54
Social Computing The Promise and the Perils Kannan Subbiah FCA, CISA Sr. Manager - Solution Architecture Knowledge Universe Technologies India Pvt Ltd, Chennai

Social Computing – The Promise And The Perils Final

Embed Size (px)

DESCRIPTION

Presented this at the Study Circle of SIRC of ICAI on July 13th.

Citation preview

Page 1: Social Computing – The Promise And The Perils Final

Social Computing ndash The Promise and the Perils

Kannan Subbiah FCA CISA

Sr Manager - Solution Architecture

Knowledge Universe Technologies India Pvt Ltd Chennai

Agenda

The Revolution

The Evolution

The Drivers

The Promises

The Perils

Conclusion

The Revolution

Social Media ndash A Fad

bull Mobile phones double up as internet

access device

bull Digital Cameras have the ability to

connect to internet and share photos

bull TVs double up as PCs

bull Gadget manufacturers are now

thinking of engaging the Social Media

Fans some how

Something meaningful is happening

world is becoming interconnected

It affects everyone hellip

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 2: Social Computing – The Promise And The Perils Final

Agenda

The Revolution

The Evolution

The Drivers

The Promises

The Perils

Conclusion

The Revolution

Social Media ndash A Fad

bull Mobile phones double up as internet

access device

bull Digital Cameras have the ability to

connect to internet and share photos

bull TVs double up as PCs

bull Gadget manufacturers are now

thinking of engaging the Social Media

Fans some how

Something meaningful is happening

world is becoming interconnected

It affects everyone hellip

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 3: Social Computing – The Promise And The Perils Final

The Revolution

Social Media ndash A Fad

bull Mobile phones double up as internet

access device

bull Digital Cameras have the ability to

connect to internet and share photos

bull TVs double up as PCs

bull Gadget manufacturers are now

thinking of engaging the Social Media

Fans some how

Something meaningful is happening

world is becoming interconnected

It affects everyone hellip

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 4: Social Computing – The Promise And The Perils Final

Social Media ndash A Fad

bull Mobile phones double up as internet

access device

bull Digital Cameras have the ability to

connect to internet and share photos

bull TVs double up as PCs

bull Gadget manufacturers are now

thinking of engaging the Social Media

Fans some how

Something meaningful is happening

world is becoming interconnected

It affects everyone hellip

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 5: Social Computing – The Promise And The Perils Final

Something meaningful is happening

world is becoming interconnected

It affects everyone hellip

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 6: Social Computing – The Promise And The Perils Final

world is becoming interconnected

It affects everyone hellip

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 7: Social Computing – The Promise And The Perils Final

It affects everyone hellip

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 8: Social Computing – The Promise And The Perils Final

Social Media Revolution

A Flash Movie

httpyoutubeQzZyUaQvpdc

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 9: Social Computing – The Promise And The Perils Final

The Evolution

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 10: Social Computing – The Promise And The Perils Final

Social Networking in real world

Conferences Meetings

Specific reference from friends

Campaigns Road shows to reach newer customers

Social get together

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 11: Social Computing – The Promise And The Perils Final

The Evolution ndash 1930

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 12: Social Computing – The Promise And The Perils Final

The Evolution ndash 1969

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 13: Social Computing – The Promise And The Perils Final

The Evolution ndash 1978

Ward Christensen

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 14: Social Computing – The Promise And The Perils Final

The Evolution ndash 1989

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 15: Social Computing – The Promise And The Perils Final

The Evolution ndash 1989

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 16: Social Computing – The Promise And The Perils Final

The Evolution ndash 1999

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 17: Social Computing – The Promise And The Perils Final

The Evolution ndash 2003

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 18: Social Computing – The Promise And The Perils Final

The Evolution ndash 2004

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 19: Social Computing – The Promise And The Perils Final

The Evolution ndash 2004

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 20: Social Computing – The Promise And The Perils Final

The Evolution ndash 2006

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 21: Social Computing – The Promise And The Perils Final

The Evolution ndash 2007

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 22: Social Computing – The Promise And The Perils Final

The Evolution ndash 2007

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 23: Social Computing – The Promise And The Perils Final

The Evolution ndash 2008

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 24: Social Computing – The Promise And The Perils Final

The Evolution ndash 2010

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 25: Social Computing – The Promise And The Perils Final

The Drivers

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 26: Social Computing – The Promise And The Perils Final

Internet Growth

High Speed Internet

Evolution of Powerful PCs

Other devices

Evolution of Web technologies

Open Source development tools

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 27: Social Computing – The Promise And The Perils Final

Rich Media

Photos amp Photo tagging

Videos amp Video tagging

Personalized content

Highly intuitive applications

Online Games

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 28: Social Computing – The Promise And The Perils Final

Services Orientation

APIs to extend interaction with Applications

Identity Sharing

Profile sharing

Content posting

Friend Lists

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 29: Social Computing – The Promise And The Perils Final

Tools amp Technologies

Web 20

Open Source Tools

Open Standards

Platform for developers

Platform for business entities

Cloud

Distributed computing

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 30: Social Computing – The Promise And The Perils Final

The Promises

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 31: Social Computing – The Promise And The Perils Final

You are the Ad

Higher reach

The power of referrals

Rich media support

Know better about the target customers

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 32: Social Computing – The Promise And The Perils Final

Power of Communities

Increased Trust

73 of the Fortune 100 companies use LinkedInrsquos hiring solutions

Used for background checks

New Opportunities and businesses

Brand building

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 33: Social Computing – The Promise And The Perils Final

Drives the Web

A model based on the connections between people and all the things they care

about

Well on its way to being built and providing value to both users and developers mdash

the underlying graph of connections just needs to be mapped in a way that makes it

easy to use and interoperable

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 34: Social Computing – The Promise And The Perils Final

Proof of Concepts

3 billion photos uploaded each month

Biggest photo site ndash bigger than all other photo sites added up

Over 250 Applications

A million users every month

80000 connect implementation

Interconnected data ndash a challenge for partitioning

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 35: Social Computing – The Promise And The Perils Final

Enablers

Expansion of SaaS beyond traditional

business applications due for instance to

cloud computing

Increasing mobility thanks to wireless

technology

Virtualization and Portability of data to

support mobility but also to cut storage costs

Conthellip

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 36: Social Computing – The Promise And The Perils Final

Enablers

Social networking on top of Web 20 tools that ―has become a way to leverage

enterprise knowledge customer-based business intelligence and more

Web and video collaboration that are expected to be adopted by a majority of

companies

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 37: Social Computing – The Promise And The Perils Final

Other benefits

Old Friends

Society and new friends

Jobs and opportunities

Activities and hobbies

Matrimony

Pictures video and entertainment

Geo Tagging

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 38: Social Computing – The Promise And The Perils Final

Privacy

Content shared across diverse

communities

Applications being granted access to your

profile data

Security holes in the third party APIs

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 39: Social Computing – The Promise And The Perils Final

Data Leak

Legal Regulatory and Financial Impacts

Damage to Image and Credibility

Loss of Competitive Advantage

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 40: Social Computing – The Promise And The Perils Final

Addiction

Drop in productivity at work and at home

End up with unwanted unhealthy acquaintances

Changed the way of interactions

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 41: Social Computing – The Promise And The Perils Final

Primary Attack Vectors

Phishing

Malicious Content Applications

Increasing monitoring amp control needs

Not Just Technology that can help

Identity Theft

Using same password for all websites

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 42: Social Computing – The Promise And The Perils Final

Cyber Warfare

Easy to build and groom a community

Deploy malicious applications to steal

profile information

Politically motivated foreign nation attacks

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 43: Social Computing – The Promise And The Perils Final

China ndash Cyber warfare

―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has

become the strategic war of the information era and this has become a form of

battle that is massively destructive and concerns the life and death of nations

Source TNW Asia June 03 2011

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 44: Social Computing – The Promise And The Perils Final

Enterprise Challenges

Bandwidth Management

Content Filtering

Inappropriate content in the workplace

Managing Streaming Video

Forbidden files on to the network

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 45: Social Computing – The Promise And The Perils Final

Enterprise View

Situation is not new

When World Wide Web took off

When Gaming took off

Camera Mobiles

ldquoWe donrsquot have a choice on whether we DO social

media the question is how well we DO ITrdquo

- Erik Qualman

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 46: Social Computing – The Promise And The Perils Final

Conclusion

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 47: Social Computing – The Promise And The Perils Final

Quote - 1

―More companies are discovering that an uumlber-connected workplace is not just about

implementing a new set of tools mdash it is also about embracing a cultural shift to

create an open environment where employees are encouraged to share innovate

and collaborate virtually

ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 48: Social Computing – The Promise And The Perils Final

Quote - 2

―We dont monitor what Intel staff do in social media but we do have lots of support

services for them Facebook is important to Intel because it is a place where people

can get advice We have more than 80 thousand fans on Facebook There is a

return on investment in social media Its hard but its not true that you cannot

calculate an ROI

- by Ekaterina Walter social media strategist at Intel

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 49: Social Computing – The Promise And The Perils Final

Quotes - 3

Organisations IT departments will need help in planning against and managing social

media threats - so businesses operations can safely enjoy the benefits―

- Andrew Mckeeve COO at Bluesource

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 50: Social Computing – The Promise And The Perils Final

CIO Speak

―Earlier our organization was also against social media owing to apprehension of

employee productivity loss but now we have started taking baby steps to use social

media

- Umesh Jain CIO YES Bank

―we neither have any separate social media policy nor do we feel the need to have any

But we have a set of guidelines for the code of conduct to be followed strictly by each

people

- Anoop Handa CIO Fullerton Securities

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 51: Social Computing – The Promise And The Perils Final

How to be Safe

If an offer sounds too good to be true it probably is

If you cant think of a good reason you were singled out for a windfall its probably a

scam

Dont believe things just because they are stated in e-mail or on Web sites

Dont click on alluring links without thinking through the possible consequences

Never provide personal or company information unless you are certain of the identity

and authority of the person requesting it

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 52: Social Computing – The Promise And The Perils Final

How to be Safe

Never reveal personal and financial information via e-mail or by following links to sites to

enter such information

If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up

Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly

named ones that may be malicious

Dont send sensitive information over the Internet if you arent confident of the sites security

Be suspicious of unsolicited phone calls and e-mails seeking information about your business

and employees

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 53: Social Computing – The Promise And The Perils Final

Finally

Social is all about providing context a rich environment of data points that a streamlined

workflow would be lacking otherwise

The challenge is to make this context useful both from a social networking perspective and

from an unstructured data perspective

Thank You

reach me kannavsnlcom

Page 54: Social Computing – The Promise And The Perils Final

Thank You

reach me kannavsnlcom