This document discusses common questions organizations have when implementing an enterprise social media strategy and lessons learned from experience. The first question addressed is how to encourage and manage user participation. The key lessons are to use tools that allow you to control the flow of content through the community by speeding up or slowing down participation as needed. This includes placing users in different groups with varying permissions, monitoring content for inappropriate content, and using automated moderation features. The overall goal is to foster open yet controlled discussions and establish appropriate community guidelines and rules.
Enterprise Social Media5 Common QuestionsMARSdigital
This document discusses common questions organizations have when developing an enterprise social media strategy and lessons learned from experience. It addresses how to encourage and manage user participation through tools for controlling content flow, user permissions and automated moderation. It also covers controlling security and access by categorizing content and users, as well as tracking member content, using versioning and audit tools for compliance. Establishing clear content ownership terms is also discussed.
This document summarizes trends and best practices in adopting social media, or Web 2.0, technologies in organizations in 2008. Key findings include that employers are increasingly allowing social media use for business purposes, finding benefits like improved branding and communication, and are taking steps to integrate these technologies into their corporate culture. Some organizations create internal communities to foster knowledge sharing and collaboration among employees, while others focus on external-facing communities to engage customers. Best practices for organizations include encouraging participation, managing communities with appropriate oversight, and using wikis more for internal audiences.
The document discusses how the Collins Center staff can utilize virtual leadership and web 2.0 tools to improve collaboration, disseminate information, and solve problems both internally and externally. It provides examples of current web 2.0 uses including websites, videos, and social media. It also discusses how to measure the ROI of social media through exposure, engagement, influence, and actions taken. The retreat aims to explore how to better position staff as virtual leaders and use online communities and tools.
This presentation showcases how Web 2.0 could be used within an enterprise with a "day (weeks, actually) in the life of" story of how a new employee, Michael, uses web 2.0 (or Enterprise 2.0) tools to quickly get up to speed and start contibuting. Touches on social networking, social bookmarking, blogs / microblogs, wiki, virtual world, mashups, RSS
This document discusses using social media and Enterprise 2.0 tools for collaboration. It begins by asking which social media platforms people use like Twitter, LinkedIn, Facebook. It then discusses how these platforms and others like YouTube, Wikipedia can be used both personally and professionally. It focuses on how Enterprise 2.0 uses these same tools internally for engagement, communication, innovation and knowledge sharing among employees, customers and partners to increase productivity, collaboration and business agility.
Companies benefit from Web 2.0 investmentSustainly
The latest research from Deutsche Bank shows that 20% of US and European companies use social media channels for business purposes. But, these are only the most transparent companies. More DB research can be found at: www.dbresearch.com
This document discusses how HR can leverage social media and enterprise 2.0 platforms. It begins by defining key social media platforms like Facebook, Twitter, LinkedIn, and Wikipedia. It then discusses how these can be used for HR purposes like recruitment, networking, and knowledge sharing. The document also discusses enterprise 2.0 concepts like social networks, blogs, wikis and how these internal tools can boost productivity, innovation and engagement. It argues HR should drive adoption of these tools by establishing guidelines, introducing an element of fun, and motivating creativity.
This is a group assignment done for Subject Semantic Web on the topic of "Web 2.0 for Business"
Group Members - H.M.V.T.W Bandara , S.M.P.S Chamara , W.G.Y Lakmal
Enterprise Social Media5 Common QuestionsMARSdigital
This document discusses common questions organizations have when developing an enterprise social media strategy and lessons learned from experience. It addresses how to encourage and manage user participation through tools for controlling content flow, user permissions and automated moderation. It also covers controlling security and access by categorizing content and users, as well as tracking member content, using versioning and audit tools for compliance. Establishing clear content ownership terms is also discussed.
This document summarizes trends and best practices in adopting social media, or Web 2.0, technologies in organizations in 2008. Key findings include that employers are increasingly allowing social media use for business purposes, finding benefits like improved branding and communication, and are taking steps to integrate these technologies into their corporate culture. Some organizations create internal communities to foster knowledge sharing and collaboration among employees, while others focus on external-facing communities to engage customers. Best practices for organizations include encouraging participation, managing communities with appropriate oversight, and using wikis more for internal audiences.
The document discusses how the Collins Center staff can utilize virtual leadership and web 2.0 tools to improve collaboration, disseminate information, and solve problems both internally and externally. It provides examples of current web 2.0 uses including websites, videos, and social media. It also discusses how to measure the ROI of social media through exposure, engagement, influence, and actions taken. The retreat aims to explore how to better position staff as virtual leaders and use online communities and tools.
This presentation showcases how Web 2.0 could be used within an enterprise with a "day (weeks, actually) in the life of" story of how a new employee, Michael, uses web 2.0 (or Enterprise 2.0) tools to quickly get up to speed and start contibuting. Touches on social networking, social bookmarking, blogs / microblogs, wiki, virtual world, mashups, RSS
This document discusses using social media and Enterprise 2.0 tools for collaboration. It begins by asking which social media platforms people use like Twitter, LinkedIn, Facebook. It then discusses how these platforms and others like YouTube, Wikipedia can be used both personally and professionally. It focuses on how Enterprise 2.0 uses these same tools internally for engagement, communication, innovation and knowledge sharing among employees, customers and partners to increase productivity, collaboration and business agility.
Companies benefit from Web 2.0 investmentSustainly
The latest research from Deutsche Bank shows that 20% of US and European companies use social media channels for business purposes. But, these are only the most transparent companies. More DB research can be found at: www.dbresearch.com
This document discusses how HR can leverage social media and enterprise 2.0 platforms. It begins by defining key social media platforms like Facebook, Twitter, LinkedIn, and Wikipedia. It then discusses how these can be used for HR purposes like recruitment, networking, and knowledge sharing. The document also discusses enterprise 2.0 concepts like social networks, blogs, wikis and how these internal tools can boost productivity, innovation and engagement. It argues HR should drive adoption of these tools by establishing guidelines, introducing an element of fun, and motivating creativity.
This is a group assignment done for Subject Semantic Web on the topic of "Web 2.0 for Business"
Group Members - H.M.V.T.W Bandara , S.M.P.S Chamara , W.G.Y Lakmal
Collective intelligence refers to the shared intelligence that emerges from collaboration between many individuals. It is important for modern internet functions and Web 2.0. Examples of websites that utilize collective intelligence include blogs, wikis, and video-sharing sites like YouTube, where users contribute content that improves website functions. Collective intelligence provides benefits like increased efficiency and catering content to audiences. It has also impacted larger-scale crowd-funding through social media networks.
Social media can be used in various ways to foster innovation, including generating and testing new ideas, finding solutions to challenges, and enabling collaboration both within and outside an organization. Key approaches include using ideation platforms, professional networks, blogs, wikis, and social media monitoring to identify unmet needs, tap new expertise, gather diverse inputs, and solve problems in new ways. Establishing active online communities allows for innovative ideas to be shared, built upon, and transformed through engagement and dialogue.
In this research we focuses on the revolution that is changing the World Wide Web, electronic commerce, and business in general. Web 2.0 is the term used to describe the wave of change in business models and in Web site functionality that has transformed the online landscape. Most likely, you are already familiar with popular Web 2.0 applications such as Facebook or Wikipedia.
Web 2.0 introduces unprecedented ways to connect to friends, share knowledge with your colleagues, or collaborate with a team of engineers 5,000 miles away, and many of today’s companies cannot afford to miss this trend.
Most young people entering the workforce have grown accustomed to using Facebook or Twitter for their communication needs. With Web 2.0 providing a new set of capabilities for individuals and businesses, an understanding of how they can be applied can be very helpful. Being able to understand and apply these emerging capabilities and strategies that are associated with Web 2.0 is a highly marketable skill.
Relevant information was collected from trusted internet sources and some papers which is published in well-known conferences.
Wikis are websites that allow users to easily add and edit content. They are well-suited for collaborative knowledge building from a variety of user inputs. In contrast, blogs are better for communicating chronological data from one source to many users. Wikis have been used by businesses for project management and collaboration. Mass collaboration on the internet, enabled by technologies like wikis, blogs and social networks, is empowering crowdsourced solutions and transforming how businesses operate.
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...Ian Truscott
Presentation from Gilbane Boston 2011 - discussing content management systems supporting a social media marketing strategy.
If you'd like a copy, let me know on twitter: @iantruscott
Collective Intelligence and Web 2.0 Presentation studentweb20
Collective intelligence refers to the shared intelligence that emerges from collaboration between many individuals. On the internet, it involves users contributing content that improves websites. Examples include blogs where users link to each other, wikis where many edit pages together, and video sites where users tag videos. Collective intelligence is key to Web 2.0, as users provide much of the content. It benefits websites by making them more efficient and catering content better to audiences. Social media demonstrates these principles on a large scale through crowd-funding.
SharePoint voor de social enterprise erwin koensErwin Koens
Gebruikers verwachten van hun samenwerkingsplatform ‘op kantoor’ dat ze ermee op een vergelijkbare, net zo intuïtieve manier als in hun privéleven interactie kunnen hebben met collega’s, partners en opdrachtgevers. SharePoint biedt hiervoor uitgebreide mogelijkheden. Deze sessie laat zien hoe een goed doordachte SharePoint implementatie uw intranet en/of extranet kan omturnen tot een waar Social Enterprise platform. Daarnaast verneem je meer over de aanpak, de implementatie en de adoptie van social functionaliteiten binnen de organisatie.
Fyronic Seminar : Engaging with your stakeholders through Web 2.0, Social Media and Enterprise 2.0
Presented by : Franky Redant - Founder Fyronic, Consultant
Social media and communications workshop held on 13 July 2012georginachatfield
The presentation given at Peterborough Town Hall by Edward Truch and Didier Soopramanien on 13 July 2012 - on social media and communications - for local community and voluntary groups
The document discusses various components of Web 2.0 and social media that are relevant for B2B marketers, including blogs, RSS, social networking sites, podcasts, videos, wikis, and software as a service. It provides examples and recommendations for how to utilize these channels for marketing purposes, highlighting benefits like SEO, building communities, and viral marketing. The key takeaway is that B2B companies should engage with various social media to find and convert leads on the web.
Social computing is a rapidly growing and constantly evolving technology that is aimed at increasing communication, encouraging collaboration, and enhancing productivity among people and resources. Social computing applications or Web 2.0 are built on a range of advanced and supporting technologies that enhance collective action and interaction which currently dominates the Web (Parameswaran & Whinston 2007).
Social computing applications are categorized into social media, social bookmarking, and social networks categories as identified by the continuing Web 2.0 trend (Schwartz et al. 2009; Amer-Yahia, 2009). Each of these categories has been embodied by various social software and web sites. Some of the best-known and equally famous social web sites that dominate the web are Facebook, YouTube, Twitter, Wikipedia, Delicious, and LinkedIn.
This document discusses social media and its uses both personally and professionally. It defines social media as online content created by people using technologies that allow highly accessible publishing. It then discusses different types of social media like blogs, wikis, social networking sites, and media sharing sites. It outlines benefits and risks of using social media professionally, including raising your profile, engaging with clients, and marketing your services at scale. However, it notes risks around blurring personal and professional boundaries and content reflecting negatively. It emphasizes managing privacy settings and considering how your activities may be viewed in the future.
A Taste of Tech: Finding Function in Social MediaJordan Epp
Web 2.0 tools can be used for networking, collaborating, and sharing by building an online presence. These tools include social media sites for networking like Facebook and Twitter, collaborative platforms like Google Docs and wikis, and sharing options like blogs, social bookmarking, and Creative Commons licenses. Users should categorize which tools will help them professionally, define a purpose for using each tool, and begin constructing an online identity.
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...Spotlight Communications
This webcast will provide attendees with an orientation to social media and e-learning technologies. Participants will learn how to leverage social media networks such as Facebook, YouTube and Twitter in maternal and child health programs. Additionally, case studies which successfully demonstrate the influence of social media will be presented and discussed.
Target Audience: MCHB/HRSA Staff, Program Grantees and other MCH/Public Health Professionals
Learning Objectives: Webinar attendees will learn about recent accessibility of social media apps that can maximize the visibility of their public health programs including Instagram, Pinterest, Vine, FiLMiC Pro and Path. They will also take-away best practices, and tips/tricks to help engage their target audience on social media.
This document discusses social media and how businesses can become social businesses. It defines social media as a set of tools that allow people to share things online, such as photos, videos, blogs, reviews, and messages. Social media is used in two ways - on social networks among friends and on online communities among people with shared interests. The document outlines problems with viewing social media as just a communications channel, advertising platform, or way to get people to do things. It emphasizes that social media requires an ongoing conversation and having a focus on engaging people. Finally, it presents a model for becoming a social business by engaging staff, communities, customers, partners and influencers through social tools, guidelines, training, data and more to improve customer
Enterprise 2.0 – Social Tools used with SharePointYianni Achele
Yianni Achele and Alan Ciunciusky talk about the out-of-the-box capabilities of SharePoint, and shows with the integration of applications such as NewsGator, Yammer and Jive, SharePoint can deliver a "best of breed" social media platform.
The Department of Homeland Security is creating an online social network called First Responder Communities of Practice to allow the nation's 2.5 million first responders to connect and share information. The network was designed based on Booz Allen Hamilton's internal social network. It allows first responders to collaborate through tools like wikis, blogs, and discussion boards. The network currently has around 600 users from 34 states sharing "sensitive but unclassified" information. The article outlines best practices for implementing a successful social media initiative, including analyzing needs, securing leadership support, and identifying champions to promote adoption.
Application Architecture for Cloud Computing white paper
Cloud computing allows sharing of computing resources and offers applications on demand. To succeed in the cloud, applications must be designed to scale easily, tolerate failures, and include management tools. Key considerations for cloud architecture include making applications simple, split into loosely coupled functions, and network-based. Applications should also be resilient, distribute failures across clusters, and automate recovery. Management of cloud applications is simplified by deploying standardized virtual appliances that are easy to provision and update.
Principles of Web Usabilty II - Fall 2007 white paper
This document summarizes a presentation about principles of usability for web design. It discusses conducting usability studies to understand user behaviors and test sites. Effective design focuses on simplicity, intuitiveness, and meeting user goals with minimal clicks or thought required. Key recommendations include using conventions from popular sites, prioritizing content over branding, and designing for scanning with short paragraphs and graphic elements to draw attention. Usability testing helps fix issues before launch and improves conversions.
Principles of Web Usability I - Summer 2006white paper
The document summarizes a presentation about principles of usability for websites. The presenter discusses conducting usability studies, examples of successful sites like Amazon and Craigslist, and tips for writing content, navigation, and homepage design with usability in mind. Key recommendations include focusing on simplicity, following conventions of popular sites, and testing designs with users to identify and address usability issues.
Collective intelligence refers to the shared intelligence that emerges from collaboration between many individuals. It is important for modern internet functions and Web 2.0. Examples of websites that utilize collective intelligence include blogs, wikis, and video-sharing sites like YouTube, where users contribute content that improves website functions. Collective intelligence provides benefits like increased efficiency and catering content to audiences. It has also impacted larger-scale crowd-funding through social media networks.
Social media can be used in various ways to foster innovation, including generating and testing new ideas, finding solutions to challenges, and enabling collaboration both within and outside an organization. Key approaches include using ideation platforms, professional networks, blogs, wikis, and social media monitoring to identify unmet needs, tap new expertise, gather diverse inputs, and solve problems in new ways. Establishing active online communities allows for innovative ideas to be shared, built upon, and transformed through engagement and dialogue.
In this research we focuses on the revolution that is changing the World Wide Web, electronic commerce, and business in general. Web 2.0 is the term used to describe the wave of change in business models and in Web site functionality that has transformed the online landscape. Most likely, you are already familiar with popular Web 2.0 applications such as Facebook or Wikipedia.
Web 2.0 introduces unprecedented ways to connect to friends, share knowledge with your colleagues, or collaborate with a team of engineers 5,000 miles away, and many of today’s companies cannot afford to miss this trend.
Most young people entering the workforce have grown accustomed to using Facebook or Twitter for their communication needs. With Web 2.0 providing a new set of capabilities for individuals and businesses, an understanding of how they can be applied can be very helpful. Being able to understand and apply these emerging capabilities and strategies that are associated with Web 2.0 is a highly marketable skill.
Relevant information was collected from trusted internet sources and some papers which is published in well-known conferences.
Wikis are websites that allow users to easily add and edit content. They are well-suited for collaborative knowledge building from a variety of user inputs. In contrast, blogs are better for communicating chronological data from one source to many users. Wikis have been used by businesses for project management and collaboration. Mass collaboration on the internet, enabled by technologies like wikis, blogs and social networks, is empowering crowdsourced solutions and transforming how businesses operate.
Gilbane 2011 - All the cool web kids are social, is your CMS ready to hang wi...Ian Truscott
Presentation from Gilbane Boston 2011 - discussing content management systems supporting a social media marketing strategy.
If you'd like a copy, let me know on twitter: @iantruscott
Collective Intelligence and Web 2.0 Presentation studentweb20
Collective intelligence refers to the shared intelligence that emerges from collaboration between many individuals. On the internet, it involves users contributing content that improves websites. Examples include blogs where users link to each other, wikis where many edit pages together, and video sites where users tag videos. Collective intelligence is key to Web 2.0, as users provide much of the content. It benefits websites by making them more efficient and catering content better to audiences. Social media demonstrates these principles on a large scale through crowd-funding.
SharePoint voor de social enterprise erwin koensErwin Koens
Gebruikers verwachten van hun samenwerkingsplatform ‘op kantoor’ dat ze ermee op een vergelijkbare, net zo intuïtieve manier als in hun privéleven interactie kunnen hebben met collega’s, partners en opdrachtgevers. SharePoint biedt hiervoor uitgebreide mogelijkheden. Deze sessie laat zien hoe een goed doordachte SharePoint implementatie uw intranet en/of extranet kan omturnen tot een waar Social Enterprise platform. Daarnaast verneem je meer over de aanpak, de implementatie en de adoptie van social functionaliteiten binnen de organisatie.
Fyronic Seminar : Engaging with your stakeholders through Web 2.0, Social Media and Enterprise 2.0
Presented by : Franky Redant - Founder Fyronic, Consultant
Social media and communications workshop held on 13 July 2012georginachatfield
The presentation given at Peterborough Town Hall by Edward Truch and Didier Soopramanien on 13 July 2012 - on social media and communications - for local community and voluntary groups
The document discusses various components of Web 2.0 and social media that are relevant for B2B marketers, including blogs, RSS, social networking sites, podcasts, videos, wikis, and software as a service. It provides examples and recommendations for how to utilize these channels for marketing purposes, highlighting benefits like SEO, building communities, and viral marketing. The key takeaway is that B2B companies should engage with various social media to find and convert leads on the web.
Social computing is a rapidly growing and constantly evolving technology that is aimed at increasing communication, encouraging collaboration, and enhancing productivity among people and resources. Social computing applications or Web 2.0 are built on a range of advanced and supporting technologies that enhance collective action and interaction which currently dominates the Web (Parameswaran & Whinston 2007).
Social computing applications are categorized into social media, social bookmarking, and social networks categories as identified by the continuing Web 2.0 trend (Schwartz et al. 2009; Amer-Yahia, 2009). Each of these categories has been embodied by various social software and web sites. Some of the best-known and equally famous social web sites that dominate the web are Facebook, YouTube, Twitter, Wikipedia, Delicious, and LinkedIn.
This document discusses social media and its uses both personally and professionally. It defines social media as online content created by people using technologies that allow highly accessible publishing. It then discusses different types of social media like blogs, wikis, social networking sites, and media sharing sites. It outlines benefits and risks of using social media professionally, including raising your profile, engaging with clients, and marketing your services at scale. However, it notes risks around blurring personal and professional boundaries and content reflecting negatively. It emphasizes managing privacy settings and considering how your activities may be viewed in the future.
A Taste of Tech: Finding Function in Social MediaJordan Epp
Web 2.0 tools can be used for networking, collaborating, and sharing by building an online presence. These tools include social media sites for networking like Facebook and Twitter, collaborative platforms like Google Docs and wikis, and sharing options like blogs, social bookmarking, and Creative Commons licenses. Users should categorize which tools will help them professionally, define a purpose for using each tool, and begin constructing an online identity.
HRSA Social Media Webcast: Using Visual Apps to Connect with Your Target Audi...Spotlight Communications
This webcast will provide attendees with an orientation to social media and e-learning technologies. Participants will learn how to leverage social media networks such as Facebook, YouTube and Twitter in maternal and child health programs. Additionally, case studies which successfully demonstrate the influence of social media will be presented and discussed.
Target Audience: MCHB/HRSA Staff, Program Grantees and other MCH/Public Health Professionals
Learning Objectives: Webinar attendees will learn about recent accessibility of social media apps that can maximize the visibility of their public health programs including Instagram, Pinterest, Vine, FiLMiC Pro and Path. They will also take-away best practices, and tips/tricks to help engage their target audience on social media.
This document discusses social media and how businesses can become social businesses. It defines social media as a set of tools that allow people to share things online, such as photos, videos, blogs, reviews, and messages. Social media is used in two ways - on social networks among friends and on online communities among people with shared interests. The document outlines problems with viewing social media as just a communications channel, advertising platform, or way to get people to do things. It emphasizes that social media requires an ongoing conversation and having a focus on engaging people. Finally, it presents a model for becoming a social business by engaging staff, communities, customers, partners and influencers through social tools, guidelines, training, data and more to improve customer
Enterprise 2.0 – Social Tools used with SharePointYianni Achele
Yianni Achele and Alan Ciunciusky talk about the out-of-the-box capabilities of SharePoint, and shows with the integration of applications such as NewsGator, Yammer and Jive, SharePoint can deliver a "best of breed" social media platform.
The Department of Homeland Security is creating an online social network called First Responder Communities of Practice to allow the nation's 2.5 million first responders to connect and share information. The network was designed based on Booz Allen Hamilton's internal social network. It allows first responders to collaborate through tools like wikis, blogs, and discussion boards. The network currently has around 600 users from 34 states sharing "sensitive but unclassified" information. The article outlines best practices for implementing a successful social media initiative, including analyzing needs, securing leadership support, and identifying champions to promote adoption.
Application Architecture for Cloud Computing white paper
Cloud computing allows sharing of computing resources and offers applications on demand. To succeed in the cloud, applications must be designed to scale easily, tolerate failures, and include management tools. Key considerations for cloud architecture include making applications simple, split into loosely coupled functions, and network-based. Applications should also be resilient, distribute failures across clusters, and automate recovery. Management of cloud applications is simplified by deploying standardized virtual appliances that are easy to provision and update.
Principles of Web Usabilty II - Fall 2007 white paper
This document summarizes a presentation about principles of usability for web design. It discusses conducting usability studies to understand user behaviors and test sites. Effective design focuses on simplicity, intuitiveness, and meeting user goals with minimal clicks or thought required. Key recommendations include using conventions from popular sites, prioritizing content over branding, and designing for scanning with short paragraphs and graphic elements to draw attention. Usability testing helps fix issues before launch and improves conversions.
Principles of Web Usability I - Summer 2006white paper
The document summarizes a presentation about principles of usability for websites. The presenter discusses conducting usability studies, examples of successful sites like Amazon and Craigslist, and tips for writing content, navigation, and homepage design with usability in mind. Key recommendations include focusing on simplicity, following conventions of popular sites, and testing designs with users to identify and address usability issues.
Facebook Meets the Virtualized Enterprisewhite paper
This document discusses using social networking and cloud computing technologies in an enterprise setting. The authors developed an environment that uses Facebook to provide access to a legacy application called the Fire Dynamics Simulator. The application is hosted using virtual appliances in an internal cloud computing infrastructure that dynamically adapts to user demands. Initial feedback suggests this approach provides a better user experience than traditional standalone use of the application, while also simplifying management and increasing effective utilization of IT resources.
Pre-Integrated SSO for Software-as-a-Service & Enterprise Applicationswhite paper
Symplified KeyChain provides single sign-on (SSO) for software-as-a-service (SaaS) and enterprise applications to ease user access and strengthen security. It unifies security and compliance for both cloud-based SaaS and on-premise applications. KeyChain integrates with applications like Salesforce, Workday, and SAP to provide centralized SSO, authentication management, auditing, and reporting across applications regardless of their location.
Protecting Dynamic Datacenters From the Latest Threatswhite paper
The document discusses the challenges of securing dynamic datacenters, where servers are increasingly virtualized, mobile between physical locations, and deployed in public clouds. It notes that traditional network-based security is insufficient as servers lose their strict separation. The proliferation of virtual machines multiplies security risks like exposure to attacks between VMs and loss of security context during live migration. Cloud computing further challenges the security model by removing even the datacenter perimeter and requiring host-based protections on internet-accessible VMs. The document introduces Third Brigade Deep Security as a comprehensive server and application protection solution suited for dynamic virtual, cloud and traditional datacenter environments.
Cloud Computing With Amazon Web Services, Part 3: Servers on Demand With EC2white paper
This document introduces Amazon EC2, a cloud computing service that provides virtual servers. EC2 allows users to configure computing capacity on demand, adjusting resources based on traffic needs. Users launch instances of virtual servers from templates called Amazon Machine Images (AMIs). Instances can be configured in different sizes and launched across multiple data center locations for reliability. Security features like security groups and keypairs control access to instances.
This document provides checklists to help companies create social media policies that ensure proper disclosure and compliance with FTC guidelines. The first checklist focuses on best practices for disclosing employee and agency identities when using social media on behalf of a company. It recommends clearly disclosing affiliations from the first encounter, using real identities unless pseudonyms provide privacy or security, and allowing two-way communication to verify involvement in social media content. The overall goal is to make disclosures clear, understandable, and conspicuous to average readers.
Enterprise Social Media: Trends and Best Practices in Adopting Web 2.0 in 2008white paper
The document discusses trends in enterprise social media adoption in 2008. Key findings include:
1) Employers are becoming more open to allowing social media participation for business purposes, with 69% allowing it in 2008 compared to 37% in 2007.
2) Employers are finding benefits to using social media like building their brand, improving communication, and increasing consumer engagement.
3) Some employers are using internal social networks rather than public sites like Facebook, while others use external or blended networks.
This document provides an introduction and table of contents for the ReadWriteWeb Premium Guide to Online Community Management. The guide covers topics such as the basics of online community management, whether startups need community managers, calculating return on investment, developing job descriptions, balancing marketing and customer engagement, dealing with challenging community members, and additional resources. It includes curated content from other sources as well as interviews with experienced community managers.
The document discusses governance models for content management systems (CMS). It defines governance as the policies, roles, responsibilities and processes that guide how a CMS is used to achieve business goals. It emphasizes aligning the right people in the right roles, including an executive sponsor, web steering team, and web team. The roles and responsibilities of each group are outlined. It also discusses considerations for extranets and tips for effective content governance, such as permission models, workflows and guidelines.
The document discusses best practices for using social media for business purposes in a compliant manner. It emphasizes taking an "outside in" approach by focusing on how to benefit customers rather than just compliance. Top tips include listening to customers, engaging with them authentically, and constantly monitoring social media to build trust. It also provides guidance on setting social media policies and community guidelines, as well as using tools to archive social media conversations for regulatory purposes.
This document provides an introduction to the ReadWriteWeb Guide to Online Community Management. It discusses the emergence of new online communities and the corresponding need for community managers. It outlines the contents of the guide, which explores questions around return on investment, job descriptions, balancing marketing and engagement, and dealing with challenging community members. The guide includes curated articles, interviews with community managers, and additional online resources for ongoing learning.
Dig into the dynamics of online reputation and learn about the available tools for managing it. Find out how to find, engage and empower your superfnas to drive real business outcomes with social customers.
How b2 b decision makers use social mediaDavid Brooks
B2B decision-makers use social media primarily for learning and conversing in order to keep up with changing ideas. They want to engage directly with company representatives on social networks to discuss insights and ideas. Senior decision-makers, who make up 35-50% of social media users, particularly enjoy using social media to both acquire and share knowledge on topics that advance their thinking. Effective social media strategies for B2B companies include directly engaging with customers, sharing content that educates users, and managing online communities.
Social media is interactive digitally-mediated technologies that facilitate the creation or sharing/exchange of information, ideas, career interests, and other forms of expression via virtual communities and networks
The document discusses social media strategies and tools for organizations. It provides an overview of popular social networks like Facebook, Twitter, LinkedIn, and others. It then discusses three secret synergies between search engine optimization and social media: content, link building, and search queries. Content is important for social media and it provides guidelines for creating quality content. The document also decodes a successful social media strategy, including engaging fans and turning participants into evangelists. It discusses how organizations can join social media conversations by providing content like photos, videos, surveys and discussions.
The document provides guidelines for developing effective social media policies for companies and employees. It discusses balancing open communication with protecting proprietary information. It also emphasizes the importance of an inclusive process to create guidelines that reflect the organization's culture. The document details Cision's process for creating their social media guidelines and the nine guidelines they developed, which focus on transparency, professionalism, respect, and protecting confidential information.
Social Media For Business Part 1 Social Media BasicsSteven Fisher
In Part 1, we lay the foundation and explain the basics of social media, what created this new technology area, what tools are available and what it is used for in a business setting.
4 Essential Steps to Reach Social Community Critical MassSandy Adam
By The Social Business Council
with Sandy Adam, Vishal Agnihotri, Stephane Aknin, Chris Dittrick, Patrick O’Brien, Dennis Pearce, Sharon Lina Pearce, and Simon Vaughan
Published October 22, 2013
Social media can help organizations in several ways but also poses some limitations. It allows improved communication across geographical distances and time zones. It facilitates information sharing, expertise finding, and marketing. However, it can reduce employee productivity and confidentiality if misused. Organizations must have social media strategies and policies to address security, compliance, and acceptable use. Overall social computing's prospects for success in organizations are good if its benefits and limitations are properly managed.
The document discusses social media in business and provides tips for using social media effectively. It defines key terms like Web 2.0, social media, user-generated content, and social bookmarking. It also outlines trends in social media use and consumer trust, and provides best practices for social media strategies including using the POST method, optimizing content, increasing linkability, rewarding inbound links, and making tagging and bookmarking easy.
This document discusses how retailers can embrace social media marketing to meet changing consumer needs. It introduces the four C's of social media marketing: content, connections, context, and community. It then provides examples of social media platforms and discusses how small businesses can capitalize on social networking by increasing search engine optimization, brand awareness, customer relationships and more. The document advocates starting with blogging and monitoring other industry blogs as an initial step in social media marketing.
Social technologies like microblogging and social networking are being used internally by companies to dramatically speed the flow of work. But you need large-scale adoption to get business results that make a difference. This paper provides a blueprint to drive the large-scale adoption of a social software solution, so you get results that are noticed.
Similar to Enterprise Social Media: Five Common Questions (20)
Java provides strong security features that are built into its design and well-suited for distributed computing. Its security model uses sandboxes, class loaders, bytecode verification, and security managers to prevent untrusted applications from accessing system resources. Java also supports protected domains that extend security through flexible user-defined permissions for applications. Effective security requires ongoing diligence through techniques, training, and adapting to new threats.
This document provides an overview of security in the Java platform, covering topics like the Java language's security features, bytecode verification, the basic security architecture including security providers and file locations, cryptography, public key infrastructure (PKI), authentication, secure communication techniques, access control including permissions and policy, and built-in security providers. It describes the key principles of implementation independence, interoperability, and extensibility that the Java security APIs are designed around.
This guide helps developers migrate Java applications from version 1.3 to 5.0. While many 1.3 applications run without changes, some compatibility issues exist as described in this guide. The guide covers runtime issues, deployment issues, and tooling issues to assist with the migration. Developers should consult this guide and release notes for any late-breaking issues when migrating applications to Java 5.0.
The document summarizes performance enhancements and new features in J2SE 5.0, including ergonomics in the Java Virtual Machine to automatically select optimal settings, improved string handling with StringBuilder, enhancements to Java 2D and image I/O, and reduced startup time and memory footprint through class data sharing. Benchmark results show significant performance improvements over J2SE 1.4.2 in SPECjbb2000 and VolanoMark, as well as up to 22% faster startup for applications. Memory footprint is also reduced for applications on various platforms including Windows XP and Linux.
This document provides an overview of new performance and scalability improvements in Java SE 6, including runtime optimizations for locking, compilation, and garbage collection. It discusses features like biased locking, lock coarsening, parallel compaction collection, improved ergonomics, and reduced application startup times. Benchmark results demonstrate performance gains of 10-20% for SPECjbb2005, I/O tests, and VolanoMark compared to Java SE 5.
This document provides an overview of new performance and scalability improvements in Java Standard Edition 6, including runtime optimizations like biased locking and lock coarsening, garbage collection enhancements like parallel compaction, and compiler optimizations. It discusses these changes and provides references for more detailed information.
This document provides an overview of new performance and scalability improvements in Java SE 6, including runtime optimizations like biased locking and lock coarsening, garbage collection enhancements like parallel compaction, and client-side improvements such as reduced application startup time. Benchmark results demonstrate performance gains of 10-20% on SPECjbb2005, I/O tests, and VolanoMark compared to Java SE 5. The document discusses the new features and their impact in detail over several sections.
This document provides an overview of new performance and scalability improvements in Java SE 6, including runtime optimizations, garbage collection enhancements, and client-side improvements. Key changes include biased locking for faster uncontended synchronization, parallel compaction for faster major garbage collections, background compilation for improved multicore utilization, and boot class loader optimizations for faster application startup times. Benchmark results demonstrate performance gains of 10-20% for SPECjbb2005, I/O tests, and VolanoMark compared to Java SE 5.
This document provides an overview of new performance and scalability improvements in Java Standard Edition 6, including runtime optimizations like biased locking and lock coarsening, garbage collection enhancements like parallel compaction, and compiler optimizations. It discusses these changes and provides references for more detailed information.
Memory Management in the Java HotSpot Virtual Machinewhite paper
This document provides an overview of memory management and garbage collection in the Java HotSpot Virtual Machine. It describes the different garbage collectors available, including the serial, parallel, parallel compacting, and concurrent mark-sweep collectors. It also discusses generational memory organization, garbage collection concepts, and tools for evaluating performance.
This document discusses the version numbering for Java SE 6. It states that the platform name has changed from J2SETM to JavaTM SE and the official name is JavaTM Platform, Standard Edition 6. It also discusses that version 6 is used for both the product and developer versions to reflect the maturity of Java SE.
1. Java Web Start allows users to launch Java applications from a web page with a single click without complicated installation. It manages installation of the required Java Runtime Environment version and updates applications automatically.
2. When a user clicks to launch the Notepad application, Java Web Start installs the needed Java version if missing and runs the application, caching it for future use.
3. The application is integrated with the user's desktop and can be launched from the Java Application Cache viewer or a desktop shortcut in the future without returning to the web page. Java Web Start handles running multiple applications requiring different Java versions.
This document provides a summary of tuning techniques for Java applications. It begins with best practices like using the latest Java version and release. It emphasizes the importance of making decisions based on data through statistical analysis and benchmarks. The document then gives tuning ideas covering JVM settings like garbage collection policies and heap sizing. It aims to provide guidance on performance optimization in a methodical, data-driven manner.
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applicationswhite paper
The document discusses the Java 2D and Java Advanced Imaging APIs. It provides an overview of the Java 2D API and its capabilities for 2D graphics and imaging. It then describes the Java Advanced Imaging API, which builds on the Java 2D API to provide more sophisticated image processing capabilities. Key features of the Java Advanced Imaging API include tiling of large images, resolution-independent processing, and support for distributed and network-based imaging applications. The APIs allow for cross-platform development of imaging applications.
Introduction to the Java(TM) Advanced Imaging APIwhite paper
The document introduces the Java Advanced Imaging (JAI) API, which provides advanced image processing capabilities for Java applications. It describes key JAI functionality like tiled images, lazy evaluation, multi-resolution imaging, and network imaging. The course will cover pixel-based and resolution-independent imaging, writing JAI extensions, and an example application.
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...white paper
This document describes a project between Sun Microsystems and Utah State University to evaluate Java Advanced Imaging (JAI) as a basis for image processing applications in earth sciences. The project's primary objective was to determine if JAI provided adequate functionality for earth sciences applications by assessing it against a matrix of requirements. Some demonstration software was also developed using JAI. The results found that JAI satisfied most requirements directly or through extensibility, and the remaining requirements were outside the project scope. The demonstration software showed JAI's ability to handle typical earth sciences data formats and generate classification maps. The project helped Sun understand how well JAI meets earth sciences application needs.
Java 2D API: Enhanced Graphics and Imaging for the Java Platformwhite paper
The document discusses the Java 2D API, which provides a powerful framework for device- and resolution-independent 2D graphics in Java programs. The Java 2D API extends the graphics and imaging classes defined by java.awt while maintaining compatibility. It enables developers to easily incorporate high-quality 2D graphics, text, and images. Key features of the Java 2D API include support for images, fonts, layout, paths, transformations, strokes, fills, and rendering.
The Java 2 platform includes a new package of concurrency utilities that are designed to simplify building concurrent applications. The concurrency utilities provide commonly used building blocks such as thread pools, asynchronous task execution frameworks, concurrent collections, atomic variables, locks, and condition variables. Using these utilities reduces programming effort, improves performance, reliability, maintainability and productivity when building concurrent applications compared to developing these components from scratch. The concurrency utilities package aims to make concurrent programs clearer, shorter, faster, more reliable, scalable, easier to write, read and maintain.
Defining a Summative Usability Test for Voting Systemswhite paper
This document outlines a proposed approach for conducting a summative usability test of a voting system to evaluate whether it meets specified usability requirements. The test is intended to identify failures in effectiveness, efficiency, and satisfaction rather than diagnose their causes. Key elements that must be defined include the purpose of the test, voting system, user tasks, data collection, and how results will be analyzed. Gaps are noted in establishing specific usability benchmarks and criteria for voting systems to pass or fail the test.
This document summarizes research conducted to develop usability performance benchmarks for voting systems to be included in the Voluntary Voting System Guidelines (VVSG). The research established a standardized testing methodology to measure usability across different voting system technologies. Over 450 test participants used four different voting systems and their interactions were analyzed to determine accuracy, completion rates, and error rates. The results were used to propose benchmark values for three usability measures that all systems must meet: a Total Completion Score of 98%, a Voter Inclusion Index of 0.35, and a Perfect Ballot Index of 2.33. The benchmarks and testing methodology are intended to improve the usability of future voting systems.
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
Digital Marketing with a Focus on Sustainabilitysssourabhsharma
Digital Marketing best practices including influencer marketing, content creators, and omnichannel marketing for Sustainable Brands at the Sustainable Cosmetics Summit 2024 in New York
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
3 Simple Steps To Buy Verified Payoneer Account In 2024SEOSMMEARTH
Buy Verified Payoneer Account: Quick and Secure Way to Receive Payments
Buy Verified Payoneer Account With 100% secure documents, [ USA, UK, CA ]. Are you looking for a reliable and safe way to receive payments online? Then you need buy verified Payoneer account ! Payoneer is a global payment platform that allows businesses and individuals to send and receive money in over 200 countries.
If You Want To More Information just Contact Now:
Skype: SEOSMMEARTH
Telegram: @seosmmearth
Gmail: seosmmearth@gmail.com
How MJ Global Leads the Packaging Industry.pdfMJ Global
MJ Global's success in staying ahead of the curve in the packaging industry is a testament to its dedication to innovation, sustainability, and customer-centricity. By embracing technological advancements, leading in eco-friendly solutions, collaborating with industry leaders, and adapting to evolving consumer preferences, MJ Global continues to set new standards in the packaging sector.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....Lacey Max
“After being the most listed dog breed in the United States for 31
years in a row, the Labrador Retriever has dropped to second place
in the American Kennel Club's annual survey of the country's most
popular canines. The French Bulldog is the new top dog in the
United States as of 2022. The stylish puppy has ascended the
rankings in rapid time despite having health concerns and limited
color choices.”
How to Implement a Real Estate CRM SoftwareSalesTown
To implement a CRM for real estate, set clear goals, choose a CRM with key real estate features, and customize it to your needs. Migrate your data, train your team, and use automation to save time. Monitor performance, ensure data security, and use the CRM to enhance marketing. Regularly check its effectiveness to improve your business.
Easily Verify Compliance and Security with Binance KYCAny kyc Account
Use our simple KYC verification guide to make sure your Binance account is safe and compliant. Discover the fundamentals, appreciate the significance of KYC, and trade on one of the biggest cryptocurrency exchanges with confidence.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...my Pandit
Explore the fascinating world of the Gemini Zodiac Sign. Discover the unique personality traits, key dates, and horoscope insights of Gemini individuals. Learn how their sociable, communicative nature and boundless curiosity make them the dynamic explorers of the zodiac. Dive into the duality of the Gemini sign and understand their intellectual and adventurous spirit.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
Navigating the world of forex trading can be challenging, especially for beginners. To help you make an informed decision, we have comprehensively compared the best forex brokers in India for 2024. This article, reviewed by Top Forex Brokers Review, will cover featured award winners, the best forex brokers, featured offers, the best copy trading platforms, the best forex brokers for beginners, the best MetaTrader brokers, and recently updated reviews. We will focus on FP Markets, Black Bull, EightCap, IC Markets, and Octa.
Call8328958814 satta matka Kalyan result satta guessing➑➌➋➑➒➎➑➑➊➍
Satta Matka Kalyan Main Mumbai Fastest Results
Satta Matka ❋ Sattamatka ❋ New Mumbai Ratan Satta Matka ❋ Fast Matka ❋ Milan Market ❋ Kalyan Matka Results ❋ Satta Game ❋ Matka Game ❋ Satta Matka ❋ Kalyan Satta Matka ❋ Mumbai Main ❋ Online Matka Results ❋ Satta Matka Tips ❋ Milan Chart ❋ Satta Matka Boss❋ New Star Day ❋ Satta King ❋ Live Satta Matka Results ❋ Satta Matka Company ❋ Indian Matka ❋ Satta Matka 143❋ Kalyan Night Matka..
Storytelling is an incredibly valuable tool to share data and information. To get the most impact from stories there are a number of key ingredients. These are based on science and human nature. Using these elements in a story you can deliver information impactfully, ensure action and drive change.
2. 5 Common Questions
Table of Contents
3. Introduction: Approaching the Web 2.0 Groundswell
4. Managing Participation
The Question: How Do You Encourage and Manage User Participation?
Lesson Learned: Speed Up and Slow Down Community Activity
Controlling the Flow of Bad Content and Good
Slowing the Surge of Bad Content
Controlling What Users Perform
Using Automated Moderation Features
Leveraging Good Content
7. Controlling Security and Access
The Question: Who Can Get In; and What Can They See and Do?
Lesson Learned: Categorize Content and Users; Control Access
9. Compliance and Auditing
The Question: Who Did What?
Lesson Learned: Use Versioning and Audit Tools
10. Recognizing Content Ownership
The Question: Who Owns the Content?
Lesson Learned: Establish Ownership
11. Choosing a Technology Strategy
The Question: What’s Best for My Users?
Lesson Learned: Be Ready for Change
12. Summary: Learning from Experience
www.awarenessnetworks.com
3. 5 Common Questions
Introduction: Approaching the Web 2.0 Groundswell
The rise of Web 2.0 communities such as MySpace, Facebook and LinkedIn is
driving a groundswell of social media activity that many businesses are clamoring
to take advantage of. As organizations begin to think through their social media
strategy, they raise a lot of questions. An experienced provider of Web 2.0
communities, Awareness hears many of these questions first hand. And we
offer practical advice on ways to address them. This report discusses five common
questions we hear and the real-world lessons we’ve learned helping customers
build effective Web 2.0 strategies.
These lessons stem from our experience developing internal- and external-facing
social media communities for leading brands such as Marriott, the New York
Times, McDonalds, Cannondale, Northwestern Mutual, Discovery Channel,
JetBlue and Kodak. One major observation is that regardless of the business a
company is in or nature of the community it wants to build, its concerns are
shared by almost everyone considering a Web 2.0 strategy. They typically relate
to the same issues, including:
• Legal considerations
• Brand image
• Community ethics and integrity
• Participation and community dynamics
• Intellectual property rights
• Technology strategy
As your business begins charting its course in the Web 2.0 frontier, you’re likely
to encounter the same concerns. The questions highlighted in this report and
resulting lessons learned will help you address them with confidence.
www.awarenessnetworks.com 3
4. 5 Common Questions
1 Managing Participation
THE QUESTION: How Do You Encourage and Manage User
Participation?
Every community’s success depends on user participation. When considering how to
optimize this, customers often express two concerns at opposite ends of a spectrum.
The first is that they will devote resources to a community and no one will participate.
The second is that everyone will participate in what could become a chaotic, difficult-to-
manage “wild west” environment.
?
No one Participation Everyone
Failure? Wild Wild West?
Common Web 2.0 Question: Will too few or too many participate?
Lesson Learned: Speed Up and Slow Down Community Activity
Effectively managing user participation requires some essential capabilities:
1) A speedometer that enables you to watch the flow of content, and gauge
how the community is evolving
2) An accelerator to increase the rate of contribution and speed up participation
3) A brake pedal to decrease the rate of contribution and slow down participation
The best social media solutions provide these capabilities through a combination
of facilities:
You Need
Accelerator Speedometer Brake Pedal
Social media tools for controlling the flow of bad content and good content.
• The ability to place users into different groups and control their permissions
• The ability to control if a user’s content is published directly to the community or
requires explicit approval from a moderator first
• The ability to monitor content with strong manual and automatic moderation tools
4 www.awarenessnetworks.com
5. 5 Common Questions
Managing Participation (cont.)
Fostering Open, Controlling the Flow of Content
Transparent Communities Some organizations are understandably concerned about ensuring that community
Monitoring content for contribu- content is consistent with brand image, not hurtful or offensive, or doesn’t violate IP
tions that are offensive, hurtful ownership rules. It’s common for these organizations to launch their communities with
or inconsistent with brand controls that closely regulate the flow of content, then open them up to allow a faster
image, or violate IP leakage rules rate of participation as they become more comfortable with the dynamics.
is very different from looking for
controversial or critical content. Slowing the Surge of Bad Content
It may be appropriate to reject Organizations that notice a surge in “bad” content can use social media software
content that uses swear words, controls to moderate the postings of specific community members or member groups,
for example, but we advise and restrict their permissions if necessary. This is often achieved by controlling a user’s
companies not to reject content status. Two common status settings are Trusted and Untrusted.
from users that criticize the
company or its products or The contributions of a member who is Untrusted, for example, can be automatically
services. We’ve found that the routed to a moderator’s inbox for explicit approval before it appears in the community.
best communities are open, In contrast, the contributions of Trusted users are posted automatically without any
transparent, and enable moderation restrictions. As community behavior evolves and you learn more about
members to express themselves specific individuals, you can change a member status and their authority to perform
freely in an appropriate manner. specific activities. You should also be able to adjust these controls for specific users or
groups of users, depending on the needs of the community.
Controlling User Activities
Controlling what activities a user or a group of users perform is another valuable
capability. For example, some organizations start by allowing some users to just comment
or vote on content. Often, they will later give them the option to post their own content
or edit others’ in a Wiki.
Using Automated Moderation Features
Automated moderation facilities make it possible to watch contributions for bad content
without requiring a moderator to manually review each post. By creating rules that
automatically flag or reject content if it contains certain words or phrases, an
organization can be comfortable that the content flowing to community members
is not violating company ethics, codes of conduct, or IP ownership rules.
www.awarenessnetworks.com 5
6. 5 Common Questions
Managing Participation (cont.)
The L es son Leveraging Good Content
It can be equally beneficial to watch postings, comments and RSS feeds for “good”
content. What qualifies as good content varies by the nature of the community and
3 Use manual
goals of the organization. Perhaps you’ve just launched a new product and want to
and automatic
know when a member writes about it. Or, maybe you want to know what people are
moderation tools
saying about an event or user conference you just ran.
3 Control user
With automated moderation, your social media software can automatically watch every
permissions
piece of content — such as postings, comments and RSS feeds — to see how often
certain words or phrases are used, and notify you when they are posted. This is an
effective and nearly effortless way to monitor positive content in your community.
You can leverage this capability in other creative ways. Here are two examples:
1. Automatic categorization. Some automated moderation facilities automatically
assign categories to posts based on the content. This is useful for importing an RSS
feed and ensuring that the content is placed in the appropriate categories.
2. Automatic link insertion. Having content with appropriate links to other relevant
content is a useful capability, but authors often forget to insert the URLs. Some
automated moderation facilities replace text in a post. This enables you to watch for
certain words and phrases, and then convert them to URLs that point to predefined
destinations. For example, you might maintain an online glossary of acronyms and
convert any acronyms in a post to live links to entries in the glossary. You can also
convert any mention of your company name to the URL of your website. The latter
is a capability we use in our public Awareness community.
6 www.awarenessnetworks.com
7. 5 Common Questions
2 Controlling Security and Access
THE QUESTION: Who Can Get In, and What Can They See and Do?
Another set of questions involves controlling access to and participation in Web 2.0
communities. Common questions we hear include:
• Who can access my community?
• What security measures do I need to control access?
• What content can a user see? Can everyone see all content?
• What actions can users perform in the community?
When dealing with these questions, here are some issues to consider:
1) Will your community be a public one that anyone can access? Or, will it be private,
for example, only for groups such as employees, customers or partners?
2) Will your community have a mix of participants? If you build a community that
mixes employees with prospects and customers, you need to think about security
and access implications.
3) Will you segment your users? If you build a community that includes all customers,
you should think about giving special permissions to certain customers that have
paid for a “gold” level of service.
4) Will your users require some type of authentication? If this is the case, you might
want to integrate your community with your single sign-on or identity management
systems. You may find it useful to integrate with one system for employees and
another for customers.
5) Is there some content that only certain users can see? If you mix partners and
employees in one community, you may not want your partners to see the same
content that your employees see.
6) Do you need to control what actions a user can take? For example, you may want
to allow a set of users to read and comment on some content, but not directly
contribute to it.
Typically, companies start by building two types of communities: 1) Internal-facing
communities for employees; or 2) External-facing communities for customers, prospects
and/or partners. Eventually, companies find they can achieve the greatest value with a
blend of participants. That usually implies that not all of them have access to the same
content with the same privileges.
www.awarenessnetworks.com 7
8. 5 Common Questions
Controlling Security and Access (cont.)
Lesson Learned: Categorize Content and Users; Control Access
The L es s on A strong social media solution should blend security and access management with a
category structure that enables you to control what specific groups of members see
3 Decide who can get in and do when they log in. You can apply a category structure to both private and public
communities, as well as internal- and external-facing communities. You create categories
3 Build category-level to match the varying characteristics of different community groups. There are many
structure different use cases for category-level access and control. Here are some examples:
• Category for executives only
3 Use profiles
• Area only for members working on a special project and including a blend of users
such as employees, customers and partners
3 Assign privileges
• ”From the experts” category where anyone can see or comment, but where only
3 Use single sign-on or users with an “expert” status can post
identity management • ”Suggestion box” where everyone can post but only select people can read
integration where • ”Featured posts” area that only select users can write to but anyone can read
appropriate
• Wiki that only select users can edit, but anyone can read
Internal- Topics
facing Post?
private • Topic 1 Edit?
External- External-
? • Topic 2
• Topic 3
Delete?
Comment?
facing facing
public private
Category-Level Security and Access
Security and Access Case In Point
An innovative online travel business offers a social media community that blends
content contributed by consumers with content contributed by travel experts.
The expert-provided content in contained in wikis that only the authors are authorized
to edit, but anyone can read. This gives the online travel business two advantages:
1. Ability to track version histories of expert-delivered content
2. Maintains credibility of expert endorsements
8 www.awarenessnetworks.com
9. 5 Common Questions
3 Compliance and Auditing
The L es s on THE QUESTION: Who Did What?
Another common concern we hear is how to find out who did what and when. Consider
3 Track member content
a situation in which an employee posts objectionable content to an internal community
and then later realizes the misstep and retracts the posting. What if the posting caused
3 Version
some damage during the short time it was live? Can you prove the employee actually
made the post? You can’t if your social media solution permanently removes the
3 Audit for compliance
deleted posting.
and discovery
You need to be able to prove the existence of the original posting, if necessary. This
requires capabilities for tracking the history of content posted to the community at any
point in time, even content that has been removed from public view. This is particularly
important for discovery and compliance purposes.
Lesson Learned: Use Versioning and Audit Tools
We recommend that you track community content activities with a social media solution
that saves deletions and versions all generations of members’ postings. If you’re ever
concerned about a user’s activities, you can use the social media software’s auditing
features to verify how the user’s content evolved over time.
www.awarenessnetworks.com 9
10. 5 Common Questions
4 Recognizing Content Ownership
The L es son THE QUESTION: Who Owns The Content?
Today’s focus on intellectual property rights is sharp. And whether you’re building a
3 Establish ownership
corporate Web 2.0 community or using an open solution like Facebook or MySpace,
you need to ensure that members have a clear understanding of several factors.
3 Understand terms of
These include terms of use, content ownership and what happens in different
use and different
ownership scenarios.
ownership scenarios
Lesson Learned: Understand Ownership
If you’re considering an open community to generate conversation about a particular
offering or event, one of the first things you need to think about is how your content
may be used. For example, some social media providers have terms of use agreements
that give them the authority to use your content however they choose. While this may
be appropriate in some cases, you need to consider the implications in respect to the
kind of content you want to generate.
The second factor to understand is who owns the content — whether it’s the user, the
company that sponsors the community or the service provider that stores the content.
The answer to this question is essential for understanding what happens to content in
The Value of Establishing different circumstances.
Ownership:
Two Cases In Point For example, if an influential employee leaves your company, should she be able to
A highly-recognized Microsoft take her blog with her? You may not have a claim to it if it was executed in an open
blogger was able to take his community like Facebook or MySpace. When it’s in your interest to own and control use
blog with him when he left of employee blogs, it’s best to build your own Web 2.0 community and ensure that you
the company. Was that good have ownership rights to the content.
or bad for Microsoft?
Terms of use? Whose owns it? What happens when?
When a former Motorola CTO
“…you grant, to the Company an • The user? • The user leaves the company?
announced her departure for
irrevocable worldwide license to use, • The company? • The content is inappropriate?
Cisco, Motorola was able to copy, publicly display, reformat, trans-
• The provider? • The content violates
take her public blog down late, excerpt and distribute such User trademark or IP ownership
Content for any purpose, commercial,
immediately because it was
advertising, or otherwise.”
managed in a corporate
community.
Other questions to consider: If an employee leaves your company, can he take his
e-mail inbox and saved messages with him? Can a sales rep take the contents of your
CRM system? Are contributions to a company-sponsored social community the same
or different?
10 www.awarenessnetworks.com
11. 5 Common Questions
5 Choosing a Technology Strategy
The L es son THE QUESTION: What’s Best for My Users?
The Web 2.0 world is new for most companies. As a result, deciding what features and
3 Use scalable, extensible
technologies you need in your social communities can be daunting. One point is clear:
technology
Wherever you start, you can be sure you won’t finish in the same place. What’s the
implication? As communities evolve and members’ needs grow and change, you need
3 Use a platform, rather
the flexibility to incorporate new capabilities into your Web 2.0 solution as quickly and
than point product(s)
easily as possible.
Lesson Learned: Be Ready for Change
You need to ensure that you can build a community that can adapt to the addition of
new features and enhancements over time. If you create a community with a collection of
point products — such as separate blog, wiki and photo sharing tools — the responsibility
of integrating these products into a unified community experience falls on you. This is not
easy and there are additional challenges when you want to incorporate new features.
A better alternative is to use a social media platform. With this strategy, the vendor bears
the burden of ensuring a unified community experience and integrating new features
over time. You can focus on the business benefit of the community while the vendor
focuses on the technology.
www.awarenessnetworks.com 11