Social business is about using diverse social technologies to easily connect with one another. In my previous video blog post, we learned some present and future trends within this realm, and how it’s evolving. Let’s continue that train of thought and delve deeper.
Let’s Get This Social Media Party Started
According to Industry Analyst Jeremiah Owyang, “the social business space is still very immature, and things are just heating up” (Owyang, “Social Business: We’re Just Getting Started”). As more and more companies jump on the social media bandwagon, it’s essential that they remember to holistically integrate social business into the corporation. Before getting started with social, Jeremiah recommends conducting an internal analysis of your organization to figure out which of the 5 organizational models your company is currently in and which you aspire to be in. Afterward, employees must realize that incorporating social into their business is likely to be a slow process since it’s much of a major cultural change that their company will undergo.
The Role of the Social Strategist Amidst It All
Many people know that social media is not free – it requires a lot of time, money and people resources. One of the key players that constitute social business is the social strategist. As this realm continues to develop, how will the role of the social strategist change? Will it disappear or become further embedded into a corporation somehow? We wanted to hear what “social media guy at LinkedIn” Mario Sundar (@mariosundar) and Jeremiah (@jowyang) thought about this topic. Watch this short video recapping their words of wisdom:
Read More »
Tags: Altimeter Group, best practices, evolving social strategist, lessons learned, linkedin, Social Business, tips
LinkedIn is believed to have suffered a password hash breach (updated: LinkedIn has confirmed the breach), thanks to a forum post that quickly caught the attention of security researchers on Twitter and other social outlets. The posted archive contained a 270+ MB text file of SHA-1 hashes, and forum discussions suggested that it was related to the popular business-centric social site.
At the moment, little is known and speculation is running wild. LinkedIn has not finished investigating whether they have been breached, however many security pros are confirming for the media that the SHA-1 hashes of their passwords are found in the file. The file is constructed in a hash-per-line fashion, with no evident plaintext that suggests it is anything other than passwords (such as usernames, etc.). However, it’s possible that anyone gaining the original access to hashes had or has access to additional details.
I obtained a copy of the hash list, produced a SHA-1 hash of my old LinkedIn password, and did indeed find it in the list. I have also spot-checked several other hashes posted by security pros on Twitter, and have found them as well. Given the nature of my own password (16 random characters comprised of A-Z, a-z, and 0-9) the likelihood that my SHA-1 hash of my password (that was unique to LinkedIn) would be present in a file that did NOT come (at least in part) from a source that had access to hashes of LinkedIn passwords is statistically impossible.
Read More »
Tags: best practices, Breach, Hash, infosec, it security, linkedin, password breach, passwords, security, SHA-1
Todd Shimizu (@shimmage), SVP and Managing Director at Ant’s Eye View, says, “Social media is becoming more part of the rhythm of the business.”
Read More »
Tags: AEV, ant's eye view, best practices, lessons learned, past and future trends, Social Business, todd shimizu
I lived off my iPad for two days, using it to take pictures, live-tweet, check in to new apps, and even message with my family.
Read More »
Tags: best practices, collaboration, social media
On an everyday basis, Greg has demonstrated exemplary blogging skills, but his contributions to award-winning projects that innovatively used social media to connect with fans are not to be overlooked.
A 12-year veteran at Cisco, Greg Smith is a Marketing Manager for Cisco’s Service Provider (SP) Routing & Switching platform. He mainly focuses on the SP Carrier Grade IPv6 solutions (CGv6) and worldwide marketing of Cisco’s Edge solution portfolio, which includes products such as the ASR family of routers.
Greg’s Unique Blogging Talent
Being his team’s lead for global communication efforts, this SME is involved with much of the blog-writing and editing on the SP360 Blog (check out Greg’s Cisco blogger profile). Many of these blog posts have been featured as Cisco’s top 5 blog posts (based on number of number of hits) due to Greg’s attractive writing style which easily captures readers’ attention. Particularly notable is his gift for writing intriguing headlines and connecting technological topics to life analogies as is exemplified with his blog article relating Internet gaming to 100 GB technology and this one showcasing his video on how the network is relevant to NOOAs mission to protect the environment.
As successful as Greg has been with his blogging practice, the highlight of his social achievements have been comprised of his contributions to two exceptional projects—Cisco myPlanNet Game and the ASR 9000 “Robot Arm” demo—for which he acted as the concept designer and promoter. What’s more, both projects were selected as winners of the B2B Marketing Awards in two subsequent years!
The Fun, Educational, and Relevant myPlanNet Simulation Game Read More »
Tags: best practices, blogging, Cisco myPlanNet simulation game, lessons learned, meet our SMEs, Meet Our SMEs blog series, Robot Arm video, Service Provider, SME, SP, subject matter expert