Skip to main content

Home/ entreprise2.0/ Group items tagged tech

Rss Feed Group items tagged

shalani mujer

One on One Professional Online Tech Support - 3 views

I love working with these guys. Their tech support technicians are very professional and polite. They offer one-on-one tech support. They listen to what your issues are, diagnose what your problem ...

tech support enterprise 2.0

started by shalani mujer on 06 Jun 11 no follow-up yet
seth kutcher

Remote Online PC Support I Can Rely On - 1 views

I availed of the remote computer support services of Remote Computer Support Site because their services are proven to be very fast and accurate. They have expert online computer tech professiona...

remote computer support

started by seth kutcher on 12 Sep 11 no follow-up yet
shalani mujer

Reliable and Fast Online Computer Tech Support - 1 views

I love watching movies and I usually get them online. There was this one time that my computer automatically shut down while downloading a movie. Good thing I was able to sign up with an online ...

online computer tech support

started by shalani mujer on 10 Nov 11 no follow-up yet
shai edrote

They Are the Best Computer Tech Specialists - 1 views

I called Fix Slow Computer Today because I wanted them to fix slow computer fast. I need their expert computer tech specialist to help me with my slow PC problem. I heard they are the best and trus...

Fix Slow Computer

started by shai edrote on 13 Jul 11 no follow-up yet
shalani mujer

Enjoying Worry-Free Computer Use - 1 views

As an executive of a medium-sized company in Oakland, life has always been hectic to me except on weekends. Nevertheless, when I have some work that needs to be rushed, I am forced to do it at home...

tech support enterprise 2.0

started by shalani mujer on 08 Jul 11 no follow-up yet
shayne mosley

Getting Used to Help and Support - 1 views

I have never been used to getting help and support with all my problems. But when it comes to computer problems, I am glad Computer Tech Help And Support is helping me out. Whenever my PC is in tr...

help and support enterprise 2.0

started by shayne mosley on 07 Jun 11 no follow-up yet
seth kutcher

My Trusted PC Tech Support Provider - 2 views

Computer Assistance Online services are the best. They know how to fix all types of computers issues, even the most complicated ones. I was never wrong when I signed up for their computer assistanc...

computer assistance

started by seth kutcher on 19 Sep 11 no follow-up yet
seth kutcher

Certified Expert Remote PC Tech Support Provider! - 1 views

I used to have a slow computer. It would take 10 minutes to boot up and then another 10 minutes to load. It was really a big headache. Good thing I called Remote PC Repair Now . Their remote PC...

remote PC repair

started by seth kutcher on 02 Nov 11 no follow-up yet
fabien Lair

Home - Quora - 0 views

shared by fabien Lair on 10 Feb 15 - Cached
  •  
    Is there an existing site similar to TechCrunch but catered to tech news in China"
Ray Dacteur

De l'importance des mots de passe - Tech' You! - 1 views

  • Laurent Heslault, directeur des technologies de sécurité chez Symantec, y va même de son petit conseil : « les mots de passe, c’est un peu comme un slip, ça se change souvent, mais ça ne se prête pas ! »
  • Laurent Heslault, directeur des technologies de sécurité chez Symantec, y va même de son petit conseil : « les mots de passe, c’est un peu comme un slip, ça se change souvent, mais ça ne se prête pas ! »
Christophe Deschamps

SaaS market will 'collapse' in two years | Tech News on ZDNet - 0 views

  • People are stupid. History has shown it repeats itself, and people make the same mistakes.
    • Christophe Deschamps
       
      A l'ère de la participation voilà quelqu'un qui n'aime pas le politiquement correcte.
Christophe Deschamps

Open-Source Spying - 0 views

  • The spy agencies were saddled with technology that might have seemed cutting edge in 1995.
  • Theoretically, the intelligence world ought to revolve around information sharing. If F.B.I. agents discover that Al Qaeda fund-raising is going on in Brooklyn, C.I.A. agents in Europe ought to be able to know that instantly.
  • Analysts also did not worry about anything other than their corners of the world.
  • ...57 more annotations...
  • When the Orange Revolution erupted in Ukraine in late 2004, Burton went to Technorati, a search engine that scours the “blogosphere,” to find the most authoritative blog postings on the subject. Within minutes, he had found sites with insightful commentary from American expatriates who were talking to locals in Kiev and on-the-fly debates among political analysts over what it meant. Because he and his fellow spies were stuck with outdated technology, they had no comparable way to cooperate — to find colleagues with common interests and brainstorm online.
  • Indeed, throughout the intelligence community, spies are beginning to wonder why their technology has fallen so far behind — and talk among themselves about how to catch up. Some of the country’s most senior intelligence thinkers have joined the discussion, and surprisingly, many of them believe the answer may lie in the interactive tools the world’s teenagers are using to pass around YouTube videos and bicker online about their favorite bands.
  • perhaps, they argue, it’ s time to try something radically different. Could blogs and wikis prevent the next 9/11?
  • during the cold war, threats formed slowly. The Soviet Union was a ponderous bureaucracy that moved at the glacial speed of the five-year plan. Analysts studied the emergence of new tanks and missiles, pieces of hardware that took years to develop.
  • Writing reports was thus a leisurely affair, taking weeks or months; thousands of copies were printed up and distributed via interoffice mail. If an analyst’s report impressed his superiors, they’d pass it on to their superiors, and they to theirs — until, if the analyst was very lucky, it landed eventually in the president’s inner circle.
  • The F.B.I. terminals were connected to one another — but not to the computers at any other agency, and vice versa.
  • If an analyst requested information from another agency, that request traveled through elaborate formal channels. The walls between the agencies were partly a matter of law.
  • Islamist terrorists, as 9/11 proved, behaved utterly unlike the Soviet Union. They were rapid-moving, transnational and cellular.
  • To disrupt these new plots, some intelligence officials concluded, American agents and analysts would need to cooperate just as fluidly — trading tips quickly among agents and agencies. Following the usual chain of command could be fatal. “To fight a network like Al Qaeda, you need to behave like a network,” John Arquilla,
  • This control over the flow of information, as the 9/11 Commission noted in its final report, was a crucial reason American intelligence agencies failed to prevent those attacks. All the clues were there — Al Qaeda associates studying aviation in Arizona, the flight student Zacarias Moussaoui arrested in Minnesota, surveillance of a Qaeda plotting session in Malaysia — but none of the agents knew about the existence of the other evidence. The report concluded that the agencies failed to “connect the dots.”
  • Spies, Andrus theorized, could take advantage of these rapid, self-organizing effects. If analysts and agents were encouraged to post personal blogs and wikis on Intelink — linking to their favorite analyst reports or the news bulletins they considered important — then mob intelligence would take over.
  • Pieces of intel would receive attention merely because other analysts found them interesting. This grass-roots process, Andrus argued, suited the modern intelligence challenge of sifting through thousands of disparate clues: if a fact or observation struck a chord with enough analysts, it would snowball into popularity, no matter what their supervisors thought.
  • What most impressed Andrus was Wikipedia’s self-governing nature. No central editor decreed what subjects would be covered. Individuals simply wrote pages on subjects that interested them — and then like-minded readers would add new facts or fix errors.
  • He pointed out that the best Internet search engines, including Google, all use “link analysis” to measure the authority of documents.
  • Each agency had databases to amass intelligence, but because of the air gap, other agencies could not easily search them. The divisions were partly because of turf battles and partly because of legal restrictions — but they were also technological.
  • This, Burton pointed out, is precisely the problem with Intelink. It has no links, no social information to help sort out which intel is significant and which isn’t. When an analyst’s report is posted online, it does not include links to other reports, even ones it cites.
  • “Analytical puzzles, like terror plots, are often too piecemeal for individual brains to put together. Having our documents aware of each other would be like hooking several brains up in a line, so that each one knows what the others know, making the puzzle much easier to solve.”
  • With Andrus and Burton’s vision in mind, you can almost imagine how 9/11 might have played out differently. In Phoenix, the F.B.I. agent Kenneth Williams might have blogged his memo noting that Al Qaeda members were engaging in flight-training activity. The agents observing a Qaeda planning conference in Malaysia could have mentioned the attendance of a Saudi named Khalid al-Midhar; another agent might have added that he held a multi-entry American visa. The F.B.I. agents who snared Zacarias Moussaoui in Minnesota might have written about their arrest of a flight student with violent tendencies. Other agents and analysts who were regular readers of these blogs would have found the material interesting, linked to it, pointed out connections or perhaps entered snippets of it into a wiki page discussing this new trend of young men from the Middle East enrolling in pilot training.
    • Christophe Deschamps
       
      Peut-être un peu idyllique?
  • “The 16 intelligence organizations of the U.S. are without peer. They are the best in the world. The trick is, are they collectively the best?”
  • in a system like this, as Andrus’s theory goes, the dots are inexorably drawn together. “Once the intelligence community has a robust and mature wiki and blog knowledge-sharing Web space,”
  • From now on, Meyerrose said, each agency would have to build new systems using cheaper, off-the-shelf software so they all would be compatible. But bureaucratic obstacles were just a part of the problem Meyerrose faced. He was also up against something deeper in the DNA of the intelligence services. “We’ve had this ‘need to know’ culture for years,” Meyerrose said. “Well, we need to move to a ‘need to share’ philosophy.”
  • In the fall of 2005, they joined forces with C.I.A. wiki experts to build a prototype of something called Intellipedia, a wiki that any intelligence employee with classified clearance could read and contribute to.
  • By the late summer, Fingar decided the Intellipedia experiment was sufficiently successful that he would embark on an even more high-profile project: using Intellipedia to produce a “national intelligence estimate” for Nigeria. An N.I.E. is an authoritative snapshot of what the intelligence community thinks about a particular state — and a guide for foreign and military policy.
  • But it will also, Fingar hopes, attract contributions from other intelligence employees who have expertise Fingar isn’t yet aware of — an analyst who served in the Peace Corps in Nigeria, or a staff member who has recently traveled there.
  • In the traditional method of producing an intelligence estimate, Fingar said, he would call every agency and ask to borrow their Africa expert for a week or two of meetings. “And they’d say: ‘Well, I only got one guy who can spell Nigeria, and he’s traveling. So you lose.’ ” In contrast, a wiki will “change the rules of who can play,” Fingar said, since far-flung analysts and agents around the world could contribute, day or night.
  • Intelink allows any agency to publish a Web page, or put a document or a database online, secure in the knowledge that while other agents and analysts can access it, the outside world cannot.
  • Rasmussen notes that though there is often strong disagreement and debate on Intellipedia, it has not yet succumbed to the sort of vandalism that often plagues Wikipedia pages, including the posting of outright lies. This is partly because, unlike with Wikipedia, Intellipedia contributors are not anonymous. Whatever an analyst writes on Intellipedia can be traced to him. “If you demonstrate you’ve got something to contribute, hey, the expectation is you’re a valued member,” Fingar said. “You demonstrate you’re an idiot, that becomes known, too.”
  • So why hasn’t Intelink given young analysts instant access to all secrets from every agency? Because each agency’s databases, and the messages flowing through their internal pipelines, are not automatically put onto Intelink. Agency supervisors must actively decide what data they will publish on the network — and their levels of openness vary.
  • It would focus on spotting and predicting possible avian-flu outbreaks and function as part of a larger portal on the subject to collect information from hundreds of sources around the world, inside and outside of the intelligence agencies.
  • Operational information — like details of a current covert action — is rarely posted, usually because supervisors fear that a leak could jeopardize a delicate mission.
  • “See, these people would never have been talking before, and we certainly wouldn’t have heard about it if they did,” the assistant said. By September, the site had become so loaded with information and discussion that Rear Adm. Arthur Lawrence, a top official in the health department, told Meyerrose it had become the government’s most crucial resource on avian flu.
  • Intelink has grown to the point that it contains thousands of agency sites and several hundred databases. Analysts at the various agencies generate 50,000 official reports a year, many of which are posted to the network. The volume of material online is such that analysts now face a new problem: data overload. Even if they suspect good information might exist on Intelink, it is often impossible to find it. The system is poorly indexed, and its internal search tools perform like the pre-Google search engines of the ’90s.“
  • But Meyerrose insists that the future of spying will be revolutionized as much by these small-bore projects as by billion-dollar high-tech systems. Indeed, he says that overly ambitious projects often result in expensive disasters, the way the F.B.I.’s $170 million attempt to overhaul its case-handling software died in 2005 after the software became so complex that the F.B.I. despaired of ever fixing the bugs and shelved it. In contrast, the blog software took only a day or two to get running. “We need to think big, start small and scale fast,” Meyerrose said.
  • But the agency’s officials trained only small groups of perhaps five analysts a month. After they finished their training, those analysts would go online, excited, and start their blogs. But they’d quickly realize no one else was reading their posts aside from the four other people they’d gone through the training with. They’d get bored and quit blogging, just as the next trainees came online.
  • This presents a secrecy paradox. The Unclassified Intellipedia will have the biggest readership and thus will grow the most rapidly; but if it’s devoid of truly sensitive secrets, will it be of any use?
  • Many in the intelligence agencies suspect not. Indeed, they often refuse to input sensitive intel into their own private, secure databases; they do not trust even their own colleagues, inside their own agencies, to keep their secrets safe.
  • These are legitimate concerns. After the F.B.I. agent Robert Hanssen was arrested for selling the identities of undercover agents to Russia, it turned out he had found their names by trawling through records on the case-support system.
  • “When you have a source, you go to extraordinary lengths to protect their identities,” I. C. Smith, a 25-year veteran of the bureau, told me. “So agents never trusted the system, and rightly so.”
  • What the agencies needed was a way to take the thousands of disparate, unorganized pieces of intel they generate every day and somehow divine which are the most important.
  • A spy blogosphere, even carefully secured against intruders, might be fundamentally incompatible with the goal of keeping secrets. And the converse is also true: blogs and wikis are unlikely to thrive in an environment where people are guarded about sharing information. Social software doesn’t work if people aren’t social.
  • the C.I.A. set up a competition, later taken over by the D.N.I., called the Galileo Awards: any employee at any intelligence agency could submit an essay describing a new idea to improve information sharing, and the best ones would win a prize.
  • The first essay selected was by Calvin Andrus, chief technology officer of the Center for Mission Innovation at the C.I.A. In his essay, “The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community,”
  • For the intelligence agencies to benefit from “social software,” he said, they need to persuade thousands of employees to begin blogging and creating wikis all at once. And that requires a cultural sea change: persuading analysts, who for years have survived by holding their cards tightly to their chests, to begin openly showing their hands online.
    • Christophe Deschamps
       
      Un point essentiel. Il faut commencer petit technologiquement et grand humainement!
  • Indeed, Meyerrose’s office is building three completely separate versions of Intellipedia for each of the three levels of secrecy: Top Secret, Secret and Unclassified. Each will be placed on a data network configured so that only people with the correct level of clearance can see them — and these networks are tightly controlled, so sensitive information typed into the Top Secret Intellipedia cannot accidentally leak into the Unclassified one.
  • The chat room was unencrypted and unsecured, so anyone could drop in and read the postings or mouth off. That way, Meyerrose figured, he’d be more likely to get drop-ins by engineers from small, scrappy start-up software firms who might have brilliant ideas but no other way to get an audience with intelligence chiefs. The chat room provoked howls of outrage. “People were like, ‘Hold it, can’t the Chinese and North Koreans listen in?’ ” Meyerrose told me. “And, sure, they could. But we weren’t going to be discussing state secrets. And the benefits of openness outweigh the risks.”
  • Fingar says that more value can be generated by analysts sharing bits of “open source” information — the nonclassified material in the broad world, like foreign newspapers, newsletters and blogs. It used to be that on-the-ground spies were the only ones who knew what was going on in a foreign country. But now the average citizen sitting in her living room can peer into the debates, news and lives of people in Iran. “If you want to know what the terrorists’ long-term plans are, the best thing is to read their propaganda — the stuff out there on the Internet,”
  • Beat cops in Indiana might be as likely to uncover evidence of a terror plot as undercover C.I.A. agents in Pakistan. Fiery sermons printed on pamphlets in the U.K. might be the most valuable tool in figuring out who’s raising money for a possible future London bombing. The most valuable spy system is one that can quickly assemble disparate pieces that are already lying around — information gathered by doctors, aid workers, police officers or security guards at corporations.
  • The premise of spy-blogging is that a million connected amateurs will always be smarter than a few experts collected in an elite star chamber; that Wikipedia will always move more quickly than the Encyclopaedia Britannica; that the country’s thousand-odd political bloggers will always spot news trends more quickly than slow-moving journalists in the mainstream media.
  • In three meetings a day, the officials assess all the intel that has risen to their attention — and they jointly decide what the nation’s most serious threats are.
  • The grass roots, they’ve found, are good at collecting threats but not necessarily at analyzing them. If a lot of low-level analysts are pointing to the same inaccurate posting, that doesn’t make it any less wrong.
  • Without the knowledge that comes from long experience, he added, a fledgling analyst or spy cannot know what is important or not. The counterterrorism center, he said, should decide which threats warrant attention.
  • Many of the officials at the very top, like Fingar, Meyerrose and their colleagues at the office of the director of national intelligence, are intrigued by the potential of a freewheeling, smart-mobbing intelligence community. The newest, youngest analysts are in favor of it, too. The resistance comes from the “iron majors” — career officers who occupy the enormous middle bureaucracy of the spy agencies. They might find the idea of an empowered grass roots to be foolhardy; they might also worry that it threatens their turf.
  • The normal case for social software is failure,” Shirky said. And because Intellipedia is now a high-profile experiment with many skeptics, its failure could permanently doom these sorts of collaborative spy endeavors.
  • It might be difficult to measure contributions to a wiki; if a brilliant piece of analysis emerges from the mob, who gets credit for it?
  • “A C.I.A. officer’s career is advanced by producing reports,”
  • Though D.N.I. officials say they have direct procurement authority over technology for all the agencies, there’s no evidence yet that Meyerrose will be able to make a serious impact on the eight spy agencies in the Department of Defense, which has its own annual $38 billion intelligence budget — the lion’s share of all the money the government spends on spying.
  • if the spies do not join the rest of the world, they risk growing to resemble the rigid, unchanging bureaucracy that they once confronted during the cold war.
  •  
    Article du NY Times qui décrit en détail le projet Intellipedia, avantages, inconvénients,.... Très intéressant pour l'étude de cas de déploiement d'un projet 2.0. les risques et écueils ne sont pas oubliés. D'autant plus utile que c'est sans doute l'un des plus anciens projets de grande envergure de ce type actuellement. 10 pages.
Christophe Deschamps

Entreprise 2.0 en 2011 : la valeur ou le déni ? - 3 views

  • Maintenant il y a loin des discours aux actes et tout dépendra de la capacité de l’entreprise 2.0 à sortir d’une forme de déni d’entreprise. Accepter de parler franchement de valeur, mettre les mains dans les sujets complexes et sensibles de la mécanique productive, sortir de la vision idéaliste et angélique d’une entreprise rêvée menée par la passion, l’ouverture et les bons sentiments seront des sujets clé en 2011.
  • C’est ce qu’il nomme la mise en capacité de l’organisation par la technologie (ou tech-enabled organization). Ce mode de fonctionnement étant rendu souhaitable, voire nécessaire, par la transformation des modes de travail induite par l’évolution de notre économie et des modèles de création de valeur, on a essayé d’implanter ces fameux outils dans l’entreprise. Souvent en vain. On s’est alors rendu compte (pour ceux qui en doutaient) que l’outil n’était qu’un facilitateur
  • il est devenu évident qu’il fallait s’attaquer en profondeur à la structure du travail et de l’organisation (voir mes “prédictions” 2009 et 2010), à la fois pour rendre les choses possibles et pour s’assurer du bénéfice de l’opération en termes de création de valeur. Ce qui a amené un certain consensus courant 2010 vers la nécessité de s’attaquer, entre autres, aux business process à la fois pour des raisons d’alignement et d’impact sur la valeur.
  • ...12 more annotations...
  • Récapitulons : • Prise de conscience qu’il faut s’attaquer aux rouages, à la mécanique de l’organisation • Prise de conscience qu’il faut articuler les dynamiques “hors flux” et “dans le flux” de travail (in the flow et above the flow pour les érudits). • Prise de conscience qu’il faut aller au delà des simples dynamiques communautaires. • Développement, par ailleurs, d’un grand savoir faire sur la mise en place de ces dynamiques communautaires. Soyons honnêtes : on a les best practices, des monceaux de méthodologie, des cas à foison et des outils pour supporter le tout. On sait faire fonctionner des communautés et ce qui donne le sentiment contraire, fait penser que la réussite dans ce domaine est rare, c’est qu’on veut transformer en communautés ce qui n’en n’est pas (d’où l’intérêt d’aller voir au delà…). • On a des outils qui tiennent la route.
  • N’avez vous pas remarqué que finalement peu de choses nouvelles vraiment intéressantes ont été dites ou écrites ces derniers mois (j’ai dit “peu”…pas “pas”) ? Qu’on pourrait republier nos billets d’il y a un an sans que personne ne s’en rende compte ? Deux reponses à cela : soit nous étions quelques visionnaires vraiment en avance…soit rien n’a changé. Et je penche plutôt pour la seconde solution.
  • La raison ? Le microcosme 2.0 se complait dans une forme d’angélisme fondé sur une sorte de “flower power management” qui aurait été de bon teint dans les années 70. Tout doit n’être qu’engagement volontaire, passion, démonstration, engouement. Le process c’est le vieux monde et c’est sale. La valeur et l’argent aussi. Le ROI n’en parlons pas. Il y a un point de basculement a passer, des choses à acter, une direction à prendre mais au delà du consensus mou il y a une gêne évidente. On rechigne a abandonner le territoire de l’entreprise confraternelle idéalisée pour mettre le bleu de chauffe et aller réparer la chaudière et la tuyauterie dans la salle des machines.
  • quelques tendances fortes pour 2011 :
  • 1°) Futile : Beaucoup de temps et d’énergie seront gaspillés à discuter les mérites respectifs de l’entreprise 2.0 et du social business. Ca évitera de parler d’autre chose et laissera les entreprises dans un doute encore plus profond qu’aujourd’hui.
  • 2°) Stratégique : soit l‘entreprise 2.0 reste dans le déni de réalité soit elle met les mains dans le cambouis. Dans le second cas on sera encore là pour parler du sujet dans un an ou deux, avec des résultats tangibles et mesurables, dans le premier les entreprises se seront lassées avant.
  • Avoir le courage de parler des sujets qui font peur : redéfinir le travail, la manière dont on évalue la contribution de chacun à la création de valeur, dont on rémunère les gens en fonction, trouver des indicateurs financiers et comptables pertinents pour rendre les modes de fonctionnement nouveaux acceptables.
  • Assumer le fait que soit on parle d’un projet stratégique d’entreprise qui doit s’imposer à tous, ce qui implique d’assumer ses choix et avoir le courage d’en tirer toutes les conséquences, soit on est dans le nice to have cosmétique et se demander si l’énergie et l’argent dépensés en valent la peine.
  • Et attendons à entendre des choses du genre “pour faire les malins avec des médias sociaux et avoir des discussions sympas y’a du monde, pour régler des vrais problèmes business y’a plus personne”. Et ça sera mérité.
  • On ne transformera pas l’essai tant que les “outils sociaux” constitueront une bulle à part, seront indépendants du reste des outils de l’entreprise. Devoir dire à un utilisateur : “rendez vous sur tel outil” c’est déjà perdre la partie.
  • intégration avec toute type d’outil du SI traditionnel et possibilité d’utiliser (et enrichir)les fonctionnalités de l’application en tant que services hors de l’application, au sein d’une couche sociale commune à l’ensemble du SI.
  • Une entreprise est une structure économique et sociale qui regroupe des moyens humains, matériels, immatériels (service) et financiers, qui sont combinés de manière organisée pour fournir des biens ou des services à des clients dans un environnement concurrentiel (le marché) ou non concurrentiel (le monopole) avec un objectif de rentabilité.
  •  
    Excellent billet de @bduperrin
sally pearson

Renewing My Remote Computer Help Subscription - 3 views

My friend recommended ComputerHelpFastOnline - an emerging team of computer savvy tech support professionals - to provide computer help for my business. Thank God I heeded his words because since I...

computer help enterprise 2.0

started by sally pearson on 06 Jun 11 no follow-up yet
shai edrote

They Helped Me With My PC Issues - 1 views

I need computer help and I really need it fast! I am in the middle of doing something important on my laptop when it suddenly froze up and shut down. I do not know what is wrong. All I know is that...

need computer help

started by shai edrote on 12 Sep 11 no follow-up yet
Miguel Membrado

Cisco ruffles feathers with new collaboration tools | Business Tech - CNET News - 2 views

  •  
    a new competitor in the field.
  •  
    a new competitor in the field.
1 - 20 of 23 Next ›
Showing 20 items per page