There was a saying that someone once recited to me when I first started work, and it went like this:

“There are three types of people that you will encounter in the workplace, those who love you, those who hate you and finally those who are undecided. Don’t focus on those who love you as they are already on your side, likewise, don’t focus on those who hate you as you won’t sway them either way, focus on those who are undecided as having their approval means you hold two thirds majority and that’s all you’ll ever need.”

With social media this task is made even simpler, and the figures are skewed even further in your favour. It only takes 1 – 3% of uploaders or contributors to a social media platform to jump on something for it to reach ‘critical mass’ and become a viral hit, so it’ imperative to ‘be prepared’ (as the Scouts say) before delving into the abyss that is the Enterprise 2.0.

Stacks of cash don’t just grow on trees

As with any business venture there is uncertainty which can be quantified as ‘risk’. Depending on the risk presented, companies may be willing to take a gamble on an investment in the hope of making a something out of next to nothing. While this is a nice pipe dream and may pay off in certain ventures, the odds when it comes to social media are about at good as robbing a casino… naked… with only a pair of pliers, a chastity belt and a copy of Richard Dean Anderson’s autobiography.

So what am I getting at here? Process! There needs to be order amongst the chaos and that calls for the identification of keys areas to focus on. The key question I would be asking are as follows:

– What is the social structure of your target market?

– Who are the most active 1 – 3% of uploaders or contributors and how do you identify / reward them?

– What factors can you systematically identify to increase viral, interactive and social influence / referral factors in relation to your business?

It’s been said before and I’ll say it again, it’s WHO you know not WHAT you know! Knowing who you are dealing with, your target market, their social structure and associated groups, friends, fan pages, organizations etc is key to not only knowing your audience, but drawing them into the community.
Trust is the key here, as social networks are basically a collection of people who have ties to other people, and the strength of these ties form the basis of a relationship. Being able to harness this though directing information (information flow), fostering ties and associations with your target audience will ensure you’re on the road to success.

Likewise, if you can find the contributors in this community and actively seek to engage them, that 1 – 3% can escalate very quickly into a juggernaut (NSFW – Language Warning).

“Like” for success  

Once these key questions above are addressed, the next step is to plan, develop and implement social network strategies to ensure their objectives are met and challenges addressed.

While there are both internal and external factors to consider here, the key areas I would be tacking are as follows:

– Creation of official pages, fan pages, groups, apps etc to drive and foster a community externally. This encourages collaboration from multiple sources early on and cements a foothold in social media cyberspace.

–  Taking a Risk based approach with implementation and execution due to volatile nature of social media as well as ensuring data sovereignty question are answered early on, this ensures everyone knows ‘who own the information’.

– Internal controls such as policy, procedure, fair use, disciplinary action and physical (i.e. computer hardware and applications) devices developed and used pro-actively  to ensure maximum business benefit

For a case study, HP (yes the computer company, not the sauce brand) found their skills base was disappearing whenever a staff member left the organization. As well as this they found a huge amount of enterprise 2.0 technologies already being used by staff, however some of these such, as online wiki’s, were storing data outside the HP network and thus they did not have control over sensitive corporate information.

Their senior management set about the task of turning what could have been a disaster into a very well crafted strategy to embrass the new medium, as seen below.

Taken from HP Whitepaper on Implementing Social Media:

 “To develop our strategy, we:

Collaborated with Human Resources and Information Security to develop a usage policy with • governance, legal, and security considerations at the forefront.

Performed extensive exploration, including defining usage models to identify the needs of • individual users.

Performed proof of concept (PoC) tests to evaluate business value and user acceptance of • different products.

Defined an architecture and an approach to phased implementation.”

They also set realistic and achievable goals instead of seeing it as a cash grab:

“To develop our strategy, we:

Collaborated with Human Resources and Information Security to develop a usage policy with • governance, legal, and security considerations at the forefront.

Performed extensive exploration, including defining usage models to identify the needs of • individual users.

Performed proof of concept (PoC) tests to evaluate business value and user acceptance of • different products.

Defined an architecture and an approach to phased implementation.”

So there is method to this madness?
Indeed there is! If you take nothing else away from this post it should be that the cost of inaction when it comes to taking on this new and emerging technology is greater than the potential benefits.
To ensure success you need to secure it both inside and outside to mitigate your potential risk footprint. This means taking time to observer, learn, develop, implement and maintain physical, logical and policy controls at all times.
Identify opportunities where there will be maximum business value for minimum outlay, ensuring low risk opportunities give high return on investment.

Finally, shop around, there is no one perfect suite of tools to manage both your internal and external social media needs, but avoid (like the plague) simply purchasing tools because the box with the flashing lights looks pretty, ensure they meet your needs!

Well that’s the final blog post for this year, it’s been a fun ride and I’ve enjoyed being an active part of the community over these last few months.

All the best and see you again soon! Have safe and happy holiday! If you’re bored for ideas, I found this on The Oatmeal:


Wiki Wiki whaat?

If you haven’t heard of Wikipedia by now then crawl out from under your Web 1.0 rock and turn your intertubes to This is the most successful implementation of
what is known as a ‘Wiki’, which is effectively a resource that is built on collaboration and contribution from a large, or small, group of people. The concept is similar to a brainstorming session based on facts, everyone contributes their expertise on a single topic, the submissions are either posted straight away or moderated for quality, and the knowledge is saved into the Wiki for later.

In Wikipedia’s case it has moderators to ensure quality over quantity, and also accuracy of the data within the Wiki. If you’re a regular user of Wikipedia you will be familiar with the concept of ‘getting distracted’ while researching things due to the sheer volume of information on there.

The great thing about Wiki’s in a business scenario is their ability to be used for sharing operational information. The Wiki can be turned into a living, breathing knowledge base of both present issues and past fixes, common issues that present themselves, what to watch out for, projects that people are working on and the progress / hickups / needs they currently have. Needs, advice or other content can then be contributed by either people internal to the organisation (internal wiki) or externally if it is published to the internet.

The downside to a Wiki is that if content isn’t moderated or backed up there is always the possibility of incorrect, incomplete or down right wrong information. This is either done accidently, with the best intent or simply people trolling. For an obvious example of Wikipedia Trolling click here, or for the uninitiated, here and here.

Who Wiki’s?

So what about people who don’t use it to make money? Wikipedia is a commercial turned non-profit organisation and has proved the platform can be successful, so to demonstrate they didn’t just ‘get   lucky’, I present Rt. 1 Day Centre in Columba, Maryland who actively use a Wiki to enhance the productivity of their non-profit organisation that helps the homeless.

The centre uses an external wiki that is accessible once you have created a free account on their website, and uses it to coordinate food deliveries, stocks and needed supplies, as well as when showers are available, laundries for people to clean the clothes, social services and many other facilities. They are partnered with over 40 churches in the area which ensures a good volunteer base of willing participants.

Volunteers simply logon / register, then can look at or contribute to the wiki instantly which info such as donations they are going to make, services they can provide or even contribute strategies such as the way the centre can engage the community or more effectivly deliver services.

This collaboration ensures a community, not just a group of volunteers is brought together, all sharing a common goal by collaborating with each other on common ground. This equal contribution that Wiki’s enable ensures people get an opportunity to provide their input on situations or topics, thus making them feel validated and a valued part of the community they are helping to contribute to.

How to Wiki with Enterprise 2.0


In order to successfully implement a Wiki in your Enterprise, there are a number of things to consider such as what your target audience is, how will people access your Wiki, is it only for internal staff or also external members, who can edit or contribute, what content will be on there, how easy will it be to edit? There are just some of the many questions that need answering before you delve into creating a Wiki.

The strategy I would take first is to consult with key staff and areas of the business to find their business needs, and translate those into deliverables that they Wiki would satisfy. This would culminate in form of an internal Wiki for staff and have basic content developed and published to ensure when people started using it there was a base to build on.

Stakeholder support is very important in any new venture so ensuring they key stakeholders and managers actively participated in editing, publishing and engaging the community would be a key driver to the Wiki’s success. Different sections would be created inside the Wiki such as a section for news and current affairs, a knowledge base section such as an FAQ or Technical Support etc to ensure information was organised and categorised for ease of use.

The final step would be to assign permission levels to each section, which could include having moderators review the content before publishing it to the page. This is especially valuable for things such as the FAQ sections, which are accessed often and correct information is paramount to ensuring the usefulness of the resource.

If everything goes well from here there could also be opportunity to open up an extranet wiki which could leverage off the information already inside the internal wiki pages.


No wiki story is complete without mentioning the most notoriuos of Wiki’ers, Julian Assange, so if you’ve got an hour to spare this is well worth a look, if you don’t however then the summary is a group of activists use a Wiki platform to leak highly confidential documents submitted to them from anonymous sources.

Hey all,

So by now we’re all familiar with the concept of social media in general such as Facebook, LinkedIn etc, as well as Blogging both internal to the organisation and external, such as this WordPress blog.

Micro blogging takes a different approach to the usual format, restricting posts to a bare minimum of characters per post. Twitter for example limits posts to 160 characters, and these micro blog posts are referred to as “Tweets”.

However much like better cars don’t make better drivers, the micro blogging format doesn’t mean junk will never be posted, or a useless Tweet sent every second, it does however help to ensure the content is short, sharp and to the point. People can also ‘follow’ Twitter accounts to ensure that they receive information instantly. To ensure content is targeted, Twitter uses a system called ‘hash-tagging’ which works by placing a hash symbol (#) in front of a word e.g. #micro-blogging.

In an enterprise context this is very useful as it enables content to not only be targeted through the use of hash tags, but the business can also see what topics are ‘trending’ by looking at what hash tags appear the most. These trending topics can be used to gain a business advantage by utilising trending hash tags that are relevant to their business, thus generating more traffic by association. Trendsmap is a great tool that can be used to sort out what is trending geographically speaking, in order to ensure your tweets are hitting the right areas.

Personally, for any blog post I publish I will also send a Tweet sent out to all my followers, along with accompanying hash tag to ensure anyone else either in my class, or interesting in the content I am posting will be able to find my post. This is very useful in a business situation where you can inform people of specials, promotions, initiatives, latest news and events as well as get to interact with your target market and learn what they like, dislike, follow, use, think and pretty much anything else that they are willing to share via social media.


Iran and Social Media

I’ve previously focused on government and social media, so I thought I’d explore how a people as a whole, rather than an organisation, can be used to demonstrate the power of micro blogging.

During the 2011-2012 Iranian protests, the government issued a media blackout to ensure no news of the unrest would be seen, or heard of throughout the country. Enter Twitter, Facebook and other social media applications which suddenly turned groups of both organised and disorganised protestors into a single hive mind that shared information instantly enabling quick decisions on what the best course of action was at that immediate moment.

By sharing what the government forces were doing, where other protestors were, what places to march on, what to expect around the corner etc. they were better prepared and embodied they saying ‘knowledge is power’
Recently there were fresh demonstrations around the Iranian election, and in a move to pre-empt any unrest the government blocked what it considered ‘damaging’ western based websites.
This ensured some 30 million Iranians were unable to access Facebook, Twitter, Gmail and a host of other sites instrumental to a coordinated protest.


So what’s it got to do with business?

If a business is able to build an online presence through micro blogging, it will enable them to engage with people on a very personal, very rapid level which will ensure targeted marketing and successful business engagement.

Internally, micro blogging could be used to ensure any issues, ideas, projects or current topics are available to the entire organisation instantly.
I will leave you all with a snippet of Fox11 news about Twitter and Iran:

If you’re a car enthusiast like myself who shoves money hand over fist into old cars because we have fond memories of them when we were younger you might want to adjust your attitude when thinking about ‘Return on Investment‘ in a business context. You could argue nostalgia is the benefit here but it’s a bloody expensive one, with blood, sweat and tears every year without fail.

At the end of the day a business does not run on good vibes and unicorn farts, so you can be damn sure they don’t want to be ploughing money into ventures that don’t provide a tangible benefit.

For scientific purposes, I have included what is widely accepted as the most accurate representation of a unicorn fart.

Metrics to use when calculating ROI

My personal favourite way to calculate how well you’re doing is client feedback. Actively engage your staff through either open door sessions where staff can approach managers to voice their concerns, ideas etc, polls that are available through your chosen enterprise 2.0 platform i.e a poll on your main Wiki page or even just asking around the office.

People can be reluctant to voice their opinions however so you may need to provide a way of anonymously providing feedback to ensure there is no ‘confrontation’ as such.

The other way of doing this is through cold hard statistics, and Harry Gold from ClickZ has put together a list of 14 Social Media ROI Metrics You Use Right Now to measure your organisations Enterprise 2.0 return on investment.

The cold hard truth

If only it were as easy as looking at statistics all day, as there are so many different ways to measure your ROI. You need to find the right tool for the right job, not all ROI metrics will map well to your organisation so try and few and see what you can find out!

Most of the time when I mention Enterprise 2.0 people seem to go all Jerry Maugie, I mean come on, how many of you have had that ‘friend on facebook’ ask you to ‘Like’ their ‘SUPERNEW AWESOME BUSINESS THAT WILL MAKE MILLIONS”?

What it takes is time, persistence and an understanding of your target audience, only then will you start to see a realised return on investment.

Found this very interesting, apparently open WiFi networks are designed to be ‘public’ in nature.

I’m not sure I’d be giving away my personal banking details over a public WiFi network anytime soon, however for those who don’t know better this could be a goldmine for information harvesting.

A rather hectic week has been and gone so I can finally post the final instalment of ‘Navigating the Social Media legal Minefield’.

In this final chapter we shall cover two topics that are close to my heart, being the legal issues around Information, as well as Statutory risks of engaging in social media. These two go hand in hand as the information that is distributed via social media takes on a life of its own, leading to situations that could be potential dangerous or even downright humiliating for either the poster or the person(s) involved both directly and indirectly.
Sounds like a mouthful yes? I use the term ‘legal minefield’ when describing social media for a reason! While some may delight in have a mental image of a suited up lawyer tiptoeing through an actual minefield, it’s about the most accurate description you could give for posting into the Enterprise 2.0 sphere.


For a start, who owns what you post into the ether? You would think that because you typed the words posted onto your chosen platform that you and only you are accountable, and any actions taken would only be against the poster… right?

Well for the most part you would be correct, and as Social Rabbit points out there are a few things you should know when putting information onto FaceBook. Companies who have a social media vessel that allows users to submit comments, feedback, post images, thoughts, ideas etc are actually allowing this to be submitted to their companies public face, thus the information on their page is in fact representing them to the general public.

An example of brands that embarrassed themselves on social media is McDonalds, who ran a campaign designed to generate positive memories of the beloved golden arches. This was the (disastrous) result:

This goes to show that not everyone is your friend when it comes to social media. It also raises issues around what information is shared.

Take for example a new employee on the current American campaign trail who is given Facebook access for their party. They are given full access and can post on behalf of the entire campaign as it will appear to come from the page that is owned by the campaign.

Imagine the field day that would result if something unmoderated was
posted such as this?

For a start, someone would be getting fired! But it would also damage the campaign’s credibility due to the fact it was posted by their official social media mouthpiece. This has far reaching repercussions which need to be carefully assessed before releasing ANY form of information via social media.
Legal Issues

As we’ve explored above, what you post is yours, you own it, and that means if you said it online it’s the same as saying it to someone on the street. In Liam Stacey’s case, that meant taking to twitter and with the glorious mouthpiece that is social media, managed to enrage an entire nation. His trolling efforts on Twitter, where he drunkenly tweeted racists comments when Fabrice Muamba collapsed during an international soccer match, were so profoundly successful that a District Judge decided to throw him a 56 day private party… where he could celebrate by himself, in a jail cell.
This is only one example of many, however I feel I should cut to the chase and point out a few key points to ensure your companies venture into Enterprise 2.0 is regarded as a success by all.

– Only post information on behalf of the company if you are authorised to

– Information published should be considered ‘Public’ in nature, as such, NEVER release private or sensitive company information.

– Maintain a professional attitude and profile, no lolcats.

– Always respond promptly to customer feedback, ALL feedback, this included negative comments.


On a final note, monitor you page 24/7, know your memes, know what’s hip and what’s not, find someone to vet images on your page as well as posts or you might end up making a gaff like Nestle did... is this the Kit Kat bear or something more sinister?

As we explored in Part 1, any Government has reason to be wary of social media and the legal implications that go with it. So we know that there are risks, but where do they come from?

Firstly, I highly suggest you get your bearing by checking out a Map of The Internet.

There are a number of risks associated with social media within an organisation however I would like to focus on four key risk areas I feel are highly relevant no matter what sector you work for:

– Technology (Covered in this blog post)

– Reputation (Covered in this blog post)

– Information (Covered in part 3)

– Statutory risks (Covered in part 3)
Through many years on the internet and working in an information security role, my interactions with the majority of people look something like this:

This might be seen as pessimistic, until you start looking at what real world consequences can result when ‘Risks go Wild’… it’s far less sexy than the American College girl you’re picturing in your head I assure you… now get your mind out of the gutter and focus!

Let’s look at how these stack up and where a good policy can work towards mitigating risk as much as possible:

– Technology – Why people are afraid of it

No, seriously, people are afraid, they don’t understand it, they find it difficult to comprehend and this can mean having a very frustrated customer on the other end of a Helpdesk phone call.  To highlight this this, a recent study even found 51% of those surveyed believed the ‘Cloud’ was affected by the weather.

The flipside is you may actually have a very cleaver social engineer on the other end trying to steal your Apple account details. The scary thing is this actually happened to happened to Mat Honan of WIRED magazine fame who had his whole Apple identity compromised.

Educating your users and having a policy that enforces this is key to ensuring technology is used to benefit the organisation rather than expose it to further risks. Simple giving open access to new technology that people have no idea probably looks something like this:

– Reputation

For a crash course on managing your online reputation, I highly recommend getting staff or users to read Anton Koekemoers article on How to manage your social reputation. This will set the groundwork for users who have never heard of ChirpChrip or BookFace before by giving them the basics.

These basics need to be enshrined in company policy, especially for Government as they represent the public face of what is often perceived as a ‘faceless’ organisation. Who are the men and women in suits? What do they do? Why are they going through my garbage bin? Those cuban cigars aren’t mind I swear! Castro? Isn’t that a milkshake? I digress…

The point I’m trying to make is that even if you’re not a multi-billion dollar enterprise, you still have a public face. For Governments this lesson is essential as you’re delivering human services to the public, and you want to be damn sure they feel valued and appreciated especially when the people you are delivering services to are they ones paying your salary.

To elaborate on an example from Part 1, can you image if the Police posted up a picture of a person in handcuffs with the caption “GOT THE BASTARD!! #cops>crims #21jumpstreetallupinthismotha #yeeeaboi”. What message does this send the public? Do they feel protected by upstanding people who put their lives on the line everyday? Or do they see a bunch of cowboys who are a law unto themselves.

Presenting a clean, professional image yet human image to the public ensures a solid reputation is established. This is cemented by ensuring staff are either limited to what they can post by incorporating Technology, limiting who can post on behalf the department in question and of course having reviewers and approvers before it sees the light of day.

More to come!

Information and Statutory Risks will be discussed in Part 3!

I’ve decided to take a different approach to blogging today. For those who want to skip the preamble, scroll down past the pretty pictures.
As Catherine Weber points out, It’s no secret why blogs fail. I think this image (taken from linked article) sums it up:

With that said, I am taking an ‘Agile’ approach to blogging instead of the usual (but very well written!) ‘WALL OF TEXT” that seems to adorn every other blog I come across, sadly, including my own.

Some humour to lighten the mood with my new found enlightenment, this seemed very relevant as today we were discussing what media managers actually do all day, this seems to fit the consensus.

Anyhow, this entry is Part 1 of 2 around legal risks and risk mitigation strategies for organisations implementing social media. Rather than focus on a private enterprise, I thought it would be fun to assess a different type of organisation, an entire Government.

So why on earth would the Government care about social media? They operate in the Public sector and have no profit margins to meet or shareholders to appease, that seems fairly straight forward right? I was recently sent this picture at work, and I know many who share this view.

But any Government is more like a business than you would expect, and they aren’t lazy like the picture above would have you believe either! While they do operate in the public sector, they are using tax payers money to fund their operations, thus tax payers operate like shareholders only their votes are the (political) currency. Governments provide a multitude of services across a huge number of departments who all deliver ‘human services’ in one way or another.

Why would the government worry though? What risks could apply to a publicly funded body?

Image for a minute the following:

  • Police Twitter feed tweets about an operation in progress involving highly classified information including names of individuals – This is a clear breach of confidentiality
  • Healthcare Facebook page posts a nation-wide alert about a (fake) deadly virus sweeping the nation – Reputation is damaged and mass panic, wasted resource and Statutory  issues come into play

I leave you with Kabrina Chang: Facebook got me fired – Legal and Management issues for Social Networking

Next post will be discussing where these threats come from, how they are relevant to the organisation and what social media policies should have in place to adequately address them.

Nothing to do on the weekend or being kept awake by your significant other snoring like a steam train at 3am in the morning? Why not upgrade your WordPress blog!?

I stumbled across 30 Most Wanted WordPress Tips, Tricks and Hacks on HONGKIAT.COM and some of them are great!

My quick list that I would give a go include:

10. for WordPress which links back to your account and shares your bookmarks

16. How to avoid duplicate posts

19. save buttons to encourage users to bookmark your website

27. WordPress exploit scanner to ensure your site doesn’t have any buggy code

and my personal favourite

32. Create and Ajax-based auto-completing search field to guide your users.

I will be giving these a go over the weekend, once they’ve been tested I will let you all know so you can attempt to use / break them for me!

On a final note, some South African friends of mine put me onto a cider called Savanna – Dry.

For a refreshing afternoon drink give this a try

1. Buy 4 pack Savanna Dry and 2 lemons

2. Chill cider in fridge or freezer (don’t forget it’s in the freezer! I can’t stress this enough!)

3. Cut lemons into wedges and grind rock salt over them, the ratio of salt to lemon will depend on your palate, I prefer 2 lemon wedges (about 1/2 inch thick) with a decent dusting of salt.

4. Using a mortar and pestle, crush the lemon until most of the juice is out.

5. Open a cider and take a couple of drinks out of it to make room for the lemon. OK…but not amazing, correct?

6. Add the lemon pieces, then pour in the juice. This may froth up at you depending on the temperate of the cider.

7. Place your thumb over the top of the bottle and invert 2 – 3 times.

8. Drink up!

It might take a couple of ciders to adjust the salt vs lemon ratio but this a light, refreshing drink that always seems to hit the spot on a hot day.
Drink responsibly and enjoy,


Hello all,

I’ve been sick the last week so please accept my apologies that this post will be somewhat shorter and less meaty than usual.

I work in the IT Security field and because of this, anything related to risk peaks my interest for a number of reasons, however the main one we will be focusing on today is the benefits that accompany them!

Usually the first things managers in a traditional “1.0” organisation think of when Social Media is mentioned goes along the lines of “What?! We’re going to let them sit on the BookFace all day, and what’s it called, chirpy bird thing? Yeah right!”.

Time (you might have picked this up as a recurring theme) is usually the first thing on their minds, the risk of losing vast amounts of company paid time to employees frittering the hours away on social media. The flipside or benefit to this is of course the new pathways create interaction between employees, allows them to express themselves at work thus elevating their mood which is a good thing, as you can make more money by making your employees happy (Forbes, 2012).

External Social Media

On the “Interwebz”, areas of particular interest to me are security, loss of control, reputation and reliability. How can you control something that is out in the ether for everyone to access? Do you want to be the heavy handed “Post Patrol” that blocks all access full stop, or the fun light hearted manager who lets everyone play Farmville all day?

The answer in my opinion is neither, as both extremes are not going to get your organisation anywhere near a mature Enterprise 2.0 standard. To minimise Risk and maximise Benefit you need Compromise. You also need another layer, Physical and Logical security controls in order to provide some meat in your sandwich. Furthermore, you need to foster a Social Media Culture within your organisation where everyone knows and agrees what fly’s and what doesn’t.

Physical controls help mitigate the risks such as loss of control as well as ensuring reputation is upheld by allowing only certain users to post on the corporate page, and granting read only access to the rest of the site. The benefit here is that users are still able to access the social media platform and knowledge contained within.

Logical controls revolve around policy and procedure which many consider to be, quite frankly, a drag. To all those who are in this school of thinking, let me assure you that policy doesn’t suck! Policies and procedures are out there to educate, guide and assist people who wish to use social media tools in the approved manner set out by the company or enterprise. A good policy will ensure users are aware of their roles and responsibilities, and the consequences breaking the agreed upon rules.

Culture is the fabric that binds it all together, a socially accepted take on what’s ok to post and what’s not, how long you should spend on a certain page or site or what to do if something doesn’t look quite right. It is this culture that will ensure policy is adhered to, physical controls are respected and respect for both the enterprise 2.0 platform and the company / enterprise is observed (or not as the case may be!).

Internal Social Media

I recently read a case study revolving around one Al Essa, CIO at MIT’s Sloan School of Management who used blogs and wiki’s to not only manage a multitude of projects across multiple teams, but also leveraged the platforms to create a collaborative Business Plan, sourcing input from his entire staff faculty.

Read more @

Well that’s all for now, I hope you all have a great week and a riotous weekend!

All the best,