08:47 AM
Connect Directly

Davos Diary, Day 3: Prepare to Be Socialized for Profit

The fast moving wave that is social computing swept through Davos on Thursday in a session titled "Organizing the Unorganizable: Social Computing and the Enterprise."

Guest Blog Entry: by Richard Muirhead, Tideway

The fast moving wave that is social computing swept through Davos on Thursday in a session titled "Organizing the Unorganizable: Social Computing and the Enterprise." The interactive workshop at the World Economic Forum assembled such luminaries as Paulo Coelho, Jim Schwartz, Michael Arrington, Robert Scoble, Jimmy Wales, Matt Cohler, and Reid Hoffman, among others. The goal was to address many of the questions around social computing's business applicability, such as: What advantages does it bring? What are its risks and how can they be mitigated? How can it support leadership, decision-making, product development and innovation? And what role does it play in investor/client relations and support?In the true spirit of social computing (and democracy) we were divided into tables to provide answers to three of these questions. We then voted individually on our preferred answer to the first of three questions, with two further rounds of knock-out. Think of it as a "Social Idol" of sorts. We kicked off with what seemed to be a simple question: What on earth is social computing? My vote went for "Like a marriage, totally desirable but ultimately uncontrollable." That was perhaps only because I didn't pipe up quickly enough with my own definition: "Mimicking the intimacy, chaos and adaptability of families, teams and tribes in software so they can scale to cover the globe." Perhaps wordier than another attendee's take: "Getting pleasure from other people having insight into your private and professional life."

According to the group, the trickiest subject to tackle with social media seemed to be investor relations, due to the legal disclosure and timing issues. But the point was raised that many large companies employ full-time employees, armed with specific software tools, and dedicated to monitoring the blogosphere and tweets. After all, to be forewarned is to be "forearmed" when it comes to an issue that could quickly snowball for the worse (the recent Motrin debacle, anyone?). Or you can monitor those same virtual words to, say, gain an investing edge.

So what are the fundamental advantages of new social media technologies? In terms of usability and appeal, the user interfaces of social technologies easily outstrip those of most existing corporate tools. Chalk that up to its consumer internet genetics. In fact, the acid test is really "no training, no manuals." If you can't get started yourself, it's a failure. What's more, the consumer internet itself is a massive sandpit and training ground for your employees in a particular mode of user interaction (think Google, Yahoo, AJAX). Given that one of the fiercest accusations historically leveled at enterprise software has been the challenges of widespread and effective adoption, good luck to anyone choosing to fight social technologies imbued with this intrinsic advantage. In fact, it was mentioned in a session that in a Forrester Research survey conducted a year ago, 46% of companies claimed they planned to invest more in social computing. Among other things, this includes Wikis, networks and blogs. Now, a year later, the survey has been repeated - and the result is that the number has jumped to 47%! While this small increase may not initially seem impressive, remember that we are in the midst of incredibly challenging economic times, and companies are lucky if their investment budgets even remain steady. Plus, overall, 66% of CEOs say they intend to invest in social computing at some point in time.

So what's the best rallying call if faced with reluctant senior management? It seems from the sessions here that this question may be close to moot considering the tide of adoption in younger generations and the fundamental advantages of social technologies. Instead, the pertinent question seems to be how we most effectively embrace them. We can do that by promoting the aspects that are working well and keeping a close eye on the unruly elements.

Here's an interesting example. During an earlier Thursday session for Tech Pioneers on how to weather the current economic storm, the discussion notes for our table were taken directly onto one attendee's iPhone (despite an abundance of paper). The suggestion was made that perhaps they were published straight onto a blog. One might say that's an example of social media in action. Surely making our relationships, habits and preferences transparent can help us learn to evaluate these for what they are. Obviously there must be a time and place for total privacy, but the impact of social media is first to scale the communications of our human interactions, and then highlight the responsibilities.

Apparently some studies have found that the most trusted digital medium was an email from someone you know, followed by user-rated reviews. Personal and corporate blogs, however, came right at the bottom of the list. So expect me to email this to each of you individually.

Richard Muirhead, is CEO and founder of Tideway Tideway. He has more than a decade of experience commercializing ways to make advanced IT and data center management effective and efficient, and has provided strategic IT counsel for numerous companies globally, including some of the largest financial institutions and insurance companies affected by the recession. This is his first visit to the WEF in Davos.The fast moving wave that is social computing swept through Davos on Thursday in a session titled "Organizing the Unorganizable: Social Computing and the Enterprise." Greg MacSweeney is editorial director of InformationWeek Financial Services, whose brands include Wall Street & Technology, Bank Systems & Technology, Advanced Trading, and Insurance & Technology. View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.