Remove tag social-media
article thumbnail

Two-Dot Oh Fatigue – but only for the inexperienced

ChiefTech

And in the quest for management attention-share (or wallet-share if you like) I see that even the social media snake oil salesmen are turning on their fellow travellers, the knowledge managers. Clearly a fight to the death is expected (blogs at fifty paces maybe?). Of course, this was to be expected.

article thumbnail

Predictions 2014: A Difficult Year To See

John Battelle's Searchblog

The subject of this cloud has nothing – directly – to do with digital media, marketing, technology or platform ecosystems – the places where I focus much of my writing. But while the topic is orthogonal at best, it’s weighing heavily on me. It seemed we were figuring it out, slowly but surely.

Marketing 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Articles & Papers

ChiefTech

2004, Supporting collaboration at Ernst & Young (PDF, 372KB): Helping people to use computer mediated communication to work together around the world, in the conference proceedings for KM Challenge 04 , Driving Performance through Knowledge Collaboration, SAI Global, Sydney. Slides also available. Small World!

Paper 40
article thumbnail

Are you ready for collaboration (again)?

ChiefTech

Bearing in mind I wrote these in 2004, I think most of these questions are still very applicable. Technorati tags: Anecdote , Shawn Callahan , Collaboration , Check List , Readiness List at 11:41 PM View blog reactions 0comments: Post a Comment Note: Only a member of this blog may post a comment.

Paper 40
article thumbnail

Security Keys

Imperial Violet

The first instance of this that Google can find is from Bill Gates in 2004 , although I suspect it wasn’t the first. The codes may also be socially engineered as they can be read over the phone etc by a confused user. The DRM in Encrypted Media Extensions might be an exception, and there was an appropriately large fight over that.

Security 118
article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Social engineering attacks soon found use in the digital space. 2004 saw the first worm designed to infect cell phones in Cabir. Thanks to Vidar, GandCrab provided a potent combination of both stealing and locking down victims’ files and rapidly became the most-used RaaS on the market in 2018 and 2019.

article thumbnail

This Is What Happens When Context Is Lost.

John Battelle's Searchblog

You chose your intended audience (the target), you chose your message (the creative), and then you chose your delivery vehicle (the media plan). That media plan involved identifying publications, television programs, and radio stations where your target audience was engaged. Facebook: People Based Marketing FTW. What waste!