This luncheon keynote at the ARMA Houston Spring Seminar introduced Web 2.0 concepts and issues and provided attendees with specific steps for managing social content as part of the records program.
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
This presentation introduced enterprise use cases for social media, described the difference between commercial and enterprise social technologies, and provided specific steps to take to manage social content as records.
This provides an overview of core principles of Web 2.0/Social Computing systems and how organizations can learn from them through technology deployment, community creation, and application of the social computing principles in development of traditional enterprise systems.
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
JISC Legal examines the legal issues of using Web 2.0 and social networking in the UK higher and further education sectors. For more information please see: www.jisclegal.ac.uk.
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
This presentation introduced enterprise use cases for social media, described the difference between commercial and enterprise social technologies, and provided specific steps to take to manage social content as records.
This provides an overview of core principles of Web 2.0/Social Computing systems and how organizations can learn from them through technology deployment, community creation, and application of the social computing principles in development of traditional enterprise systems.
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
JISC Legal examines the legal issues of using Web 2.0 and social networking in the UK higher and further education sectors. For more information please see: www.jisclegal.ac.uk.
Rebooting the Enterprise with Blogs, Wikis and other Social SoftwareJames Dellow
Consumer-driven social communication technologies — like blogs, wikis and instant messaging - are now helping business people to collaborate in new ways, with the organisations that adopt them internally being dubbed “Enterprise 2.0”.
Learn about the impact of these social software tools inside your organisation and the implications for existing business information systems. This presentation was made at the Australian Institure of Management (AIM) on 11th October, 2006 in Canberra, Australia. Note: Some changes to the first few slides have been made from the original presentation to provide context for the remainder of the slides.
This presentation showcases how Web 2.0 could be used within an enterprise with a "day (weeks, actually) in the life of" story of how a new employee, Michael, uses web 2.0 (or Enterprise 2.0) tools to quickly get up to speed and start contibuting. Touches on social networking, social bookmarking, blogs / microblogs, wiki, virtual world, mashups, RSS
Cheryl McKinnon Speaker Bio - list of recent ECM and information management publications, speaking engagements, committee work, awards. Founder of Candy Strategies Inc.
Companies benefit from Web 2.0 investmentSustainly
The latest research from Deutsche Bank shows that 20% of US and European companies use social media channels for business purposes. But, these are only the most transparent companies. More DB research can be found at: www.dbresearch.com
SocialSafe is your business social media library.
SocialSafe creates a full archive of all your Facebook, Facebook Pages, Twitter, LinkedIn, Google+, Blogs, Instagram, Pinterest social media posts, interactions and followers, to meet your legal compliance needs.
In addition SocialSafe provides excellent capabilities to support engagement monitoring across your social media use with Search, Insights and more.
As social media use increases throughout your organisation SocialSafe is THE cost-effective tool to support both regulatory compliance and engagement monitoring.
My presentation to Bentley University’s: CS 299 – Web 2.0: Technology, Strategy, Community.
I cover:
Cloud Computing
Web 2.0 Policies for Business
Personal Knowledge Management
Professional Networking with Web 2.0
Enterprise 2.0
Gov 2.0 - eGovernment Social Media Platform Deployments and Future OpportunitiesNIC Inc | EGOV
A white paper that discusses best practices in deploying Web 2.0 social media tools to help state and local governments more effectively serve constituents.
The presentation delivered to the ARMA Dallas Chapter by Jesse Wilkins, AIIM Director, Systems of Engagement. The presentation looks at methods of managing web 2.0 records, such as Facebook, Twitter and everything in between.
This presentation from the 2011 NARA E-Records Forum in Austin provided guidance on how to manage social business content as part of a records program.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
Rebooting the Enterprise with Blogs, Wikis and other Social SoftwareJames Dellow
Consumer-driven social communication technologies — like blogs, wikis and instant messaging - are now helping business people to collaborate in new ways, with the organisations that adopt them internally being dubbed “Enterprise 2.0”.
Learn about the impact of these social software tools inside your organisation and the implications for existing business information systems. This presentation was made at the Australian Institure of Management (AIM) on 11th October, 2006 in Canberra, Australia. Note: Some changes to the first few slides have been made from the original presentation to provide context for the remainder of the slides.
This presentation showcases how Web 2.0 could be used within an enterprise with a "day (weeks, actually) in the life of" story of how a new employee, Michael, uses web 2.0 (or Enterprise 2.0) tools to quickly get up to speed and start contibuting. Touches on social networking, social bookmarking, blogs / microblogs, wiki, virtual world, mashups, RSS
Cheryl McKinnon Speaker Bio - list of recent ECM and information management publications, speaking engagements, committee work, awards. Founder of Candy Strategies Inc.
Companies benefit from Web 2.0 investmentSustainly
The latest research from Deutsche Bank shows that 20% of US and European companies use social media channels for business purposes. But, these are only the most transparent companies. More DB research can be found at: www.dbresearch.com
SocialSafe is your business social media library.
SocialSafe creates a full archive of all your Facebook, Facebook Pages, Twitter, LinkedIn, Google+, Blogs, Instagram, Pinterest social media posts, interactions and followers, to meet your legal compliance needs.
In addition SocialSafe provides excellent capabilities to support engagement monitoring across your social media use with Search, Insights and more.
As social media use increases throughout your organisation SocialSafe is THE cost-effective tool to support both regulatory compliance and engagement monitoring.
My presentation to Bentley University’s: CS 299 – Web 2.0: Technology, Strategy, Community.
I cover:
Cloud Computing
Web 2.0 Policies for Business
Personal Knowledge Management
Professional Networking with Web 2.0
Enterprise 2.0
Gov 2.0 - eGovernment Social Media Platform Deployments and Future OpportunitiesNIC Inc | EGOV
A white paper that discusses best practices in deploying Web 2.0 social media tools to help state and local governments more effectively serve constituents.
The presentation delivered to the ARMA Dallas Chapter by Jesse Wilkins, AIIM Director, Systems of Engagement. The presentation looks at methods of managing web 2.0 records, such as Facebook, Twitter and everything in between.
This presentation from the 2011 NARA E-Records Forum in Austin provided guidance on how to manage social business content as part of a records program.
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
This final session at the ARMA Central Iowa Spring Seminar focused on enterprise social business software capabilities and considerations and described steps to capture social content as records.
This workshop delivered July 20, 2011 at FOSE 2011 described the elements of a social media governance framework, identified structural and policy statements to include in the social media policy, and describes strategies for capturing and managing social media-generated content as records.
This presentation to the ARMA Cincinnati Chapter introduced Web 2.0 tools, provided some use cases for each tool, and then described strategies for managing the content created by these tools.
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
SharePoint 2013, Yammer and Office 365 product families bring new capabilities for content sharing, finding, organizing, and authoring. They also create new challenges. The move to the cloud and the integration of SharePoint with the enterprise social network with yammer, and have made this release so profound and disruptive to the business. In this session we'll dig into planning and strategy for social architectures around both business process and the technologies to help ensure compliance and success. Social enterprise technology is transformative and will lead to more agile business when used correctly, but a disaster and chaos when not used properly.
Fyronic Seminar : Engaging with your stakeholders through Web 2.0, Social Media and Enterprise 2.0
Presented by : Franky Redant - Founder Fyronic, Consultant
A quick overview of the various technologies i came across during my enterprise 2.0 research. The content for the slides comes from content shared in the Enterprise 2.0 conference and Dion Hinchcliffe as well. (I do not claim ownership of creating all the content, its more of aggregation of content and adding to it)
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Oklahoma chapter on February 15, 2024, introduced attendees to the idea of a business and RIM playbook. Attendees learned about the benefits of a playbook, the elements of a playbook, and the elements of a play. The session concluded with a review of the process for building a playbook from scratch.
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
This presentation, delivered virtually to the ARMA Chattanooga chapter on February 13, 2024, described the elements of a business assessment, a technical assessment, and a maturity assessment in support of an information management initiative.
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
This presentation, delivered virtually on February 2, 2024 as part of the Austin ARMA Annual Conference, introduced the idea of a records management playbook. I described the purpose and benefits of a playbook, then outlined the elements of a playbook and the individual plays.
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater St. Louis Chapter on January 18, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater Kansas City Chapter on January 10, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
This presentation, delivered virtually to the ARMA Madison Chapter on December 7, 2023, outlined the value of a business playbook and, specifically, a records and information management (RIM) playbook. Attendees learned about the elements of a playbook and of individual plays and how to construct their own playbooks using a provided template.
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
This presentation, delivered virtually to the ARMA Florida Gulf Chapter on December 19, 2023, outlined the value of certifications and described three class of certifications including RIM, "RIM-adjacent", and "Other". Attendees received an overview of the 6 RIM certifications and a table comparing their exams and programs. The session concluded with a framework for determining how to select the most appropriate certification based on costs, context, and program visibility and market awareness.
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
This presentation was delivered virtually to ARMA San Diego on October 5, 2023. It compared and contrasted the various information governance / information management-related certifications and presented a framework for deciding which one(s) to pursue based on an individual's career goals.
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
This presentation, delivered at the ARMA Canada Information Conference on July 19, 2023 in Toronto, outlined a framework for professional development in the IM industry. Attendees learned about the 4 types of learning and the 5 domains IM professionals need to understand. Attendees also received a professional development plan template.
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
This presentation, delivered on July 17, 2023, at the ARMA Canada Information Conference, compared and contrasted the various IM and IM-adjacent certifications. Attendees also learned how to determine the right certification for them based on their career goals.
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
This keynote, delivered at the ARMA New England Win with IG seminar on September 19, 2023, outlined the state of the IG industry from three perspectives: what industry analysts are talking about, what the key conference sessions are about, and what individual chapters and vendors are talking about. The session concluded with ways for individuals to keep abreast of developments in IG.
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
This presentation, delivered to the ARMA Mile High Denver Chapter on January 17, 2023, outlined the value and benefits of building a records management playbook. Attendees learned about the elements of a playbook and the individual plays within the playbook. The session concluded with a discussion of how to actually build a RM playbook.
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
This presentation, delivered to the ARMA Boston Chapter on June 2, 2016, outlined how to apply information governance practices to social media posts. It described specific social media security threats and gave attendees an opportunity to participate in roundtable discussions.
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
This presentation, delivered at the MER conference in Chicago on May 23, 2023, introduced attendees to the concept of an information governance playbook. Attendees learned the purpose and value of a playbook, as well as the structure of a playbook and of individual plays. The session concluded with a discussion of how to build and maintain a playbook.
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
This presentation, delivered to the AIIM True North chapter virtually on September 12th, introduced ChatGPT and other generative AI tools. I briefly introduced and demonstrated ChatGPT and some other generative AI tools. We reviewed some of the more popular use cases and benefits of using generative AI. We also reviewed some of the challenges these tools present for the organization. Finally, we discussed some practices to use these tools safely and effectively in support of real business outcomes.
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
This session provided the conclusion to the ARMA Nebraska 2023 Spring Seminar in Omaha, Nebraska. Attendees learned what a playbook is, what plays are, and how to develop a RIM/IG playbook tailored to their organization.
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
This session, delivered at the ARMA Nebraska Spring Seminar 2023 on April 19, 2023, introduced the professional development matrix and walked attendees through how to leverage the matrix to develop their own personal professional development plans.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org About AIIM
3. Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Director, ARMA International Board of Directors (2007-2010) Frequent industry speaker and author AIIM ERM Expert Blogger Instructor for AIIM Certificate Programs Jesse Wilkins, CRM 3
4. By the end of 2013, half of all companies will have been asked to produce material from social media websites for e-discovery. Source: “Social Media Governance: An Ounce of Prevention”, Gartner It’s just a fad….
8. “Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success on that new platform. Chief among those rules is this: Build applications that harness network effects to get better the more people use them.” -- Tim O’Reilly, 12/10/2006 Web 2.0
9. “Enterprise 2.0 is the use of emergent social software platforms within companies, or between companies and their partners or customers.” -- Andrew McAfee, 5/2006
10. “Working where you want, when you want, and being able to conduct real business.” blognation Canada
15. Started as online diaries Today used more as lightweight CMS Hides complexity of Web publishing Generally arranged in chronological order, most recent at top What’s a blog? 15
19. “It is part text messaging and part blogging, with the ability to update on your cell phone or computer, but constrained to 140 characters.” -- Ari Herzog, Ariwriter.com Defining microblogging 19
23. Collaborative website Organized as linked articles Hides complexity of HTML from users Easy to add and link articles Easy to correct mistakes Wiki-wiki 23
35. Services dedicated to sharing particular types of information Often allow subscription to a particular user or keyword Often allow rating and adding to favorites Easy to link to and embed in other websites What is social sharing?
45. Boundary issues Friending your boss might be a career-limiting move NOT friending your boss might be a career-limiting move Should you friend your spouse? Teacher-student issues
51. Other issues Unusual profile names or pictures Groups “Liberals/Conservatives for X” “I bet I can find X people who [insert belief here] Other “bad role model” stuff Pictures of alcohol use/abuse Sexually graphic or obscene materials Criticism of family, friends, current/past employers
54. “…fully networked enterprises are not only more likely to be market leaders or to be gaining market share but also use management practices that lead to margins higher than those of companies using the Web in more limited ways…”
55.
56.
57.
58.
59.
60.
61. [Social content on external sites] will be archived and retained for the required period of time in accordance with the DIR Records Retention Schedule.
65. Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision? Is it a record?
66. Individual social network status updates or Tweets? The entire stream over a given period? Many of these tools do not lend themselves to metadata…. Policy and consistency are key What is the record?
67. Determine whether content is unique If it’s already being captured elsewhere, treat as a duplicate record or as a non-record A note about co-creation Duplication
70. Records management in brief Archive selected items locally Use search queries and monitoring Store selected items locally using search queries or RSS
71. Use the native backup to store locally Store locally using built-in tools
72. Use a third-party service to store locally Store locally using third-party service
77. Web 2.0 is here Prohibition is not a realistic option Web 2.0 tools can add significant value to the organization And they can be managed as records Lead your organization to use them effectively Conclusion
78. Jesse Wilkins, CRM, CDIA+ Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins For more information
79. “How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”, Patricia Franks, Ph.D., IBM Center for The Business of Government, 2010 “Electronic Records Management: Blogs, Wikis, Facebook, Twitter, & Managing Public Records”, Washington State Archives, September 2009 Additional Resources
80. “Managing Social Media Records”, U.S. Department of Energy, September 2010 http://cio.energy.gov/documents/Social_Media_Records_and_You_v2_JD.pdf “Best Practices Study of Social Media Records Policies”, ACT-IAC, April 2011 http://www.actgov.org/knowledgebank/whitepapers/Documents/Shared%20Interest%20Groups/Collaboration%20and%20Transformation%20SIG/Best%20Practices%20of%20Social%20Media%20Records%20Policies%20-%20CT%20SIG%20-%2003-31-11%20(3).pdf Additional Resources
81. NARA Bulletin 2011-02, “Guidance on Managing Records in Web 2.0/Social Media Platforms”, October 2010 http://www.archives.gov/records-mgmt/bulletins/2011/2011-02.html “A Report on Federal Web 2.0 Use and Value”, National Archives and Records Administration, 2010 http://www.archives.gov/records-mgmt/resources/web2.0-use.pdf Additional Resources
82. Florida Social Media Toolkit http://sites.google.com/site/flsocmed/ “Friends, Followers, and Feeds: A National Survey of Social Media Use in Government”, NASCIO, September 2010 http://www.nascio.org/publications/documents/NASCIO-SocialMedia.pdf Texas Dept of Information Resources Social Media Policy http://www.texas.gov/en/about/Pages/social-media-policy.aspx Additional Resources
83. Compliance Building Social Media Policies Database http://www.compliancebuilding.com/about/publications/social-media-policies/ 57 Social Media Policy Examples and Resources http://www.socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-and-resources Web 2.0 Governance Policies and Best Practices http://govsocmed.pbworks.com/w/page/15060450/Web-2-0-Governance-Policies-and-Best-Practices Additional Resources
84. Social Media Governance policy database http://socialmediagovernance.com/policies.php “Analysis of Social Media Policies: Lessons and Best Practices”, Chris Boudreaux, December 2009 http://socialmediagovernance.com Additional Resources
Editor's Notes
[twitter]Introduction to Web 2.0[/twitter]
Now let’s turn to some definitions. And we begin with Web 2.0. The first references to Web 2.0 occurred as early as 1999, but it wasn’t until Tim O’Reilly’s inaugural Web 2.0 Conference in 2004 that the term really started to stick. Tim has redefined Web 2.0 on a number of occasions and seems to be happiest with this one. I won’t read the entire thing to you, but I do want to focus your attention on the last line: “Build applications that harness network effects to get better the more people use them.” This really started with fax – the first person to buy a fax was pretty gullible, no? So was the second. But once that tipping point hit, fax became an amazing business tool that many companies today consider a critical part of their communications infrastructure. Amazon doesn’t work nearly as well without recommendations, and “People who bought this also bought…..”, and lists, and all the other social functionality embedded in it. Wikipedia with only one author is Microsoft Word with a bad user interface. [twitter]Tim O’Reilly’s definition of Web 2.0: build apps that get better the more people use them. http://is.gd/87biX [/twitter]
Andrew McAfee is generally accepted to have coined the term Enterprise 2.0 in 2006. His definition has gone through a number of refinements; in May 2006 he came up with this definition for Enterprise 2.0 2.0 (his term). [twitter]Andrew McAfee: E2.0 is the use of emergent social software platforms within companies, or between companies and their partners or customers.[/twitter]
It’s also true that Web 2.0 is profoundly changing the way we work. You can work on a computer at your work, home, or Internet café, a laptop at the airport, a tablet PC at the local starbucks, or on your iPhone in a pub. It generally requires Web access, though even this is starting to change, but the tools are lightweight enough and the computers are both mobile enough and powerful enough to let you “work where you want, when you want, and be able to conduct real business.“[twitter]Web 2.0:work where you want, when you want, and be able to conduct real business. – blognation Canada[/twitter]
During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
Not just Twitter, but since it is by far the most successful at this point the examples for the first two sections will largely focus on it.
Wikipedia: 3 million+ articles in EnglishMore than 13 million in 264 languagesWiktionary:1,306,000+ definitions in EnglishWikiQuote: 16,900+ quotationsWikitravel: 22,000+ destination guidesLyricwiki: 879,000+ song lyrics!
Wikis are another really common example of Web 2.0 tools. Whereas blogs are designed for one-way broadcast-type communications, wikis are genuinely collaborative tools. The most well-known example of this is Wikipedia, the encyclopedia that anyone can edit. As I noted earlier Wikipedia includes more than 13 million articles in 260+ languages. Compare this with the EncyclopediaBrittanica, which includes some 65,000 articles in its 35-volume set. Wikis make it easy to collaborate on a particular document or deliverable – click Edit, make your changes, click Save or Publish. Changes are tracked to the individual character level, and for private wikis, can be integrated into your Active Directory or identity infrastructure so as to prohibit anonymous changes.
And finally, we come to social networking. This term describes sites that allow users to interact with other users. Individual users can update their status, add contacts, publish photos and blogs, share links, and do many other activities. Common examples of these include Facebook, which claims more than 400 million users world-wide; LinkedIn; Myspace; and any number of custom social networks. Here is ARMA’s custom social network, iConference. It’s built on top of the Ning engine, which supports more than 1.8 million social networks and adds more than 4,000 new networks every day. You can see here it supports photo sharing, event announcements and planning, blogs, and a forum. iConference has groups set up for specific topics including education, government, and energy. The forum also has a special area set up to ask questions of the 2010 candidates for the Board of Directors.
Keep in touch with remote offices, colleagues, and even familyNetworking - personal, professional, career
Learn new things. Lots of what folks post day-in and day-out is trivial. Then again, so is the RECMGMT-L listserv – and yet how many of you are on that and swear by the value you receive from it?
80% of companies use social media for recruitment – 95% use LinkedIn. And every recruiter and HR manager does due diligence on candidates using Google – and the top links for many are their profiles on LinkedIn, Facebook, etc.
Because people are amazingly altruistic in a crisis. Not directly related but see Haiti relief effort: text = $10 donation to Red Cross. Quick, easy, Tweetable, FB-able, etc.
Here is a screenshot of YouTube. You can see some of the social aspects of Youtube here, including ratings; the ability to mark it as a favorite; the ability to subscribe to updates either of the video or by the author; and the ability to share a video in a number of ways including sending a link or embedding it directly in another web application such as a blog or Facebook. Users can also comment on individual videos via text or by posting video responses. Most of the other social sharing tools offer similar capabilities.
Social sharing tools, as the name suggests, are tools useful for sharing particular types of content. The most well-known ones include YouTube, for sharing video; Flickr, for sharing photographs; Delicious, for sharing bookmarks; Box.net, for sharing files; and Slideshare, for sharing presentations and other documents. I will be posting this presentation to my Slideshare account later this week. Here is a screenshot of YouTube. You can see some of the social aspects of Youtube here, including ratings; the ability to mark it as a favorite; the ability to subscribe to updates either of the video or by the author; and the ability to share a video in a number of ways including sending a link or embedding it directly in another web application such as a blog or Facebook. Users can also comment on individual videos via text or by posting video responses. Most of the other social sharing tools offer similar capabilities. [twitter]Screenshot of YouTube as example of social sharing tool. Others include Box.net, Slideshare, Delicious, and Flickr.[/twitter]
This is delicious, which is used to share all kinds of bookmarks. It’s great for accessing your bookmarks from another computer such as an internet kiosk, but it’s even more valuable as a filter. As you see here, you can see bookmarks related to a particular topic and how many times it’s been bookmarked, which is one way to gauge its value to others. You can also post a link to your delicious page and others can access your bookmarks directly.
[twitter] Web 2.0 considerations and issues[/twitter]
Security issues are probably the ones most often cited. Every day seems to bring another high-profile data breach. It’s important to remember that in the overwhelming majority of these cases the breach is not due to third-party hackers – instead, it’s often done by someone on the inside such as a disgruntled employee or former employee whose access was not revoked. And the next most common avenue for breaking into an application is through social engineering – guessing users’ weak passwords like “password” or “12345”, etc. Many of the larger Web 2.0 services offer physical and logical security comparable to, if not better than, what the organization provides because there is no way for rogue employees to directly access the system, the database, etc. [twitter]Web 2.0 tools are perceived to be less secure but not always the case.[/twitter]
It may seem obvious that a Web 2.0 tool requires internet connectivity to work, but organizations do not always think through the ramifications of that. An employee for an organization that moves entirely to Google Apps and Gmail, for example, would not be able to do any work on a plane and would have to either buy an air modem or buy or find Wifi internet access. And if connectivity should drop in the middle of drafting a long report, it is entirely possible that any unsaved work would be lost. Some services can work offline and synchronize, but these are still few and far between. [twitter]Web 2.0 tools have to be connected to work – no connection, no access.[/twitter]
Technology often moves from the consumer space to the enterprise – consider everything from CDs to instant messaging. But often the technologies require very technology-savvy users, a bit of hacking about, and at least the tacit acceptance if not outright assistance of IT to implement. Web 2.0 is sometimes referred to as “Shadow IT” because it is so easy to implement and use without IT’s assistance. Many of these tools are free, or extremely low cost. The software that runs Wikipedia for example is open source (and therefore essentially free). It’s a complicated product – but if you don’t need that scalability and robustness, you can set up a very feature-rich yet intuitive wiki from pbWorks or Wikispaces for very low cost in about 15 minutes. And most of the other tools we discussed earlier are similar. [twitter] Web 2.0 is sometimes referred to as “Shadow IT” because it is so easy to implement and use without IT’s assistance.[/twitter]
Photo uploadsLikesCommentsAdding to new Groups in FacebookLocation checkins- Anyone have a younger brother with an attitude?
[twitter] Web 2.0 considerations and issues[/twitter]
The first step many organizations take to manage Web 2.0 is to try to block them. This is unrealistic for a number of reasons.
Moving into mainstream
FacebookflickrYoutubeTwitterGet satisfaction
TwitterFacebookFlickrYouTubeGet Satisfaction
Categories…Administrative RecordsElectronic Data Processing RecordsPersonnel RecordsFiscal RecordsSupport Services Records
The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information:Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
The next step is to determine exactly what is the record and must therefore be retained. Again, this will likely vary not just by content, but also by the nature of the tool. An individual social network status update or Tweet could rise to the level of a record, though I suspect this will be uncommon; in the case of a protracted discussion on someone’s wall or via Twitter, it might be the entire stream of updates on a particular topic or over a given period. This is analogous to determining when an instant message is a record. Many of these tools don’t really have metadata in the traditional sense. Twitter, for example, has the following public metadata: SenderMentions (the @ or DM it is addressed to, and could be more than one)A unique Twitter IDAn in-response-to Twitter ID if it uses the Twitter Reply capabilityA ReTweet ID if it was ReTweetedDate and time sentThe client used to send the update, if knownAny hashtags could be considered metadataBut note what there isn’t: No subject line or topic, no mechanism for filing it, no keywords (except maybe the hashtag). Other systems may offer more or less metadata but it is difficult to access some of that, even if it is retained by the system or commercial provider. The key is to have a records policy that is broad enough to encompass all of these tools and that stresses the content and context of information rather than its format. And as we noted earlier, just because it exists does not make it a record per se.[twitter] The next step is to determine exactly what is the record and must therefore be retained. [/twitter]
Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it.
At this point I’d be pleased to entertain your questions.
In conclusion, Web 2.0 is not something coming down the road or over the horizon – it’s here today and is probably in your organization, whether you know about it or not. It is all but impossible to effectively prohibit them – and the tools can significantly improve an organization’s collaboration and knowledge sharing, thereby adding value to the organization. It is incumbent on records management professionals to step up and lead your organizations in the effective use and management of these tools.