Skip to main content

Home/ entreprise2.0/ Group items tagged media social

Rss Feed Group items tagged

Christophe Deschamps

5 Factors to Consider When Selecting Enterprise Social Tools - 0 views

  • Know what you want to achieve with your initiative. Social media tools can achieve a huge range of different tasks, from better internal collaboration to lead generation. What does your firm need to do?
  • Understand your organization’s culture and leadership. Social media won’t change an organization’s culture. Understanding the culture and leadership of your organization will have a huge impact on your requirements, choice of tool and how to implement and configure it.
  • Listen, watch, understand and interview or survey the constituent base that will be asked to participate in your social initiative. It’s important to figure out how your new social initiative will be received and used by the people you hope will utilize it. Make sure you have involvement and buy-in at an early stage, and understand your users’ needs.
  • ...2 more annotations...
  • Ensure that you have an effective resource and content plan in place to manage your community. Your new social software can enable an existing community or form new ones, but in order to be successful, communities need ongoing cultivation. Make sure that you have the resources and a plan in place to cultivate your community.
  • Initiate conversations with your legal, HR and IT teams early on, in order to understand the limitations and risks that may be associated with your initiative. As with any new business initiative, you should make sure that you understand the risks involved with implementing social software.
  •  
    What factors should you consider when selecting an enterprise social media tool for your business?
Willis Wee

8 Reasons Why Businesses Avoid Using Social Media | Penn Olson - 0 views

  •  
    You will probably find an increasing number of businesses putting their brand presence in social media sites. Several big brands (and also small brands) are using Twitter and Facebook to build relationships with their fan base. Conversely, there are also many businesses who are (very) skeptical about this whole idea. Are you that stubborn businessman who is unwilling to try new social media tools? If you are, you will most probably agree with the points below but look out for the counter-arguments!
Miguel Membrado

Social Media Case Studies | The Parallax View: Social Media inside the Firewall / Enter... - 0 views

  •  
    A list of case studies about social media and enterprise 2.0 on-going projects
Willis Wee

5 Social Media Disasters | Penn Olso - 0 views

  •  
    Social media has given consumers a whole new voice. A recent study by Penn State's College of Information Sciences and Technology found that 20% of Twitter updates are either requests for product info, or responses to brand messages. With that, companies better not give consumers anything bad to talk about. As with the 5 case studies below, the consequences can be severe.
Christophe Deschamps

Employers taking chances when blocking Facebook too, says Deacons - 0 views

  • 14 per cent use it at some time to access social networking sites. Usage is significantly higher among younger workers with 32 per cent of 16-24 year olds and 23 per cent of 25-34 year olds reporting frequent or occasional use. 20 per cent said their employer blocked access to social networking sites while 57 per cent said their employer allowed it (23 per cent did not know). 76 per cent of workers who use the Internet at work could see a benefit to their organisation in allowing access to social networking sites believing it showed: - trust in employees (68 per cent);  - gave people a break from day to day work and kept them fresh (48 per cent); and  - allowed them to better network with other employees, customers and suppliers (40 per cent). Among those who use social networking sites, 91 per cent saw a benefit to their organisation from the activity. In general, younger workers were more likely to see these benefits than their older counterparts. 16 per cent overall said an employer’s policy re on-line social networking would influence their decision to join one employer over another. This view was particularly strong among 16 to 24 year olds, with one in four saying it would. 91 per cent say that they use the Internet appropriately at work, with only 1 per cent admitting to frequent inappropriate use.
  •  
    Etude australienne, avril 2008
Ray Dacteur

Entreprise Collaborative - Social media learning principles - 2 views

  • My conclusion was that we develop tools to represent the complexity of learning (such as LAMS), but that the social media/web 2.0 approach t
  • My conclusion was that we develop tools to represent the complexity of learning (such as LAMS), but that the social media/web 2.0 approach
  •  <embed> is the universal acid of the web – we should build around it.
  • ...1 more annotation...
  • Start simple and let others build on top
Frank Hamm

Wild Apricot Blog : Social Media for Non-Profits: 26 Great Slideshare Presentations You... - 0 views

  •  
    Here's a hand-picked selection of presentations to get you started.
Bhaumik Mehta

Marketing Strategy on New Facebook Graph Search - 0 views

  •  
    Facebook is preparing to introduce its newest feature, the Graph Search. The social network already has several great tools available to help you analyze content, build apps and get closer to your target audience. The Graph Search is another offering that has the potential to improve your social media marketing strategy.
Christophe Deschamps

Ce qui manque aux médias sociaux ? L'intelligence - 4 views

  • La valeur de ces outils dans l’entreprise repose sur l’intelligence, et ce à double titre :- l’intelligence que les utilisateurs y déposent- l’intelligence dont ils font preuve pour s’y retrouver
  • Aujourd’hui les utilisateurs les plus actifs en entreprise sont ceux qui satisfont le second critère, que ce soit par habitude personnelle ou capacité à apprendre vite. Ce qui pose deux problèmes :- la valeur résultant d’un certain niveau critique d’utilisation, il faut aller au delà de ce premier groupe de personnes et rendre les choses simples pour n’importe qui dans l’entreprise.- tout étant question de temps, il est logique qu’au niveau de l’entreprise on soit soucieux de voir les collaborateurs utiliser leur temps pour partager de l’intelligence et l’utiliser dans le cadre de leur travail que la trier pour se la rendre utilisable.
  • il serait bon de ne pas seulement se fier à l’intelligence des utilisateurs mais également essayer d’incorporer une forme d’intelligence dans le produit. Autrement dit, après avoir exploré la manière de mettre les logiques de social media au service de la Business Intelligence, essayons de mettre la BI au service de ces outils.
  • ...5 more annotations...
  • il importe donc de réunir l’ensemble de ces signaux en un endroit unique où ils pourront être traités sans que le collaborateur ne se disperse, ce qui rend encore plus indispensable de rendre cet endroit unique intelligent. Cela peut se faire de deux manières :- en laissant l’utilisateur “dire” à l’outil ce qui est le plus important pour lui- en rendant l’outil capable de comprendre les priorités de chacun en apprenant de leurs usages, ce qui est un pur travail de BI.
  • on ne s’attend pas une seconde à ce qu’un outil métier anticipe un besoin et vienne se mêler à une conversation. C’est pourtant quelque chose de souhaitable qui finira bien par arriver.
  • . Plus on rendra le système intelligent plus le collaborateur pourra se consacrer à des tâches où sa valeur ajoutée est unique, où il est irremplaçable. L’outil métier, avant d’intéragir avec l’utilisateur doit en effet être capable d’apprendre de lui.
  • Une dernière raison à cette évolution inéluctable : lorsqu’on regarde le marché des logiciels “sociaux” d’entreprise on ne peut que constater deux choses :- leur valeur réside dans l’intelligence des collaborateurs- en termes de produit n’importe qui peut, avec quelques moyens, développer une application comprenant blogs, wikis, boomarks, microblog, espaces communautaires et activity stream. La preuve : de nouvelles plateformes voient le jour chaque semaine et la plupart se ressemblent trait pour trait.
  • Pour exister durablement sur ce marché, un éditeur devra apporter une valeur ajoutée propre, interne au produit. On va donc passer d’outils “qui ne font rien” et tirent leur valeur de ce que font les utilisateurs à des outils qui “font” et apportent une valeur ajoutée à l’utilisateur.
  •  
    Bertrand Duperrin pour l'intégration d'algos apprenants et de BI dans les plateformes sociales, au service de l'utilisateur final. Comment être contre?
Christophe Deschamps

Open-Source Spying - 0 views

  • The spy agencies were saddled with technology that might have seemed cutting edge in 1995.
  • Theoretically, the intelligence world ought to revolve around information sharing. If F.B.I. agents discover that Al Qaeda fund-raising is going on in Brooklyn, C.I.A. agents in Europe ought to be able to know that instantly.
  • Analysts also did not worry about anything other than their corners of the world.
  • ...57 more annotations...
  • When the Orange Revolution erupted in Ukraine in late 2004, Burton went to Technorati, a search engine that scours the “blogosphere,” to find the most authoritative blog postings on the subject. Within minutes, he had found sites with insightful commentary from American expatriates who were talking to locals in Kiev and on-the-fly debates among political analysts over what it meant. Because he and his fellow spies were stuck with outdated technology, they had no comparable way to cooperate — to find colleagues with common interests and brainstorm online.
  • Indeed, throughout the intelligence community, spies are beginning to wonder why their technology has fallen so far behind — and talk among themselves about how to catch up. Some of the country’s most senior intelligence thinkers have joined the discussion, and surprisingly, many of them believe the answer may lie in the interactive tools the world’s teenagers are using to pass around YouTube videos and bicker online about their favorite bands.
  • perhaps, they argue, it’ s time to try something radically different. Could blogs and wikis prevent the next 9/11?
  • during the cold war, threats formed slowly. The Soviet Union was a ponderous bureaucracy that moved at the glacial speed of the five-year plan. Analysts studied the emergence of new tanks and missiles, pieces of hardware that took years to develop.
  • Writing reports was thus a leisurely affair, taking weeks or months; thousands of copies were printed up and distributed via interoffice mail. If an analyst’s report impressed his superiors, they’d pass it on to their superiors, and they to theirs — until, if the analyst was very lucky, it landed eventually in the president’s inner circle.
  • The F.B.I. terminals were connected to one another — but not to the computers at any other agency, and vice versa.
  • If an analyst requested information from another agency, that request traveled through elaborate formal channels. The walls between the agencies were partly a matter of law.
  • Islamist terrorists, as 9/11 proved, behaved utterly unlike the Soviet Union. They were rapid-moving, transnational and cellular.
  • To disrupt these new plots, some intelligence officials concluded, American agents and analysts would need to cooperate just as fluidly — trading tips quickly among agents and agencies. Following the usual chain of command could be fatal. “To fight a network like Al Qaeda, you need to behave like a network,” John Arquilla,
  • This control over the flow of information, as the 9/11 Commission noted in its final report, was a crucial reason American intelligence agencies failed to prevent those attacks. All the clues were there — Al Qaeda associates studying aviation in Arizona, the flight student Zacarias Moussaoui arrested in Minnesota, surveillance of a Qaeda plotting session in Malaysia — but none of the agents knew about the existence of the other evidence. The report concluded that the agencies failed to “connect the dots.”
  • Spies, Andrus theorized, could take advantage of these rapid, self-organizing effects. If analysts and agents were encouraged to post personal blogs and wikis on Intelink — linking to their favorite analyst reports or the news bulletins they considered important — then mob intelligence would take over.
  • Pieces of intel would receive attention merely because other analysts found them interesting. This grass-roots process, Andrus argued, suited the modern intelligence challenge of sifting through thousands of disparate clues: if a fact or observation struck a chord with enough analysts, it would snowball into popularity, no matter what their supervisors thought.
  • What most impressed Andrus was Wikipedia’s self-governing nature. No central editor decreed what subjects would be covered. Individuals simply wrote pages on subjects that interested them — and then like-minded readers would add new facts or fix errors.
  • He pointed out that the best Internet search engines, including Google, all use “link analysis” to measure the authority of documents.
  • Each agency had databases to amass intelligence, but because of the air gap, other agencies could not easily search them. The divisions were partly because of turf battles and partly because of legal restrictions — but they were also technological.
  • This, Burton pointed out, is precisely the problem with Intelink. It has no links, no social information to help sort out which intel is significant and which isn’t. When an analyst’s report is posted online, it does not include links to other reports, even ones it cites.
  • “Analytical puzzles, like terror plots, are often too piecemeal for individual brains to put together. Having our documents aware of each other would be like hooking several brains up in a line, so that each one knows what the others know, making the puzzle much easier to solve.”
  • With Andrus and Burton’s vision in mind, you can almost imagine how 9/11 might have played out differently. In Phoenix, the F.B.I. agent Kenneth Williams might have blogged his memo noting that Al Qaeda members were engaging in flight-training activity. The agents observing a Qaeda planning conference in Malaysia could have mentioned the attendance of a Saudi named Khalid al-Midhar; another agent might have added that he held a multi-entry American visa. The F.B.I. agents who snared Zacarias Moussaoui in Minnesota might have written about their arrest of a flight student with violent tendencies. Other agents and analysts who were regular readers of these blogs would have found the material interesting, linked to it, pointed out connections or perhaps entered snippets of it into a wiki page discussing this new trend of young men from the Middle East enrolling in pilot training.
    • Christophe Deschamps
       
      Peut-être un peu idyllique?
  • “The 16 intelligence organizations of the U.S. are without peer. They are the best in the world. The trick is, are they collectively the best?”
  • in a system like this, as Andrus’s theory goes, the dots are inexorably drawn together. “Once the intelligence community has a robust and mature wiki and blog knowledge-sharing Web space,”
  • From now on, Meyerrose said, each agency would have to build new systems using cheaper, off-the-shelf software so they all would be compatible. But bureaucratic obstacles were just a part of the problem Meyerrose faced. He was also up against something deeper in the DNA of the intelligence services. “We’ve had this ‘need to know’ culture for years,” Meyerrose said. “Well, we need to move to a ‘need to share’ philosophy.”
  • In the fall of 2005, they joined forces with C.I.A. wiki experts to build a prototype of something called Intellipedia, a wiki that any intelligence employee with classified clearance could read and contribute to.
  • By the late summer, Fingar decided the Intellipedia experiment was sufficiently successful that he would embark on an even more high-profile project: using Intellipedia to produce a “national intelligence estimate” for Nigeria. An N.I.E. is an authoritative snapshot of what the intelligence community thinks about a particular state — and a guide for foreign and military policy.
  • But it will also, Fingar hopes, attract contributions from other intelligence employees who have expertise Fingar isn’t yet aware of — an analyst who served in the Peace Corps in Nigeria, or a staff member who has recently traveled there.
  • In the traditional method of producing an intelligence estimate, Fingar said, he would call every agency and ask to borrow their Africa expert for a week or two of meetings. “And they’d say: ‘Well, I only got one guy who can spell Nigeria, and he’s traveling. So you lose.’ ” In contrast, a wiki will “change the rules of who can play,” Fingar said, since far-flung analysts and agents around the world could contribute, day or night.
  • Intelink allows any agency to publish a Web page, or put a document or a database online, secure in the knowledge that while other agents and analysts can access it, the outside world cannot.
  • Rasmussen notes that though there is often strong disagreement and debate on Intellipedia, it has not yet succumbed to the sort of vandalism that often plagues Wikipedia pages, including the posting of outright lies. This is partly because, unlike with Wikipedia, Intellipedia contributors are not anonymous. Whatever an analyst writes on Intellipedia can be traced to him. “If you demonstrate you’ve got something to contribute, hey, the expectation is you’re a valued member,” Fingar said. “You demonstrate you’re an idiot, that becomes known, too.”
  • So why hasn’t Intelink given young analysts instant access to all secrets from every agency? Because each agency’s databases, and the messages flowing through their internal pipelines, are not automatically put onto Intelink. Agency supervisors must actively decide what data they will publish on the network — and their levels of openness vary.
  • It would focus on spotting and predicting possible avian-flu outbreaks and function as part of a larger portal on the subject to collect information from hundreds of sources around the world, inside and outside of the intelligence agencies.
  • Operational information — like details of a current covert action — is rarely posted, usually because supervisors fear that a leak could jeopardize a delicate mission.
  • “See, these people would never have been talking before, and we certainly wouldn’t have heard about it if they did,” the assistant said. By September, the site had become so loaded with information and discussion that Rear Adm. Arthur Lawrence, a top official in the health department, told Meyerrose it had become the government’s most crucial resource on avian flu.
  • Intelink has grown to the point that it contains thousands of agency sites and several hundred databases. Analysts at the various agencies generate 50,000 official reports a year, many of which are posted to the network. The volume of material online is such that analysts now face a new problem: data overload. Even if they suspect good information might exist on Intelink, it is often impossible to find it. The system is poorly indexed, and its internal search tools perform like the pre-Google search engines of the ’90s.“
  • But Meyerrose insists that the future of spying will be revolutionized as much by these small-bore projects as by billion-dollar high-tech systems. Indeed, he says that overly ambitious projects often result in expensive disasters, the way the F.B.I.’s $170 million attempt to overhaul its case-handling software died in 2005 after the software became so complex that the F.B.I. despaired of ever fixing the bugs and shelved it. In contrast, the blog software took only a day or two to get running. “We need to think big, start small and scale fast,” Meyerrose said.
  • But the agency’s officials trained only small groups of perhaps five analysts a month. After they finished their training, those analysts would go online, excited, and start their blogs. But they’d quickly realize no one else was reading their posts aside from the four other people they’d gone through the training with. They’d get bored and quit blogging, just as the next trainees came online.
  • This presents a secrecy paradox. The Unclassified Intellipedia will have the biggest readership and thus will grow the most rapidly; but if it’s devoid of truly sensitive secrets, will it be of any use?
  • Many in the intelligence agencies suspect not. Indeed, they often refuse to input sensitive intel into their own private, secure databases; they do not trust even their own colleagues, inside their own agencies, to keep their secrets safe.
  • These are legitimate concerns. After the F.B.I. agent Robert Hanssen was arrested for selling the identities of undercover agents to Russia, it turned out he had found their names by trawling through records on the case-support system.
  • “When you have a source, you go to extraordinary lengths to protect their identities,” I. C. Smith, a 25-year veteran of the bureau, told me. “So agents never trusted the system, and rightly so.”
  • What the agencies needed was a way to take the thousands of disparate, unorganized pieces of intel they generate every day and somehow divine which are the most important.
  • A spy blogosphere, even carefully secured against intruders, might be fundamentally incompatible with the goal of keeping secrets. And the converse is also true: blogs and wikis are unlikely to thrive in an environment where people are guarded about sharing information. Social software doesn’t work if people aren’t social.
  • the C.I.A. set up a competition, later taken over by the D.N.I., called the Galileo Awards: any employee at any intelligence agency could submit an essay describing a new idea to improve information sharing, and the best ones would win a prize.
  • The first essay selected was by Calvin Andrus, chief technology officer of the Center for Mission Innovation at the C.I.A. In his essay, “The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community,”
  • For the intelligence agencies to benefit from “social software,” he said, they need to persuade thousands of employees to begin blogging and creating wikis all at once. And that requires a cultural sea change: persuading analysts, who for years have survived by holding their cards tightly to their chests, to begin openly showing their hands online.
    • Christophe Deschamps
       
      Un point essentiel. Il faut commencer petit technologiquement et grand humainement!
  • Indeed, Meyerrose’s office is building three completely separate versions of Intellipedia for each of the three levels of secrecy: Top Secret, Secret and Unclassified. Each will be placed on a data network configured so that only people with the correct level of clearance can see them — and these networks are tightly controlled, so sensitive information typed into the Top Secret Intellipedia cannot accidentally leak into the Unclassified one.
  • The chat room was unencrypted and unsecured, so anyone could drop in and read the postings or mouth off. That way, Meyerrose figured, he’d be more likely to get drop-ins by engineers from small, scrappy start-up software firms who might have brilliant ideas but no other way to get an audience with intelligence chiefs. The chat room provoked howls of outrage. “People were like, ‘Hold it, can’t the Chinese and North Koreans listen in?’ ” Meyerrose told me. “And, sure, they could. But we weren’t going to be discussing state secrets. And the benefits of openness outweigh the risks.”
  • Fingar says that more value can be generated by analysts sharing bits of “open source” information — the nonclassified material in the broad world, like foreign newspapers, newsletters and blogs. It used to be that on-the-ground spies were the only ones who knew what was going on in a foreign country. But now the average citizen sitting in her living room can peer into the debates, news and lives of people in Iran. “If you want to know what the terrorists’ long-term plans are, the best thing is to read their propaganda — the stuff out there on the Internet,”
  • Beat cops in Indiana might be as likely to uncover evidence of a terror plot as undercover C.I.A. agents in Pakistan. Fiery sermons printed on pamphlets in the U.K. might be the most valuable tool in figuring out who’s raising money for a possible future London bombing. The most valuable spy system is one that can quickly assemble disparate pieces that are already lying around — information gathered by doctors, aid workers, police officers or security guards at corporations.
  • The premise of spy-blogging is that a million connected amateurs will always be smarter than a few experts collected in an elite star chamber; that Wikipedia will always move more quickly than the Encyclopaedia Britannica; that the country’s thousand-odd political bloggers will always spot news trends more quickly than slow-moving journalists in the mainstream media.
  • In three meetings a day, the officials assess all the intel that has risen to their attention — and they jointly decide what the nation’s most serious threats are.
  • The grass roots, they’ve found, are good at collecting threats but not necessarily at analyzing them. If a lot of low-level analysts are pointing to the same inaccurate posting, that doesn’t make it any less wrong.
  • Without the knowledge that comes from long experience, he added, a fledgling analyst or spy cannot know what is important or not. The counterterrorism center, he said, should decide which threats warrant attention.
  • Many of the officials at the very top, like Fingar, Meyerrose and their colleagues at the office of the director of national intelligence, are intrigued by the potential of a freewheeling, smart-mobbing intelligence community. The newest, youngest analysts are in favor of it, too. The resistance comes from the “iron majors” — career officers who occupy the enormous middle bureaucracy of the spy agencies. They might find the idea of an empowered grass roots to be foolhardy; they might also worry that it threatens their turf.
  • The normal case for social software is failure,” Shirky said. And because Intellipedia is now a high-profile experiment with many skeptics, its failure could permanently doom these sorts of collaborative spy endeavors.
  • It might be difficult to measure contributions to a wiki; if a brilliant piece of analysis emerges from the mob, who gets credit for it?
  • “A C.I.A. officer’s career is advanced by producing reports,”
  • Though D.N.I. officials say they have direct procurement authority over technology for all the agencies, there’s no evidence yet that Meyerrose will be able to make a serious impact on the eight spy agencies in the Department of Defense, which has its own annual $38 billion intelligence budget — the lion’s share of all the money the government spends on spying.
  • if the spies do not join the rest of the world, they risk growing to resemble the rigid, unchanging bureaucracy that they once confronted during the cold war.
  •  
    Article du NY Times qui décrit en détail le projet Intellipedia, avantages, inconvénients,.... Très intéressant pour l'étude de cas de déploiement d'un projet 2.0. les risques et écueils ne sont pas oubliés. D'autant plus utile que c'est sans doute l'un des plus anciens projets de grande envergure de ce type actuellement. 10 pages.
Christophe Deschamps

Social media case study by Cisco - Media Culpa - 0 views

  •  
    Le marketing 2.0 selon Cisco
Christophe Deschamps

10 superb social media presentations - 0 views

  •  
    10 présentations sur les médias sociaux du web.
Christophe Deschamps

How IBM Uses Social Media to Spur Employee Innovation - 2 views

  •  
    Les pratiques d'IBM pour exploiter la créativité de ses employés.
Frank Hamm

Enterprise 2.0 SUMMIT on 10 - 12 November, 2009 - 2 views

  •  
    "The Enterprise 2.0 SUMMIT is organized by Kongress Media and was first been held at CeBIT 2008. The event is about how corporations have to change to be more productive as well as innovative and competitive for their markets by the use of social software. With the presentation of European and international best-practices coupled with a gathering of the international expert's community the Enterprise 2.0 SUMMIT is helping participants in gaining new ideas and inspiration for their projects as well as learning about the real-life opportunities and challenges. The upcoming conference is held on November 11 & 12th, 2009 in Frankfurt with additional pre-conference seminars on November 10th." With Lee Bryant, Markus Bentele, Betrand Duperrin, Craig Hepburn, Dion Hinchcliffe, Oliver Marks, Mark Masterson, Frank Schönefeld, Simon Wardley, Gil Yehuda and others With best practises from * CSC * Dassault Systems * Deutsche Bundeswehr * ISO * Lago * National Suisse * Otto Group * SUN Microsystems * Westaflex
Christophe Deschamps

Les études de cas nous disent "c'est possible" et rien de plus ! | Bloc-Notes... - 5 views

  • au fur et à mesure que les premiers cas solides arrivent à propos des projets étiquetés “social media”, on a l’impression qu’un doute subsiste, ou que les cas ne semblent pas assez nombreux ou assez proches de leurs lecteurs pour les convaincre. Combien de fois entend on “ils n’ont pas notre culture, notre passé, nous ne sommes pas sur le même marché, nos produits sont différents, nos clients sont différents”.
  • D’ailleurs, tout le monde y croyait d’autant plus que toutes les entreprises étant sur un même secteur ou ayant les mêmes besoins déployaient peu ou prou les mêmes logiciels, accompagnées par les mêmes consultants qui en utilisant les mêmes méthodes en arrivaient aux mêmes implémentations.
  • i toutes les entreprises implémentaient les mêmes choses de la même manière, faisaient les mêmes choix, c’est également parce qu’on leur demandait d’être comparables. Les investisseurs avaient bien compris qu’ils ne pouvaient comparer des pommes et des poires alors ils exerçaient, même de manière inconsciente, une pression amenant à l’uniformisation des pratiques et des technologies. Qui aurait pris le risque de se retrouver montré du doigt en raison de choix manageriaux, technologies ou organisationnels non conformistes qui auraient fait qu’on aurait pas pu comparer ses résultats avec les autres, point par point, en utilisant les mêmes indicateurs dans le même contexte.
  • ...4 more annotations...
  • Le cas “entreprise 2.0″ se distingue par deux aspects. Le premier c’est que le logiciel en question ne fait rien par lui-même, que tout dépend des variables humaines, managériales, etc… qui étaient la variable cachée des cas des années 2000.
  • es réponses apportées par une entreprise A à ces questions sont peut être aux antipodes de celles qui conviennent à une entreprise B.
  • Souvenons nous d’un des principes de base, un des fondements du social media en entreprise. “Rendre les entreprises moins semblables”. Il est donc normal de ne pas trouver de réponse standardisée et standardisable à la manière de réussir.
  • l’apport de l’outil dépend de facteurs qui sont quasi uniques à chaque entreprise. Savoir, culture, capital humain, potentiel innovant…c’est ce qui différencie deux entreprises même lorsqu’elles ont l’air a priori identiques. Ce qui laisse à penser qu’une bonne implémentation de solutions de social software sera beaucoup plus différenciante que d’autres projets informatiques ont pu l’être par le passé. Mais s’agit il encore de projets informatiques ?
  •  
    Billet essentiel de Bertrand Duperrin pour comprendre la logique qui doit animer les projets 2.0 et qui est radicalement différente des projets de type ERP.
Yan Thoinet

Collaborative Thinking: Enterprises Not One Dimensional - Technology Not the Only Influ... - 0 views

  • Business leaders often view social software through the lens of consumer market trends (e.g., user-generated content) and media coverage of popular Internet sites (i.e., Facebook).
  • Expressing technology value in a business context is fundamental for strategists to gain credibility as they explore new work models made possible through social systems.
  • IT strategists often view social software quite differently, considering such tools as part of the natural progression of existing collaboration and content platforms
  • ...2 more annotations...
  • Transforming social structures within an organization to leverage community relationships across a network of customers, partners, suppliers, and employees has become a key competency demonstrated by high performing enterprises.
  • Enterprises Not One Dimensional - Technology Not the Only Influence on the Future Enterprise
1 - 20 of 38 Next ›
Showing 20 items per page