Skip to main content

Home/ entreprise2.0/ Group items tagged Technology

Rss Feed Group items tagged

Yan Thoinet

« Les nouvelles technologies nous ont condamnés à devenir intelligents ! ». M... - 0 views

  • Les nouvelles technologies nous ont condamnés à devenir intelligents ! ». Michel Serres ... Par Dominique Dardel, samedi 29 décembre 2007 à 16:07 :: Technologies :: #1735 :: rss
Christophe Deschamps

Enterprise Web 2.0: Building the Next-Generation Workplace - the Driving Force behind J... - 0 views

  • Building on the somewhat vague and yet particular usage of the term 'Web 2.0', 'Enterprise Web 2.0' describes a fresh, and some would say new, approach to the design and provision of business applications that incorporates aspects such as social networking, collaboration, and real-time communication. In addition, Enterprise Web 2.0 focuses a great deal of attention on the user's 'experience' or 'joy of use' -- something of a novelty in enterprise IT these days. By comparison, when Butler Group talks about 'Enterprise 2.0', we are focusing on the composition and architecture of the IT ecosystem, and the associated business models that will support Enterprise Web 2.0 applications.
  • Enterprise Web 2.0 is very much concerned with the user experience of corporate systems and applications, and on extracting business value from the social contributions and interactions of the organisation's various stakeholders.
  • The management of customer relationships continues to remain pivotal for most organisations, and so the social aspects of Web 2.0 are mirrored in the corporate world of Enterprise Web 2.0
  • ...8 more annotations...
  • Workforce mobility and changing communication patterns are two more trends that are driving change at the infrastructure layer, and so unified communication and collaboration requirements form an important part of Enterprise 2.0 strategy.
  • Enterprise Web 2.0 might be about putting the user (i.e. employee, customer, or stakeholder) first, but in order to do so it also requires supporting technology. And so at the IT infrastructure level, Enterprise 2.0 means Internet Protocol (IP) everywhere -- voice, video, and data. Enterprise 2.0 also means, 'open' standards rather than proprietary or 'closed' systems. Furthermore, Enterprise 2.0 technology means user-driven technology and not IT-driven technology.
  • Having accepted the fact that 'processes' means 'people', then we have to look for ways in which these people (i.e. processes) can self-organise and reference one another. Then, where possible, we need to somehow incapsulate the processes into a set of business services. One day (we might call it Web 3.0), Artificial Intelligence (AI) will enable organisations to do with computers that which they do via human beings today, but until that day arrives, organisations must do more to aid interdepartment and inter-company collaboration. Workflow has not yet figured largely in the consumer-oriented world of Web 2.0, but Butler Group sees this as pivotal when considering Enterprise Web 2.0.
  • Today applications that embody processes are built by IT professionals, but tomorrow they will be built by a new breed of power user, using mashup builders, software agents, and other Web 2.0 technologies.
  • Business and IT managers must therefore prepare themselves for the new generation of power user who will be creating mashups and situational applications that have a far broader impact than the typical spreadsheet macro of yesteryear, and that if organisations are to avoid a proliferation of unmanageable, siloed, micro-applications, then they must blend the power of personal productivity with an appropriate management layer and a degree of central oversight.
  • Web 2.0 is no longer PC-centric.
  • It is clearly a mistake to think that Web 2.0 is all about technology, and likewise Enterprise Web 2.0, but it is also a mistake to dismiss the technology altogether. Therefore, selecting and implementing enterprise social software solutions, next-generation collaboration solutions, and Rich Internet Applications requires careful thought, consideration, and planning.
  • The driving force behind just about every aspect of Enterprise Web 2.0, is of course, the user -- something that has not always ranked highly on the list of priorities for corporate IT mangers -- and so the challenge for all forward-looking organisations is to refocus on this aspect of their IT strategies.
  •  
    Nouvelle étude de Research & Markets. Pas mal d'infos dans cette synthèse. User-centric
Christophe Deschamps

How companies are benefiting from web 2.0: McKinsey Global Survey Results - 0 views

  • 69 percent of respondents report that their companies have gained measurable business benefits, including more innovative products and services, more effective marketing, better access to knowledge, lower cost of doing business, and higher revenues. Companies that made greater use of the technologies, the results show, report even greater benefits.
  • We found that successful companies not only tightly integrate Web 2.0 technologies with the work flows of their employees but also create a “networked company,” linking themselves with customers and suppliers through the use of Web 2.0 tools. Despite the current recession, respondents overwhelmingly say that they will continue to invest in Web 2.0.
  • When we asked respondents about the business benefits their companies have gained as a result of using Web 2.0 technologies, they most often report greater ability to share ideas; improved access to knowledge experts; and reduced costs of communications, travel, and operations. Many respondents also say Web 2.0 tools have decreased the time to market for products and have had the effect of improving employee satisfaction.
  • ...15 more annotations...
  • Respondents also say they have been able to burnish their innovation skills, perhaps because their companies and customers jointly shape and cocreate products using Web 2.0 connections.
  • The median level of gains derived from internal Web 2.0 use ranged from a 10 percent improvement in operational costs to a 30 percent increase in the speed at which employees are able to tap outside experts.
  • Web 2.0 delivers benefits by multiplying the opportunities for collaboration and by allowing knowledge to spread more effectively. These benefits can accrue through companies’ use of automatic information feeds such as RSS2 or microblogs, of which Twitter is the most popular manifestation. Although many companies use a mix of tools, the survey shows that among all respondents deriving benefits, the more heavily used technologies are blogs, wikis, and podcasts—the same tools that are popular among consumers
  • Similarly, among those capturing benefits in their dealings with suppliers and partners, the tools of choice again are blogs, social networks, and video sharing. While respondents tell us that tapping expert knowledge from outside is their top priority, few report deploying prediction markets to harvest collective insights from these external networks.
  • Comparing respondents’ industries, those at high-technology companies are most likely to report measurable benefits from Web 2.0 across the board, followed by those at companies offering business, legal, and professional services
  • These survey results indicate that a different type of company may be emerging—one that makes intensive use of interactive technologies. This networked organization is characterized both by the internal integration of Web tools among employees, as well as use of the technologies to strengthen company ties with external stakeholders—customers and business partners.
  • As such, companies reporting business benefits also report high levels of Web 2.0 integration into employee workflows. They most often deploy three or more Web tools, and usage is high throughout these organizations
  • Respondents reporting measurable benefits say their companies, on average, have Web 2.0 interactions with 35 percent of their customers. These companies forged similar Web ties to 48 percent of their suppliers, partners, and outside experts. An organizational structure that’s more porous and networked may make companies more resilient and adaptive, sharpening their ability to access knowledge and thus innovate more effectively.
  • The survey results confirm that successful adoption requires that the use of these tools be integrated into the flow of users’ work (Exhibit 5). Furthermore, encouraging continuing use requires approaches other than the traditional financial or performance incentives deployed as motivational tools.
  • They also say role modeling—active Web use by executives—has been important for encouraging adoption internally.
    • Christophe Deschamps
       
      Cf le président de Cisco
  •  
    L'entreprise 2.0 n'est pas qu'un concept et cette étude menée sur 1700 dirigeants le prouve.
Christophe Deschamps

Open-Source Spying - 0 views

  • The spy agencies were saddled with technology that might have seemed cutting edge in 1995.
  • Theoretically, the intelligence world ought to revolve around information sharing. If F.B.I. agents discover that Al Qaeda fund-raising is going on in Brooklyn, C.I.A. agents in Europe ought to be able to know that instantly.
  • Analysts also did not worry about anything other than their corners of the world.
  • ...57 more annotations...
  • When the Orange Revolution erupted in Ukraine in late 2004, Burton went to Technorati, a search engine that scours the “blogosphere,” to find the most authoritative blog postings on the subject. Within minutes, he had found sites with insightful commentary from American expatriates who were talking to locals in Kiev and on-the-fly debates among political analysts over what it meant. Because he and his fellow spies were stuck with outdated technology, they had no comparable way to cooperate — to find colleagues with common interests and brainstorm online.
  • Indeed, throughout the intelligence community, spies are beginning to wonder why their technology has fallen so far behind — and talk among themselves about how to catch up. Some of the country’s most senior intelligence thinkers have joined the discussion, and surprisingly, many of them believe the answer may lie in the interactive tools the world’s teenagers are using to pass around YouTube videos and bicker online about their favorite bands.
  • perhaps, they argue, it’ s time to try something radically different. Could blogs and wikis prevent the next 9/11?
  • during the cold war, threats formed slowly. The Soviet Union was a ponderous bureaucracy that moved at the glacial speed of the five-year plan. Analysts studied the emergence of new tanks and missiles, pieces of hardware that took years to develop.
  • Writing reports was thus a leisurely affair, taking weeks or months; thousands of copies were printed up and distributed via interoffice mail. If an analyst’s report impressed his superiors, they’d pass it on to their superiors, and they to theirs — until, if the analyst was very lucky, it landed eventually in the president’s inner circle.
  • The F.B.I. terminals were connected to one another — but not to the computers at any other agency, and vice versa.
  • If an analyst requested information from another agency, that request traveled through elaborate formal channels. The walls between the agencies were partly a matter of law.
  • Islamist terrorists, as 9/11 proved, behaved utterly unlike the Soviet Union. They were rapid-moving, transnational and cellular.
  • To disrupt these new plots, some intelligence officials concluded, American agents and analysts would need to cooperate just as fluidly — trading tips quickly among agents and agencies. Following the usual chain of command could be fatal. “To fight a network like Al Qaeda, you need to behave like a network,” John Arquilla,
  • This control over the flow of information, as the 9/11 Commission noted in its final report, was a crucial reason American intelligence agencies failed to prevent those attacks. All the clues were there — Al Qaeda associates studying aviation in Arizona, the flight student Zacarias Moussaoui arrested in Minnesota, surveillance of a Qaeda plotting session in Malaysia — but none of the agents knew about the existence of the other evidence. The report concluded that the agencies failed to “connect the dots.”
  • Spies, Andrus theorized, could take advantage of these rapid, self-organizing effects. If analysts and agents were encouraged to post personal blogs and wikis on Intelink — linking to their favorite analyst reports or the news bulletins they considered important — then mob intelligence would take over.
  • Pieces of intel would receive attention merely because other analysts found them interesting. This grass-roots process, Andrus argued, suited the modern intelligence challenge of sifting through thousands of disparate clues: if a fact or observation struck a chord with enough analysts, it would snowball into popularity, no matter what their supervisors thought.
  • What most impressed Andrus was Wikipedia’s self-governing nature. No central editor decreed what subjects would be covered. Individuals simply wrote pages on subjects that interested them — and then like-minded readers would add new facts or fix errors.
  • He pointed out that the best Internet search engines, including Google, all use “link analysis” to measure the authority of documents.
  • Each agency had databases to amass intelligence, but because of the air gap, other agencies could not easily search them. The divisions were partly because of turf battles and partly because of legal restrictions — but they were also technological.
  • This, Burton pointed out, is precisely the problem with Intelink. It has no links, no social information to help sort out which intel is significant and which isn’t. When an analyst’s report is posted online, it does not include links to other reports, even ones it cites.
  • “Analytical puzzles, like terror plots, are often too piecemeal for individual brains to put together. Having our documents aware of each other would be like hooking several brains up in a line, so that each one knows what the others know, making the puzzle much easier to solve.”
  • With Andrus and Burton’s vision in mind, you can almost imagine how 9/11 might have played out differently. In Phoenix, the F.B.I. agent Kenneth Williams might have blogged his memo noting that Al Qaeda members were engaging in flight-training activity. The agents observing a Qaeda planning conference in Malaysia could have mentioned the attendance of a Saudi named Khalid al-Midhar; another agent might have added that he held a multi-entry American visa. The F.B.I. agents who snared Zacarias Moussaoui in Minnesota might have written about their arrest of a flight student with violent tendencies. Other agents and analysts who were regular readers of these blogs would have found the material interesting, linked to it, pointed out connections or perhaps entered snippets of it into a wiki page discussing this new trend of young men from the Middle East enrolling in pilot training.
    • Christophe Deschamps
       
      Peut-être un peu idyllique?
  • “The 16 intelligence organizations of the U.S. are without peer. They are the best in the world. The trick is, are they collectively the best?”
  • in a system like this, as Andrus’s theory goes, the dots are inexorably drawn together. “Once the intelligence community has a robust and mature wiki and blog knowledge-sharing Web space,”
  • From now on, Meyerrose said, each agency would have to build new systems using cheaper, off-the-shelf software so they all would be compatible. But bureaucratic obstacles were just a part of the problem Meyerrose faced. He was also up against something deeper in the DNA of the intelligence services. “We’ve had this ‘need to know’ culture for years,” Meyerrose said. “Well, we need to move to a ‘need to share’ philosophy.”
  • In the fall of 2005, they joined forces with C.I.A. wiki experts to build a prototype of something called Intellipedia, a wiki that any intelligence employee with classified clearance could read and contribute to.
  • By the late summer, Fingar decided the Intellipedia experiment was sufficiently successful that he would embark on an even more high-profile project: using Intellipedia to produce a “national intelligence estimate” for Nigeria. An N.I.E. is an authoritative snapshot of what the intelligence community thinks about a particular state — and a guide for foreign and military policy.
  • But it will also, Fingar hopes, attract contributions from other intelligence employees who have expertise Fingar isn’t yet aware of — an analyst who served in the Peace Corps in Nigeria, or a staff member who has recently traveled there.
  • In the traditional method of producing an intelligence estimate, Fingar said, he would call every agency and ask to borrow their Africa expert for a week or two of meetings. “And they’d say: ‘Well, I only got one guy who can spell Nigeria, and he’s traveling. So you lose.’ ” In contrast, a wiki will “change the rules of who can play,” Fingar said, since far-flung analysts and agents around the world could contribute, day or night.
  • Intelink allows any agency to publish a Web page, or put a document or a database online, secure in the knowledge that while other agents and analysts can access it, the outside world cannot.
  • Rasmussen notes that though there is often strong disagreement and debate on Intellipedia, it has not yet succumbed to the sort of vandalism that often plagues Wikipedia pages, including the posting of outright lies. This is partly because, unlike with Wikipedia, Intellipedia contributors are not anonymous. Whatever an analyst writes on Intellipedia can be traced to him. “If you demonstrate you’ve got something to contribute, hey, the expectation is you’re a valued member,” Fingar said. “You demonstrate you’re an idiot, that becomes known, too.”
  • So why hasn’t Intelink given young analysts instant access to all secrets from every agency? Because each agency’s databases, and the messages flowing through their internal pipelines, are not automatically put onto Intelink. Agency supervisors must actively decide what data they will publish on the network — and their levels of openness vary.
  • It would focus on spotting and predicting possible avian-flu outbreaks and function as part of a larger portal on the subject to collect information from hundreds of sources around the world, inside and outside of the intelligence agencies.
  • Operational information — like details of a current covert action — is rarely posted, usually because supervisors fear that a leak could jeopardize a delicate mission.
  • “See, these people would never have been talking before, and we certainly wouldn’t have heard about it if they did,” the assistant said. By September, the site had become so loaded with information and discussion that Rear Adm. Arthur Lawrence, a top official in the health department, told Meyerrose it had become the government’s most crucial resource on avian flu.
  • Intelink has grown to the point that it contains thousands of agency sites and several hundred databases. Analysts at the various agencies generate 50,000 official reports a year, many of which are posted to the network. The volume of material online is such that analysts now face a new problem: data overload. Even if they suspect good information might exist on Intelink, it is often impossible to find it. The system is poorly indexed, and its internal search tools perform like the pre-Google search engines of the ’90s.“
  • But Meyerrose insists that the future of spying will be revolutionized as much by these small-bore projects as by billion-dollar high-tech systems. Indeed, he says that overly ambitious projects often result in expensive disasters, the way the F.B.I.’s $170 million attempt to overhaul its case-handling software died in 2005 after the software became so complex that the F.B.I. despaired of ever fixing the bugs and shelved it. In contrast, the blog software took only a day or two to get running. “We need to think big, start small and scale fast,” Meyerrose said.
  • But the agency’s officials trained only small groups of perhaps five analysts a month. After they finished their training, those analysts would go online, excited, and start their blogs. But they’d quickly realize no one else was reading their posts aside from the four other people they’d gone through the training with. They’d get bored and quit blogging, just as the next trainees came online.
  • This presents a secrecy paradox. The Unclassified Intellipedia will have the biggest readership and thus will grow the most rapidly; but if it’s devoid of truly sensitive secrets, will it be of any use?
  • Many in the intelligence agencies suspect not. Indeed, they often refuse to input sensitive intel into their own private, secure databases; they do not trust even their own colleagues, inside their own agencies, to keep their secrets safe.
  • These are legitimate concerns. After the F.B.I. agent Robert Hanssen was arrested for selling the identities of undercover agents to Russia, it turned out he had found their names by trawling through records on the case-support system.
  • “When you have a source, you go to extraordinary lengths to protect their identities,” I. C. Smith, a 25-year veteran of the bureau, told me. “So agents never trusted the system, and rightly so.”
  • What the agencies needed was a way to take the thousands of disparate, unorganized pieces of intel they generate every day and somehow divine which are the most important.
  • A spy blogosphere, even carefully secured against intruders, might be fundamentally incompatible with the goal of keeping secrets. And the converse is also true: blogs and wikis are unlikely to thrive in an environment where people are guarded about sharing information. Social software doesn’t work if people aren’t social.
  • the C.I.A. set up a competition, later taken over by the D.N.I., called the Galileo Awards: any employee at any intelligence agency could submit an essay describing a new idea to improve information sharing, and the best ones would win a prize.
  • The first essay selected was by Calvin Andrus, chief technology officer of the Center for Mission Innovation at the C.I.A. In his essay, “The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community,”
  • For the intelligence agencies to benefit from “social software,” he said, they need to persuade thousands of employees to begin blogging and creating wikis all at once. And that requires a cultural sea change: persuading analysts, who for years have survived by holding their cards tightly to their chests, to begin openly showing their hands online.
    • Christophe Deschamps
       
      Un point essentiel. Il faut commencer petit technologiquement et grand humainement!
  • Indeed, Meyerrose’s office is building three completely separate versions of Intellipedia for each of the three levels of secrecy: Top Secret, Secret and Unclassified. Each will be placed on a data network configured so that only people with the correct level of clearance can see them — and these networks are tightly controlled, so sensitive information typed into the Top Secret Intellipedia cannot accidentally leak into the Unclassified one.
  • The chat room was unencrypted and unsecured, so anyone could drop in and read the postings or mouth off. That way, Meyerrose figured, he’d be more likely to get drop-ins by engineers from small, scrappy start-up software firms who might have brilliant ideas but no other way to get an audience with intelligence chiefs. The chat room provoked howls of outrage. “People were like, ‘Hold it, can’t the Chinese and North Koreans listen in?’ ” Meyerrose told me. “And, sure, they could. But we weren’t going to be discussing state secrets. And the benefits of openness outweigh the risks.”
  • Fingar says that more value can be generated by analysts sharing bits of “open source” information — the nonclassified material in the broad world, like foreign newspapers, newsletters and blogs. It used to be that on-the-ground spies were the only ones who knew what was going on in a foreign country. But now the average citizen sitting in her living room can peer into the debates, news and lives of people in Iran. “If you want to know what the terrorists’ long-term plans are, the best thing is to read their propaganda — the stuff out there on the Internet,”
  • Beat cops in Indiana might be as likely to uncover evidence of a terror plot as undercover C.I.A. agents in Pakistan. Fiery sermons printed on pamphlets in the U.K. might be the most valuable tool in figuring out who’s raising money for a possible future London bombing. The most valuable spy system is one that can quickly assemble disparate pieces that are already lying around — information gathered by doctors, aid workers, police officers or security guards at corporations.
  • The premise of spy-blogging is that a million connected amateurs will always be smarter than a few experts collected in an elite star chamber; that Wikipedia will always move more quickly than the Encyclopaedia Britannica; that the country’s thousand-odd political bloggers will always spot news trends more quickly than slow-moving journalists in the mainstream media.
  • In three meetings a day, the officials assess all the intel that has risen to their attention — and they jointly decide what the nation’s most serious threats are.
  • The grass roots, they’ve found, are good at collecting threats but not necessarily at analyzing them. If a lot of low-level analysts are pointing to the same inaccurate posting, that doesn’t make it any less wrong.
  • Without the knowledge that comes from long experience, he added, a fledgling analyst or spy cannot know what is important or not. The counterterrorism center, he said, should decide which threats warrant attention.
  • Many of the officials at the very top, like Fingar, Meyerrose and their colleagues at the office of the director of national intelligence, are intrigued by the potential of a freewheeling, smart-mobbing intelligence community. The newest, youngest analysts are in favor of it, too. The resistance comes from the “iron majors” — career officers who occupy the enormous middle bureaucracy of the spy agencies. They might find the idea of an empowered grass roots to be foolhardy; they might also worry that it threatens their turf.
  • The normal case for social software is failure,” Shirky said. And because Intellipedia is now a high-profile experiment with many skeptics, its failure could permanently doom these sorts of collaborative spy endeavors.
  • It might be difficult to measure contributions to a wiki; if a brilliant piece of analysis emerges from the mob, who gets credit for it?
  • “A C.I.A. officer’s career is advanced by producing reports,”
  • Though D.N.I. officials say they have direct procurement authority over technology for all the agencies, there’s no evidence yet that Meyerrose will be able to make a serious impact on the eight spy agencies in the Department of Defense, which has its own annual $38 billion intelligence budget — the lion’s share of all the money the government spends on spying.
  • if the spies do not join the rest of the world, they risk growing to resemble the rigid, unchanging bureaucracy that they once confronted during the cold war.
  •  
    Article du NY Times qui décrit en détail le projet Intellipedia, avantages, inconvénients,.... Très intéressant pour l'étude de cas de déploiement d'un projet 2.0. les risques et écueils ne sont pas oubliés. D'autant plus utile que c'est sans doute l'un des plus anciens projets de grande envergure de ce type actuellement. 10 pages.
Yan Thoinet

)i( interstices - Les nouvelles technologies, que nous apportent-elles ? - 0 views

  • Les nouvelles technologies, que nous apportent-elles ?
  • Les nouvelles technologies, que nous apportent-elles ? > 06/01/06 Dans cette conférence, Michel Serres aborde les nouvelles technologies sous un angle original, en questionnant ce qu'elles apportent de nouveau. Michel Serres passe tout d'abord en revue ce qui ne lui paraît pas nouveau, avant de détailler les aspects où selon lui réside la nouveauté : le rapport à l'espace, la question du droit, l'externalisation des fonctions cognitives. Ces réflexions le conduisent à définir un exo-darwinisme, et à montrer que dans le développement humain, chaque perte a permis de gagner une nouvelle fonction. À la fin de son exposé, d'une durée d'une heure environ, Michel Serres répond pendant une quarantaine de minutes aux questions de l'auditoire. Voir la présentation de 1 h 38 mn en XML/SMIL. Pour visionner le document, utiliser RealPlayer. Voir la vidéo non chapitrée au format Real (utiliser RealPlayer). Écouter la conférence en MP3. Cette conférence de Michel Serres, enregistrée à l'École Polytechnique le 1er décembre 2005, fait partie du cycle Culture Web, coordonné par Serge Abiteboul, dans le cadre des Thématiques INRIA. Elle a été organisée par Serge Abiteboul et Gilles Dowek.
Christophe Deschamps

Toward a Pattern Language for Enterprise 2.0 - 0 views

  • I’ve had for some time now the vague sense that the iPhone, Twitter, Gmail, Googling, Facebook, Wikipedia, Delicious, and other runaway successes are trying to tell us something about how we want to use technology in our lives and in our work, and if we enterprise technologists listen carefully we’ll hear what that something is.
  • I started jotting down some comparisons based on what I’ve seen, read, and experienced for myself, then realized that I was identifying patterns
  • I’m dividing my 2.0 vs. 1.0 comparisons into two groups. First is a set of patterns where 2.0 is just better than 1.0
  • ...8 more annotations...
  • Second is a set in which 2.0 is an alternative or addition to 1.0, not a replacement for it.
  • the primary goal of enterprise IT is not to delight users, but rather to increase the value of the company. But do these two outcomes have to be in conflict?
  • The biggest challenge will probably be to get corporate technologists (a group that includes IT departments, vendors, and consultants) to stop thinking like monopolists that can dictate tools to users with great confidence that, because of the lack of alternatives, they’ll get used.
  • I can think of four negative consequences of ignoring these patterns and continuing to act like a 1.0 enterprise technology monopolist.
  • enterprises will deploy technologies that are disliked and/or not used
  • employees will use ’stealth IT’ and any knowledge / information captured therein will not be retained by the enterprise
  • employees and customers will leave because of their frustration with poor enterprise technologies
  • the enterprise will be handicapped or crippled  –  less productive, innovative, collaborative, agile, ‘wise,’ foresightful, insightful, transparent, clear than it could be otherwise, or than its competitor is.
  •  
    Excellent article d'Andrew McAfee sur ce que les technos 2.0 apportent de plus que les précédentes aux organisations.
Miguel Membrado

Six ways to make Web 2.0 work - The McKinsey Quarterly - Six ways Web 2.0 work - Busine... - 0 views

  •  
    Excellent article from McKinsey about how web 2.0 tools can improve productivity and efficiency in the company. They are also very well explaining difference between participation and collaboration, which we are ourselves explaining it for many years. It's good to see this difference recognized. The different categories are very well explained also. But one of the key point of this article in the introduction of workflow tecnologies in this area. McKinsey is saying that workflow + participatory technologies is a key enhancer for the company. We agree of course with this, first because companies need both world, and second because providing automation and participation capabilities to the information system is the best way to improve it drastically.
Miguel Membrado

Hal Varian on how the Web challenges managers - The McKinsey Quarterly - Hal Varian web... - 0 views

  • Google’s chief economist says executives in wired organizations need a sharper understanding of how technology empowers innovation.
  •  
    Google's chief economist says executives in wired organizations need a sharper understanding of how technology empowers innovation.
Yan Thoinet

Collaborative Thinking: Enterprises Not One Dimensional - Technology Not the Only Influ... - 0 views

  • Business leaders often view social software through the lens of consumer market trends (e.g., user-generated content) and media coverage of popular Internet sites (i.e., Facebook).
  • Expressing technology value in a business context is fundamental for strategists to gain credibility as they explore new work models made possible through social systems.
  • IT strategists often view social software quite differently, considering such tools as part of the natural progression of existing collaboration and content platforms
  • ...2 more annotations...
  • Transforming social structures within an organization to leverage community relationships across a network of customers, partners, suppliers, and employees has become a key competency demonstrated by high performing enterprises.
  • Enterprises Not One Dimensional - Technology Not the Only Influence on the Future Enterprise
Christophe Deschamps

Linear is Not Always Best - 0 views

  • Users say they know what they want until they get it, and then they want something different.‘
  • I could talk with the users in their own language; go away and develop a module with real data; and create reports, monitoring screens and other processes based on a synthesis of my knowledge, the stated needs of the client and my knowledge of the technology.  The application would work in novel ways, users would find new ways of working, and modifications would be agreed upon.  Over the course of a year, a powerful application emerged that was very different from anything that either the user or I could have defined.
  • In many ways, this is a textbook description of how to implement social media tools within the enterprise.  Work iteratively with your users, create opportunities to learn from each other and from the tool using a series of “safe-fail” experiments, stay in beta for as long as it takes to reflect user reality in your tool, and don’t be afraid to step off the straight and narrow path of linear thinking.  To be clear, this is not a recommendation that you abandon all logic in your design and implementation.  Rather, it is a reminder that there can be great beauty and greater rewards in following a more circuitous route.
  •  
    Implémenter les technologies sociales dans l'entreprise
Christophe Deschamps

Portals and KM: Forrester on Enterprise 2.0 for KM Professionals - 1 views

  • Some of these tools can be cloud based but they also need to be business based.
  • They picked the same 11 technologies studied in the vendor report: blogs, forums, mashups, microblogs, podcasts, prediction markets, RSS, social bookmarks, social networks, widgets, and wikis
  • But microblogging will only become valuable to the enterprise once it truly integrates with other enterprise processes and applications, and only after a whole set of additional tools are added to help filter content and refine the value of aggregated information.
    • Christophe Deschamps
       
      Est-ce vraiment la solution? Est-ce que l'intérêt du micro-blogging n'est pas justement dans le fait de plugger ces solutions sur l'existant et d'attendre... Micro-blogging as usual.
  • ...2 more annotations...
  • On the other hand, in talking with a few implementers, they have not yet seen the big wave of demand for enterprise 2.0 tools.
  • I think the preconditions for making microblogging useful will appear sooner than later
  •  
    Bill Ives revient sur un rapport de Forrester consacré aux technologies du web social pour l'entreprise qui s'adresse aux responsables KM et souligne les opportunités qu'ils peuvent en tirer.
Ray Dacteur

De l'importance des mots de passe - Tech' You! - 1 views

  • Laurent Heslault, directeur des technologies de sécurité chez Symantec, y va même de son petit conseil : « les mots de passe, c’est un peu comme un slip, ça se change souvent, mais ça ne se prête pas ! »
  • Laurent Heslault, directeur des technologies de sécurité chez Symantec, y va même de son petit conseil : « les mots de passe, c’est un peu comme un slip, ça se change souvent, mais ça ne se prête pas ! »
Christophe Gauthier

Ten Leading Business Intelligence Software Solutions - 2 views

  •  
    "Ten Leading Business Intelligence Software Solutions By Thor Olavsrud May 5, 2010 The Business Intelligence software market is shaping up as a David vs. Goliath struggle. Behemoths like Microsoft, Oracle and IBM offer feature-rich BI suites along with their many other enterprise software products. Meanwhile, pure-play business intelligence software vendors -- such as MicroStrategy and Tableau -- have avid followers and are known for innovating around new features and quickly adjusting to the shifting marketplace. Why is this important? Because Business Intelligence software is used to extract data from disparate sources -- spreadsheets, databases and other software programs -- inside companies and then analyze that business data to better understand a firm's internal and external strengths and weaknesses. A business relies heavily on this data. Bottom line: Business intelligence software enables managers to better see the relationship between different data for critical decision-making -- particularly opportunities for innovation, cost reduction and optimal resource deployment. The list below includes ten industry-leading BI solutions, from vendors large and not-so-large. If you're looking for a bird's eye view of this rapidly evolving market, the following condensed portraits should help. Business Intelligence Software: Ten Solutions Note: This list is NOT ordered "best to worst." The question of what business intelligence software solution is best for a given company depends on an entire matrix of factors. This list is simply an overview of BI solutions, with the debate about quality left to individual clients. SAP Crystal Reports Crystal Reports is part of SAP's Business Objects portfolio of business intelligence software solutions. It allows users to graphically design interactive reports and connect them to virtually any data source, Microsoft Excel spreadsheets, Oracle databases, Business Objects Enterprise business views and local file system info
Miguel Membrado

A new way to work with Zoho | FastCompany.TV - 0 views

  •  
    Think you know what work might look like in the future? Zoho's evangelist (and guy who setup their data center) Raju Vegesna shows me how he can gather data from the Internet, process it in a spreadsheet, and build a report -- all within minutes using Zoho's free services. Oh, and all while he could be collaborating with coworkers from around the world on live data. This is a new way to work and it's pretty exciting to think about how cloud-based technologies like Zoho's suite of applications will change how we'll work
Christophe Deschamps

IndustryWeek : Seven Strategies for Implementing a Successful Corporate Wiki - 0 views

  • Integrate the wiki as one of several important tools in an organization's IT collaboration architecture.Understand the wiki "rules of conduct" and ensure they are monitored and enforced.Optimize the use of wikis for collaborative knowledge creation across geographically dispersed employees, and for crossing divisional or functional boundaries, in order to gain insights from people not previously connected.Assign a champion to each wiki and have that champion observe contributions that people make to the wiki; the champion will help foster employees who adopt the important "shaper" role within the wiki.Recognize that the most difficult barrier to cross in sustaining a wiki is convincing people to edit others' work; organizations should ask their champion and managers to help with this.Recognize that a significant value of wikis comes from embedding small software programs into the wiki that structure repetitive behavior. Some include organizing meeting minutes, rolling up project status or scheduling meetings. Ask wiki participants to keep watching for repetitive activity to evolve and enhance wiki technology.Understand wikis are best used in work cultures that encourage collaboration. Without an appropriate fit with the workplace culture, wiki technology will be of limited value in sharing knowledge, ideas and practices.
  •  
    Tout est dans le titre
Yan Thoinet

untitled - 0 views

  • Driving successfully web 2.0 into the enterprise
  • A lot of companies are currently planning their web 2.0 strategies and are discovering the opportunities as well as facing the challenges of adopting these technologies in the workplace.
  • Making this type of initiative a success requires aligning the following critical aspects: senior management commitment and involvement, internal communication, company’s culture and organisational change, providing incentives and recognition, and finally selecting the appropriate infrastructure.
  • ...2 more annotations...
  • The business case, system adoption and issues around fragmentation are typical pain points that companies are dealing with as far as Enterprise 2.0 implementation is concerned.
  • business strategy, aligned with clearly defined outcomes & objectives, and supported by organisational structures, company's culture and adapted technologies.
Yan Thoinet

AgoraVox le média citoyen : L'entreprise 2.0 ou la mutation à l'œuvre - 0 views

  • mesure des possibilités offertes par ces nouvelles technologies collaboratives
  • un mode de fonctionnement basé sur la participation active du plus grand nombre.
  • la banque Dresdner Kleinwort Wasserstein qui, à l’automne 2005, termina la mise en oeuvre d’une nouvelle plate-forme intranet basée sur les technologies du blog, du Wiki et de la messagerie instantanée, et qui réalisa très vite que le système manquait d’une fonctionnalité cruciale, permettant de connaître en temps réel la disponibilité des utilisateurs connectés. 64 minutes plus tard, et cela sans définition de projet ni même de planning, une petite communauté d’employés avait développé un outil répondant à ce besoin. La technologie collaborative avait joué à plein son rôle d’outil communautaire.
Christophe Deschamps

KMWorld.com: Enterprise social Software technology - 0 views

  •  
    Article synthétique
Willis Wee

5 Social Media Disasters | Penn Olso - 0 views

  •  
    Social media has given consumers a whole new voice. A recent study by Penn State's College of Information Sciences and Technology found that 20% of Twitter updates are either requests for product info, or responses to brand messages. With that, companies better not give consumers anything bad to talk about. As with the 5 case studies below, the consequences can be severe.
Christophe Deschamps

Darwin offre un engin de veille à l'entreprise 2.0 - Darwin Discovery Engine ... - 0 views

  • “Une approche plus fidèle au Web 2.0 serait en mesure de livrer ces faits dans leur contexte, avec en prime des accroches qui attirent l’attention et permettant à l’utilisateur de creuser certains aspects de son choix”.
  • L’introduction des outils de Web 2.0 dans l’entreprise augmentent le risque de perte par l’isolation des informations dans les différents silos de stockage, surtout si ces nouveaux outils ne sont pas connectés entre eux et avec le reste. Darwin offre la possibilité de percevoir l'émergence des relations entre les différents contenus à travers l'ensemble des outils utilisés.
  • Grâce à son Scan Cloud™ Darwin rend la valeur du contenu de l’Entreprise 2.0 visible et mesurable (Veille et Evaluation). Non seulement vous pouvez voir les relations entre les éléments reliés entre eux dans un nuage de mots, mais aussi ces liens se rafraîchissent à mesure que vous vous déplacez dans le nuage. Cette propriété dynamique permet aux utilisateurs de voir les corrélations qui existent à travers les contenus de l'entreprise 2.0 (Découverte et Partage)
  • ...3 more annotations...
  • Darwin cherche à faire émerger les thèmes corrélés entre eux issus d’un environnement chaotique en se basant sur la mesure de corrélation vue dans la théorie du chaos. Ainsi, Darwin s'éloigne clairement des systèmes de classification par vote ou popularité actuellement utilisés par nombreux moteurs de recherche et aggregateurs de contenu pour ordonner leur résultats.
  • Darwin n’est pas un engin de remplacement des technologies entreprise 2.0, tableaux de bord, et autre outils de management des documents. Il est conçu pour compléter et renforcer ces technologies en rendant plus visible le savoir tacite enfermé dans leurs systèmes.
  • C’est une application internet (Scan Cloud™) ou cela peut aussi devenir une solution customisée grâce à l'accès API offert. Cela fonctionne sur un serveur Web avec des services et base de données qui corrèlent les différentes sources Web 2.0.
1 - 20 of 76 Next › Last »
Showing 20 items per page