John Hagel on Social Technology Adoption

John Hagel III co-author of the book “The Power of Pull” was invited on stage for a discussion with Dr. Pehong Chen, CEO of BroadVision about how companies are (or are not) adopting of social technologies at the Enterprise 2.0 conference in Santa Clara yesterday. I am a big fan of him and his latest book, so I took notes on how he sees companies resolving these difficulties. Continue reading

Parent-Teacher-Student Collaboration

Normally I would look for the best examples of coordination technology at the most advanced high tech companies in silicon valley. Doing so would miss one of the best deployments of coordination technology. Who would expect to find it in our public schools?  Continue reading

Bring Your Own Cloud to Work

Personal Cloud was the unusual subject of Frank Gillett’s talk at Forrester Forum this week.  Traditional IT: prepare for something deeply disturbing, yet inevitable.  It is important to understand this to see where Adaptive Case Management(ACM) will be going in the future.  Look for a few related posts to come out soon.  Continue reading

Self-Organizing Business Networks

As the Social Business meme becomes more mainstream, people are starting to ask “What is the real connection with ‘Social’ after all?”  and “Isn’t the connection to ‘Social’ a bit overblown?”  After all, we really are not talking about literally placing Facebook (as the canonical example) inside a business.  Why, then, call it social? Continue reading

Web Security vs. Superstition, Part 3

Web site security is a very important issue to me. I find it frustrating sometimes dealing with people who operate based more on superstition and urban legends than on solid principles.  Part 3 is about an experience I had with a public forum, and their justification for deviating from these guidelines. Continue reading

Web Security vs. Superstition, Part 2

Web site security is a very important issue to me. I find it frustrating sometimes dealing with the “security experts” in IT who operate based more on superstition and urban legends than on solid principles.  Part 2 is in response to my meeting with such a “security expert”. Continue reading