The document discusses Enterprise 2.0 and enterprise communication beyond Web 2.0. It defines Enterprise 2.0 as the use of emergent social software platforms within and between companies. Implementing an Enterprise 2.0 platform requires more than just technology and involves questions around goals, strategies, moderation, and incentives to encourage participation. Different types of Enterprise 2.0 include using 2.0 patterns for business communication, collaboration, understanding markets, and influencing markets.
Moving to Manufacture_Internet of Things (Part 02)alengadan
Reference: Designing the Internet of Things
Book by Adrian McEwen and Hakim Cassimally
Presented by: Blety Alengadan (Asst.Professor)
Chapter 10 (Part 02)
Mobile 2.0 Europe 2009 - http://mobile20.eu
Openness in the telecommunication industry
Open with care or care to open?
Carlos Domingo
Director, Internet and Multimedia Lab
TELEFÓNICA I+D
This paper identifies four key emerging technologies in the IT-sector that are bringing a huge shift in the way information systems are developed and used. The key technologies covered in this paper are Cloud Computing, Mobile Data Networks, Smart-Connected-Devices and Big Data. The paper adopts a holistic view of the changes brought forward by these emerging technologies and presents a detailed analysis of their current performance and future potential.
This whitepaper sets out the 1E view of user empowerment in the organization, together with how and why we think innovative companies are deploying user-empowerment solutions to drive down costs, drive up productivity and encourage their users to become more self sufficient in the face of the rising consumerization of IT.
Overcoming The Biggest Barriers To Cloud Computing?Bernard Marr
During the current coronavirus pandemic, cloud computing is playing an increasingly prominent part in many of our lives. From how we stay entertained, to socialising with friends and doing business, it’s fair to say that when things eventually return to normal many people will have a far greater appreciation of cloud and the way it empowers us to work, play and do business differently.
Crime Scene Investigation: Content – Who killed Enterprise Content Management? As consumer technology takes more attention, enterprise content management seems to have disappeared, particularly ECM. Presentation by John Newton was made at the Technology Services Group led by Dave Giordano at the University of Chicago Gleacher Center on 8 June 2011.
Prototyping Online Components(Part 02)_Internet of Thingsalengadan
Reference: Designing the Internet of Things
Book by Adrian McEwen and Hakim Cassimally
Presented by: Blety Alengadan (Asst.Professor)
Chapter 07 (PART 02)
Turning social disputes into knowledge representations DERI reading group 201...jodischneider
A reading group presentation about Turning social disputes into knowledge representations, based primarily on two papers:
Toni and Torroni. Bottom-up Argumentation. In: First International Workshop on the Theory and Applications of Formal Argumentation 2011 (TAFA), 16-22 July, 2011, Barcelona, Spain. http://www.doc.ic.ac.uk/~ft/PAPERS/tafaPT.pdf
Benn, Buckingham Shum, Domingue, and Mancini. Ontological Foundations for Scholarly Debate Mapping Technology. In: 2nd International Conference on Computational Models of Argument (COMMA '08), 28-30 May, 2008, Toulouse, France. http://oro.open.ac.uk/11939/
Moving to Manufacture_Internet of Things (Part 02)alengadan
Reference: Designing the Internet of Things
Book by Adrian McEwen and Hakim Cassimally
Presented by: Blety Alengadan (Asst.Professor)
Chapter 10 (Part 02)
Mobile 2.0 Europe 2009 - http://mobile20.eu
Openness in the telecommunication industry
Open with care or care to open?
Carlos Domingo
Director, Internet and Multimedia Lab
TELEFÓNICA I+D
This paper identifies four key emerging technologies in the IT-sector that are bringing a huge shift in the way information systems are developed and used. The key technologies covered in this paper are Cloud Computing, Mobile Data Networks, Smart-Connected-Devices and Big Data. The paper adopts a holistic view of the changes brought forward by these emerging technologies and presents a detailed analysis of their current performance and future potential.
This whitepaper sets out the 1E view of user empowerment in the organization, together with how and why we think innovative companies are deploying user-empowerment solutions to drive down costs, drive up productivity and encourage their users to become more self sufficient in the face of the rising consumerization of IT.
Overcoming The Biggest Barriers To Cloud Computing?Bernard Marr
During the current coronavirus pandemic, cloud computing is playing an increasingly prominent part in many of our lives. From how we stay entertained, to socialising with friends and doing business, it’s fair to say that when things eventually return to normal many people will have a far greater appreciation of cloud and the way it empowers us to work, play and do business differently.
Crime Scene Investigation: Content – Who killed Enterprise Content Management? As consumer technology takes more attention, enterprise content management seems to have disappeared, particularly ECM. Presentation by John Newton was made at the Technology Services Group led by Dave Giordano at the University of Chicago Gleacher Center on 8 June 2011.
Prototyping Online Components(Part 02)_Internet of Thingsalengadan
Reference: Designing the Internet of Things
Book by Adrian McEwen and Hakim Cassimally
Presented by: Blety Alengadan (Asst.Professor)
Chapter 07 (PART 02)
Turning social disputes into knowledge representations DERI reading group 201...jodischneider
A reading group presentation about Turning social disputes into knowledge representations, based primarily on two papers:
Toni and Torroni. Bottom-up Argumentation. In: First International Workshop on the Theory and Applications of Formal Argumentation 2011 (TAFA), 16-22 July, 2011, Barcelona, Spain. http://www.doc.ic.ac.uk/~ft/PAPERS/tafaPT.pdf
Benn, Buckingham Shum, Domingue, and Mancini. Ontological Foundations for Scholarly Debate Mapping Technology. In: 2nd International Conference on Computational Models of Argument (COMMA '08), 28-30 May, 2008, Toulouse, France. http://oro.open.ac.uk/11939/
Connecting And Engaging Teams In A Distributed WorkforceCitrix Online
This new Future of Work white paper explores the growth of today's distributed workforce and how to effectively manage distributed teams and workers to achieve optimum productivity, engagement and performance.
Instantly Connecting Developers Across The MilesCitrix Online
This new white paper examines the key challenges remote developers and teams face while exploring the advantages of leveraging an online collaboration solution to instantly connect, eliminate travel and expedite projects.
Enterprise Content Management (ECM) solutions provide robust functionality to control and analyze information. ECM solutions help reduce search times, manage data, and enable institutions with regulatory compliance. The correlation between impact on a business process through ECM implementation stage is demonstrated and been shown to follow reported hypothesis by Reimer (2002). The objective of this article is to provide (1) a typical architecture of an ECM, (2) identify key challenges in implementation and (3) implementation road map strategy
WTF - Why the Future Is Up to Us - pptx versionTim O'Reilly
This is the talk I gave January 12, 2017 at the G20/OECD Conference on the Digital Future in Berlin. I talk about fitness landscapes as applied to technology and business, the role of unchecked financialization in the state of our politics and economy, and why technology really wants to create jobs, not destroy them. (There is a separate PDF version, but some readers said the notes were too fuzzy to read.)
Skype talk given at the first Internet of Things meetup in Wellington on November 4th 2014.
http://www.meetup.com/Wellington-Internet-of-Things-IoT-Meetup/events/208303962/
What are the main business and social trends that will have an impact on ICT in 2 to 5 years? How can we take them into account in our strategies and policies?
Tercera entrega de la Serie de Publicaciones sobre la Empresa 2.0 y la Gestión del conocimiento, esta vez vamos a ver en esta presentación cómo implementar Procesos de Gestión del Conocimiento al interior de las organizaciones, a través de herramientas 2.0 y sistemas que permiten la interacción de los actores de la organización
Learn how cloud companies are keepin' it saasy with small- and medium-sized businesses. We're going to discuss:
• The unique challenges of cloud marketing
• What successful companies are doing to reach SMB tech buyers
• What SMB IT professionals are saying about the Cloud
Why? Because Spiceworks has worked with leading Cloud vendors (from startups to the Fortune 500) to help them develop, launch, and promote their cloud products to millions of tech buyers....and now we would like to share what we have learned with you!
How Technologies will change the relationship with Human ResourcesMassimo Canducci
The slides I used for the event "
Human Capital and the Challenge of Involving New Young Professionals in Hospitality" held in Venice on 13th April 2024.
Le slide utilizzate durante l'evento #InnovabilityLand che si è tenuto il 24/03/2023 alle Officine H Olivetti di Ivrea Patrimonio Unesco, organizzato da Canavese 2030
Un nuovo equilibrio tra esseri umani e macchine.pdfMassimo Canducci
Viviamo in un mondo di grandi trasformazioni in cui l'unica costante è il cambiamento e in cui gli strumenti abilitanti sono le tecnologie.
Le tecnologie solitamente non sono "buone" o "cattive", molto dipende dall'uso che facciamo di loro, ma ci sono casi in cui questo controllo può sfuggirci: quando lasciamo il potere decisionale alle macchine grazie all'intelligenza artificiale.
Le tecnologie da monitorare e da utilizzare consapevolmente in futuro sono: realtà virtuale, realtà aumentata, voice technology, robotica industriale e casalinga, wearable e dispositivi connessi con il nostro corpo.
Quello che bisogna comprendere è che: se non state costruendo un mondo migliore, allora non state innovando per niente.
Presentazione utilizzata nell'evento Tourism Data Conference 2022 a Rimini.
Si parla di quali saranno i dati del futuro e di come usarli al meglio per generare impatto e trovare nuove occasioni di business nel mondo del turismo.
The new normal waiting for the era of ecosystemsMassimo Canducci
We are facing a global tremendous crisis, after that we are not going to go back.
We will live a "new normal" and it should be Based on Ecosystems, Activated by Innovation, Enabled by Technologies.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Enterprise Communication beyond 2.0
1. Enterprise 2.0
Enterprise Communication beyond 2.0
Massimo Canducci 3
Innovation Director
Research and Innovation Division
Engineering Ingegneria Informatica S.p.A.
Como, June 2011
www.eng.it
2. An Engineering snapshot
Delaware - USA Ireland
Belgium • system integration
consulting
Italy
• outsourcing
Brasil • products
3
• software solutions
The leading Italian independent, privately-owned software • 1,000 large accounts
and Information Technology services company. • 724 M€ revenues
In the top 10 in Europe in software and services • 7,000 IT specialists
40 branches in Italy, Belgium, Latin America, USA • 40 branches
1,000 large accounts in all market sectors in the world
Enterprise Communication beyond 2.0 www.eng.it
3. Engineering Organizational Model
Business Unit Research and Innovation Division
Telecommunications Innovation
Research
Architecture and Consulting
Utilities Innovation
Competence Center
Open Source
Industry Innovation
Identity Management
3
Public Sector / Health Innovation
Enterprise Content Management
ERP
Finance Innovation
Fonderie Multimediali
Broadband Media Services (Xaltia)
Software Factories
Tablet Platforms
Enterprise Communication beyond 2.0 www.eng.it
4. Enterprise Communication
We’re going
to talk about
“Communication” 3
“2.0” and
“Enterprise”
Enterprise Communication beyond 2.0 www.eng.it
5. Enterprise Communication
In the fictional Star Trek universe, a
tricorder is a multifunction handheld
device used for sensor scanning, data
analysis, data recording and
communications.
3
Enterprise Communication beyond 2.0 www.eng.it
6. Enterprise Communication
3
Captain James T. Kirk used a tricorder to update his
Facebook status too and to send tweets on Twitter.
Really.
Enterprise Communication beyond 2.0 www.eng.it
7. Introduction
Break the ice with a question …
How many of you
have a Facebook
profile?
3
About 80/90 %.
Thanks.
Enterprise Communication beyond 2.0 www.eng.it
8. Introduction
Second and last question
How many of you
have a Twitter
account?
3
About 30/40 %.
Thanks.
Enterprise Communication beyond 2.0 www.eng.it
9. Introduction
Second question was NOT the last …
How many of you
today checked-in
here on 4sq ?
3
About 1/3%
Thanks.
Enterprise Communication beyond 2.0 www.eng.it
10. Introduction
This is the last question. Really.
How many of you
have not the faintest
idea on what is a
3 4sq check-in?
About 80/90 %.
Thanks.
Enterprise Communication beyond 2.0 www.eng.it
11. Different users
You definitely are a “standard user”
nice, agile, usable, connected,
collaborative, useful, cool
3
boring, unusable, slow,
old-style, non-productive,
uninviting
Enterprise Communication beyond 2.0 www.eng.it
12. Different approaches
Overtaking
There was a time when "technology" first came into
office and then in people personal life.
(PC, printing, CD player, CD burner, connectivity, ...)
Overtaking
3
Today, the opposite
occurs. ”Technology"
often is more advanced in
personal life than in
professional situations.
Alex Zanardi overtakes Bryan Herta at Laguna Seca 1996
http://bit.ly/eGXi32
Enterprise Communication beyond 2.0 www.eng.it
13. Different approaches
Personal and Professional Lives
Even the interaction and communication patterns
are evolving differently.
The so-called "2.0”
patterns were born in
3 consumer contexts, and
are struggling to be
taken in the enterprise.
Enterprise Communication beyond 2.0 www.eng.it
14. Evolutions
Interactions Models Evolution
Web 1.0 Web 2.0 > 2.0
(Pretty much Web pages, plus a lot Various kind of objects
HTML pages of other “content” shared over the net by
shared over the web, different kind of apps
viewed through a with more interactivity; (web apps, mobile apps,
browser) more like an mashups, …)
application than a
“page”
Mode Read Write & Contribute Share
3
Primary Unit of content Page Post Generic data
State Static Dynamic In the cloud
Viewed through… Web browser Browsers, RSS Any platform on
Readers any device
Architecture Client Server CS / WS Services / API
Content Created by… Web Coders Everyone Everything
Domain of… Geeks Most Everyone
Enterprise Communication beyond 2.0 www.eng.it
15. Evolutions
Communication Patterns Evolution
Patterns 1.0 Patterns 2.0 Patterns > 2.0
Corporate news Submit news Share contents
Executives speech Executives blog Executives tweet
Taxonomy Folksonomy Auto generated tags
Quick pool Discussion forums Comments on a tweet
3
Regular broadcast Top down contents
Annual broadcast
CMS Wikis Wikis & Aggregators
Directories (A – Z) Search Search, Tagging, Ranking
Sticky content RSS Feeds
Hard Integration Mash-up Mash-up & API
Enterprise Communication beyond 2.0 www.eng.it
16. Innovative Interaction Models
The Consumer market influences the Enterprise one
The most innovative Interaction
Models occur before into
Consumer market and then into
Enterprise market.
This situation influences the
functional and technological
choices in companies when they 3
need to design a new information
system.
We can see that as early from
“2.0” models …
Enterprise Communication beyond 2.0 www.eng.it
17. The 2.0 Information System
Typical User Requreiments
“Our Information System must have:”
Facebook – like User Profiling
Wikipedia – like Knowledge Management System
Flikr – like Objects (document and media) Management System
Google Groups – like Forums 3
and Groups Management
Wordpress – like News and Content Management System (Blog)
Twitter – like Microblogging Platform
Total Integration with existing infrastructures and systems
and possibly…
an Open Source (or very cheap …) License
Enterprise Communication beyond 2.0 www.eng.it
18. The beyond 2.0 Information System
The Most Innovative Companies User Requirements
“Our Information System must have:”
Tablet dedicated functions (Apps) – i.e.: BI dashboards / B2B
Multi device interface – different kind of tablet platforms
Service / (O)API – based business logic – single set of services
3
(Private) Social Network integration – like / tweet / share / …
Geo-refs functions – check-in / proximity B2B services
Physical – digital gateway – i.e.: Qr-Code applications
Plug-in / Widgets – based architecture
Enterprise Communication beyond 2.0 www.eng.it
19. Enterprise 2.0
Web Web
Web
2.0 > 2.0
3
Enterprise
Company
2.0
Enterprise Communication beyond 2.0 www.eng.it
20. Enterprise 2.0
An Equation and a Definition
Web 2.0 + Companies = Enterprise 2.0
Enterprise 2.0 is the use of emergent social
software platforms within companies, or
between companies and their partners or
customers. 3
[Andrew McAfee]
http://andrewmcafee.org/2006/05/enterprise_20_version_20
Complexity science uses the term emergent to describe systems like ant colonies:
the appearance of global structure follows the result of local interactions
Enterprise Communication beyond 2.0 www.eng.it
21. Enterprise 2.0
So … What is “emergent”?
What are the tools and the
platforms most commonly
identified as emergent and
then ecosystem facilitators
and business - social - 3
oriented?
To find out them we just have to take a look at
what Web 2.0 offers in terms of services, patterns and ideas ...
Enterprise Communication beyond 2.0 www.eng.it
23. Enterprise 2.0
So .. what’s the point?
We are talking about
• collaborative models
• Interaction patterns
• methodologies
• features 3
typical Web 2.0 approach (they come from the consumer world)
merged or integrated into a single "Enterprise" platform
totally integrated with the existing IT environment
and possibly with a very cheap license
Enterprise Communication beyond 2.0 www.eng.it
24. Enterprise 2.0
E2 is NOT only a technological matter
Implementing an Enterprise 2.0 platform is NOT only a
technological matter.
3
Enterprise ≠ Web
Enterprise Communication beyond 2.0 www.eng.it
25. Enterprise 2.0
Some questions to be answered
What’s the company goal in designing
and budgeting a new Enterprise 2.0
platform?
Lower costs
Increase revenue
3
Make processes more agile
Share knowledge
Someone could answer: “Because we
want an Enterprise 2.0 platform” ….
Really …
Enterprise Communication beyond 2.0 www.eng.it
26. Enterprise 2.0
Some questions to be answered
What’s the best E2 strategy?
Collaboration
Sharing
Community based approach
3
Flat repository for contents
Someone could answer:
“We ARE 2.0, we don’t need a
strategy”
Really …
Enterprise Communication beyond 2.0 www.eng.it
27. Enterprise 2.0
Some questions to be answered
CEO reports are
"top down articles" or
"blog posts"?
How many people will leave a
comment on a CEO blog post?
How many people will leave a 3
comment on a CEO blog post
honestly, without cringing and
pretending?
Someone could answer: “Can we
have a blog post without comment
feature?” ….
Really …
Enterprise Communication beyond 2.0 www.eng.it
28. Enterprise 2.0
Some questions to be answered
It makes sense to create non
business-related communities?
Yes, because we want bring people
together also in non business related
fields.
No, because we don’t want our 3
employees lose their time playing.
Time is money!
Someone could answer: “We are not
Google (they really play games in
working time), we have to earn!” ….
Really …
Enterprise Communication beyond 2.0 www.eng.it
29. Enterprise 2.0
Some questions to be answered
Must comments be moderated?
Yes, because we want ensure the
security.
No, because we want complete
freedom in communication.
3
Someone could answer: “Great! We
can open a CEO blog pretending
transparency!” ….
Really …
Enterprise Communication beyond 2.0 www.eng.it
30. Enterprise 2.0
Some questions to be answered
Can I be anonymous?
(on a “logical” point of view, this is not
a technical topic)
No, because we want ensure the
security.
Yes, because we want complete 3
freedom in communication.
Someone could answer: “Could we
pretending anonymity?” ….
Really …
Enterprise Communication beyond 2.0 www.eng.it
31. Enterprise 2.0
Some questions to be answered
It makes sense to use "ranking" and
"tagging" as tools to evaluate contents
and than evaluate people?
No, because we don’t want our
people evaluate themselves.
3
Yes, because we want to bring out
personal (hidden) skills.
Someone could answer: “Could we
avoid ranking into CEO blog posts?”
….
Really …
Enterprise Communication beyond 2.0 www.eng.it
32. Enterprise 2.0
Some questions to be answered
What kind of incentive do you need to
get active users (and influence the
1:9:90 rule)?
Money / Awards
Professional growth
3
Public visibility
Pats on the back
Someone could answer: “We don’t
need incentives, the employees have
to participate!” ….
Really …
Enterprise Communication beyond 2.0 www.eng.it
33. Enterprise 2.0
The 1:9:90 rule
In most online communities:
• 90% of users are lurkers (i.e., read or
observe, but don't contribute).
• 9% of users contribute from time
to time, but other priorities
dominate their time.
• 1% of users participate a lot 3
and account for most
contributions.
Enterprise Communication beyond 2.0 www.eng.it
34. Enterprise 2.0
The right approach to 2.0 Information System
• targets understanding (if there are ...)
• platforms selection (commercial / foss / cheap / …)
and their integration
• integration with existing information systems
(single sign on / security / HR / users / …)
3
• development of missing features
• system integration
• methodological consultancy
Enterprise Communication beyond 2.0 www.eng.it
35. Enterprise 2.0
Different kind of Enterprise 2.0
Enterprise 2.0 as a tool for
Business Communication and
3
Collaboration
Enterprise Communication beyond 2.0 www.eng.it
36. Enterprise 2.0
3
Enterprise Communication beyond 2.0 www.eng.it
37. Enterprise 2.0
3
Enterprise Communication beyond 2.0 www.eng.it
38. Enterprise 2.0
Different kind of Enterprise 2.0
Using 2.0 patterns
to understand the market
3
Enterprise Communication beyond 2.0 www.eng.it
39. Enterprise 2.0
3
Enterprise Communication beyond 2.0 www.eng.it
40. Enterprise 2.0
3
Enterprise Communication beyond 2.0 www.eng.it
41. Enterprise 2.0
Different kind of Enterprise 2.0
Using 2.0 patterns
to influence3 the market
Enterprise Communication beyond 2.0 www.eng.it
43. Social Media e Comunicazione Enterprise oltre il 2.0
Thank you
email: massimo.canducci@eng.it
3
skype: massimo.canducci
twitter: @mcanducci
www.eng.it
http://geekandpoke.typepad.com/
Enterprise Communication beyond 2.0 www.eng.it
44. Enterprise 2.0
Enterprise Communication beyond 2.0
Massimo Canducci 3
Innovation Director
Research and Innovation Division
Engineering Ingegneria Informatica S.p.A.
Como, June 2011
www.eng.it