IT Management  >   Systems Operations  >   Networking  >  

Social Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Six degrees of separation is the theory that anyone on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically.  … 
Definition continues below.
Social NetworkingWhite Papers (View All Report Types)
151 - 175 of 231 Matches Previous Page  | Next Page
Solution Brief: The Top Four Business Risks of Social Media
sponsored by BlueCoat
WHITE PAPER: Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks.
Posted: 19 Sep 2011 | Published: 19 Sep 2011

BlueCoat

Content Management Interoperable Services, A Social and Content-Centric Wave
sponsored by IBM
WHITE PAPER: Organizations have always struggled to find a common way to effectively manage, access, and govern content applications across multiple systems. Learn how CMIS can provide your business with improved operational efficiencies.
Posted: 13 Sep 2011 | Published: 13 Sep 2011

IBM

The Social CRM Playbook
sponsored by SugarCRM Inc.
WHITE PAPER: This white paper will provide an outline of the broad steps you should take in building a social CRM strategy and a overview of how you can pair that strategy with technology to enable your business to practice real social CRM.
Posted: 01 Sep 2011 | Published: 31 Aug 2011

SugarCRM Inc.

Social Media Moves into Mainstream IT Service Management
sponsored by CA Technologies.
WHITE PAPER: This white paper focuses on the evolving role of social media in service desk management. Read on to learn more about social media trends in ITSM, the new culture for service desk management, the benefits of improved self-service access via social media and how social media applies to Service Desk in terms of collaboration, community, etc.
Posted: 29 Aug 2011 | Published: 24 Aug 2011

CA Technologies.

Controlling Web 2.0 Applications in the Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

The Social Customer Engagement Index
sponsored by SAP America, Inc.
WHITE PAPER: This white paper provides the results of a survey of industry professionals about how they were using social channels to engage customers from a service perspective. Learn how you can leverage these findings to transform your own efforts to integrate social and traditional methods of communication with your customers.
Posted: 25 Jul 2011 | Published: 25 Jul 2011

SAP America, Inc.

Three Must-Have’s to Securing the Social Web
sponsored by Websense, Inc.
WHITE PAPER: Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk
sponsored by Websense, Inc.
WHITE PAPER: Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

The Eight Truths of Social Learning. Now.
sponsored by SkillSoft Corporation
WHITE PAPER: This paper seeks to uncover the fundamental requirements for a successful social learning program. Based on early experience with our own social learning tool, this list of eight “truths” has been compiled to provide a foundation for learning professionals who are launching social learning in their organizations.
Posted: 30 Jun 2011 | Published: 30 Jun 2011

SkillSoft Corporation

 The Social Business - Advent of a new age
sponsored by IBM
WHITE PAPER: This white paper discusses the ins and outs of social businesses, uncovering what it means, the value it brings, and what you should expect for the future.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

The Promises and Pitfalls of Social Media in the Legal Community
sponsored by iCONECT
WHITE PAPER: From personal brand building to professional practice, social media offers professionals a host of opportunities and pitfalls to drive success or failure. Access this white paper to learn about the legal considerations surrounding content on social media websites.
Posted: 16 Jun 2011 | Published: 09 Jun 2011

iCONECT

The State of Data Security
sponsored by Sophos, Inc.
WHITE PAPER: Recognize how your data can become vulnerable and understand the compliance issues involved. This paper identifies data protection strategies you can use to keep your organization's information both safe and compliant.
Posted: 26 May 2011 | Published: 26 May 2011

Sophos, Inc.

The State of Marketing 2011: Unica’s Annual Survey of Marketers
sponsored by Unica Corporation - An IBM Company
WHITE PAPER: This is the current report based on a survey of almost 300 online and direct marketers representing a comprehensive mix of companies by location, revenues and industry. Explore the response to new developments, continuing trends and the market.
Posted: 06 May 2011 | Published: 06 May 2011

Unica Corporation - An IBM Company

True Profiles: A Contemporary Method for Managing Customer Data
sponsored by Unica Corporation - An IBM Company
WHITE PAPER: As the internet changes the way of traditional marketing and communication, discover a “True Profile” as a means of understanding customer behavior, actions and preferences using analytics. Learn the 4 key components of True Profiles and the business benefits included.
Posted: 04 May 2011 | Published: 04 May 2011

Unica Corporation - An IBM Company

Social Networking in the Enterprise: Benefits and Inhibitors
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper reveals the primary considerations for social networking, such as: business value and strategic relevance, adoption trends and concerns, and strategic considerations for ESS deployment.
Posted: 20 Apr 2011 | Published: 01 Jun 2010

Cisco Systems, Inc.

What's your Customer Experience Advantage?
sponsored by SAP America, Inc.
WHITE PAPER: SAP Insider Article covering new SAP CRM innovations which help companies empower their employees, substantially improve the customer experience, and thereby achieve a competitive advantage.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

SAP America, Inc.

Leveraging the Power of Social Media
sponsored by Oracle Corporation
WHITE PAPER: Download this free white paper and find out how to "Drive Sales Effectiveness with Enterprise-Ready Web 2.0Solutions," "Harvest Social Knowledge for Customer Service," and learn how "Social CRM Turns Customers into Competitive Advantage."
Posted: 21 Mar 2011 | Published: 03 Aug 2009

Oracle Corporation

Balancing Social Networking with Network Security Objectives
sponsored by BlueCoat
WHITE PAPER: Social networking has achieved a level of popularity that requires reasonable access at work, but it is also sufficiently mature to bring value to many businesses. But safe social networking requires an aggressive and layered security strategy at the web gateway, as well as the definition of new usage policies and priorities from management and IT.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

BlueCoat

Is Your Acceptable Use Policy Social Media-proof?
sponsored by M86 Security
WHITE PAPER: This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

M86 Security

Sophos Security Threat Report 2011
sponsored by Sophos, Inc.
WHITE PAPER: Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Sophos, Inc.

IBM Perspective on Cloud Computing
sponsored by IBM
WHITE PAPER: Cloud computing has created a lot of buzz in the marketplace, as well as confusion about its benefits. This free white paper is geared for both IT and business leaders. Read an overview of what cloud computing is, the types of "clouds" and examples of how clients are using cloud computing to reduce costs and increase efficiencies
Posted: 17 Jan 2011 | Published: 17 Jan 2011

IBM

Total Economic Impact Of IBM Social Collaboration Tools
sponsored by IBM
WHITE PAPER: The financial impact of collaboration on productivity and processes is often elusive. Yet companies are purchasing collaboration tools at a growing rate with the expectation of real impact. This study evaluates the potential financial impact of IBM Social Collaboration tools in organizations as part of a strategic investment in collaboration.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

IBM

Using Social Media to Deepen Your Customer Relationships
sponsored by Infor
WHITE PAPER: Written for the marketing executive, this paper provides a useful framework to begin to assess how an organization can engage in social media to build deeper relationships with its customers.
Posted: 24 Nov 2010 | Published: 24 Nov 2010

Infor

Top 10 Tips to Keep Your Small Business Safe
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.
Posted: 19 Nov 2010 | Published: 17 Nov 2010

Trend Micro, Inc.

Your Small Business Security Questions Answered: SocialNetworks, SensitiveData, Business Banking
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: This white paper answers your most critical small business security questions. Social networks, sensitive data, and business banking are all topics covered in this security guide. Read this paper now to learn more.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

AVG Technologies USA, Inc.
151 - 175 of 231 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SOCIAL NETWORKING DEFINITION (continued): …  Although they were able to phrase the question (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction. In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." He randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation, and general location. They were instructed to send … 
Social Networking definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement