SlideShare a Scribd company logo
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics
Enterprise 2.0 Anti-Patterns, ROI and Metrics

More Related Content

More from Enterprise 2.0 Conference

Driving Virtual Team Productivity
Driving Virtual Team ProductivityDriving Virtual Team Productivity
Driving Virtual Team Productivity
Enterprise 2.0 Conference
 
Applying the Successful Strategies of Social Networks to the Enterprise
Applying the Successful Strategies of Social Networks to the EnterpriseApplying the Successful Strategies of Social Networks to the Enterprise
Applying the Successful Strategies of Social Networks to the Enterprise
Enterprise 2.0 Conference
 
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROI
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROIMulti-Enterprise 2.0 - Leveraging Social Software for Real ROI
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROI
Enterprise 2.0 Conference
 
Ignite Technologies Overview
Ignite Technologies OverviewIgnite Technologies Overview
Ignite Technologies Overview
Enterprise 2.0 Conference
 
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer ExperienceSincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
Enterprise 2.0 Conference
 
Angels & Demons
Angels & DemonsAngels & Demons
Angels & Demons
Enterprise 2.0 Conference
 
Jump Starting Collaboration with Social Search
Jump Starting Collaboration with Social SearchJump Starting Collaboration with Social Search
Jump Starting Collaboration with Social Search
Enterprise 2.0 Conference
 
Connecting the Dots with Conectbeam Social Networking Services
Connecting the Dots with Conectbeam Social Networking ServicesConnecting the Dots with Conectbeam Social Networking Services
Connecting the Dots with Conectbeam Social Networking Services
Enterprise 2.0 Conference
 
Real World: Customer Edition Panel "Stories about Social Computing Deployment"
Real World: Customer Edition Panel "Stories about Social Computing Deployment"Real World: Customer Edition Panel "Stories about Social Computing Deployment"
Real World: Customer Edition Panel "Stories about Social Computing Deployment"
Enterprise 2.0 Conference
 
Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?
Enterprise 2.0 Conference
 
Reality 2.0: Enterprise Social Networks (A Field Research Study)
Reality 2.0: Enterprise Social Networks (A Field Research Study)Reality 2.0: Enterprise Social Networks (A Field Research Study)
Reality 2.0: Enterprise Social Networks (A Field Research Study)
Enterprise 2.0 Conference
 
Delivering Results that Endure
Delivering Results that EndureDelivering Results that Endure
Delivering Results that Endure
Enterprise 2.0 Conference
 
Applying the Social Dimension to the Lockheed Martin IS&GS MIssion
Applying the Social Dimension to the Lockheed Martin IS&GS MIssionApplying the Social Dimension to the Lockheed Martin IS&GS MIssion
Applying the Social Dimension to the Lockheed Martin IS&GS MIssion
Enterprise 2.0 Conference
 
Lessons Learned from Internal Communities
Lessons Learned from Internal CommunitiesLessons Learned from Internal Communities
Lessons Learned from Internal Communities
Enterprise 2.0 Conference
 
The Promise of Enterprise Prediction Markets
The Promise of Enterprise Prediction MarketsThe Promise of Enterprise Prediction Markets
The Promise of Enterprise Prediction Markets
Enterprise 2.0 Conference
 
How Search 2.0 Has Been Redefined by Enterprise 2.0
How Search 2.0 Has Been Redefined by Enterprise 2.0How Search 2.0 Has Been Redefined by Enterprise 2.0
How Search 2.0 Has Been Redefined by Enterprise 2.0
Enterprise 2.0 Conference
 
Social Computing with SharePoint 2010: E2.0 Breakout
Social Computing with SharePoint 2010: E2.0 BreakoutSocial Computing with SharePoint 2010: E2.0 Breakout
Social Computing with SharePoint 2010: E2.0 Breakout
Enterprise 2.0 Conference
 
Creating a Cross-Corporate Knowledge Pool
Creating a Cross-Corporate Knowledge PoolCreating a Cross-Corporate Knowledge Pool
Creating a Cross-Corporate Knowledge Pool
Enterprise 2.0 Conference
 
Social Software in the Enterprise: Key Debates
Social Software in the Enterprise: Key DebatesSocial Software in the Enterprise: Key Debates
Social Software in the Enterprise: Key Debates
Enterprise 2.0 Conference
 
Exploring Early Enterprise 2.0 Methodology
Exploring Early Enterprise 2.0 MethodologyExploring Early Enterprise 2.0 Methodology
Exploring Early Enterprise 2.0 Methodology
Enterprise 2.0 Conference
 

More from Enterprise 2.0 Conference (20)

Driving Virtual Team Productivity
Driving Virtual Team ProductivityDriving Virtual Team Productivity
Driving Virtual Team Productivity
 
Applying the Successful Strategies of Social Networks to the Enterprise
Applying the Successful Strategies of Social Networks to the EnterpriseApplying the Successful Strategies of Social Networks to the Enterprise
Applying the Successful Strategies of Social Networks to the Enterprise
 
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROI
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROIMulti-Enterprise 2.0 - Leveraging Social Software for Real ROI
Multi-Enterprise 2.0 - Leveraging Social Software for Real ROI
 
Ignite Technologies Overview
Ignite Technologies OverviewIgnite Technologies Overview
Ignite Technologies Overview
 
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer ExperienceSincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
Sincere Marketing in an Age of Skepticism: Unthinking the Consumer Experience
 
Angels & Demons
Angels & DemonsAngels & Demons
Angels & Demons
 
Jump Starting Collaboration with Social Search
Jump Starting Collaboration with Social SearchJump Starting Collaboration with Social Search
Jump Starting Collaboration with Social Search
 
Connecting the Dots with Conectbeam Social Networking Services
Connecting the Dots with Conectbeam Social Networking ServicesConnecting the Dots with Conectbeam Social Networking Services
Connecting the Dots with Conectbeam Social Networking Services
 
Real World: Customer Edition Panel "Stories about Social Computing Deployment"
Real World: Customer Edition Panel "Stories about Social Computing Deployment"Real World: Customer Edition Panel "Stories about Social Computing Deployment"
Real World: Customer Edition Panel "Stories about Social Computing Deployment"
 
Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?Is Enterprise Search Ripe for Open Source Disruption?
Is Enterprise Search Ripe for Open Source Disruption?
 
Reality 2.0: Enterprise Social Networks (A Field Research Study)
Reality 2.0: Enterprise Social Networks (A Field Research Study)Reality 2.0: Enterprise Social Networks (A Field Research Study)
Reality 2.0: Enterprise Social Networks (A Field Research Study)
 
Delivering Results that Endure
Delivering Results that EndureDelivering Results that Endure
Delivering Results that Endure
 
Applying the Social Dimension to the Lockheed Martin IS&GS MIssion
Applying the Social Dimension to the Lockheed Martin IS&GS MIssionApplying the Social Dimension to the Lockheed Martin IS&GS MIssion
Applying the Social Dimension to the Lockheed Martin IS&GS MIssion
 
Lessons Learned from Internal Communities
Lessons Learned from Internal CommunitiesLessons Learned from Internal Communities
Lessons Learned from Internal Communities
 
The Promise of Enterprise Prediction Markets
The Promise of Enterprise Prediction MarketsThe Promise of Enterprise Prediction Markets
The Promise of Enterprise Prediction Markets
 
How Search 2.0 Has Been Redefined by Enterprise 2.0
How Search 2.0 Has Been Redefined by Enterprise 2.0How Search 2.0 Has Been Redefined by Enterprise 2.0
How Search 2.0 Has Been Redefined by Enterprise 2.0
 
Social Computing with SharePoint 2010: E2.0 Breakout
Social Computing with SharePoint 2010: E2.0 BreakoutSocial Computing with SharePoint 2010: E2.0 Breakout
Social Computing with SharePoint 2010: E2.0 Breakout
 
Creating a Cross-Corporate Knowledge Pool
Creating a Cross-Corporate Knowledge PoolCreating a Cross-Corporate Knowledge Pool
Creating a Cross-Corporate Knowledge Pool
 
Social Software in the Enterprise: Key Debates
Social Software in the Enterprise: Key DebatesSocial Software in the Enterprise: Key Debates
Social Software in the Enterprise: Key Debates
 
Exploring Early Enterprise 2.0 Methodology
Exploring Early Enterprise 2.0 MethodologyExploring Early Enterprise 2.0 Methodology
Exploring Early Enterprise 2.0 Methodology
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production