World Innovation Forum 2010. Would like to download the Presentation? Please pay with a Tweet by following the link: http://www.paywithatweet.com/pay/?id=844e8b6643e07f0c2a8f06a03a5bb1b9
Since 2005, when the term “Big Data” was launched, Big Data has become an increasingly topical theme. In terms of technological development and business adoption, the domain of Big Data has made powerful advances; and that is putting it mildly.
In this initial report on Big Data, the first of four, we give answers to questions concerning what exactly Big Data is, where it differs from existing data classification, how the transformative potential of Big Data can be estimated, and what the current situation (2012) is with regard to adoption and planning.
VINT attempts to create clarity in these developments by presenting experiences and visions in perspective: objectively and laced with examples. But not all answers, not by a long way, are readily available. Indeed, more questions will arise – about the roadmap, for example, that you wish to use for Big Data. Or about governance. Or about the way you may have to revamp your organization. About the privacy issues that Big Data raises, such as those involving social analytics. And about the structures that new algorithms and systems will probably bring us.
http://www.ict-books.com/books/inspiration-trends
10 Strategies For Getting the Most Out of your Social IntranetThoughtFarmer
Dion Hinchcliffe's keynote from Social Intranet Summit Vancouver 2010. There's a wealth of information for intranet stakeholders here, and it appeared that Dion could have spoken for an hour on any slide. Fascinating stuff!
Digital's Indelible Mark on Brand Building FundamentalsPerformics
Performics SVP of Communications Planning Jon Wegman discusses the evolution of "brand", offering his expertise on rethinking brand building fundamentals in the digital age.
From the MarTech Conference in London, UK, October 20-21, 2015. SESSION: The Human Side of Analytics. PRESENTATION: The Human Side of Data - Given by Colin Strong - @colinstrong - Managing Director - Verve, Author of Humanizing Big Data. #MarTech DAY2
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
Building the Social Powered Brand: Turning Social Data Into Competitive Advan...DataSift
Social data is exploding, providing new insight into markets, customers and audiences. Patrick Morrissey, VP of Marketing at DataSift and Shree Dandekar, Chief Strategist, BI and Analytics at Dell will tackle the social data challenge, explore the impacts and opportunities with social to drive brand advocacy and provide advice on how brands can make sense of social data at scale to drive advocacy and impact. Get an inside view on how Dell is using social data to translate conversations into a near real-time NPS (Net Promoter Score).
Just the Facts: From Social to Funnel: Connecting Social Buyers to the Custom...Dell Social Media
George Sadler, Director, Social Media Insights at Dell discusses how effectively listening to customer conversations leads to valuable and actionable information that enables businesses to achieve success in today's "social" era.
Since 2005, when the term “Big Data” was launched, Big Data has become an increasingly topical theme. In terms of technological development and business adoption, the domain of Big Data has made powerful advances; and that is putting it mildly.
In this initial report on Big Data, the first of four, we give answers to questions concerning what exactly Big Data is, where it differs from existing data classification, how the transformative potential of Big Data can be estimated, and what the current situation (2012) is with regard to adoption and planning.
VINT attempts to create clarity in these developments by presenting experiences and visions in perspective: objectively and laced with examples. But not all answers, not by a long way, are readily available. Indeed, more questions will arise – about the roadmap, for example, that you wish to use for Big Data. Or about governance. Or about the way you may have to revamp your organization. About the privacy issues that Big Data raises, such as those involving social analytics. And about the structures that new algorithms and systems will probably bring us.
http://www.ict-books.com/books/inspiration-trends
10 Strategies For Getting the Most Out of your Social IntranetThoughtFarmer
Dion Hinchcliffe's keynote from Social Intranet Summit Vancouver 2010. There's a wealth of information for intranet stakeholders here, and it appeared that Dion could have spoken for an hour on any slide. Fascinating stuff!
Digital's Indelible Mark on Brand Building FundamentalsPerformics
Performics SVP of Communications Planning Jon Wegman discusses the evolution of "brand", offering his expertise on rethinking brand building fundamentals in the digital age.
From the MarTech Conference in London, UK, October 20-21, 2015. SESSION: The Human Side of Analytics. PRESENTATION: The Human Side of Data - Given by Colin Strong - @colinstrong - Managing Director - Verve, Author of Humanizing Big Data. #MarTech DAY2
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
Building the Social Powered Brand: Turning Social Data Into Competitive Advan...DataSift
Social data is exploding, providing new insight into markets, customers and audiences. Patrick Morrissey, VP of Marketing at DataSift and Shree Dandekar, Chief Strategist, BI and Analytics at Dell will tackle the social data challenge, explore the impacts and opportunities with social to drive brand advocacy and provide advice on how brands can make sense of social data at scale to drive advocacy and impact. Get an inside view on how Dell is using social data to translate conversations into a near real-time NPS (Net Promoter Score).
Just the Facts: From Social to Funnel: Connecting Social Buyers to the Custom...Dell Social Media
George Sadler, Director, Social Media Insights at Dell discusses how effectively listening to customer conversations leads to valuable and actionable information that enables businesses to achieve success in today's "social" era.
Social Media Analytics: The Value PropositionContent Savvy
Rohini K. Srihari delivers her powerful presentation at the KDD 2010 Workshop on Social Media Analytics.
Overview:
-What is Social Media?
-Value Proposition: Why mine social media?
-Business Analytics
-Counterterrorism
-Challenges
-Technology, Challenges
-Multilingual social media mining
This is a presentation I give to marketers who are using traditional methodologies to "communicate" with their core audiences. The purpose of this presentation is to educate and introduce traditional marketers and advertisers to the new consumer truths as well as educate them on the basics of interactive marketing and creative standards that fuel consumers conversations.
This is also used as a 101 to traditional agencies that are trying to build a digital culture with in their discipline sets.
Katheleen Ritz, founder of Ritz Marketing, gives us an overview of the social media technology and how we might deploy based on her own firm’s real world examples.
Marketing is dead: long live product marketingJohnny Russo
In a world where traditional interrupt-driven, un-targeted, sales-oriented marketing is no longer effective, the nature of marketing has fundamentally changed. As marketing has changed, so has the role of product marketing. This webinar will discuss how smart Product Marketers are using inbound marketing, content, and social media. Can product marketing save marketing from itself?
iDirect is the confluence of digital and direct marketing. It is interactive, information-driven, insightful, innovative and iterative. This presentation highlights the imperative for iDirect and its 4 fundamental tenets.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. Who creates data?
Production: Data is digital air
How will this data be shared?
Distribution: Everyone is a publisher
What will this data be used for?
Consumption: Behavior changes
4. A Shift in Language
• Collect • Share
• Solicit • Distribute
• Mine • Interpret
• Segment • Empower
5. Technologies Enabling Innovation
1800’s: Transport energy
Industrial Revolution
1900’s: Transport data
Information Revolution
2000’s: Create data
Social Data Revolution
6. In the last sixty seconds…
4,000,000 Web searches
500,000 Content shares
100,000 Product searches
40,000 Tweets created
40,000 Links shortened
8. Waves of Innovation
1990’s: Search find
2000’s: Social share
2010’s: Mobile create
Social Data Revolution
9. How the
Social Data Revolution
Changes (Almost) Everything
10. Agenda
Introduction Data and Behavior
I C2B (Customer-to-Business)
II C2C (Customer-to-Customer)
III C2W (Customer-to-World)
IV Insights
4:55–5:00pm Q&A
15. Data
The amount of data each person creates
doubles every 1.5 … 2 years
2x
time?
16. Data
The amount of data each person creates
doubles every 1.5 … 2 years
□ after five years x 10
□ after ten years x 100
□ after twenty years x 10000
26. Time Scales
Data, Technology: ~1 year
Social Norms: ~10 years
Biology: ~100k yrs
27. Agenda
Introduction Data and Behavior
I C2B (Customer-to-Business)
II C2C (Customer-to-Customer)
III C2W (Customer-to-World)
IV Insights
4:55–5:00pm Q&A
30. Imagine...
You knew all the things people here have bought
You knew all of their friends
You knew their secret desires
... what would you do?
44. Result: Amazing conversion rates
since customer chooses
Content (the item)
Context (she just bought that item)
Connection (she asked Amazon to email her friend)
Conversation (information as excuse for
communication)
54. “We are not in the business of keeping
the media companies alive.”
Trevor Edwards
Nike Corporate Vice President for
Brand and Category Management
“We are in the business of
connecting with consumers.”
Q: Or rather in the business of facilitating
consumers to connect with each other?
69. E Me We-business
From e-business… (company focus, Web 1.0)
…to me-business (customer focus , Web 2.0)
…to we-business (community focus , Web 3.0)
70. Innovation
Dead data Live data
Collect and analyze Create, share, experiment
Internal External
“Most smart people don’t work here.” Bill Joy
72. Audience Question 1
Do you have any advice on how we can
be authentic in the era of Social Data?
For companies with limited
resources, what are the costs of some
of the suggestions you mentioned in the
talk?
73. Audience Question 2
What is the most important ingredient
for a successful innovation strategy?
Do you have any specific suggestion for
traditional companies: how can we
learn more about the culture change of
the Social Data Revolution?
74. Thank you!
@aweigend
Andreas Weigend | www.weigend.com
Editor's Notes
What (if anything) does it mean to own data?
.. AND IT IS HAPPENING IN REAL TIME!Business models40mins on FBFB is 3rd larger “country”Productivity gain OR lossTransport – transport(distribution and consump
Detective workbit.ly/WIF2010
.. AND IT IS HAPPENING IN REAL TIME!Business models40mins on FBFB is 3rd larger “country”Productivity gain OR lossTransport – transport(distribution and consump
Customer 2.0Behavior change for the next billion!
ComputersComputation1970’s“Experts” learn a language the computer understandsDigitizing back office10M people 1980’sFront office interacts with back office100M people
Pages1990’sCustomers interact with firmSearch: 1bn people poking at stuff2000’s
Social commerce1bn people poking at stuff100M people producing stuffPeer-production and collaborationC2C Customers interact with customers
Mobile / Sensing 2010’s1bn people poking at stuff1bn people producing stuff Mobile in addition to PC (and paper)Continuous partial attentionModel current situation plus historySensing
.. AND IT IS HAPPENING IN REAL TIME!Business models40mins on FBFB is 3rd larger “country”Productivity gain OR lossTransport – transport(distribution and consump
1 billion CONNECTED devices Whether you are with someone, or by yourself, or nobody watching at allSPORE: implicit, explicitSPORE: nr of mobile phone
Understanding purchasing
Customer 2.0Behavior change for the next billion!
What would you use them for?See whether your wife has a lover?e.g., what they want to buyCIA…Focus here: MARKETING AND SALES, Agenda E- Business Data C2C Data (Friends) BreakC2W Data (World)Social Data Revolution
QUESTION: Better a bad review vs suppress itRetail vsmanufacturOrganizational impact?Dashboard - Navigator -RecommenderPresentation - Conversation - DecisionZero-click shopping: Bertelsmann Book ClubMore metadata: people giving collectively / judging etcTransparencyMeta about meta
Based on co-purchasing behavior
…Based on click and purchase data Nudges the customer through the funnel
Plus REAL IDENTITYSocial Recommendations: Personal shopping recommendations based on profile similarities to other customers.“The click-through and conversion rates — two important measures of Web-based and email advertising effectiveness — vastly exceed those of untargeted content such as banner advertisements and top-seller lists. [...] Our item-to-item collaborative filtering algorithm produces recommendations in realtime, scales to massive data sets, and generates high quality recommendations.”http://agents.csie.ntu.edu.tw/~yjhsu/courses/u2010/papers/Amazon%20Recommendations.pdf
SRC FOR INNOVATION: Get ppl to look at search logDC no box aroundAnd you can tooSYBOL: Homework 1hr to look through search terms
based on experience, intuition, and data Picture of graph from FosterLeveraging the social graph
based on experience, intuition, and data Picture of graph from FosterLeveraging the social graph“Birds of a feather shop together”Hill, Provost, & Volinsky, Network-based Marketing. Statistical Science 21 256–276 (2006)
DC: Redo, as discussed in ER
MerchandisingDefine viral marketing10 years agoAmazon vs FacebookAmazon is about products, interactions with store, not with friends. No NewsFeed.Facebook is about interactions between friends.
Information the purpose for communication
“In the future, the difference between social networks and corporate websites will be hard to distinguish.”http://www.web-strategist.com/blog/2010/04/30/social-commerce-breakdown-how-levis-and-facebook-prompt-your-friends-to-get-you-to-buy/“Many brands are jumping on the social media bandwagon, without giving proper thought about the impacts to their marketing effort. In particular, many brands are putting ’social chicklets’ on their homepage to “Follow us on Twitter” or “Friend us on Facebook” without considering the ramifications.”http://www.web-strategist.com/blog/2010/03/28/matrix-evolution-of-integration-of-social-media-and-corporate-websites/
Transient: (anonymous) Computes scores across social networks in the US
based on experience, intuition, and data Transient: (anonymous) Computes scores across social networks in the US
Social Apps: creating branded online applications that support social interaction and user contribution.“In the two years since it launched Nike+, a technology that tracks data of every run and connects runners around the world at a Web site, nikeplus.com, Nike has built a legion of fans. Some analysts back up Nike's claims that the site is renewing the popularity of its running shoes. SportsOneSource, a Princeton (N.J.) market research firm, says Nike accounted for 48% of all running-shoe sales in the U.S in 2006. Today, its share is 61%. "A significant amount of the growth comes from Nike+," says Matt Powell, a SportsOneSource analyst. Winters, 28, who had already run a half-marathon, credits Nike+ with boosting her enthusiasm for running and for Nike, too. On nikeplus.com, she's part of a group of 90 runners who challenge each other to go faster and farther.”http://www.businessweek.com/magazine/content/08_46/b4108074443945.htm
on average
on average
Not mutual relationships
Not mutual relationships
Engages with Twitter users:Monitors Twitter for comments about company and competitors
companies thought they own their customer switching costs largely gonecompanies thought they own product -> who knows more about my phone: manufacturer? Carrier? … or the web?companies thought they own brand co-creationcustomers talk about whatever they want to talk about CONVERSATIONUltimately, all about data. Social data.
Mass Production / Industrial Age
Past - Physical presence to fully assess suitability of real estatePresent - Richness of data exchanged online (via pictures, videos, crime incidences history) allow filtering. Choice of agents increased - not limited to recommendation by people we know but also online reviews and ratings by many others. But trust still a heavy component in finding a reliable agent. (agency / incentive problem not solved by SDR but mitigated nonetheless)Mash-ups crime dataImmoscout incentivesBroadcast co-creation