IT Management  >   Systems Operations  >   Networking  >  

Social Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Six degrees of separation is the theory that anyone on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically.  … 
Definition continues below.
Social NetworkingWhite Papers (View All Report Types)
126 - 150 of 238 Matches Previous Page  | Next Page
Integrating Social Media Into Your Content Management Strategy
sponsored by Iron Mountain
WHITE PAPER: Gartner predicts that by 2013 half of all organizations will be asked to provide content from social media sources for e-discovery lawsuits, yet most organizations’ social media management policies are non-existent or counter-productive. Find out how to protect yourself from the top concerns that accompany social media.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Managing Social Content to Maximize Value and Minimize Risk
sponsored by IBM
WHITE PAPER: Social content is now as much a part of businesses today as their employees. Managing it is essential to your success. How organizations go about this varies. This paper offers a clearer understanding of the benefits of social business systems. Discover how best to govern your social content to exploit it for the maximum long-term benefit.
Posted: 22 May 2012 | Published: 17 Aug 2011

IBM

#CompliantData: The Social Media Data Archiving Conundrum
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how to set the stage for social media success - learn how to gauge risk vs. reward in social media, discover how to update your compliance strategy to include social media, receive best practices for staying on top of archiving regulations and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Live and On-Demand: Streaming Video with LifeSize UVC Video Center
sponsored by LifeSize
WHITE PAPER: Learn why video streaming has become a key part of the communications strategy of today's organizations, and how this tool can help you increase connectivity, save budget dollars, and boost productivity.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

LifeSize

The mini-guide to social customer service
sponsored by Salesforce.com
WHITE PAPER: Social media has fundamentally changed the world of customer service. This comprehensive guide outlines the keys to success to realize your social customer service potential. Learn why actively engaging with customers is imperative, 4 vital customer services areas to focus on, and more.
Posted: 23 Jul 2012 | Published: 01 Jul 2012

Salesforce.com

Social Customer Service: The Pivotal Driver of the Social Enterprise
sponsored by LiveOps
WHITE PAPER: Read this paper to see how you can maximize your customer relationship management efforts through social customer service and foster brand loyalty, higher customer lifetime value, enhanced customer experience, and higher revenues.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

LiveOps

Social Media Feedback for Hospitality: Help Every Location Protects its Online Reputation
sponsored by Medallia
WHITE PAPER: The feedback from social media can allow your business to demonstrate value to customers which will ultimately result in customer loyalty and higher revenues. Read this paper to learn how to join customer experience and social media feedback to eliminate customer pain points in a single reporting application.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Medallia

Social Media and Loyalty: Four Customer Success Stories
sponsored by Medallia
WHITE PAPER: Review this brief resource to learn the details of a CRM strategy that boasts the ability to increase online review scores, enhance referral marketing practices, build a loyal social community, and more. Read through 4 customer success stories and discover how they leveraged this tool to generate more business.
Posted: 28 Jun 2012 | Published: 01 Jun 2012

Medallia

Bringing Order to the Chaos of “Bring Your Own Device”
sponsored by Enterasys
WHITE PAPER: In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.
Posted: 01 Jun 2012 | Published: 30 Apr 2012

Enterasys

Thumbs Up! Customer Engagement for a New Generation A Benchmark Study of the Impact of Social Media on Customer Service
sponsored by DMG Consulting
WHITE PAPER: This paper reviews a study of the impact of social media on customer service and how to plan and implement social media for maximum effectiveness within your business.
Posted: 16 May 2012 | Published: 01 Nov 2011

DMG Consulting

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application.
Posted: 16 Apr 2012 | Published: 01 Dec 2011

Palo Alto Networks

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Building a Clear and Socially Connected Enterprise
sponsored by SAP America, Inc.
WHITE PAPER: Read this white paper to learn how financial services firms can leverage social channels to better understand changing customer needs and interaction styles, develop products and services that address those changes, and create marketing campaigns that target these customers.
Posted: 27 Mar 2012 | Published: 31 Dec 2010

SAP America, Inc.

Unified Self-Service: Delivering on the Value of Multi-Channel Customer Interactions
sponsored by Voxeo
WHITE PAPER: This informative paper addresses how your company can enhance service, lower costs and increase revenue by taking advantage of these new mediums and expanding the ways in which you communicate with your customers.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Voxeo

Understanding Mobility Trends and Mobile Usage Among Business Users
sponsored by iPass Inc.
WHITE PAPER: Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

iPass Inc.

Security Labs Report
sponsored by M86 Security UK
WHITE PAPER: This Security Labs report offers insight into the significant trends and developments in web and email security today. View now to uncover key findings and gain recommendations on how to protect your organisation.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

M86 Security UK

Changing the Conversation in the Workplace
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: Uncover analysis of the findings in two surveys revealing workers’ attitudes about employee engagement, productivity, and communication technologies.
Posted: 09 Feb 2012 | Published: 09 Feb 2012

Alcatel-Lucent Enterprise

Business Collaborative Conversation Scenarios
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: Take your unified communications to the next level by extending “the conversation” across multiple areas of your business.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

Alcatel-Lucent Enterprise

The Social Customer Engagement Index
sponsored by SAP America, Inc.
WHITE PAPER: Use the survey results in this paper from the TheSocialCustomer.com to find out how organizations are utilizing social channels to engage their customers, and integrate these methods into your own customer experience strategy.
Posted: 01 Feb 2012 | Published: 30 Jun 2009

SAP America, Inc.

Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: This pivotal resource offers valuable insight into 7 security predictions for the coming year, as well as ways in which your organization can prepare for whatever lurks on the horizon.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

Websense, Inc.

Using IBM Social Business to Take Your Business Relationships to the Next Level
sponsored by IBM
WHITE PAPER: This publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. It presents a high-level Social Business component diagram, highlights key capabilities, and includes customer case studies that exemplify how some of these capabilities can be applied.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

IBM

Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Websense, Inc.

Social Networking malware: The dangers facing SMBs
sponsored by GFI Software
WHITE PAPER: View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software
126 - 150 of 238 Matches Previous Page    4 5 6 7 8 9    Next Page
 
SOCIAL NETWORKING DEFINITION (continued): …  Although they were able to phrase the question (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction. In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." He randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation, and general location. They were instructed to send … 
Social Networking definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement