The document discusses the FLIRT model for crowdsourcing which consists of five elements - Focus, Language, Incentives, Rules, and Tools. It provides details on each element and how they relate to defining a crowdsourcing activity. Focus relates to determining the business objectives, scope, scale, and depth of the activity. Language considers the social aspects that engage participants such as social objects and nature of interactions. Incentives, Rules, and Tools provide the framework for participants in terms of compensation, policies, and tools to complete tasks. The model provides a way to strategically plan a crowdsourcing initiative by considering each element.
What is the secret to aligning systems to strategy? (rated the top #1 biggest challenge facing CIOs every year for the last 15 years)
What is the difference between decision models and rule models?
What is The Moment of Truth?
How do you transform ideas into implementations?
How do you build complex systems so they don't fall like dominoes?
Peek inside the BIZRULES achives and learn the secret.
What is the secret to aligning systems to strategy? (rated the top #1 biggest challenge facing CIOs every year for the last 15 years)
What is the difference between decision models and rule models?
What is The Moment of Truth?
How do you transform ideas into implementations?
How do you build complex systems so they don't fall like dominoes?
Peek inside the BIZRULES achives and learn the secret.
How to implement measurements to drive valueOMNINET USA
Slides belonging to a BrighTalk presentation given by David Smith, president of Micromation.
How to Implement Measurements to drive value
Improve the "Business of IT" by using a measurement framework and metrics that matter most.
Metrics are important to management. What's not measured cannot be managed. But what should be measured, why and how?
If you're experiencing any of these symptoms, then this session is for you:
• not sure what to measure
• not sure how to measure
• IT metrics don't seem to support business goals
• too busy fighting fires to become more proactive
• measure too many things already
• business/IT goals not measured
• priorities focus on noise vs. what's important
• customer complaints drive improvements
• efficiency, effectiveness, quality not well understood
• reduced visibility resulting in loss of control
• not sure who needs what level of detail
Learning Objectives:
Metrics validate your IT strategy and vision; provide direction with targets and metrics; justify changes with a means to gauge value-realized; signal when to intervene with corrective actions.
Hear case studies and examples that help you improve alignment, meet compliance and drive service excellence.
Learn the secrets of how measurement frameworks works and take away a roadmap with actionable steps. Let's get IT started.
Appointlink Identity Worklfow Solutions, Inc. has unveiled its latest solution called BASELINE. BASELINE is an audit utility which measures compliances level between current provisioning access and it\'s written policy. Any educational or healthcare entity reviewing identity and management decisions needs to consider BASELINE as a next step.
Web content: it’s the meat in the sandwich, not the icing on the cake. So why does planning for useful, usable content get short shrift in the design and development process? Thinking about the content is always left until the last minute, always thought to be “somebody else’s problem.” Teams are forced into crisis mode at the 11th hour, trying to deal with content that arrives too late, doesn't fit in the designs, or fails to live up to user expectations. In this session, User Experience expert Karen McGrane will talk about why we fail to plan for content, and how everyone involved can help make the process run more smoothly.
This presentation addresses how some of the challenges that have historically confronted implementers of markup technologies (SGML and XML) and how DITA, together with some of the usability innovations associated with Web 2.0, can be used to address them. Presented at Content Convergence and Integration in Vancouver (12 March 2008).
Focus is on understanding Information Professionals and how they connect with solution providers.
This was presented at the Document Management Solution Providers Executive Forum (http://www.aiim.org/dmspef).
The 4S's of Marketing is an update in thinking that focuses on the importance of service dominant logic, social interaction, superior knowledge and sales engagement in business today. Let;'s put the S back into marketing.
Social media Asia Pacific - Social Influence System is more than Social media marketing. Communicators know that social influence is changing how they do business and reach customers.
Zombie Social Media:
Social Media Marketing can be successful but often campaigns aren’t optimally executed because they’re:
Treated as one-off campaigns
Not aligned to comms goals and ROI is questionable
Not integrated into ‘regular’ workflows
Decision hierarchy murky
Infrastructure not built to support or amplify campaigns
- Audience media habits aren’t understood
Social media Asia Pacific
The Central Role of Business Analysis in EAGraham McLeod
An inaugural talk to the International Institute of Business Analysts (SA). Discusses relationship between BA and EA and how important the BA role is in this context.
How to Fast Track Your Social Business CapabilitiesPerficient, Inc.
Social networking and collaboration solutions allow businesses to increase employee productivity and innovation by providing users access to the resources they need to do their jobs. They find people faster. They collaborate better and more intuitively. They increase productivity.
Your social business cannot follow a "build it and they will come" model to be successful. While social business projects require far less investment than traditional projects, they still need a base set of tasks to achieve business goals.
Perficient hosted this social business webinar and learn how to increase productivity by giving users access to necessary resources and allowing them to collaborate more intuitively. Learn how to fast track your social business capabilities, understand social business value, and strategize and design a robust and effective social and collaboration solution.
Topics we cover include:
• Understand the value social software provides
• Define collaborative solutions
• Create a roadmap that identifies the people and the steps necessary for success
• Explore social governance foundational practices that ensures you and your employees are using the tools correctly
Business and Strategic Alignment in EA – Practical Guidelines Based on Indust...IASA
Business and Strategic Alignment in EA – Practical Guidelines Based on Industry Best Practices - Dave Guevara
As IASA members we are constantly reminded that architects are responsible for connecting business to IT. Business alignment is indicated in architecture frameworks like TOGAF or Zachman as an important step. However, the challenge comes in getting this done where EA is not top-down driven, short term deadlines always win over strategic efforts and standards like ITIL, COBIT and BPMN help but don’t really answer how There is a great deal of writing about EA, SOA, their benefits and how they need to be driven by business needs. The architect is still left with diverse guidance that provides little practical help on how exactly to conduct line-of-sight alignment between business strategy and system implementation. In this discussion, we will look at this issue from four perspectives:
1. Practical means of determining business value and impact, then creating alignment to your future state architectures.
2. Top-down view using an EA framework.
3. Bottoms up view in a future state architecture
4. Business functional model related to an application functional model
5. Practical suggestions that work now and can scale over time
How to implement measurements to drive valueOMNINET USA
Slides belonging to a BrighTalk presentation given by David Smith, president of Micromation.
How to Implement Measurements to drive value
Improve the "Business of IT" by using a measurement framework and metrics that matter most.
Metrics are important to management. What's not measured cannot be managed. But what should be measured, why and how?
If you're experiencing any of these symptoms, then this session is for you:
• not sure what to measure
• not sure how to measure
• IT metrics don't seem to support business goals
• too busy fighting fires to become more proactive
• measure too many things already
• business/IT goals not measured
• priorities focus on noise vs. what's important
• customer complaints drive improvements
• efficiency, effectiveness, quality not well understood
• reduced visibility resulting in loss of control
• not sure who needs what level of detail
Learning Objectives:
Metrics validate your IT strategy and vision; provide direction with targets and metrics; justify changes with a means to gauge value-realized; signal when to intervene with corrective actions.
Hear case studies and examples that help you improve alignment, meet compliance and drive service excellence.
Learn the secrets of how measurement frameworks works and take away a roadmap with actionable steps. Let's get IT started.
Appointlink Identity Worklfow Solutions, Inc. has unveiled its latest solution called BASELINE. BASELINE is an audit utility which measures compliances level between current provisioning access and it\'s written policy. Any educational or healthcare entity reviewing identity and management decisions needs to consider BASELINE as a next step.
Web content: it’s the meat in the sandwich, not the icing on the cake. So why does planning for useful, usable content get short shrift in the design and development process? Thinking about the content is always left until the last minute, always thought to be “somebody else’s problem.” Teams are forced into crisis mode at the 11th hour, trying to deal with content that arrives too late, doesn't fit in the designs, or fails to live up to user expectations. In this session, User Experience expert Karen McGrane will talk about why we fail to plan for content, and how everyone involved can help make the process run more smoothly.
This presentation addresses how some of the challenges that have historically confronted implementers of markup technologies (SGML and XML) and how DITA, together with some of the usability innovations associated with Web 2.0, can be used to address them. Presented at Content Convergence and Integration in Vancouver (12 March 2008).
Focus is on understanding Information Professionals and how they connect with solution providers.
This was presented at the Document Management Solution Providers Executive Forum (http://www.aiim.org/dmspef).
The 4S's of Marketing is an update in thinking that focuses on the importance of service dominant logic, social interaction, superior knowledge and sales engagement in business today. Let;'s put the S back into marketing.
Social media Asia Pacific - Social Influence System is more than Social media marketing. Communicators know that social influence is changing how they do business and reach customers.
Zombie Social Media:
Social Media Marketing can be successful but often campaigns aren’t optimally executed because they’re:
Treated as one-off campaigns
Not aligned to comms goals and ROI is questionable
Not integrated into ‘regular’ workflows
Decision hierarchy murky
Infrastructure not built to support or amplify campaigns
- Audience media habits aren’t understood
Social media Asia Pacific
The Central Role of Business Analysis in EAGraham McLeod
An inaugural talk to the International Institute of Business Analysts (SA). Discusses relationship between BA and EA and how important the BA role is in this context.
How to Fast Track Your Social Business CapabilitiesPerficient, Inc.
Social networking and collaboration solutions allow businesses to increase employee productivity and innovation by providing users access to the resources they need to do their jobs. They find people faster. They collaborate better and more intuitively. They increase productivity.
Your social business cannot follow a "build it and they will come" model to be successful. While social business projects require far less investment than traditional projects, they still need a base set of tasks to achieve business goals.
Perficient hosted this social business webinar and learn how to increase productivity by giving users access to necessary resources and allowing them to collaborate more intuitively. Learn how to fast track your social business capabilities, understand social business value, and strategize and design a robust and effective social and collaboration solution.
Topics we cover include:
• Understand the value social software provides
• Define collaborative solutions
• Create a roadmap that identifies the people and the steps necessary for success
• Explore social governance foundational practices that ensures you and your employees are using the tools correctly
Business and Strategic Alignment in EA – Practical Guidelines Based on Indust...IASA
Business and Strategic Alignment in EA – Practical Guidelines Based on Industry Best Practices - Dave Guevara
As IASA members we are constantly reminded that architects are responsible for connecting business to IT. Business alignment is indicated in architecture frameworks like TOGAF or Zachman as an important step. However, the challenge comes in getting this done where EA is not top-down driven, short term deadlines always win over strategic efforts and standards like ITIL, COBIT and BPMN help but don’t really answer how There is a great deal of writing about EA, SOA, their benefits and how they need to be driven by business needs. The architect is still left with diverse guidance that provides little practical help on how exactly to conduct line-of-sight alignment between business strategy and system implementation. In this discussion, we will look at this issue from four perspectives:
1. Practical means of determining business value and impact, then creating alignment to your future state architectures.
2. Top-down view using an EA framework.
3. Bottoms up view in a future state architecture
4. Business functional model related to an application functional model
5. Practical suggestions that work now and can scale over time
This is the deck of a webinar that I presented at the OpenGroup. The focus of this webinar is on the challenge of using these standards in practice to build a strong architecture capability in organizations.
Imperatives in Business, Design & Technology for everyone in the creative business in 2014 –
with book references and cases
By Sami Viitamäki, TBWA\
www.samiviitamaki.com
www.tbwa.fi
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Flirt Overview
1. The FLIRT model of
Crowdsourcing
FOCUS LANGUAGE INCENTIVES RULES TOOLS
Five steps to successfully engaging the crowds
Friday, February 8, 2008 1
2. Company Perspective Customer Perspective
FOCUS WHAT?
Strategic
WHY?
WHAT?
LANGUAGE
WHY?
Tactical INCENTIVES
HOW?
RULES
HOW?
Technical TOOLS
Friday, February 8, 2008 2
3. Creation & IP transfer Creation &
Platform
Interaction & Legal Sharing
Scale of Customers/ Monitoring &
Initiation RULES TOOLS
Activity Participants Action
Business Depth of
FOCUS
Objectives Activity
Extrinsic Area of Organization Social
INCENTIVES LANGUAGE
Objective Activity Capabilities Objects
Extrinsic Organization Social
Intrinsic Presence Interaction
Subjective
Friday, February 8, 2008 3
4. Creation & IP transfer Tools of
Platform
Interaction & Legal Creation
Scale of Customers/ Tools for the
Initiation RULES TOOLS
Activity Participants Company
Business Depth of
FOCUS
Objectives Activity
Extrinsic Area of Organization Social
INCENTIVES LANGUAGE
Objective Activity Capabilities Objects
Extrinsic Organization Nature of
Intrinsic Presence Interaction
Subjective
Friday, February 8, 2008 4
5. Focus consists of six
subelements
• Business objectives • Scope of activity
• Customer participants • Scale of activity
• Organization Capabilities • Depth of activity
These non-negotiable determinants These negotiable determinants are
are to be taken into account as used to define the planned
given when defining activity. crowdsourcing activity on a rough
scale.
In the long run also these
determinants become negotiable. When defining these three
elements, they need to be reflected
on each of the constraints - as
follows...
Friday, February 8, 2008 5
6. Focus
Scope Scale Depth
Answers Added cost Business
Customer Customer Customer
central vs. economies benefits exceed
Participants Participants Participants
business needs? of scale? added risk?
Suitable Manageable Significance of
Business Scope of Business Scale of Business Depth of
for ‘human’ by the control and
Objectives Activity Objectives Activity Objectives Activity
systems? people? access sufficient?
Respective Support for Organization
resources Organization scaling across Organization Organization
able to bear and
committed Capabilities organizational Capabilities Capabilities
manage risk?
and capable? borders?
Friday, February 8, 2008 6
7. Creation & IP transfer Tools of
Platform
Interaction & Legal Creation
Scale of Customers/ Tools for the
Initiation RULES TOOLS
Activity Participants Company
Business Depth of
FOCUS
Objectives Activity
Extrinsic Area of Organization Social
INCENTIVES LANGUAGE
Objective Activity Capabilities Objects
Extrinsic Organization Social
Intrinsic Presence Interaction
Subjective
Friday, February 8, 2008 7
8. Language
• Social Objects
• The “social glue” of the community: why people talk to these people/this company instead
of talking to other people/other companies
• Not scope as in Focus element but instead the medium via which to sell the scope of the
company to the people
• In order for the community to thrive, these social objects need to be playable and able to
activate people
• Social Interaction
• The nature of interaction around the social objects, focus on:
• Identity
• Presence
• Relationships
• Conversations
• Grouping
• Reputation
• Sharing
• Company Presence
• Authenticity
• Transparency
• Human Face / Community Management
Friday, February 8, 2008 8
9. Creation & IP transfer Tools of
Platform
Interaction & Legal Creation
Scale of Customers/ Tools for the
Initiation RULES TOOLS
Activity Participants Company
Business Depth of
FOCUS
Objectives Activity
Extrinsic Area of Organization Social
INCENTIVES LANGUAGE
Objective Activity Capabilities Objects
Extrinsic Organization Nature of
Intrinsic Presence Interaction
Subjective
Friday, February 8, 2008 9
10. Incentives
• Intrinsic incentives
• Related to the reward from simply undertaking activity, e.g.
• Self Efficacy
• Learning from doing
• Challenge
• Satisfying need for creativity
• Obligation
• Extrinsic subjective incentives
• Related to the reward of undertaking activity as part of community / for an organization, e.g.
• Peer recognition
• Company recognition
• Learning from others
• Exposure
• Reputation
• Social Capital
• Exclusivity (channels / resources)
• Extrinsic objective incentives
• Explicit rewards, have direct monetary value, e.g.
• Products
• Services
• Gift cards
• Subscriptions
• Cash
Friday, February 8, 2008 10
11. Creation & IP transfer Tools of
Platform Creation and
Interaction & Legal
Sharing
Scale of Customers/ Tools for the
Initiation RULES TOOLS
Activity Participants Company
Business Depth of
FOCUS
Objectives Activity
Extrinsic Area of Organization Social
INCENTIVES LANGUAGE
Objective Activity Capabilities Objects
Extrinsic Organization Nature of
Intrinsic Presence Interaction
Subjective
Friday, February 8, 2008 11
12. Rules
• Initiation
• Open or closed?
• Screening protocols?
• Personal info required?
• Creation
• Quality constraints
• Format constraints
• Manufacturing constraints
• Arbitrary constraints
• Deadlines
• Criteria of Approval
• Other constraints
• Interaction
• Seeing others ideas
• Building on others ideas
• Remixing / mashing up
• IP & Legal
• IP transfer
• Copyright issues
• Responsibility releases
Friday, February 8, 2008 12
13. Creation & IP transfer Creation &
Platform
Interaction & Legal Sharing
Scale of Customers/ Monitoring &
Initiation RULES TOOLS
Activity Participants Action
Business Depth of
FOCUS
Objectives Activity
Extrinsic Area of Organization Social
INCENTIVES LANGUAGE
Objective Activity Capabilities Objects
Extrinsic Organization Nature of
Intrinsic Presence Interaction
Subjective
Friday, February 8, 2008 13
14. Tools
• Platform • Identity
• profile pages and customization tools
• proprietary • Presence
• 3rd party • presence indicators
• hybrid • location indicators
• Creation • nearness indicators
• web tools • Relationships
• social network (binary)
• downloadable software / client • social graph (typological)
• 3rd party • Conversations
• physical tools • IM
• Interaction • IRC
• Monitoring • Forum
• Grouping
• Technology / algorithm • groups
• Pre-moderation • applications
• Post-moderation • Reputation
• Customer input • ranking lists
• average rating
• Action • Sharing
• Taking the ideas into the process within the • Within community (tagging, sending, recommending)
company • Outside (embeds, links, social bookmarking services
other means)
Friday, February 8, 2008 14
15. CREATORS CRITICS
content to scrutinize
critique & support
co
opinions & viewpoints
nt
increased exposure
en
t
content to share
co
en
tt
expert status
lle
nt
o
ts
ct
co
in
ive
po
ed
ew
at
eg
vi
ev
gr
&
al
ns
ag
u a ent
io
ju
te
in
dg
op
m
aggregated content
audience & readership
CONNECTORS CROWDS
Friday, February 8, 2008 15
16. FOCUS LANGUAGE INCENTIVES RULES TOOLS
Friday, February 8, 2008 16