The document discusses Web 2.0 and social networking. It defines Web 2.0 as the second generation of web services that allow users to collaborate and share information online through social software like blogs and wikis. It discusses key principles of Web 2.0 like harnessing collective intelligence, specialized databases, and software above a single device. It also covers understanding the effects of Web 2.0 by focusing on human traits like reciprocity and herding behavior rather than technology. Finally, it briefly describes different types of online communities like communities of passion, practice, and interest.
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
Social Technologies: challenges and opportunities for participationPenny Hagen
This presentation was given at the Participatory Design Conference in Sydney in 2010. It explores how social technologies both enable and demand new participatory approaches to designing with our future communities, that push design out of the studio and ‘into the wild’.
Social Technology
by Marti A. Hearst
We are in the midst of extraordinary
change in how people interact with one
another and with information. A
combination of advances in technology
and change in people's expectations is
altering the way products are sold,
scientific problems are solved, software
is written, elections are conducted, and
government is run.
People are social animals, and as Shirky
notes, we now have tools that are
flexible enough to match our in-built
social capabilities. Things can get
done that weren't possible before
because the right expertise, the missing
information, or a large enough group of
people can now be gathered together at
low cost.
These developments open a number of
interesting questions for NSF and CISE.
What are the key research problems? How
should these developments change how
research is conducted? How can the
intersection of social science and
technology research be aided or
improved? And how should this effect
how NSF researchers get involved with
relevant government efforts, including
transparent government, emergency
response, and citizen science?
In this talk I attempt to summarize
and put some structure around some of
these developments.
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
Social Technologies: challenges and opportunities for participationPenny Hagen
This presentation was given at the Participatory Design Conference in Sydney in 2010. It explores how social technologies both enable and demand new participatory approaches to designing with our future communities, that push design out of the studio and ‘into the wild’.
Social Technology
by Marti A. Hearst
We are in the midst of extraordinary
change in how people interact with one
another and with information. A
combination of advances in technology
and change in people's expectations is
altering the way products are sold,
scientific problems are solved, software
is written, elections are conducted, and
government is run.
People are social animals, and as Shirky
notes, we now have tools that are
flexible enough to match our in-built
social capabilities. Things can get
done that weren't possible before
because the right expertise, the missing
information, or a large enough group of
people can now be gathered together at
low cost.
These developments open a number of
interesting questions for NSF and CISE.
What are the key research problems? How
should these developments change how
research is conducted? How can the
intersection of social science and
technology research be aided or
improved? And how should this effect
how NSF researchers get involved with
relevant government efforts, including
transparent government, emergency
response, and citizen science?
In this talk I attempt to summarize
and put some structure around some of
these developments.
This presentation describes how you can use social technologies to transform key business processes, but also required governance to reduce risks. For more information www.aiim.org
Building Community In The Civic Space-revitalizing communities in America.Betsey Merkel
This presentation offers an introduction to building open, neutral spaces for collaborative communities to create new conversations in the Civic Space. The material includes an overview of real examples of community and social media use . Written by Betsey Merkel, Co-Founder and Director, The Institute for Open Economic Networks, Dec 2008.
Summary presentation about I-Open's work in Northeast Ohio and nationally building collaborative community to strengthen economic development.
Visit the Institute for Open Economic Networks (I-Open) at http://www.i-open.org
With the Government in gridlock, not innovating and not dealing with the big problems, invisible walls prevent change that is accelerating in the rest of the world. Can initiatives like Open Government help address the issues? What role can technology play? Can Open Source help? This presentation from the Alfresco Content.gov conference explores what government without walls would be like.
Following the advent of “digital”, it’s my opinion that the things people think have changed haven’t, but some things have changed that aren’t yet widely understood.
This Interview with Vanessa DiMauro, CEO Leader Networks and the Patricia Seybold Group explores the best practices for building professional peer communities. This joint collaboration was written in 2007 and stands as a classic reference for online community-building today.
This presentation describes how you can use social technologies to transform key business processes, but also required governance to reduce risks. For more information www.aiim.org
Building Community In The Civic Space-revitalizing communities in America.Betsey Merkel
This presentation offers an introduction to building open, neutral spaces for collaborative communities to create new conversations in the Civic Space. The material includes an overview of real examples of community and social media use . Written by Betsey Merkel, Co-Founder and Director, The Institute for Open Economic Networks, Dec 2008.
Summary presentation about I-Open's work in Northeast Ohio and nationally building collaborative community to strengthen economic development.
Visit the Institute for Open Economic Networks (I-Open) at http://www.i-open.org
With the Government in gridlock, not innovating and not dealing with the big problems, invisible walls prevent change that is accelerating in the rest of the world. Can initiatives like Open Government help address the issues? What role can technology play? Can Open Source help? This presentation from the Alfresco Content.gov conference explores what government without walls would be like.
Following the advent of “digital”, it’s my opinion that the things people think have changed haven’t, but some things have changed that aren’t yet widely understood.
This Interview with Vanessa DiMauro, CEO Leader Networks and the Patricia Seybold Group explores the best practices for building professional peer communities. This joint collaboration was written in 2007 and stands as a classic reference for online community-building today.
Introdución al Emprendimiento
Video Conferencia del Salón Global de Innovación MEI
Lunes 4 de marzo, 2013. 3:00 PM Hora Centro de México
Expositor: José Luis López
Como parte del programa del Salón Global de Innovación de Mexicanos Expresando sus Ideas (MEI), el emprendedor y fundador de nContacto, José Luis López, presentó esta conferencia virtual a los alumnos y personal docente de la Universidad Tecnológica del Norte de Aguascalientes (UTNA, México) y en transmisión simultanea abierta al público a través de LiveStream.com
Presentacion "De mi Ciudad para el Mundo", Empezando un negocio Hi-Tech, desde aquí.
Presentacion durante MEI 2012 (Mexicanos Expresando Ideas) Aguascalientes, Mexico
Conferencia De Empresario a Emprendedor
Por Jose Luis Lopez
Presentada en la Semana del Emprendedor
Martes 12 de agosto, 2014
ncontacto.com/de-empresario-a-emprendedor
Social Media: an Obligation, an Opportunity, or a ThreatNinetyTen
Is online social media really a threat, or a great opportunity.
This presentation aims to:
1) Discuss the social media landscape as it stands with reference to public networks and common conceptions
2) Show how a social network resonates as a model for associations and their goals
3) Look at how private and public social networks can become a threat to an association, with examples
4) Cover using a private social network for an association and how to get the best from it
5) Show how to use the best of both (private & public social networks)
Case studies from outside of the membership sector will include:
- Channel 4
- Nokia
Talent Acquisition With Online Social Networks And CommunitiesMonster
There is no doubt that social networks such as Facebook and Twitter as well as online communities have profoundly changed the business landscape. The question is how do they affect the talent recruiting and the talent development processes? How can recruiters leverage these social networks and communities to find the right candidates for their open positions?
Join Francois Gossieaux and Ed Moran, co-authors of the book "The Hyper-Social Organization" (due out this Fall), as they discuss their findings from the annual Tribalization of Business Study. The study, which profiles over 500 companies, will show you how to think differently about talent recruiting and development in this hyper-social age in order to attract, grow and retain better talent.
In this webinar you will learn:
* How online social networks and communities can augment your current recruitment processes
* What to expect from a social network and community recruitment strategy
* How to use social networks and communities to grow and retain your internal talent
A Must See presentation that look at the impact that the latest developments in Digital Technology are going to have on Human Resources operations in Corporates and Large organizations. Covering the behavioral revolution, communities and complex adaptive networks, seven game changing trends in technology, a strategy for success and practical examples employed in Corporate HR.
10 Strategies For Getting the Most Out of your Social IntranetThoughtFarmer
Dion Hinchcliffe's keynote from Social Intranet Summit Vancouver 2010. There's a wealth of information for intranet stakeholders here, and it appeared that Dion could have spoken for an hour on any slide. Fascinating stuff!
From MySpace, MySociety to MyDemocracy. Civil Society Media, an overview. Geert Wissink
The changing media-landscape and web 2.0 in that perspective. Civil Society Media are introduced, groups and organizations who exist next to state-owned and commercial media. Some lessons for government how to deal with these developments are given.
From MySpace to MySociety to MyDemocracyKennisland
The medialandscape is changing. In this presentation the emerging role of the civil society media will be outlined against the changing medialandscape.
The role of international entrepreneurial networks in cyberspace.
School of Business Administration
International Business Department
MIB - International Entrepreneurship
Prof. Sascha Fürst
presented by
Sonia Patricia Osorio Giraldo
Sandra Ospina D´Alleman
Juan David Duque Arredondo
Alexander Zehnder
El Negocio es Social, Nuevamente (The Business is Social, Again!) - 1 Web 2.0Jose Luis Lopez Mota
Worshop "El Negocio es Social, Nuevamente!" (The Business is Social, Again!). Training session delivered at the "Camara de Empresarios Latinos de Houston" (CELH) on 1/28/2012
Section II. The Web 2.0 and the Impact to the World
http://www.ncontacto.com/el-negocio-es-social.html
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. Who I am? Father of two boys Evangelist of business models based on collaboration and social networking. Chief Officer of nContacto Expert on Enterprise Communities of Practice WW Compliance Manager in the business of Printing Systems Management at HP Former CFO and Controller for Hewlett Packard Venezuela. Chemical Engineer (ITESO Guadalajara) MBA in Finance (ITESM campus Guadalajara) Experienced educator President of the Houston Chapter of the Mexican Talent Network Co-founder and active member of the Alumni Association ITESM in Houston (Ex-A-Tecs) Follow Me: pplopez.mp twitter.com/pplopez www.inkedin.com/in/joseluislopez facebook.com/jose.luis.lopez.mota friendfeed.com/pplopez pplopez.tumblr.com pplopez.posterous.com stumbleupon.com/stumbler/PePeLopez delicious.com/pplopez www.slideshare.net/pplopez PP_Lopez 2
3. Topics What is Web 2.0 ? Principles of Web 2.0 Understanding effects of Web 2.0 Communities How to start Enterprise 2.0 3
6. “Web 1.0 was Commerce Web 2.0 is People” - Ross Mayfield 6
7. Web 2.0 The term Web 2.0 refers to a second generation of services available on the World Wide Web that lets people collaborate and share information online. closer experience to desktop applications than the traditional static Web pages (Web 1.0). allow for mass participation (web-based social software - blogs and wikis). the phrase refers to one or more of the following: The transition of websites from isolated information silos to sources of content and functionality -> computing platforms serving web applications to end users Approach to creating and distributing Web content itself (open communication, decentralization of authority, freedom to share and re-use, and "the market as a conversation“) A more organized and categorized content A shift in economic value of the web, possibly surpassing that of the dot com boom of the late 1990s A marketing term to differentiate new web businesses from those of the dot com boom The resurgence of excitement around the possibilities of innovative web applications and services http://en.wikipedia.org/wiki/Web_2.0 7
8. WWW was born! Web 2.0 Conference Linkedin Facebook Google Twitter sixdegrees Friendster Mosaic (Netscape) Yahoo! MySpace History .com Bubble Source: Wikipedia 8
14. Consumer mind-shifts... Only 42% of consumers say they even “somewhat” trust newspapers Consumer trust is falling Consumers are less brand loyal 52% of consumers say brand trumps price, down from 59% in 2000 Consumer-to-consumer activities growing C2C eCommerce, messaging, blogs, camera phones, video phones Consumers are customizing products and services 10% - 40% of customers develop or modify products Source: Forrester 12
15. What’s Changed Web 2.0 attributes differ from those of traditional web apps in numerous ways 13
20. Principles of Web 2.0 No Products, but Services Customization Focus on the “Long Tail” Harnessing Collective Intelligence Specialized Database Who owns the data End of Software Release Cycle Software above the level of a single device 18
21. No Products but Services “There are no products, only solutions” Not what customer wants but why they want A problem solving approach Simple Solutions 19
23. Customization Every individual is unique Some people want to be different Allow him to choose instead of forcing him to use what you have made Make him feel home 21
25. Focus on the “Long Tail” Reach out to the entire web To the edges and not just to the centre, to the long tail and not the just the head Put everything there Leverage customer-self service 23
27. Harnessing Collective Intelligence Network effects from user contribution are the key to market dominance in Web 2.0 era The Wisdom of crowds – Users add value Systems designed to encourage participation Pay for people to do it – ‘gimme five’ Get volunteers to perform the same task Inspired by the open source community Mutual benefits e.g. P2P sharing It requires radical experiment in trust 25
29. Specialized Database Every significant application to date has been backed by a specialized database Database management is the core competency of Web 2.0 companies “Infoware” rather than merely “software” 27
31. Who owns the data Control over data has led to market control and oversized financial returns It will provide a sustainable competitive advantage to the company Especially is data sources are expensive to create or amenable to increasing returns via network effects Race is to own certain classes of core data e.g. naukri.com, 99acre, yahoo 29
33. End of the Software Release Cycle “Release Early and Release Often” “Perpetual BETA” Daily operations must become a core competency Software will cease to perform unless it is maintained on a daily basis Real time monitoring of user behavior 31
34. End of the Software Release Cycle 32 www.docs.google.com
35. Software above the level of a Single Device The PC is no longer the only access device for internet applications Applications that are limited to a single device are less valuable than those that are connected. Design your application from the get-go to integrate services across handheld devices, PCs, and internet servers. 33
38. So to understand how to do business in a 2.0 world… You are better off understanding Human 1.0 – not as individuals, but as hyper-social creatures You do not need to understand the Web 2.0 technologies 36
42. What are the important Human 1.0 Hyper-Social Traits Reciprocity – it’s a reflex that allows us to be the only super-social species without all being brothers and sisters Social framework - Evaluating things vs. market framework Fairness - The role of fairness and punishment in assessing situations Mimicking Others - The importance of looking cool and imitating others Herding and self-herding – We like to gather Meritocracy – Status and reputation matters Source: The Hyper-Social Organization – F. Gossieaux & E. Moran 40
43. Hyper-Social companies think differently: a recap Think tribe – not market segment We need to find groups of people who have something in common based on their behavior, not their market characteristics Think knowledge network – not information channel The most important conversations in communities happen in networks of people, not between the company and the community. Think human-centricity – not company-centricity The human has to be at the center of everything you do, not the company Think emergent messiness – not hierarchical fixed processes People will want to see responses to their suggestions, even if it does not fit your community goals – FAST Source: The Hyper-Social Organization – F. Gossieaux & E. Moran 41
44. Turning a business process into a social process Running traditional programs using social media platforms Source: The Hyper-Social Organization – F. Gossieaux & E. Moran 42
45. Turning a business process into a social process Running programs based on human reciprocity and social contracts to get others Source: The Hyper-Social Organization – F. Gossieaux & E. Moran 43
51. 3 Types of Communities Communities of Passion - have the richest and most formal set of activities, governance, and structure Communities of Practice - are less formal and are based on common work specialties Communities of Interest - are for topics that don’t require formal communities but need threaded discussions for collaboration and knowledge sharing 49
52.
53. Develops members to fit into this role, be proficient in this role, and actively help others to develop in this role
61. Motivation: stay current on the topic and ask questionsfacebook.com Group EXATEC HOUSTON - ITEMS 52
62. Richard McDermott on Communitieswww.mcdermottconsulting.com Healthy communities have a driving purpose, clear activities, and a sense of accomplishment Communities are becoming integrated into organizations Community facilitationand participation are real work and require time Core community members are well-connected through meetings and ongoing contact Healthy communities have high management expectations and support The heart of a community of practice: peer-to-peer relationships responsibility for stewarding a body of knowledge membership crosses boundaries room for dealing with whatever comes up 53
63. Patterns of contribution 1% active contributors 9% occasional contributors The 1-9-90 rule Number of contributions 90% readers (aka ‘lurkers’) Number of participants Source:Jacob Nielsonwww.useit.com/alertbox/participation_inequality.html 54
64. The “1% Rule” For every 100 people online only 1 person will create content and 10 will “interact” with it. The other 89 will just view it. Each day at YouTube there are 100 million downloads and 65,000 uploads 50% of all Wikipedia article edits are done by 0.7% of users, and more than 70% of all articles have been written by just 1.8% of all users In Yahoo Groups, 1% of the user population might start a group; 10% of the user population might participate actively. 100% of the user population benefits from the activities of the above groups Source: The Guardian 55
65. Members of an active community 90% Outsiders 9% Lurkers Facilitators Contributors 1% Activist Facilitator en.wikipedia.org/wiki/1%25_rule_(Internet_culture) 56
67. Levels of Engagement Become an expert Become a mentor Write a blog Ask a question (with attribution) Comment (with attribution) Level of engagement Register Waxing and Waning Interest Comment (Anonymously) Browse, search, learn (Anonymously) Type of engagement 58
68. Start Contributing Identify Yourself Search & Explore Content Know more About Save & Share Links / Bookmarks Subscribe Store & Distribute Documents 59
69. Start Contributing Express & Discuss Ideas Communicate & Get Feedback Learn & Share Knowledge Produce & publish content Invite to Events Work together 60
71. The “Long Tail” of Work Multi-tasking Enriched jobs, several roles Broad span of control, flat organizations Tons of emails daily Calendar overloaded of meetings and calls 3-digits number of direct contacts People located around the world Multi-language, multi-cultures Phone, email, instant messaging, virtual meetings, twitter, facebook, etc. Did I mention face-2-face (occasionally)? Only 24 hours at day….. 62
72. Fundamental Shifts on Organizations More virtual, few human interaction Communities requires face-to-face meetings Micro formats of knowledge PowerPoint slides, no longer reports People is not reading, they are scanning Tragedy of knowledge common sense
74. Exploration & Production Senior VP Mares Exploration Drilling Production Avery McWatters Milavec Ramirez Production Reservoir Geology Petrophysical Hassan Hopper Dhillon Crossley Sutherland Waring Smith Myers Cordoza Keller Angelo Klimchuck Mitchell Schultz Zaheer Formal vs. Informal Structures What Do You Notice When You Compare the Formal and Informal Structures? Formal Structure (Org Chart) Informal Structure (revealed in ONA) Hussan Milavec Hopper Waring Dhillon Mitchell Mares Zaheer Myers Avery Smith Schultz Keller Cordoza McWatters Crossley Angelo Sutherland Ramirez Klimchuck
75. Enterprise 2.0 Informal, less structure, knowledge-based work of a company Balance of formal structures and informal networking IT enabled application of Web 2.0 to corporate environment SLATES Enterprise-wide Social Networks Hyper-Collaboration Wiki-culture 66
76. Components of Enterprise 2.0 Six components (SLATES): Search Links Authoring Tags Extensions Signals 67 http://sloanreview.mit.edu/smr/issue/2006/spring/06/
77. Levels of Collaboration Groups utilizing systems to make sense and share complex materials and data Core product enhanced by a social component, deeper participation to interact Low-barrier social involvement like voting and the recording of personal participation
78. Key decisions needed for success A Receptive Culture A Common Platform An Informal Rollout Managerial Support 69
84. Socialize Think, then share URL it! Be Transparent Be Personal Contribute Be reciprocal Set the stage 75
85. Create your Digital Identity Show who you are Express yourself Know your tools Keep simple Know your audience 76 My profile My blog My feeds My tags My pictures My presentations My places My videos
94. Six Themes of the Long Tail age There are far more niche goods than hits Cost of reaching those niches is now falling dramatically. New “filters” can drive demand down the Tail Once there’s a massively expanded variety and the filters to sort throught it, the demand curve flattens There are so many niche products that collectively they can compromise a market rivaling the hits. Then, the natural shape of demand is revealed A Long Tail is just culture unfiltered by economic scarcity 85
99. Slidegraphy Web 2.0 – The Social Web (this presentation!) http://www.slideshare.net/PPLopez/web-20-the-social-web-6806313 What is Web 2.0 www.slideshare.net/adunne/what-is-web-20-157107 Web 2.0 Tools to inspire www.slideshare.net/tippydawn/web-20-tools-to-inspire Web 2.0 www.slideshare.net/kikollan/an-introduction-to-web-20-the-user-role An introduction to Web 2.0 www.slideshare.net/kikollan/an-introduction-to-web-20-the-user-role Webinar: The Hyper-Social Organization www.slideshare.net/AwarenessLIVE/webinar-the-hypersocial-organization 90