IT Management  >   Systems Operations  >   Networking  >  

Social Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Six degrees of separation is the theory that anyone on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically.  … 
Definition continues below.
Social NetworkingReports
201 - 225 of 476 Matches Previous Page  | Next Page
Microsoft announces new office 365 offerings
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst group, Nucleus Research assesses Microsoft's plans to  update to its Office 365 cloud services, including enhanced social capabilities with SharePoint and Yammer.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

UC's Impact on the Network
sponsored by SearchUnifiedCommunications.com
EZINE: This TechGuide from SearchUnifiedCommunications.com looks at how UC applications affect network performance and explains the importance of coordinating deployments with other enterprise IT plans.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchUnifiedCommunications.com

The Deloitte Consumer Review: A more secure customer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

CW Buyer's Guide: Big Data Infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Effective E-Discovery: Best practices, processes and team building tips
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Research shows that general counsels are frustrated by lack of control, collaboration and communication regarding e-discovery processes. This classroom will focus on ways to optimize communication, get team members on the same page, and how to better leverage and integrate IT into the e-discovery process.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Technology industry at the cross-roads: Transforming quote-to-cash operations
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

ComputerWeekly.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

Benefits Management: How to increase the business value of your IT projects
sponsored by ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

ComputerWeekly.com

Super themes shaping the ICT agenda in 2013
sponsored by ComputerWeekly.com
ANALYST BRIEF: Tim Jennings, chief IT analyst at Ovum identifies seven super themes that will shape the ICT agenda for the year ahead.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

ComputerWeekly.com

The Human Face of Big Data: Data Driven
sponsored by ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Handbook: The Dos and Don’ts of Social Media Analytics
sponsored by SearchBusinessAnalytics
EBOOK: Read this handbook for advice on developing a social media analytics strategy, maintaining a clear business purpose for the program, and dealing with obstacles along the way.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

SearchBusinessAnalytics

ROI, Budgets Prevent Companies' Embrace of Social Media Analytics
sponsored by IBM
EGUIDE: Many companies are still avoiding implementing social media analytics, despite the renowned benefits it can provide a business. This expert e-guide describes some of the main reasons that companies are hesitant to start a social media analytics endeavor.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

IBM

About to Buy Guide: How to Succeed in Social Networking and Collaboration
sponsored by SearchCIO.com
EGUIDE: In this expert E-Guide, President of The Real Story Group Tony Byrne describes the importance of homing in on specific business applications and of getting IT involved in the implementation—as well as why integration of social tools remains a problem. Read now to learn more.
Posted: 14 Mar 2013 | Published: 28 Sep 2012

SearchCIO.com

Social Media Analytics Software Pulls Useful Info out of Online Muddle
sponsored by IBM
EGUIDE: In this white paper, see how unstructured and semi-structured data analytics are changing the relationship of businesses to their social media consumer bases.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

IBM

Using Social Media Monitoring Tools Starts with Business Connections
sponsored by IBM
EGUIDE: This expert e-guide explains what you need to know for getting the most from your social media analytics tools and provides useful tips for integrating social media into your analytics landscape.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

IBM

Using Social Media to Win Over Customers
sponsored by SearchCRM
EBOOK: While many businesses are eager to join their customers at the social media party, doing so without the proper internal processes in place could spell disaster. In this brief expert e-book, you can learn how to create a successful social CRM initiative (and valuable customer relations) through implementing the right processes and technologies.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchCRM

Technology industry at the cross-roads: Transforming quote-to-cash operations
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

ComputerWeekly.com

Putting Web Threat Protection and Content Filtering in the Cloud
sponsored by Webroot
WHITE PAPER: In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.
Posted: 05 Feb 2013 | Published: 31 Dec 2012

Webroot

UC and Collaboration: Benefits and Market Drivers
sponsored by Sprint
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.
Posted: 30 Jan 2013 | Published: 30 Jan 2013

Sprint

Personalization Driving E-Commerce
sponsored by Limelight Networks, Inc.
EGUIDE: Gartner analysts predict that mobile apps and Web 2.0 will be a deciding factor in 50% of your sales by 2015. In order to keep pace, your e-commerce processes need to evolve to include CRM technologies. Read on to learn what 6 factors are essential for an effective e-commerce/CRM merger.
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Limelight Networks, Inc.

Presentation Transcript- Enterprise Social Platforms-Meet Dyanamic Case Management
sponsored by OpenText
PRESENTATION TRANSCRIPT: In this presentation transcript, come to understand enterprise social platforms, dynamic case management- and how you can leverage the combination of both. Examine case studies of companies successfully using this combination to find value in greater collaboration and communications and eliminate the barrier between people and useful information.
Posted: 09 Jan 2013 | Published: 09 Jan 2013

OpenText

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

E-Guide: Creating an Effective Social Analytics Program
sponsored by IBM
EGUIDE: Read this e-guide to discover the tricks of effective social media analytics, including:knowing, up front, what you hope to achieve with the data; bringing in an analytics software vendor or service provider if you don't plan on analyzing large quantities of data; and using social analytics as a crisis aversion tool.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

IBM
201 - 225 of 476 Matches Previous Page    7 8 9 10 11 12    Next Page
 
SOCIAL NETWORKING DEFINITION (continued): …  Although they were able to phrase the question (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction. In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." He randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation, and general location. They were instructed to send … 
Social Networking definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement