IT Management  >   Systems Operations  >   Networking  >  

Social Networking

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Six degrees of separation is the theory that anyone on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. The theory was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."In the 1950's, Ithiel de Sola Pool (MIT) and Manfred Kochen (IBM) set out to prove the theory mathematically.  … 
Definition continues below.
Social NetworkingReports
226 - 250 of 516 Matches Previous Page  | Next Page
Social Intelligence Approaches to Support Four Core Customer Scenarios
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper outlines some of the best methods for deploying social intelligence to support your CRM strategies. Read this and learn how the right social intelligence can help you win new customers, retain existing customers, reduce the cost of customer management and more. Also, discover specific use cases of social intelligence.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

Hewlett-Packard Company

Monetising the Mobile Content Plan
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive report for Computer Weekly readers by Juniper Research, offers a comprehensive briefing on the routes Mobile Network Operators (MNOs) taking to develop new business models.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Microsoft announces new office 365 offerings
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst group, Nucleus Research assesses Microsoft's plans to  update to its Office 365 cloud services, including enhanced social capabilities with SharePoint and Yammer.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

UC's Impact on the Network
sponsored by SearchUnifiedCommunications.com
EZINE: This TechGuide from SearchUnifiedCommunications.com looks at how UC applications affect network performance and explains the importance of coordinating deployments with other enterprise IT plans.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchUnifiedCommunications.com

The Deloitte Consumer Review: A more secure customer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

CW Buyer's Guide: Big Data Infrastructure
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at the mindset and technology infrastructure businesses need to analyse big data.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Effective E-Discovery: Best practices, processes and team building tips
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Research shows that general counsels are frustrated by lack of control, collaboration and communication regarding e-discovery processes. This classroom will focus on ways to optimize communication, get team members on the same page, and how to better leverage and integrate IT into the e-discovery process.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

Technology industry at the cross-roads: Transforming quote-to-cash operations
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

ComputerWeekly.com

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

Benefits Management: How to increase the business value of your IT projects
sponsored by ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

ComputerWeekly.com

Super themes shaping the ICT agenda in 2013
sponsored by ComputerWeekly.com
ANALYST BRIEF: Tim Jennings, chief IT analyst at Ovum identifies seven super themes that will shape the ICT agenda for the year ahead.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

ComputerWeekly.com

UC and Collaboration: Benefits and Market Drivers
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.
Posted: 30 Jan 2013 | Published: 30 Jan 2013

SearchSecurity.com

CRM Analytics: Effective and Efficient Customer Data
sponsored by SearchCRM
WHITE PAPER: View this white paper to unlock the power behind CRM analytics. It explains how you can develop a view of the customer by analyzing social media data. Find out how to make the most of tweets and Facebook postings by reading this resource now.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

SearchCRM

Mobile, Social, Analytics Offer Promise but Demand New Metrics
sponsored by IBM
EGUIDE: A successful social media analytics endeavor involves changing your business practices and metrics in order to adapt to these new technologies.  This expert e-guide explains how your organization should rethink metrics in order to maximize the value of social technologies, analytics, and mobile devices.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

IBM

For Unwary Users, Social Media Data Analysis Can be an Unfriendly Task
sponsored by IBM
EGUIDE: Social media analytics can help you gain valuable insights into your business, but it can also be a waste if not implemented properly. Read this expert e-guide to learn about the typical pitfalls of companies when deploying a social media analytics program and get advice on how to avoid them.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

IBM

ROI, Budgets Prevent Companies' Embrace of Social Media Analytics
sponsored by IBM
EGUIDE: Many companies are still avoiding implementing social media analytics, despite the renowned benefits it can provide a business. This expert e-guide describes some of the main reasons that companies are hesitant to start a social media analytics endeavor.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

IBM

About to Buy Guide: How to Succeed in Social Networking and Collaboration
sponsored by SearchCIO.com
EGUIDE: In this expert E-Guide, President of The Real Story Group Tony Byrne describes the importance of homing in on specific business applications and of getting IT involved in the implementation—as well as why integration of social tools remains a problem. Read now to learn more.
Posted: 14 Mar 2013 | Published: 28 Sep 2012

SearchCIO.com

Social Media Analytics Software Pulls Useful Info out of Online Muddle
sponsored by IBM
EGUIDE: In this white paper, see how unstructured and semi-structured data analytics are changing the relationship of businesses to their social media consumer bases.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

IBM

Using Social Media Monitoring Tools Starts with Business Connections
sponsored by IBM
EGUIDE: This expert e-guide explains what you need to know for getting the most from your social media analytics tools and provides useful tips for integrating social media into your analytics landscape.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

IBM

Using Social Media to Win Over Customers
sponsored by SearchCRM
EBOOK: While many businesses are eager to join their customers at the social media party, doing so without the proper internal processes in place could spell disaster. In this brief expert e-book, you can learn how to create a successful social CRM initiative (and valuable customer relations) through implementing the right processes and technologies.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchCRM

Technology industry at the cross-roads: Transforming quote-to-cash operations
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

ComputerWeekly.com

Putting Web Threat Protection and Content Filtering in the Cloud
sponsored by Webroot
WHITE PAPER: In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.
Posted: 05 Feb 2013 | Published: 31 Dec 2012

Webroot

Personalization Driving E-Commerce
sponsored by Limelight Networks, Inc.
EGUIDE: Gartner analysts predict that mobile apps and Web 2.0 will be a deciding factor in 50% of your sales by 2015. In order to keep pace, your e-commerce processes need to evolve to include CRM technologies. Read on to learn what 6 factors are essential for an effective e-commerce/CRM merger.
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Limelight Networks, Inc.
226 - 250 of 516 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SOCIAL NETWORKING DEFINITION (continued): …  Although they were able to phrase the question (given a set N of people, what is the probability that each member of N is connected to another member via k_1, k_2, k_3...k_n links?), after twenty years they were still unable to solve the problem to their own satisfaction. In 1967, American sociologist Stanley Milgram devised a new way to test the theory, which he called "the small-world problem." He randomly selected people in the mid-West to send packages to a stranger located in Massachusetts. The senders knew the recipient's name, occupation, and general location. They were instructed to send … 
Social Networking definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement