький, ю.і. бажора ...клінічна імунологія та алергологія г.м. дранік, о.с. прилуцький, ю.і. бажора ...
клінічна імунологія та алергологія г.м. дранік, о.с. прилуцький, ю.і. бажора ...
 
SAP Mobile Platform Overview
SAP Mobile Platform OverviewSAP Mobile Platform Overview
SAP Mobile Platform Overview
 
Experience Manager 6 Developer Features - Highlights
Experience Manager 6 Developer Features - HighlightsExperience Manager 6 Developer Features - Highlights
Experience Manager 6 Developer Features - Highlights
 
SAP mobile platform & mobile apps
SAP mobile platform & mobile appsSAP mobile platform & mobile apps
SAP mobile platform & mobile apps
 
SAP Kapsel Plugins For Cordova
SAP Kapsel Plugins For CordovaSAP Kapsel Plugins For Cordova
SAP Kapsel Plugins For Cordova
 

Similar to Social Networking Software

The Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsThe Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsClearanceJobs
 
weConnect - the Enterprise
weConnect - the EnterpriseweConnect - the Enterprise
weConnect - the Enterprisehugoleijtens
 
Pubcon Las Vegas 2012 - Social Signals on Search, presented by Rob Garner
Pubcon Las Vegas 2012 - Social Signals on Search, presented by Rob GarnerPubcon Las Vegas 2012 - Social Signals on Search, presented by Rob Garner
Pubcon Las Vegas 2012 - Social Signals on Search, presented by Rob GarnerRob Garner
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
Panel presentation at ECDL 2009
Panel presentation at ECDL 2009Panel presentation at ECDL 2009
Panel presentation at ECDL 2009Paul Walk
 
Nyheterna I IBM Connections version 4
Nyheterna I IBM Connections version 4Nyheterna I IBM Connections version 4
Nyheterna I IBM Connections version 4IBM Sverige
 
Proven social media action plan for professionals & small business
Proven social media action plan for professionals & small businessProven social media action plan for professionals & small business
Proven social media action plan for professionals & small businessDoug Hay & Associates
 
Knowledge Plaza
Knowledge PlazaKnowledge Plaza
Knowledge PlazaElium
 
L003 Network Computing (2016)
L003 Network Computing (2016)L003 Network Computing (2016)
L003 Network Computing (2016)Jan Wong
 
Productguide weConnect 2012
Productguide weConnect 2012Productguide weConnect 2012
Productguide weConnect 2012hugoleijtens
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social SoftwareRalph Paglia
 
How Social Networking can Enable Mission Success: An overview for Project Man...
How Social Networking can Enable Mission Success: An overview for Project Man...How Social Networking can Enable Mission Success: An overview for Project Man...
How Social Networking can Enable Mission Success: An overview for Project Man...Robert_
 
Antunes.emma
Antunes.emmaAntunes.emma
Antunes.emmaNASAPMC
 
Participant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking TrainingParticipant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking TrainingAngela Siefer
 

Similar to Social Networking Software (20)

The Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared ProfessionalsThe Cleared Network: Recruiting and Networking with Cleared Professionals
The Cleared Network: Recruiting and Networking with Cleared Professionals
 
weConnect - the Enterprise
weConnect - the EnterpriseweConnect - the Enterprise
weConnect - the Enterprise
 
Bk datasheet2010 en
Bk datasheet2010 enBk datasheet2010 en
Bk datasheet2010 en
 
Pubcon Las Vegas 2012 - Social Signals on Search, presented by Rob Garner
Pubcon Las Vegas 2012 - Social Signals on Search, presented by Rob GarnerPubcon Las Vegas 2012 - Social Signals on Search, presented by Rob Garner
Pubcon Las Vegas 2012 - Social Signals on Search, presented by Rob Garner
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Research 3.0
Research 3.0Research 3.0
Research 3.0
 
Panel presentation at ECDL 2009
Panel presentation at ECDL 2009Panel presentation at ECDL 2009
Panel presentation at ECDL 2009
 
Nyheterna I IBM Connections version 4
Nyheterna I IBM Connections version 4Nyheterna I IBM Connections version 4
Nyheterna I IBM Connections version 4
 
Proven social media action plan for professionals & small business
Proven social media action plan for professionals & small businessProven social media action plan for professionals & small business
Proven social media action plan for professionals & small business
 
Knowledge Plaza
Knowledge PlazaKnowledge Plaza
Knowledge Plaza
 
Knowledge Plaza
Knowledge PlazaKnowledge Plaza
Knowledge Plaza
 
L003 Network Computing (2016)
L003 Network Computing (2016)L003 Network Computing (2016)
L003 Network Computing (2016)
 
Productguide weConnect 2012
Productguide weConnect 2012Productguide weConnect 2012
Productguide weConnect 2012
 
Baltimore 3
Baltimore 3Baltimore 3
Baltimore 3
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software
 
5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software
 
How Social Networking can Enable Mission Success: An overview for Project Man...
How Social Networking can Enable Mission Success: An overview for Project Man...How Social Networking can Enable Mission Success: An overview for Project Man...
How Social Networking can Enable Mission Success: An overview for Project Man...
 
Antunes.emma
Antunes.emmaAntunes.emma
Antunes.emma
 
Apurv smm
Apurv smmApurv smm
Apurv smm
 
Participant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking TrainingParticipant Guide for INROADS Social Networking Training
Participant Guide for INROADS Social Networking Training
 

More from ipspat

Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internetipspat
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protectionsipspat
 
Outsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by AgilentOutsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by Agilentipspat
 
The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuationipspat
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Overview of Legal Structures for Outsourcing
Overview of Legal Structures for OutsourcingOverview of Legal Structures for Outsourcing
Overview of Legal Structures for Outsourcingipspat
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issuesipspat
 
Licensing & IP Valutation
Licensing & IP ValutationLicensing & IP Valutation
Licensing & IP Valutationipspat
 
Current Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. StrategiesCurrent Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. Strategiesipspat
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IPipspat
 
Intellectual Property Rights in Nanotechnology
Intellectual Property Rights in NanotechnologyIntellectual Property Rights in Nanotechnology
Intellectual Property Rights in Nanotechnologyipspat
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerationsipspat
 
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...ipspat
 

More from ipspat (13)

Building Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the InternetBuilding Fences In Cyberspace: Business Method Patents and the Internet
Building Fences In Cyberspace: Business Method Patents and the Internet
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 
Outsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by AgilentOutsourcing Lessons as Learned and Applied by Agilent
Outsourcing Lessons as Learned and Applied by Agilent
 
The Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent ValuationThe Role of Claims Construction in Patent Valuation
The Role of Claims Construction in Patent Valuation
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Overview of Legal Structures for Outsourcing
Overview of Legal Structures for OutsourcingOverview of Legal Structures for Outsourcing
Overview of Legal Structures for Outsourcing
 
Keeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security IssuesKeeping Information Safe: Privacy and Security Issues
Keeping Information Safe: Privacy and Security Issues
 
Licensing & IP Valutation
Licensing & IP ValutationLicensing & IP Valutation
Licensing & IP Valutation
 
Current Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. StrategiesCurrent Issues in International Cross-Border I.P. Strategies
Current Issues in International Cross-Border I.P. Strategies
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
 
Intellectual Property Rights in Nanotechnology
Intellectual Property Rights in NanotechnologyIntellectual Property Rights in Nanotechnology
Intellectual Property Rights in Nanotechnology
 
Developing a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP ConsiderationsDeveloping a National Software Strategy: Some IP Considerations
Developing a National Software Strategy: Some IP Considerations
 
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
Changing Relationship Between Venture Capital And Angels - Impact On Funding ...
 

Recently uploaded

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Recently uploaded (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Social Networking Software

  • 1. Spoke builds enterprise applications that deliver insight from--and access to--human capital through intra- and extra-enterprise relationships Connecting People to Knowledge Through Relationships Andrew Halliday VP Business Development Andy.Halliday@spoke.com 1 Spoke Software - Confidential
  • 2. Social Networks, and Social Network Analysis...Some Terms of Art • Links are “arcs” between “nodes” in a “graph” – Links (arcs) between people can be: • declared • observed/recorded • “Degrees of separation” measures the number of arcs separating nodes • Most current web social networks are fashioned of declared arcs – Web interfaces for creating one’s node/profile, and workflow to collect arcs – Graph represents the “n degrees” of all inter-connected nodes – Users can typically navigate paths along arcs to friends-of-friends • Social Network Analysis...two distinct kinds 1. simple mapping of declared social networks (arcs are undifferentiated) 2. analysis of digital messaging to establish social networks and create measures of strength of relationships (arcs are quantified) 2 Spoke Software - Confidential
  • 3. What if You could… • Discover and measure all the private relationships held within a company and its partners, without data entry? • Get everyone to participate because their personal relationship information is kept private, and under their control? • Deliver cooperative insight and access from all company relationships with active participation and permission, opt-in? • Bring any relationship the company, its partners, and affiliates have to bear on any business situation? • Discover the knowledge resources the enterprise is connected to through relationships? 3 Spoke Software - Confidential
  • 4. Discovering organizational relationship capital Your workgroup network Human Resources inside or outside the company Northeast Division West Division “light up” all the channels of insight and access © 2003 Spoke Software, Inc. 4 Spoke Software - Confidential
  • 5. Networked Users + those known by users Message analysis extends Network Comprehension and Reach to all those known by networked users in email...with no data entry 5 Spoke Software - Confidential
  • 6. Reach in Social Networks, and Diversity • Constraints on reach in “declared arc” networks – Limited to those who join – Limited to the scope of user’s input effort – Limited to memorable/comfortable connections • Automated discovery in electronic messaging enables broader reach, and comprehends many non-users • Including those known to users creates a comprehensive map of social networks, and rich data, but this demands etiquette and privacy controls for users, and especially non-users – System Messaging to/through users only – Freedom from social pressure for introductions – Inclusion of thousands of user correspondents requires differentiation among various categories/levels of relationship • The benefit is Diversity – inclusion of both strong ties and “the strength of weak ties” – Innovations and information value come from as-yet-unexplored relationship capital 6 Spoke Software - Confidential
  • 7. Extra-enterprise reach is essential to creating value in external and multi-company business alliances • Many if not most relationships of value to the enterprise are outside the firewall • Intra-enterprise discovery systems are limited to one degree beyond the firewall – Effective for intra-enterprise collaboration – Extra-enterprise collaboration depends on navigation beyond 1 degree • Federation with broad public networks enables discovery of external relationships many degrees beyond the firewall 7 Spoke Software - Confidential
  • 8. “Private information self-determination” Maintaining privacy through individual control • Your information is yours, for your eyes only...and my information is mine • Never reveal contact information • Never allow anyone to discover who-knows-whom • Provide fine-grained control over movement of my data • Provide articulate control over who can access/message me • Allow permissioned disclosure of private information • Design Principle: Relationships are owned by the individual, not the enterprise...any other premise results in sabotage 8 Spoke Software - Confidential
  • 9. Future Impact of Social Networks • Search – by creating personalized context for results based on whom-you-know • Commerce – by facilitating relevant influencer effects on Tipping Points in societies – personally relevant peer reviews based on network proximity • Communities – by supporting flexible, personally-defined networks and subnetworks • Media – by promoting and coordinating content choices within cohorts, creating communal experience and keeping you au courant with your cohort 9 Spoke Software - Confidential
  • 10. Online Social Networks will have an impact on internetworking...these are some possible developments 1. The emergence of extensive online registries with personal profiles 2. New model of relevance for peoplesearch...”Who matters most are those most connected, and/or those most connected to you” 3. Profiles derived from social cohorts will be used for content routing, search personalization, and alignment into communities-of-interest 4. The emergence of trusted messaging networks based on relationship managers can replace the polluted general emailbox 5. Social networks will be used for knowledge collection, collaboration, and dissemination, with higher personal relevance based on society 10 Spoke Software - Confidential
  • 11. Personal Context and Productivity: Managing the volume problem in the digital environment 11 Spoke Software - Confidential
  • 12. Person-centric knowledge assets are auto-generated in Social Network systems Visualization of Personal Network Building Sharable Dossiers • Privacy maintained • Automated data collection on persons • Individual or organizational • Plus manual collection and annotation • Handles massive data organization • Research asset accumulates 12 Spoke Software - Confidential
  • 13. 1. Online registry of professional and personal profiles • Social Networks are providing a motive for personal self-profiling • Publish Profile with multi-tiered access permissions-management – based on relationship levels and roles – allows multiple perspectives of personal information • The role of profiles in the semantic web – Who is managing you as an entity on the web? • The value of self-declared interests, preferences, and expertise • The value of messaging-derived interests, preferences, and expertise • The inclusion of RSS and weblogs to circulate and collect content and context about individuals 13 Spoke Software - Confidential
  • 14. 1. Profiles: example of self-attributed user profile 14 Spoke Software - Confidential
  • 15. 2. Search: Comprehensive Search on People at Companies 15 Spoke Software - Confidential
  • 16. 2. PeopleSearch relevance • Personalized results based on proximity in your network – The person you are looking for is more likely to be connected to your social network than not • Relevance based on number of connections – Google changed page rank relevance to “most connected” – People are more relevant the more connected they are...to you • Results based on match in profiles – Declared Interests, Preferences, and Needs – News and Event-related context sensitivity 16 Spoke Software - Confidential
  • 17. 3. Social Network data about who-knows-whom provides a new source of context about individuals • My Personal context is defined by my own relationship circles • My context can be derived from analysis of my social cohort • Profiling by association (whom you know defines your attributes) • Cohorts create indicators for content relevance – In information search – In semantic routing of content – Targeting of media and advertising – Suggested distribution in publish/subscribe networks • “Connectedness” to circles of experts can denote subject familiarity • All this governed by personal privacy rules with permissions 17 Spoke Software - Confidential
  • 18. 4. Social Networks create New Models for Messaging and Communication • Creates context for communication – Social networks cut through the chaos of large collectives and create stronger paths of connection and provide for the creation of subgroups • Trusted networks create implied endorsement even after crossing multiple degrees • Position in network may provide source qualification for new messages • Audit trails based on relationship or membership in topical communities qualifies contact and increases comfort with “strangers” • Declared connections provide the basis for two-way permissions and knowledge sharing 18 Spoke Software - Confidential
  • 19. Enabling Trusted Messaging and Collaboration • Like IM, pre-authorized two-way channels based on your SN circles • Unlike email, not openly accessible to anyone who can determine address • Validated senders=those in my network, or those who can pass through my network • Social Networks for Dissemination: allows discovery and validation of whom-to-message in extended trusted networks • The end of the General Inbox – Prioritization and organization by strength of relationship – Pre-qualification of new senders based on referral endorsements or ties to reference networks – Inboxes based on topical or community-of-interest networks 19 Spoke Software - Confidential
  • 20. Eventually, Social Network Analysis is applicable to other messaging/data exchanges 1. SN currently focused on web interactions/transactions and email 2. Next: Instant Messaging 3. Then: Voice over IP 4. Social Network Analysis and the Semantic Web 1. Auto-creation or nomination of RDF assertions about individuals • Based on user profiles • Based on cohorts 2. Metadata about software systems interactions • Relationship analysis of software systems’ behavior as nodes in the social network of web services (software agents analogous to humans as nodes in the graph) • What is the SOR of this agent with all others like X, where SOR is a measure based on successful transactions? • Finally, reputation tracking of software agents representing humans.... 20 Spoke Software - Confidential