FBI plans social network map alert mash-up application

Posted by & filed under App Economy, Electronic Surveillance, IT Security.

Discussion:  The FBI is designing an application that will combine information from many different social networking sites (such as Twitter and Facebook), highlight areas of interest or security concerns, and overlay them onto a map that could hypothetically show where different threats are located.  The FBI states that this is not an invasion of privacy… Read more »

MySpace sale offers tough lessons in social networking

Posted by & filed under Competitive Advantage, IT Trends, Social Networks.

Discussion: Six years after News Corp acquired MySpace, they sold it for $545 million less than their original purchase price.  MySpace is different from other social networking sites (like Facebook and Twitter) because it was founded by people from the entertainment industry who struggled with the technology needed to make the company successful as it… Read more »

Social media and the security risks they pose for business

Posted by & filed under Business Analytics, Business Intelligence, Cyber Security, E-Business, Interview, IT Governance, IT Infrastructure, IT Security, IT Strategy, Social Computing, Social Networks.

Discussion: As more and more businesses see the value in social media applications like Twitter and Facebook, they face a big dilemma: allow these applications to go through their current network without the proper security infrastructure or block them altogether.  Nir Zuk, co-founder and CTO of Palo Alto Networks, says the next big thing in… Read more »

Social Networks Offer a Way to Narrow the Field of Friends

Posted by & filed under App Economy, Business Analytics, Business Intelligence, IT Strategy, IT Trends, Privacy, Social Computing, Social Networks.

Discussion: Sometimes the day-to-day random events in life should not necessarily be shared with the large audience of colleagues and acquaintances on Facebook, so a host of more private, intimate social networks are emerging on the Web.  Path, a service that allows users to share pictures, videos, and messages with friend groups up to 50,… Read more »

10 Key Twitter Apps

Posted by & filed under App Economy, IT Trends, Mobile Computing, No Discussion Questions, Social Computing, Social Networks.

With more than 200 million users and an average of 140 million tweets daily, Twitter’s numbers are impressive for a company five years young.  But equally notable are the hundreds of thousands of applications multiplying in the wake of Twitter’s success. Source: Newsweek.com Date: April 4, 2011 Link: http://www.newsweek.com/2011/04/04/apps-born-from-twitter.all.html

Online photos: Are they the new digital fingerprint?

Posted by & filed under Cyber Security, IT Security, IT Standards, Privacy, Social Computing, Social Networks.

Discussion: Digital photos on the Web may contain information revealing where and when the shot was taken and might even lead to the identification of the faces in the photo.  Coye Cheshire, A UC Berkeley professor, is researching people’s perceptions of the pictures they post online and he’s learning that people tend to perceive a… Read more »

Conan 2.0

Posted by & filed under Business Intelligence, E-Business, IT Strategy, Mobile Computing, Social Computing, Social Networks, Web 2.0, Wireless.

Discussion: How does a self-proclaimed computer Luddite go from host of The Tonight Show to unemployed to a sold-out national comedy tour?  The power of social media transformed Conan O’Brien’s career from a late night television host with no show to an improv sensation on stages across the country.  And the numbers are impressive: Conan,… Read more »

Sites Like Twitter Absent From Free Speech Pact

Posted by & filed under Business Analytics, Business Intelligence, Civil Liberties, E-Business, IT Governance, IT Standards, IT Strategy, Privacy, Search Engine, Social Computing, Social Networks.

Discussion: In 2008 human rights groups and politicians condemned top Internet companies for complying with China’s restrictive laws and censorship requirements.  In response, Google, Microsoft, and Yahoo signed a code of conduct intended to protect online free speech and privacy in restrictive countries and hoped other technology firms would follow suit.  But social media giants… Read more »