In October of 2011, AIIM (the Association for Information & Imaging Management, a non-profit research, community and educational association), published a survey-based report that examined social business and Enterprise 2.0 (E2.0) trends. I had the good fortune to hear about the results first-hand when I co-presented with AIIM’s President, John Mancini, on a social networking panel at the Gilbane Conference held in Boston last November. John summarized the work and results of the study. One of the more interesting data points and trending analysis I found intriguing was a growing interest in a class of social application AIIM refers to as “Enterprise Q&A”. Historically, when people ask what the common application use case scenarios are for E2.0, the most frequently cited examples have been: expertise location, online communities, and ideation (innovation).
Why the growing interest in Q&A applications? Perhaps because it’s a pain point all of us – from front-line worker to senior executive – can relate to in our everyday work experience. All of us can recall situations when we’ve had a question about something and have not been able to find an answer through the information and contacts at our disposal. We ask our colleagues. We send out e-mails. We might try discussion forums, knowledge-base applications, and of course – search engines.
“The question acts as a ‘social object’ that can mobilize networks, enable people to take on informal social roles, and help create social capital between participants in these answer networks.”
However, even if we are fortunate enough to find the content, the information may not be presented in a fashion that addresses our need. Sometimes the “question” is not easily resolved by locating content. Often, what people are asking for (indirectly) when they pose a question is to have a conversation with someone to “make sense” out of that issue (in addition to the content if it’s relevant). Read More »
Tags: collaboration, Enterprise 2.0, social networking
Apparently “outside the box” topped a list of the worst offenders in corporate jargon for 2011. I expected that social would make the list until I realized that people are still struggling to apply it to business. It has yet to become a corporate jargon offender, let alone one of the worst.
Still, we have social media, social networks, social business, social advertising, social cats, social dogs, social goldfish. OK, perhaps I exaggerate. A little. It’s like Y2K all over again when we tacked an e- to the front of everything from mail and business on through the rest of the dictionary to say, “Look, it’s online now!”
Working for technology companies, I’ve often had the advantage (or disadvantage) of working with new tools as they came into being. Now, some of the so-called social media tools I started using in my personal time have become valuable business tools: Instant messaging is a good example.
Read More »
Tags: collaboration, social media, social networking, web conferencing
New media and collaboration technologies have the potential to transform higher education in terms of the classroom, the learning process, the relationship between students and instructors, and how institutions conduct academic research. While much of the industry discussion revolves around use of consumer tools and social network sites like Facebook and Twitter and LinkedIn, Cisco’s educational customers also see tremendous opportunity to increase student engagement and drive their own institutional strategies with “enterprise class” social software as well.
Since Cisco first announced Quad, we have had conversations with dozens of colleges and universities regarding the role enterprise social software and Cisco Quad can play in transforming education. Cisco Quad is an enterprise collaboration platform that brings people together to share ideas and content, collaborate on projects, and interact using chat, voice or video, regardless of where people are located.
Below, we’ve outlined four ways in which educational institutions are telling us enterprise social software is helping, or can transform the way learning, research, and academic advisement is crafted, delivered and consumed:
1. The 24/7 interactive classroom: Instructors often struggle to deliver a collaborative environment for their students that is secure and supports multiple access methods such as mobile. Technology like Quad can enable students to interact in a secure, policy-based manner that extends the classroom conversation beyond physical walls. Courses partially or wholly targeted at off-campus students can similarly benefit from enhancing the class-like experience for remote students. For example, at Duke University’s Fuqua School of Business, the cross country MBA students based in the US, England, India and other countries are using Quad to create virtual working groups, find people with common interests, share files or videos with other students working on similar projects and instantly start video conferences or chat sessions. Quad provides students with the ability to interact, ask questions and share ideas with professors/faculty/tutorial assistants anytime, as opposed to only during fixed faculty office hours. It can also drive improved accountability on team projects, as content and comments are tracked in activity feeds and in project communities by both participating students and faculty leads.
2. Serendipitous Research: Quad contains several features, such as an activity feed that compiles microblog posts from students and staff and allows a snapshot view of a person’s current activities. These dynamic updating functionalities can facilitate broader cross-departmental collaboration, for students and researchers alike. Security features ensure that research that needs to be confidential is shared in a secure and safe manner. As researchers update their statuses with exciting discoveries or frustrating problems, or create posts, upload videos or otherwise document their work, this content becomes accessible to hundreds of fellow university researchers through activity feeds and searches, making it possible for providential inter-disciplinary connections to be made and new insights to be generated. Read More »
Tags: 2012, chat, Cisco collaboration, Cisco Education, Cisco Quad, Cisco Unified Communications., collaboration, college, consumer, Duke University, edtech, education, edutech, enterprise collaboration, facebook, Fuqua School of Business, happy holidays, happy new year, higher education, highered, IM, linkedin, MBA, microblog, quad, social, social media, social networking, twitter, video, Voice, voice over IP
Recently, our very own Peter Granger was interviewed for an article in Automation World Magazine regarding the impact of social media on manufacturing collaboration.
Social media isn’t just for personal use any more. Businesses of all kinds, particularly manufacturers, are looking to leverage social media types of connections for easier access to needed expertise, business intelligence insights and new product ideas.
For manufacturers, the principal driver behind the move toward greater incorporation of social media for collaborative business processes is access to expertise.
Who knows what? Read More »
Tags: Automation World, Cisco, Ford, Harley Davidson, iwe, Manufacturing, Peter Granger, Procter & Gamble, quad, social communities, social media, Social media in manufacturing, social networking
Today’s NCSAM Tip is on recognizing and avoiding the most commonly used social engineering techniques. The root of the problem is simple enough: people are too trusting of content on the Internet. There is a long promoted perception of community, information sharing, free items, help, and friendliness on the Internet that has lulled many into a false sense of safety or security. Unfortunately, the reality is that just about every “con, scam, grift, hustle, bunko, swindle, flim flam, gaffle, sting or bamboozle” known is alive and well on the Internet. When you more closely examine the social engineering techniques that are used by criminals on the Internet, you see they are often the same or variations of con games and scams that go way back, and that many people are familiar with. This too gives people a false sense of security in that many believe they can identify these malicious attempts to exploit them. But, many tests of these beliefs have shown that most fail.
Instead of looking at the complicated technical details or various techniques themselves, it is easier to see the human factors they are attempting to exploit. Cisco SIO did some research of those human factors commonly exploited in 2010, and included the findings in the Cisco 2010 Annual Security Report. What we found was that regardless of the technical details or specific techniques and variations, the attackers commonly attempted to exploit a short list of human weaknesses:
Read More »
Tags: cyber-security-month-2011, social engineering, social networking, spam