Remove Metadata Remove Open Source Remove Social Media Remove Strategy
article thumbnail

Intranet Blog :: E-mail fatigue

Buzz Marketing for Technology

© 2006 Prescient Digital Media. Previous: Open source solutions. The Enterprise Strategy Group (ESG) reports that as much as 75 percent of most companiesâ?? intellectual property is contained in the messages and attachments they send through their e-mail systems (source: Message Therapy, CIO Magazine, January, 2005).

Wiki 189
article thumbnail

The FASTForward Blog " Managing Personal Knowledge: Setting a Foundation for Transformation? : Enterprise 2.0 Blog: News, Coverage, and Commentary

Buzz Marketing for Technology

Japanese Business Culture & Social Computing. fix Social Security? Old Media meets Social Media - KETC and the Mortgage Crisis - On the edge of launch. New Open FAST-SharePoint Search Bits Post @ MSFT Codeplex. open source. Social Computing. Social Media. Measurement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Facebook Filed for a Trademark on the Word Meta. You Should See the Description.

Bill Hartzer

G & S: Downloadable software in the nature of a mobile application; Computer hardware; Downloadable software for social networking and creating and interacting with online communities; Downloadable software for creating, managing and accessing groups within virtual communities; Software development tools; Downloadable software to enable development, (..)

article thumbnail

FedRAMP Certification: What Is It, Why It Matters, and Who Has It

Hootsuite

Bonus: Read the step-by-step social media strategy guide with pro tips on how to grow your social media presence. government’s “Cloud First” strategy. That strategy required agencies to look at cloud-based solutions as a first choice. the flow of information and metadata. That’s why the U.S.

article thumbnail

Computer Security for NGOs

Little Web Giants

In an era when government spying, corporate hacking scandals, major security flaws, online stalking and social media shaming are rarely out of the headlines, it can seem like the internet has grown up into a deep dark forest, with wolves lurking behind every tree. Who’s afraid of the big bad wolf? Government Spying.

article thumbnail

Computer Security for NGOs

Little Web Giants

In an era when government spying, corporate hacking scandals, major security flaws, online stalking and social media shaming are rarely out of the headlines, it can seem like the internet has grown up into a deep dark forest, with wolves lurking behind every tree. Who’s afraid of the big bad wolf? Government Spying.

article thumbnail

Computer Security for NGOs

Little Web Giants

In an era when government spying, corporate hacking scandals, major security flaws, online stalking and social media shaming are rarely out of the headlines, it can seem like the internet has grown up into a deep dark forest, with wolves lurking behind every tree. Who’s afraid of the big bad wolf? Government Spying.