Open source code of the reddit social news ranking site. Might be interesting to use as a basis for an enterprise tool for ranking pages on an intranet.
While some organizations are still considering a basic social media facelift for their intranet, perhaps incorporating some blogs for corporate communication or a wiki area for some shared content authoring, it's almost certain that this is too little and too late for many companies. Over the last three years, the world has undergone a social media revolution that has changed the behaviors of most of the developed world that have gone on to be validated as beneficial for the workplace.
At the Microsoft Management Summit (MMS), the company announced that it has released a beta of a tool to let IT manage iPhones, iPads, Android devices, Symbian devices, and Windows Phone 7 devices in the enterprise. Up until now, the tool only worked for Windows Mobile.
The tool is called System Center Configuration Manager (SCCM), and it's designed to deploy and update servers, clients, and devices across an enterprise's entire computing and network infrastructure.
"In our "Social Knows" series, we sniff out and compile statistics and research regarding workplace / workforce management, human resources and employee engagement. The goal is to provide you with the background knowledge necessary to support your own recommendations, findings and strategies. Submissions always welcomed."
Chris Anderson, the founder of TED, describes his battles with email and strategies for minimizing its impact on yourself and those to whom you send email.
"Paradoxically, 'document-orientation' is both the main reason why Wikis are rare in the corporate world and the main reason why Wikis are great for the corporate world."
encryption, as a preventive measure, assumes the primary threat is coming from the "outside" - typically (but not exclusively), in the form of a hacker trying to intercept communications or extract data from a lost or stolen device. While such threats are real and you absolutely must guard against them, we've reached a crucial point in the evolution of mobile technology, and just as importantly, user behavior where the primary mobile security threat is no longer the faceless and malicious hacker, but instead the legitimate, fully authenticated owner of the device itself.