John Hagel III co-author of the book “The Power of Pull” was invited on stage for a discussion with Dr. Pehong Chen, CEO of BroadVision about how companies are (or are not) adopting of social technologies at the Enterprise 2.0 conference in Santa Clara yesterday. I am a big fan of him and his latest book, so I took notes on how he sees companies resolving these difficulties. Continue reading
Category Archives: Social Network
Parent-Teacher-Student Collaboration
Normally I would look for the best examples of coordination technology at the most advanced high tech companies in silicon valley. Doing so would miss one of the best deployments of coordination technology. Who would expect to find it in our public schools? Continue reading
Bring Your Own Cloud to Work
Personal Cloud was the unusual subject of Frank Gillett’s talk at Forrester Forum this week. Traditional IT: prepare for something deeply disturbing, yet inevitable. It is important to understand this to see where Adaptive Case Management(ACM) will be going in the future. Look for a few related posts to come out soon. Continue reading
Untamed Processes at BPM Forum 2011
Craig Le Clair shared the stage this morning with Steven J Spear (author of the book “Chasing the Rabbit” and new book “The High-Velocity Edge“) to talk about complex business situations and how to support them. Continue reading
Social BPM – Book Review
The book “Social BPM: Work, Planning and Collaboration Under the Impact of Social Technology” was released in June, and I became more enthusiastic the more I read. Here is my review of the chapters of this very timely book. Continue reading
Self-Organizing Business Networks
As the Social Business meme becomes more mainstream, people are starting to ask “What is the real connection with ‘Social’ after all?” and “Isn’t the connection to ‘Social’ a bit overblown?” After all, we really are not talking about literally placing Facebook (as the canonical example) inside a business. Why, then, call it social? Continue reading
Web Security vs. Superstition, Part 3
Web site security is a very important issue to me. I find it frustrating sometimes dealing with people who operate based more on superstition and urban legends than on solid principles. Part 3 is about an experience I had with a public forum, and their justification for deviating from these guidelines. Continue reading
Web Security vs. Superstition, Part 2
Web site security is a very important issue to me. I find it frustrating sometimes dealing with the “security experts” in IT who operate based more on superstition and urban legends than on solid principles. Part 2 is in response to my meeting with such a “security expert”.
Continue reading
Social BPM Update
For the record, I am not a big fan of the buzz term “Social BPM” but there is no denying that is capturing a lot of mind-share in recent weeks. Still, I am looking forward to the Social BPM TweetJam in tomorrow, on July 21, 11:45 Eastern time, and here is a refresher on recent posts on the topic. Continue reading
Andrew McAfee on Enterprise 2.0
Andrew McAfee spoke today at the IDC Directions 11 event in San Jose as the closing keynote. It is the first time I have seen him speak live, and came away quite impressed. Below are my notes on his talk titled “The State of an Art.” Continue reading