IT Management  >   Systems Operations  >   Networking  >  

Social Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Six degrees of separation is the theory that anyone on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically.  … 
Definition continues below.
Social NetworkingReports
226 - 250 of 498 Matches Previous Page  | Next Page
Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

Benefits Management: How to increase the business value of your IT projects
sponsored by ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

ComputerWeekly.com

Super themes shaping the ICT agenda in 2013
sponsored by ComputerWeekly.com
ANALYST BRIEF: Tim Jennings, chief IT analyst at Ovum identifies seven super themes that will shape the ICT agenda for the year ahead.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

ComputerWeekly.com

UC and Collaboration: Benefits and Market Drivers
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.
Posted: 30 Jan 2013 | Published: 30 Jan 2013

SearchSecurity.com

The Human Face of Big Data: Data Driven
sponsored by ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Small and Midsize Business guide to Mobile Security
sponsored by SearchSecurity.com
WHITE PAPER: In this mobile security FAQ for small to midsize businesses, hear the answers to all of your pressing questions about the mobile threat landscape and what you can do to protect your mobile workforce. Discover how vulnerable SMBs are to mobile threats, tips for evaluating your solution options, and more.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

Managing Web Security in an increasingly Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER: In this expert guide, discover how new trends such as mobility, social networking, and cloud computing may be putting your organization at risk, and learn essential strategies for securing your extended enterprise from Web-based threats – read on to learn more.
Posted: 19 Dec 2012 | Published: 19 Dec 2012

SearchSecurity.com

Forrester Talks About Collaboration Services: Deployment Options for the Enterprise
sponsored by Cisco Systems, Inc.
WHITE PAPER: This independent research report explores how senior IT decision-makers across the globe are handling their collaboration needs. In addition, discover why the cloud is a key collaboration enabler.
Posted: 12 Dec 2012 | Published: 30 Nov 2012

Cisco Systems, Inc.

A Unified Records Management Approach to Maximize SharePoint and Social Media
sponsored by Iron Mountain
WHITE PAPER: As the use of social media and SharePoint technologies continues to rise, effective records management is becoming more difficult than ever before.  Inside this paper, learn best practices for effectively managing SharePoint and social media, including 5 questions to consider and 4 key issues to address when designing your overall strategy.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Iron Mountain

How to be influential online
sponsored by ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Records Management Strategies for Social Media Compliance
sponsored by Iron Mountain
WHITE PAPER: According Smithsonian Magazine, by 2013 businesses will generate as much data every 10 minutes as was generated in the world through 2003 – most of which will be social media data. Does you have a solid plan in place to effectively manage these social records? Read on to learn 5 steps to devising a social media records management program.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

Iron Mountain

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Top 10 Predictions for 2013
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Group, Nucleus Research gives its view of the IT trends and technologies that will shape 2013.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

Tips and Best practices for Enterprise Social Software Adoption
sponsored by IBM
EGUIDE: Most businesses today are aware of the benefits of social technologies, but many organizations are finding that simply deploying social tools isn't enough to ensure social success or user adoption. Read this e-guide to learn 4 steps that lead to enterprise-wide user adoption and the importance of establishing a collaborative environment.
Posted: 14 Nov 2012 | Published: 14 Nov 2012

IBM

The Social Collaboration Revolution: Keeping Your Dispersed Enterprise Connected
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the market drivers for unified communications and collaboration in the dispersed workplace and details a technology that has set its sights on revolutionizing the world of social collaboration.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

SearchSecurity.com

Technology industry at the cross-roads: Transforming quote-to-cash operations
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

ComputerWeekly.com

Putting Web Threat Protection and Content Filtering in the Cloud
sponsored by Webroot
WHITE PAPER: In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.
Posted: 05 Feb 2013 | Published: 31 Dec 2012

Webroot

Personalization Driving E-Commerce
sponsored by Limelight Networks, Inc.
EGUIDE: Gartner analysts predict that mobile apps and Web 2.0 will be a deciding factor in 50% of your sales by 2015. In order to keep pace, your e-commerce processes need to evolve to include CRM technologies. Read on to learn what 6 factors are essential for an effective e-commerce/CRM merger.
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Limelight Networks, Inc.

Presentation Transcript- Enterprise Social Platforms-Meet Dyanamic Case Management
sponsored by OpenText
PRESENTATION TRANSCRIPT: In this presentation transcript, come to understand enterprise social platforms, dynamic case management- and how you can leverage the combination of both. Examine case studies of companies successfully using this combination to find value in greater collaboration and communications and eliminate the barrier between people and useful information.
Posted: 09 Jan 2013 | Published: 09 Jan 2013

OpenText

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

Handbook: The Dos and Don’ts of Social Media Analytics
sponsored by SearchBusinessAnalytics
EBOOK: Read this handbook for advice on developing a social media analytics strategy, maintaining a clear business purpose for the program, and dealing with obstacles along the way.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

SearchBusinessAnalytics

E-Guide: Creating an Effective Social Analytics Program
sponsored by IBM
EGUIDE: Read this e-guide to discover the tricks of effective social media analytics, including:knowing, up front, what you hope to achieve with the data; bringing in an analytics software vendor or service provider if you don't plan on analyzing large quantities of data; and using social analytics as a crisis aversion tool.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

IBM

E-Guide: Social Analytics: Opportunities and Challenges
sponsored by IBM
EGUIDE: Read this e-guide to learn how social media analytics can help businesses improve marketing by quantifying customer value at different stages of the life cycle, but also that they need tools like in-memory computing to provide real-time analysis of vast volumes of customer behavior data.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

IBM

E-Guide: Harnessing Social Analytics
sponsored by IBM
EGUIDE: In this e-guide, discover how social media analytics software leverages text analytics capabilities to reveal patterns, trends, and potential business problems within online discussions.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

IBM
226 - 250 of 498 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SOCIAL NETWORKING DEFINITION (continued): …  Although they were able to phrase the question (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction. In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." He randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation, and general location. They were instructed to send … 
Social Networking definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement