IT Management  >   Systems Operations  >   Networking  >   Pervasive Computing  >  

Social Computing

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals. While social networking has gone on almost as long as societies themselves have existed, the unparalleled potential of the Internet to promote such connections is only now being fully recognized and exploited, through Web-based groups established for that purpose.  … 
Definition continues below.
Social Computing Reports
176 - 200 of 295 Matches Previous Page  |  Next Page
Collaborative Learning in a Project Environment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from ESI International explains how organisations can harness collaborative learning to drive better project management.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Network Evolution University: Video Conferencing and Collaboration
sponsored by SearchUnifiedCommunications.com
VIRTUAL ENVIRONMENT: In this classroom, our experts examines how desktop video is enabling the focus on collaboration, best practices for using desktop video, and policies to manage its use and protect the network.
Posted: 19 Mar 2013 | Premiered: 19 Mar 2013

SearchUnifiedCommunications.com

CW Buyer's Guide: Big Data Infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Journey 2016: Enterprise without boundaries
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from Atos assess how major trends including the birth of the total data economy, a cashless society, social and shared innovation will start to reshape business and society by 2016.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

UC and Collaboration: Benefits and Market Drivers
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.
Posted: 30 Jan 2013 | Published: 30 Jan 2013

SearchSecurity.com

The Human Face of Big Data: Data Driven
sponsored by ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

ISM Essentials Guide – Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchSecurity.com

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Introducing Social Business for the Mid-Market
sponsored by IBM
WHITE PAPER: Consult this resource to learn more about the insight Aberdeen research discovered by studying 229 mid-sized companies. They looked to uncover if there were specific characteristics that made companies more interested in using social business.
Posted: 09 Apr 2013 | Published: 09 Apr 2013

IBM

The Future of Email and Applications is Social
sponsored by IBM
WHITE PAPER: The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides.
Posted: 05 Apr 2013 | Published: 28 Feb 2013

IBM

Making the Most of Customer Data Using CRM Analytics
sponsored by SearchCRM
WHITE PAPER: Explore this expert e-book for advice on choosing a CRM platform that suits your needs, and learn how to construct a well-defined plan to put social media analytics into a broader enterprise context.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

SearchCRM

The Impact of UC Apps on Enterprise Networks
sponsored by SearchUnifiedCommunications.com
EGUIDE: How can you ensure that unified communications (UC) apps work well with other internal systems and, more importantly, that they don't crash the network? This expert e-guide explores how UC apps impact network performance, and how to overcome challenges posed by video conferencing, social media, and more.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchUnifiedCommunications.com

CW Europe – March Edition
sponsored by ComputerWeekly.com
EZINE: Never have we been so open about the information we share online, without so little concern for our privacy. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

ComputerWeekly.com

All Mobile, All the Time: Can Businesses Make the Leap?
sponsored by IBM
EBOOK: Consult this white paper to learn how to manage the increasing array of data sources. Find out how you can ensure that your valuable data is accurate and accessible. Explore the changes the mobile revolution is causing your enterprise and the values you need to establish to have successful BI by reading this resource now.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

IBM

Putting Web Threat Protection and Content Filtering in the Cloud
sponsored by Webroot
WHITE PAPER: In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.
Posted: 05 Feb 2013 | Published: 31 Dec 2012

Webroot

3-2-1 Contact the Call Center
sponsored by SearchCRM
WHITE PAPER: Contact centers can't live in the past. This three-part handbook offers insight into how contact centers can modernize an agent's tools to meet the demands and needs of customers whose mobile and social empowerment has put companies in the virtual hot seat.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

SearchCRM

Presentation Transcript- Enterprise Social Platforms-Meet Dyanamic Case Management
sponsored by OpenText
PRESENTATION TRANSCRIPT: In this presentation transcript, come to understand enterprise social platforms, dynamic case management- and how you can leverage the combination of both. Examine case studies of companies successfully using this combination to find value in greater collaboration and communications and eliminate the barrier between people and useful information.
Posted: 09 Jan 2013 | Published: 09 Jan 2013

OpenText

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

The Dos and Don’ts of Social Media Analytics
sponsored by SearchBusinessAnalytics
EBOOK: This three-part expert e-guide demonstrates how to tie social networking analytics to your unique organizational goals. Access now and you'll also learn ways to execute a business-focused social media strategy while mitigating obstacles.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

SearchBusinessAnalytics

E-Guide: Creating an Effective Social Analytics Program
sponsored by IBM
EGUIDE: Read this e-guide to discover the tricks of effective social media analytics, including:knowing, up front, what you hope to achieve with the data; bringing in an analytics software vendor or service provider if you don't plan on analyzing large quantities of data; and using social analytics as a crisis aversion tool.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

IBM

E-Guide: Social Analytics: Opportunities and Challenges
sponsored by IBM
EGUIDE: Read this e-guide to learn how social media analytics can help businesses improve marketing by quantifying customer value at different stages of the life cycle, but also that they need tools like in-memory computing to provide real-time analysis of vast volumes of customer behavior data.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

IBM

E-Guide: Harnessing Social Analytics
sponsored by IBM
EGUIDE: In this e-guide, discover how social media analytics software leverages text analytics capabilities to reveal patterns, trends, and potential business problems within online discussions.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

IBM

Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge
sponsored by IBM
EGUIDE: This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting.
Posted: 18 Dec 2012 | Published: 17 Dec 2012

IBM
176 - 200 of 295 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SOCIAL COMPUTING DEFINITION (continued): …  Based on the six degrees of separation concept (the idea that any two people on the planet could make contact through a chain of no more than five intermediaries), social networking establishes interconnected Internet communities (sometimes known as personal networks) that help people make contacts that would be good for them to know, but that they would be unlikely to have met otherwise. In general, here's how it works: you join one of the sites and invite people you know to join as well. Those people invite their contacts to join, who in turn invite their contacts to join, and the process repeats … 
Social Computing definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement