The document discusses the potential benefits of enterprise social networks. It notes that they can help reduce the time spent on emails, searching for internal information, and communicating within an organization. By centralizing information sharing and collaboration, social networks may increase productivity on role-specific tasks by 15% by making all job functions and applications accessible in one hub. The document also discusses how social networks can enable collective intelligence by allowing information and ideas to be shared across a large network of employees.
Les Ateliers du Webmarketing par WSI, Saison 3 épisode 7: Les réseaux sociaux BtoB, Linkedin et Viadeo
LinkedIn & Viadeo proposent de nouvelles voies d'opportunités commerciales et de développement de votre business et évoluent sans cesse.
Comment les exploiter et optimiser un maximum sa performance et visibilité sur ces 2 réseaux professionnels ?
Présenté par François-Xavier Magnin et Kamel Touzaline, consultants internet WSI
Contactez l'expert en webmarketing le plus proche de chez vous:
http://www.wsi-marketing-internet.fr/agences-wsi/agences-wsi-france.html
Les Ateliers du Webmarketing par WSI, Saison 3 épisode 7: Les réseaux sociaux BtoB, Linkedin et Viadeo
LinkedIn & Viadeo proposent de nouvelles voies d'opportunités commerciales et de développement de votre business et évoluent sans cesse.
Comment les exploiter et optimiser un maximum sa performance et visibilité sur ces 2 réseaux professionnels ?
Présenté par François-Xavier Magnin et Kamel Touzaline, consultants internet WSI
Contactez l'expert en webmarketing le plus proche de chez vous:
http://www.wsi-marketing-internet.fr/agences-wsi/agences-wsi-france.html
Tallk given at #SXSW2019 in the Intelligent Future track as part of the Interactive Festival. We explain 3 frameworks for MachineEthics and how they affect the supervised and unsupervised methods, and the data engineering discipline.
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
The world has become a giant network, transformed by the
growth of mobile devices and social technologies. In fact,
there are now more devices than people.1 This networked
world is clearly evident in our personal lives: We keep in
touch with our friends and family on Facebook or Instagram,
use Twitter to get the latest news from people around the
globe, and often find our next career opportunity with
LinkedIn. In this networked world, people connect with each
other easily, information and knowledge move faster, and we
are able to accomplish more by working together.
These are the slides from a presentation given to the 2012 Annual Meeting of the American Oil Chemists' Society. It was the third and last presentation in a Forum on Emerging Technologies.
I have made an attempt to capture my talk by adding notes to explain what I was getting at with the graphics. I believe I've been more successful on some slides than I have been on others. Some I have yet to annotate. For some reason this presentation would not upload here when I attempted to share it shortly after I gave it and I was laboring under the mistaken notion it was too large. I have no idea what actually happened and it is my fault it's taken me so long to provide it.
Talk give to QUT students on 14 April 2011. It deals with three key questions:
Why do we need governance in social media?
What are the issues and risks around it?
What does it look like in practice?
Social software lets employees connect and share in new ways, and can dramatically improve the effectiveness of your organization. But social technologies like microblogging, social networking, automated activity feeds, social spreadsheets, wikis, etc. are new to most organizations, and most IT departments don’t have experience with how to successfully implement them.
Success with social software involves a lot more than simply finding the product that best fits your needs. It involves framing the problem appropriately in the first place, defining your business goals, and choosing a rollout methodology designed to meet those goals. It involves selling your CFO, changing behavior across your organization, and more.
This paper is designed to help you learn from the mistakes of others before you, so you can avoid the common pitfalls of social software, and get fast business value.
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
SharePoint 2013, Yammer and Office 365 product families bring new capabilities for content sharing, finding, organizing, and authoring. They also create new challenges. The move to the cloud and the integration of SharePoint with the enterprise social network with yammer, and have made this release so profound and disruptive to the business. In this session we'll dig into planning and strategy for social architectures around both business process and the technologies to help ensure compliance and success. Social enterprise technology is transformative and will lead to more agile business when used correctly, but a disaster and chaos when not used properly.
NCompass Live - March 13, 2019
http://nlc.nebraska.gov/NCompassLive/
In the presentation on February 13, I covered what emerging technology is and how it relates to libraries. Now it’s time to dive into what that means on a larger scale. What makes technology good or bad? Who is really qualified to make that determination? Anyone who tracks emerging technology will start to think about how this technology will affect the future of our communities and the world. What will make a piece of technology influential and powerful in the world? Tune in if you want to learn more about the following topics:
•Which ethics matter most in technology?
•What makes technology good or bad?
•What potential dangers should we be aware of with new technology?
•What factors might affect society in the long-run?
There are no easy answers to any of these questions. The concept of ‘ethics’ tends to be a gray area for many, and understandably so. This presentation won’t give you a finite right or wrong stance on all technology. But it will provide you with the tools to make the decision for yourself.
Presenter: Amanda Sweet, Technology Innovation Librarian, Nebraska Library Commission.
Data analysis is one of the revolutionary technique that has been the base for further lot technologies and industries. It is important and is structured in a disciplinary manner in order to produce essential results. Concept includes static algorithms and particular set of work methods but the result is always dynamic.
Keynote by Seth Grimes, presented at the Knowledge Extraction from Social Media workshop, November 12, 2012, preceding the International Semantic Web Conference
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
Information security is at a critical juncture. How do we solve the weakest link - human psychology? Insight from cyberpsychology into leadership, power and persuasion are essential. These slides are from Dr Ciarán Mc Mahon's keynote at (ISC)² Security Congress EMEA, Sofitel Munich, October 2015
Iconuk 2016 - IBM Connections adoption Worst practices!Femke Goedhart
Regardless if you've implemented IBM Connections, are considering it or in the middle of the planning stages - there are wrong (and right) turns to take at every step. Join Femke to learn about misconceptions and tribulations others have faced while striving to become a socially enabled company. Hear about real World examples and often funny anecdotes from the trenches of adoption to show you how NOT to do it and giving you tips on how to do it better along the way.
Walk away with a grasp on what to focus on to make a success out of your IBM Connections environment.
Tallk given at #SXSW2019 in the Intelligent Future track as part of the Interactive Festival. We explain 3 frameworks for MachineEthics and how they affect the supervised and unsupervised methods, and the data engineering discipline.
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
The world has become a giant network, transformed by the
growth of mobile devices and social technologies. In fact,
there are now more devices than people.1 This networked
world is clearly evident in our personal lives: We keep in
touch with our friends and family on Facebook or Instagram,
use Twitter to get the latest news from people around the
globe, and often find our next career opportunity with
LinkedIn. In this networked world, people connect with each
other easily, information and knowledge move faster, and we
are able to accomplish more by working together.
These are the slides from a presentation given to the 2012 Annual Meeting of the American Oil Chemists' Society. It was the third and last presentation in a Forum on Emerging Technologies.
I have made an attempt to capture my talk by adding notes to explain what I was getting at with the graphics. I believe I've been more successful on some slides than I have been on others. Some I have yet to annotate. For some reason this presentation would not upload here when I attempted to share it shortly after I gave it and I was laboring under the mistaken notion it was too large. I have no idea what actually happened and it is my fault it's taken me so long to provide it.
Talk give to QUT students on 14 April 2011. It deals with three key questions:
Why do we need governance in social media?
What are the issues and risks around it?
What does it look like in practice?
Social software lets employees connect and share in new ways, and can dramatically improve the effectiveness of your organization. But social technologies like microblogging, social networking, automated activity feeds, social spreadsheets, wikis, etc. are new to most organizations, and most IT departments don’t have experience with how to successfully implement them.
Success with social software involves a lot more than simply finding the product that best fits your needs. It involves framing the problem appropriately in the first place, defining your business goals, and choosing a rollout methodology designed to meet those goals. It involves selling your CFO, changing behavior across your organization, and more.
This paper is designed to help you learn from the mistakes of others before you, so you can avoid the common pitfalls of social software, and get fast business value.
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
SharePoint 2013, Yammer and Office 365 product families bring new capabilities for content sharing, finding, organizing, and authoring. They also create new challenges. The move to the cloud and the integration of SharePoint with the enterprise social network with yammer, and have made this release so profound and disruptive to the business. In this session we'll dig into planning and strategy for social architectures around both business process and the technologies to help ensure compliance and success. Social enterprise technology is transformative and will lead to more agile business when used correctly, but a disaster and chaos when not used properly.
NCompass Live - March 13, 2019
http://nlc.nebraska.gov/NCompassLive/
In the presentation on February 13, I covered what emerging technology is and how it relates to libraries. Now it’s time to dive into what that means on a larger scale. What makes technology good or bad? Who is really qualified to make that determination? Anyone who tracks emerging technology will start to think about how this technology will affect the future of our communities and the world. What will make a piece of technology influential and powerful in the world? Tune in if you want to learn more about the following topics:
•Which ethics matter most in technology?
•What makes technology good or bad?
•What potential dangers should we be aware of with new technology?
•What factors might affect society in the long-run?
There are no easy answers to any of these questions. The concept of ‘ethics’ tends to be a gray area for many, and understandably so. This presentation won’t give you a finite right or wrong stance on all technology. But it will provide you with the tools to make the decision for yourself.
Presenter: Amanda Sweet, Technology Innovation Librarian, Nebraska Library Commission.
Data analysis is one of the revolutionary technique that has been the base for further lot technologies and industries. It is important and is structured in a disciplinary manner in order to produce essential results. Concept includes static algorithms and particular set of work methods but the result is always dynamic.
Keynote by Seth Grimes, presented at the Knowledge Extraction from Social Media workshop, November 12, 2012, preceding the International Semantic Web Conference
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
Information security is at a critical juncture. How do we solve the weakest link - human psychology? Insight from cyberpsychology into leadership, power and persuasion are essential. These slides are from Dr Ciarán Mc Mahon's keynote at (ISC)² Security Congress EMEA, Sofitel Munich, October 2015
Iconuk 2016 - IBM Connections adoption Worst practices!Femke Goedhart
Regardless if you've implemented IBM Connections, are considering it or in the middle of the planning stages - there are wrong (and right) turns to take at every step. Join Femke to learn about misconceptions and tribulations others have faced while striving to become a socially enabled company. Hear about real World examples and often funny anecdotes from the trenches of adoption to show you how NOT to do it and giving you tips on how to do it better along the way.
Walk away with a grasp on what to focus on to make a success out of your IBM Connections environment.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Group Presentation 2 Economics.Ariana Buscigliopptx
Réseaux sociaux d'entreprise
1. Master 1 en gestion des ressources humaines
Techniques appliquées de GRH
GRH et nouvelles technologies
Les réseaux sociaux d’entreprise
http://images.pcworld.com/images/article/2012/08/shutterstock_109044584-11394457.jpg Jacques Folon
Partner Edge Consulting
Me de conférences Université de LIège
Chargé de cours ICHEC
SOURCE: http://ictkm.files.wordpress.com/2009/07/social-media-bandwagon1.jpg Prof. invité Université de Metz
12. • Les managers passent 2h/jour à rechercher de l’information
• 50 % de l’information trouvée n’a pas d’utilité
• 59 % ne voient pas d’information interne qui soit utile
• 53 % disent qu’elle n’a pas de valeur
• 36 % disent qu’il y en a trop, rendant difficile la recherche
de la bonne information Accenture : Survey 1000 middle managers US/UK –8Jan 2007
13.
14. Définition des RSE
• Les technologies dites de réseaux sociaux d’entreprise sont
considérées comme des supports pouvant permettre
l’animation des réseaux sociaux d’une organisation.
• Un réseau social correspond à un ensemble de nœuds
(individus, organisations) reliés par un ensemble de relations
sociales (Fuhrer et al., 2009).
• Ces relations prennent forme spontanément et sont donc
informelles.
• Ces réseaux relationnels permettent d’accélérer le travail
collectif dans l’organisation en dépassant les logiques
hiérarchiques officielles.
• VERRA, Lucas Gabriel, KAROUI, Myriam, et DUDEZERT,
Aurélie. Adoption symbolique d’un Réseau Social pour
entreprise: Le cas de BOUYGUES CONSTRUCTION.
22. 1.1.Data privacy basics
• Basic principles: the Data
controller
(i.e. the Belgian state i.e. the
Minister)
– collect and process personal data
only when this is legally permitted
– respect certain obligations
regarding the processing of
personal data (details on next slide) ;
– respond to complaints regarding
breaches of data protection rules;
– collaborate with national data
protection supervisory authorities
Source: http://ec.europa.eu/justice/data-protection/index_en.htm
23. 1.2. Data privacy rules for data
controllers
• Personal Data must be
– processed legally and fairly;
– collected for explicit and legitimate
purposes and used accordingly;
– adequate, relevant and not excessive in
relation to the purposes for which it is
collected and/or further processed;
– accurate, and updated where necessary;
– kept any longer than strictly necessary;
– rectified, removed or blocked by the
data subject if incorrect;
– Protected against accidental or unlawful
destruction, loss, alteration and
disclosure, particularly when processing
involves data transmission over
networks.
Source: http://ec.europa.eu/justice/data-protection/index_en.htm
24. 1.3. Data privacy &
internal social media questions
• Which precise purpose ?
• What kind of personal data will be stored?
• Are data stored in Europe ?
• Are they in the « Cloud »?
• Data privacy commission advice needed?
• What will be the security policy?
• What about the content of ex-employees?
• Is a code of conduct enough?
SO IT ’S AN IMPORTANT ISSUE !!!
25. 2.0. Data security
SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
31. Where do one steal data? Which devices are stolen?
•Banks •USB
•Hospitals •Laptops
•Ministries •Hard disks
•Police •Papers
•Newspapers •Binders
•Telecoms •Cars
•...
36. Employer’s responsibility !
• What about external protected
works?
• What about creation by employees?
• What about import of protected
works by employees?
• What about sub-contractors
protected works?
• What about advertising campaign?
• What about press clipping?
• What about external trademarks
• What about employee’s images?
• …
• What do you think of a code of
conduct? http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html
37. 4.0. INTERNAL COMMUNITY MANAGER
PICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-
role.html
38. Who’s in charge if …?
http://www.capreseaux.fr/community-management/
41. Second part: Added value
http://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy
42.
43. Reading and answering e-mail. Approximately 28%, or about 11.2 hours,
of the average interaction worker’s workweek is spent reading and
answering e-mails. The study indicates that because of private social
media’s ability to make searchable content out of all posted messages,
the amount of time spent with e-mail can be reduced by as much as 35%,
or about 4 hours.
44. Searching and gathering information. 19%, about 7.6 hours, of the
Searching and gathering information. 19%, about 7.6 hours, of the
average interaction worker’s work hours are spent searching for internal
average interaction worker’s work hours are spent searching for internal
information only certain employees possess. Again, because of
information only certain employees possess. Again, because of
enterprise social media’s ability to store all messages as searchable
enterprise social media’s ability to store all messages as searchable
content, this figure can be reduced by nearly 35% to about 4.9 hours per
content, this figure can be reduced by nearly 35% to about 4.9 hours per
week, which amounts to a savings of 2.7 hours per week per interaction
week, which amounts to a savings of 2.7 hours per week per interaction
worker.
worker.
45. Communicating and collaborating internally. Using phones, e-mail, and
in-person interaction to communicate consumes about 5.6 hours of the
average interaction worker’s workweek. Because you can directly
message anyone in the organization without cluttering up an e-mail inbox
with a collaboration tool, your organization can realize up to a 35% time
savings, or about 2.0 hours per interaction worker.
46. Role-specific tasks. Tasks specific to a particular job consume the most
Role-specific tasks. Tasks specific to a particular job consume the most
amount of time for any role, averaging out to about 15.6 hours per week.
amount of time for any role, averaging out to about 15.6 hours per week
Internal social media increases the productivity of these tasks by about
Internal social media increases the productivity of these tasks by about
15%, or approximately 2.3 hours per week. One way they enhance job-
15%, or approximately 2.3 hours per week. One way they enhance job-
specific productivity lies in their ability to centralize all job functions at
specific productivity lies in their ability to centralize all job functions at
one hub, so your employees begin using all other applications there.
one hub, so your employees begin using all other applications there.
47.
48. Intelligence collective
• Chacun d’entre ces personnes
peut ne pas être de qualité
supérieure; mais quand elles
sont ensemble, il est possible
qu’elles puissent surpasser –
collectivement et comme une
nouvelle entité –la qualité des
meilleurs
• Aristote
55. Reed's Law
The value of
networks scales
exponentially with
the size of the
network.
http://fr.slideshare.net/eekim/achieving-collective-intelligence
56. Brooks's Law
Adding people
to a complex
project makes it
take longer.
http://fr.slideshare.net/eekim/achieving-collective-intelligence
62. Culture et veille
• Le RSE permet
– Le partage d’informations
– De modifier la culture vers de l’intelligence
collective et la gestion des connaissances
– De transformer tout le monde en « veilleur »
– D’intégrer l’Intelligence stratégique dans la
culture
70. Internal code of conduct main
rules
• Define the internal and external social media
• Intellectual property rules
• Data privacy explanations
• Confidential information
• Anonimity is forbidden
• Penalties
• And
• Which communication for the code of conduct?
• How to have it approved?
71.
72. Conclusion
• Do not forget privacy issues
• CC/CO 81
• Control or not control
• IPR regulation s/b reminded
• Internal code of conduct
• BUT
• There are some important added value