IT Management  >   Systems Operations  >   Networking  >  

Social Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Six degrees of separation is the theory that anyone on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically.  … 
Definition continues below.
Social Networking White Papers (View All Report Types)
151 - 175 of 200 Matches Previous Page  |  Next Page
2010 Information Security & Compliance Trend Study
sponsored by nCircle
WHITE PAPER: This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

nCircle

The Impact of Business Analytics on Performance and Profitability
sponsored by SAS
WHITE PAPER: Let it be stated plainly: Business analytics are the key to achieving these challenging objectives. Our world generated more data in 2009 than in the previous recorded history of mankind. A good deal of this data can be converted into useful information and competitive advantage – by applying the right analytics.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Web 2.0 Engaging Customer Passion
sponsored by SDL Web Content Management Solutions Division
WHITE PAPER: This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy, marketing tactics and communication plan to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Posted: 28 Jul 2010 | Published: 27 Jul 2010

SDL Web Content Management Solutions Division

Cloud Computing - Latest Buzzword or a Glimpse of the Future?
sponsored by Google Apps
WHITE PAPER: Google Apps has the same potential to revolutionize the productivity of IT operations for small to mid-size businesses. The cost savings are immediate, and the potential for innovative collaboration is boundless. Google Apps offers simple, powerful communication and collaboration tools for enterprises of any size.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Google Apps

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

Web 2.0 @ Work: How CIOs Can Help Drive Business Returns by Improving Organizational Effectiveness
sponsored by IBM
WHITE PAPER: Without access to historical information, organizations today would be severely limited in their ability to make informed, appropriate decisions regarding even the most basic aspects of their business. This whitepaper outlines the four keys to success and discusses the ROI of Web 2.0.
Posted: 18 Jun 2010 | Published: 15 Jan 2009

IBM

Running a Successful Enterprise 2.0 Pilot
sponsored by NewsGator
WHITE PAPER: NewsGator has years of experience running effective social computing solution pilots. Running a successful pilot not only boosts the value you can derive from your solution, it also prepares you for a successful companywide launch. This whitepaper will provide a framework for a successful pilot, give best practice tips and tricks, and more!
Posted: 17 May 2010 | Published: 17 May 2010

NewsGator

A Framework for 2.0 Adoption in the Enterprise
sponsored by NewsGator
WHITE PAPER: This report draws from the knowledge of full‐time practitioners who orchestrate enterprise‐wide rollouts in their organizations. We outline patterns of adoption and highlight practical insight that will help your company and your clients plan for the process and help set realistic expectations for a successful 2.0 rollout.
Posted: 05 May 2010 | Published: 05 May 2010

NewsGator

Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

AVG Technologies USA, Inc.

Top Tips to Securing your Business Reputation
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Reputation is everything in the world of a small business. It often takes years to establish a good reputation, but unfortunately it can take far less time lose one. Read this paper to learn tips that will help you keep your reputation secure.
Posted: 28 Apr 2010 | Published: 28 Apr 2009

AVG Technologies USA, Inc.

Ten Ways to Dodge CyberBullets
sponsored by ESET
WHITE PAPER: This paper comes from a series of blogs from the beginning of 2009 and based on that material, it’s been updated here with more recent material from other members of ESET’s research teams across the globe. Read more to find out.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

ESET

Social Engineering: Hacking People, Not Machines
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Maintaining Trust: Protecting Your Web Site Users from Malware
sponsored by IBM
WHITE PAPER: This paper explores the problem of malware and how it is increasingly being delivered through legitimate Web sites. It also introduces new techniques from IBM that are designed to go beyond standard security measures to help organizations proactively defend against threats.
Posted: 31 Dec 2009 | Published: 02 Nov 2009

IBM

Expanding Information Access Initiatives with Embedded Enterprise Search
sponsored by Vivisimo, Inc.
WHITE PAPER: This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications.
Posted: 22 Dec 2009 | Published: 22 Dec 2009

Vivisimo, Inc.

Using Social Search to Drive Innovation through Collaboration
sponsored by Vivisimo, Inc.
WHITE PAPER: This paper, will try to help you strike a balance between solid business thinking and explosive enthusiasm for any new technology option with 2.0 in the description. Our goal is to give you a new way of looking at old challenges.
Posted: 22 Dec 2009 | Published: 22 Dec 2009

Vivisimo, Inc.

Leveraging Social Media to Drive Retail Sales and Enhance Customer Experience
sponsored by Wipro Technologies
WHITE PAPER: Read this article for an examination of three considerations for social media: social media driving revenue, customer experience and tracking and using social media measurement tools.
Posted: 17 Dec 2009 | Published: 17 Dec 2009

Wipro Technologies

SUN SYSTEMS FOR ENTERPRISE 2.0 WITH ORACLE
sponsored by Sun Microsystems, Inc.
WHITE PAPER: Enterprises today are seeking new communication technologies, such as wikis, blogs, and forums, to improve communication and collaboration and increase employee productivity.
Posted: 11 Nov 2009 | Published: 11 Nov 2009

Sun Microsystems, Inc.

Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies
sponsored by Sun Microsystems, Inc.
WHITE PAPER: Social technologies, commonly called Web 2.0, were originally used to describe consumer technologies that enable groups to organize and share information and media. But enterprises quickly caught on to the value of these easy-to-use tools for capturing and sharing ad hoc information that may otherwise not be documented.
Posted: 11 Nov 2009 | Published: 16 Apr 2009

Sun Microsystems, Inc.

Winning Strategies for the Evolving Legal Marketplace
sponsored by BlackBerry
WHITE PAPER: Law firms have had to develop new strategies to compete and win in a legal market that contains greater uncertainty than any that has come before it. This paper will briefly outline strategies for success in the evolving legal marketplace.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

BlackBerry

Microsoft Office SharePoint Server 2007
sponsored by Microsoft
WHITE PAPER: Microsoft® Office SharePoint® Server 2007 is an integrated suite of server capabilities that can help improve organizational effectiveness by providing comprehensive content management and enterprise search, accelerating shared business processes, and facilitating information sharing across boundaries for better business insight.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Microsoft

Sales 2.0: Tap Into Social Media to Drive Enterprise Sales Results
sponsored by InsideView
WHITE PAPER: Read this paper to learn how Sales 2.0 technology helps sales identify the right opportunities at the right time and determine the right people to contact. Also learn how this unique approach enables sales and marketing collaboration to drive productivity and close more deals in this increasingly connected world.
Posted: 26 Aug 2009 | Published: 26 Aug 2009

InsideView

The Web Hacking Incidents Database 2009 Bi-Annual Report
sponsored by Breach Security
WHITE PAPER: Criminals focus on exploiting web application vulnerabilities in order to plant malware and thus infect clients who visit websites. Read this report to learn more about the drivers behind web hacking, the vulnerabilities hackers exploit, and the types of organizations attacked most often.
Posted: 20 Aug 2009 | Published: 03 Aug 2009

Breach Security

When Web 2.0 Becomes Security Risk 2.0
sponsored by Kaspersky Lab
WHITE PAPER: Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos

Successfully Integrating Collaboration into the Workplace
sponsored by Orange Business Services
WHITE PAPER: Collaboration is one of the hottest topics in the workplace today as market and technology trends drive changes in how employees work together. This paper looks at those trends and suggests ways for information technology (IT) organizations to enable and support the changes that are affecting the way their employees work. Read on to learn more.
Posted: 21 Jul 2009 | Published: 20 Jul 2009

Orange Business Services
151 - 175 of 200 Matches Previous Page    5 6 7 8    Next Page
 
SOCIAL NETWORKING DEFINITION (continued): …  Although they were able to phrase the question (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction. In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." He randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation, and general location. They were instructed to send … 
Social Networking definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement