IT Management  >   Systems Operations  >   Networking  >  

Social Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Six degrees of separation is the theory that anyone on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically.  … 
Definition continues below.
Social NetworkingReports
226 - 250 of 473 Matches Previous Page  | Next Page
Proactive security measures: How to prevent malware attacks
sponsored by SearchSecurity.com
EGUIDE: Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.
Posted: 21 Oct 2012 | Published: 30 Aug 2012

SearchSecurity.com

Anatomy of the New Decision: Five Hot Trends Shaping Business Analytics
sponsored by Information Builders
WHITE PAPER: Businesses have been using data to improve decision-making for decades, but practicing legacy business intelligence strategies today can put you at a disadvantage. Read on to learn how the 5 hottest IT trends help you extract more sophisticated intelligence from your data, including: mobile computing, social media, cloud services, and more.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

Information Builders

Your Guide to Mobile Application Management
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

Big Data Analytics
sponsored by ComputerWeekly.com
ANALYST REPORT: IDC explores the initial impact that Big Data is having on organisations, its impact on IT architectures, delivery models and future roadmaps.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

ComputerWeekly.com

The Compliance Case for Social Media Records Management
sponsored by Iron Mountain
EGUIDE: In this e-guide, learn how your organization can develop a solid records management policy to stay compliant while reaping social networking benefits.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

Iron Mountain

Big data: Lessons from the leaders
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from the Economist Intelligence Unit assess how far companies have progressed in their use of big data and examines how they can turn it to business advantage.
Posted: 14 Sep 2012 | Published: 14 Sep 2012

ComputerWeekly.com

Business Collaboration Benefits: 10 Questions to Ask Your Potential Vendors
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com describes the need for collaboration in a geographically dispersed enterprise and highlights the top ten questions you should ask any potential collaboration vendor.
Posted: 11 Sep 2012 | Published: 11 Sep 2012

SearchSecurity.com

The ROI of Social CRM
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report from Nucleus Research shows that businesses can achieve a significant return on investment by adding social media to their CRM deployments
Posted: 07 Sep 2012 | Published: 05 Aug 2012

ComputerWeekly.com

How to Integrate UC with Mobile Device Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com offers best practices for managing mobile unified communications (UC) in a bring your own device (BYOD) environment. Read now for tips and hints to integrating mobile device management (MDM) with your UC systems and features.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

SearchSecurity.com

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by SearchSecurity.com
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

SearchSecurity.com

Making Sense of Big Data in the Petabyte Age
sponsored by ComputerWeekly.com
EBRIEF: This report from Cognizant offers advice on the roadmap organisations should follow to survive the Petabyte Age.
Posted: 10 Jul 2012 | Published: 10 Jul 2012

ComputerWeekly.com

Integrating Mobile Device Management with UC Systems and Features
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the issues with combining the unique communications services and interfaces of multiple mobile device operating systems with corporate unified communications (UC) strategies, and best practices to overcome these challenges.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

SearchSecurity.com

The future of software development: The FT's view.
sponsored by ComputerWeekly.com
IT BRIEFING: Jagdeep Singh Bhambra, head of software development at the FT, gives his views on the future of software development, in this presentation for Computer Weekly's 500 Club for IT leaders.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Benchmarking in the contact center: Tips for managing what you measure
sponsored by Avaya
WHITE PAPER: Benchmarking projects are a great way for contact center organizations to improve their operations in order to reconcile competing demands from customers and the business. Read this white paper to learn best practices for executing a successful contact center benchmarking project.
Posted: 24 Oct 2012 | Published: 31 Dec 2010

Avaya

Social Recruiting Guide: How to Effectively Use Social Networks and Avoid Legal Risks
sponsored by Oracle Corporation
WHITE PAPER: Social networking sites are some of the most powerful tools available to recruiters today. If you're not sure where to start with a social recruiting strategy, this paper will outline why social recruiting is becoming an imperative for companies today, what considerations you need to be aware of, and what first steps you can take.
Posted: 03 Oct 2012 | Published: 31 Jul 2012

Oracle Corporation

Customer Care in a Social World: Are We There Yet?
sponsored by Oracle Corporation
WHITE PAPER: This paper explores and explains why the contact center is a key strategic focal point for customer engagement via social channels.
Posted: 21 Sep 2012 | Published: 01 Mar 2012

Oracle Corporation

The Anywhere Worker: Essential Tools to Keep Teams Connected
sponsored by Citrix
WHITE PAPER: This white paper takes an in-depth look at the changing role of IT departments in the face of the demand to connect, collaborate and communicate with remote and in-office workers in a similar - if not near exact - fashion. Read now to learn about the best practices and tools available to make this a reality.
Posted: 12 Sep 2012 | Published: 12 Sep 2012

Citrix

Cisco IBSG Global Research Reveals New Ways for Banks To Prosper in an Omnichannel World
sponsored by Cisco Systems, Inc.
WHITE PAPER: Banking customers worldwide are ready for an omnichannel experience – are you ready to give it to them? This resource describes the concept of omnichannel banking, why your customers need it, and why you shouldn't wait to offer it to them.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

Cisco Systems, Inc.

Sales Strategy: How to Effectively Incorporate Social Media
sponsored by SAP America, Inc.
PRESENTATION TRANSCRIPT: In this white paper learn how social media is incorporated in the sales process, how companies are using social selling, and how to get started.
Posted: 02 Aug 2012 | Published: 02 Aug 2012

SAP America, Inc.

The Social Business: Advent of a new age
sponsored by IBM
WHITE PAPER: This paper outlines the why organizations need to become social businesses today. Read on to learn how your business can become social through crafting the right blueprint relying on networks, social and real-time collaboration, mobility and integration, how to deepen your customer relationships and the benefits associated with it, and much more.
Posted: 30 Jul 2012 | Published: 16 Feb 2011

IBM

Live and On-Demand: Streaming Video with LifeSize UVC Video Center
sponsored by LifeSize
WHITE PAPER: Learn why video streaming has become a key part of the communications strategy of today's organizations, and how this tool can help you increase connectivity, save budget dollars, and boost productivity.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

LifeSize

The mini-guide to social customer service
sponsored by Salesforce.com
WHITE PAPER: Social media has fundamentally changed the world of customer service. This comprehensive guide outlines the keys to success to realize your social customer service potential. Learn why actively engaging with customers is imperative, 4 vital customer services areas to focus on, and more.
Posted: 23 Jul 2012 | Published: 01 Jul 2012

Salesforce.com

Gartner Magic Quadrant reveals fragmented social CRM market
sponsored by Infor CRM
EGUIDE: This tip guide provides you with Gartner's expert insights into this fragmented social CRM market and predictions for the future of social CRM from their 2011 Magic Quadrant for Social CRM.
Posted: 07 Jul 2012 | Published: 08 Feb 2012

Infor CRM

Social Customer Service: The Pivotal Driver of the Social Enterprise
sponsored by LiveOps
WHITE PAPER: Read this paper to see how you can maximize your customer relationship management efforts through social customer service and foster brand loyalty, higher customer lifetime value, enhanced customer experience, and higher revenues.
Posted: 06 Jul 2012 | Published: 06 Jul 2012

LiveOps

Geoffrey Moore on Application Transformation –Part 2
sponsored by Hewlett-Packard Company
WEBCAST: Watch this video featuring renowned author and venture capitalist Geoffrey Moore as he discusses the future of enterprise IT and specifically how your application strategy can take full advantage of the latest tools and technology from mobile, the cloud, social media and more.
Posted: 05 Jul 2012 | Premiered: Jul 5, 2012

Hewlett-Packard Company
226 - 250 of 473 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SOCIAL NETWORKING DEFINITION (continued): …  Although they were able to phrase the question (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction. In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." He randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation, and general location. They were instructed to send … 
Social Networking definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement