Upload
kannan-subbiah
View
1.179
Download
0
Embed Size (px)
DESCRIPTION
Presented this at the Study Circle of SIRC of ICAI on July 13th.
Citation preview
Social Computing ndash The Promise and the Perils
Kannan Subbiah FCA CISA
Sr Manager - Solution Architecture
Knowledge Universe Technologies India Pvt Ltd Chennai
Agenda
The Revolution
The Evolution
The Drivers
The Promises
The Perils
Conclusion
The Revolution
Social Media ndash A Fad
bull Mobile phones double up as internet
access device
bull Digital Cameras have the ability to
connect to internet and share photos
bull TVs double up as PCs
bull Gadget manufacturers are now
thinking of engaging the Social Media
Fans some how
Something meaningful is happening
world is becoming interconnected
It affects everyone hellip
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Agenda
The Revolution
The Evolution
The Drivers
The Promises
The Perils
Conclusion
The Revolution
Social Media ndash A Fad
bull Mobile phones double up as internet
access device
bull Digital Cameras have the ability to
connect to internet and share photos
bull TVs double up as PCs
bull Gadget manufacturers are now
thinking of engaging the Social Media
Fans some how
Something meaningful is happening
world is becoming interconnected
It affects everyone hellip
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Revolution
Social Media ndash A Fad
bull Mobile phones double up as internet
access device
bull Digital Cameras have the ability to
connect to internet and share photos
bull TVs double up as PCs
bull Gadget manufacturers are now
thinking of engaging the Social Media
Fans some how
Something meaningful is happening
world is becoming interconnected
It affects everyone hellip
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Social Media ndash A Fad
bull Mobile phones double up as internet
access device
bull Digital Cameras have the ability to
connect to internet and share photos
bull TVs double up as PCs
bull Gadget manufacturers are now
thinking of engaging the Social Media
Fans some how
Something meaningful is happening
world is becoming interconnected
It affects everyone hellip
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Something meaningful is happening
world is becoming interconnected
It affects everyone hellip
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
world is becoming interconnected
It affects everyone hellip
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
It affects everyone hellip
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Social Media Revolution
A Flash Movie
httpyoutubeQzZyUaQvpdc
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Social Networking in real world
Conferences Meetings
Specific reference from friends
Campaigns Road shows to reach newer customers
Social get together
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 1930
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 1969
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 1978
Ward Christensen
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 1989
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 1989
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 1999
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2003
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2004
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2004
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2006
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2007
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2007
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2008
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Evolution ndash 2010
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Drivers
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Internet Growth
High Speed Internet
Evolution of Powerful PCs
Other devices
Evolution of Web technologies
Open Source development tools
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Rich Media
Photos amp Photo tagging
Videos amp Video tagging
Personalized content
Highly intuitive applications
Online Games
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Services Orientation
APIs to extend interaction with Applications
Identity Sharing
Profile sharing
Content posting
Friend Lists
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Tools amp Technologies
Web 20
Open Source Tools
Open Standards
Platform for developers
Platform for business entities
Cloud
Distributed computing
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
The Promises
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
You are the Ad
Higher reach
The power of referrals
Rich media support
Know better about the target customers
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Power of Communities
Increased Trust
73 of the Fortune 100 companies use LinkedInrsquos hiring solutions
Used for background checks
New Opportunities and businesses
Brand building
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Drives the Web
A model based on the connections between people and all the things they care
about
Well on its way to being built and providing value to both users and developers mdash
the underlying graph of connections just needs to be mapped in a way that makes it
easy to use and interoperable
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Proof of Concepts
3 billion photos uploaded each month
Biggest photo site ndash bigger than all other photo sites added up
Over 250 Applications
A million users every month
80000 connect implementation
Interconnected data ndash a challenge for partitioning
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Enablers
Expansion of SaaS beyond traditional
business applications due for instance to
cloud computing
Increasing mobility thanks to wireless
technology
Virtualization and Portability of data to
support mobility but also to cut storage costs
Conthellip
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Enablers
Social networking on top of Web 20 tools that ―has become a way to leverage
enterprise knowledge customer-based business intelligence and more
Web and video collaboration that are expected to be adopted by a majority of
companies
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Other benefits
Old Friends
Society and new friends
Jobs and opportunities
Activities and hobbies
Matrimony
Pictures video and entertainment
Geo Tagging
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Privacy
Content shared across diverse
communities
Applications being granted access to your
profile data
Security holes in the third party APIs
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Data Leak
Legal Regulatory and Financial Impacts
Damage to Image and Credibility
Loss of Competitive Advantage
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Addiction
Drop in productivity at work and at home
End up with unwanted unhealthy acquaintances
Changed the way of interactions
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Primary Attack Vectors
Phishing
Malicious Content Applications
Increasing monitoring amp control needs
Not Just Technology that can help
Identity Theft
Using same password for all websites
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Cyber Warfare
Easy to build and groom a community
Deploy malicious applications to steal
profile information
Politically motivated foreign nation attacks
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
China ndash Cyber warfare
―Just as nuclear warfare was the strategic war of the industrial era cyber-warfare has
become the strategic war of the information era and this has become a form of
battle that is massively destructive and concerns the life and death of nations
Source TNW Asia June 03 2011
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Enterprise Challenges
Bandwidth Management
Content Filtering
Inappropriate content in the workplace
Managing Streaming Video
Forbidden files on to the network
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Enterprise View
Situation is not new
When World Wide Web took off
When Gaming took off
Camera Mobiles
ldquoWe donrsquot have a choice on whether we DO social
media the question is how well we DO ITrdquo
- Erik Qualman
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Conclusion
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Quote - 1
―More companies are discovering that an uumlber-connected workplace is not just about
implementing a new set of tools mdash it is also about embracing a cultural shift to
create an open environment where employees are encouraged to share innovate
and collaborate virtually
ndash Karie Willyerd amp Jeanne C Meister HarvardBusinessorg
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Quote - 2
―We dont monitor what Intel staff do in social media but we do have lots of support
services for them Facebook is important to Intel because it is a place where people
can get advice We have more than 80 thousand fans on Facebook There is a
return on investment in social media Its hard but its not true that you cannot
calculate an ROI
- by Ekaterina Walter social media strategist at Intel
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Quotes - 3
Organisations IT departments will need help in planning against and managing social
media threats - so businesses operations can safely enjoy the benefits―
- Andrew Mckeeve COO at Bluesource
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
CIO Speak
―Earlier our organization was also against social media owing to apprehension of
employee productivity loss but now we have started taking baby steps to use social
media
- Umesh Jain CIO YES Bank
―we neither have any separate social media policy nor do we feel the need to have any
But we have a set of guidelines for the code of conduct to be followed strictly by each
people
- Anoop Handa CIO Fullerton Securities
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
How to be Safe
If an offer sounds too good to be true it probably is
If you cant think of a good reason you were singled out for a windfall its probably a
scam
Dont believe things just because they are stated in e-mail or on Web sites
Dont click on alluring links without thinking through the possible consequences
Never provide personal or company information unless you are certain of the identity
and authority of the person requesting it
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
How to be Safe
Never reveal personal and financial information via e-mail or by following links to sites to
enter such information
If you doubt the legitimacy of e-mail contact the sender by a separate channel you look up
Check URLs of sites you visit to be sure they are the URLs you actually want not a similarly
named ones that may be malicious
Dont send sensitive information over the Internet if you arent confident of the sites security
Be suspicious of unsolicited phone calls and e-mails seeking information about your business
and employees
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Finally
Social is all about providing context a rich environment of data points that a streamlined
workflow would be lacking otherwise
The challenge is to make this context useful both from a social networking perspective and
from an unstructured data perspective
Thank You
reach me kannavsnlcom
Thank You
reach me kannavsnlcom