Deciphering Social Networks (ID: ERS0806)
Mike Gotta (Burton Group)
Adoption and usage data regarding social networking trends by consumers has convinced many business and IT leadership teams that social network sites, and their technological underpinnings, can be viewed as viable usage models to satisfy the communication, information sharing, and collaboration needs of the enterprise. In addition, strategists believe that the technology that supports such sites should be considered a credible technological model to help guide internal deployments. Higher education institutions should be careful, however, that they don’t blindly adopt solutions simply because they are popular at the moment. Strategists unfamiliar with the field of social networks beyond its technological aspects should pay attention to issues such as:
* How culture influences awareness of, and engagement in, social networks
* How social networks can be structured in different ways with, or without, technology as a mediation method
* How relationship dynamics influence participation (e.g., politics)
– Deciphering Social Networks (ID: ERS0806) [EDUCAUSE CONNECT]
In the August 2008 survey we received responses from 176,748,506 sites. This month’s overall growth of 1.3 million sites reflects Apache’s growth of 1.2 million and Google’s gain of half a million sites, but a loss of 760 thousand sites using Microsoft IIS.
– August 2008 Web Server Survey (2008-Aug-29) [Netcraft]
Harsh comments in your blog? It could be a LOT worse;
Russian police kill anti-government website owner
The owner of an independent website critical of authorities was shot and killed by police today in a volatile province in southern Russia, his colleague said.
The killing of Ingushetiya.ru owner Magomed Yevloyev could incite tensions in the province of Ingushetia west of Chechnya, which has been the site of frequent attacks on police and other officials.
– (2008-SEP-01) [The Age]
How can you outline a system’s security state succinctly, yet without omitting important points? Consider using the SWOT matrix to summarize your perspective. This approach is particularly effective when communicating with managers and executives, who are usually familiar with SWOT analysis.
The acronym SWOT, which stands for Strengths, Weaknesses, Opportunities and Threats, is designed to remind you of the key factors to consider when analyzing a situation. A SWOT matrix is a table that presents these elements in a compact manner. Take a look the SWOT matrix template below. …
– SWOT matrix for describing security posture (2008-Aug-29) [SANS]
Over at Wired’s Geek Dad;
10 Geeky Movies to Raise Your Kids On
In our never-ending quest to provide you the tools and knowledge to raise your kids in your own geeky image, we present you with a list of 10 geeky movies to raise your kids with. This is a starter list, and by no means comprehensive. It also skews towards the younger set because we have to lay the proper geeky foundation. As always, leave your suggestions for additional titles in the comments.
My list would be
- The Princess Bride (1987)
- Star Wars: Episode IV: A New Hope (1977)
- Labyrinth (1986)
- Howl’s moving castle (2004)
- Raiders of the Lost Ark (1981)
- Flash Gordon (1980)
- The Dark Crystal (1982)
- The Hobbit (1977)
- Willow (1988)
- Batteries not included (1987)