Remove Adoption Remove Facilitation Remove Harvesting Remove Social Software

How I use social media | Full Circle Associates

Nancy White

I figured it would be good to exercise my memory a bit and unearth some of the key stories that led me to to my social media use today, and perhaps surface some of my patterns. Social media is a great place to fail. Social media enables this. How I use social media [.]

List of "White Label" or "Private Label" (Applications you can Rebrand) Social Networking Platforms

John Tropea - Delicious Social Network

Below you’ll find a list of over 100 vendors (and more in the comments) of vendors that offer commodity community software. It’s somewhat relevant as Om Malik has now asked a rhetorical question if Social Network tools are just a feature of website.

2008 55

Full Circle Associates " Notes from the Seattle Online Community Meetup

John Tropea - Delicious Community

In international NGOs and NPOs, this doesn’t really help advance the cause…I told some stories about work I’m doing, people asked me specifically about adoption patterns of wiki use and behaviors, etc. Any social graph representations? New social forms are arising.

How to Hit the Enterprise 2.0 Bullseye

John Tropea - Delicious Social Network KM

The company harnesses this power by creating “internal corporate social networks that accelerate, deepen and extend purposeful relationships around the work that needs to be done. As I’ve written before , I believe that the new crop of digital tools for building, maintaining, and exploiting social networks are both novel and powerful for individuals and enterprises alike. At present most social networking applications – Facebook, Twitter , etc.

2007 33

The ties that find

John Tropea - Delicious Social Network KM

The company harnesses this power by creating “internal corporate social networks that accelerate, deepen and extend purposeful relationships around the work that needs to be done. As I’ve written before , I believe that the new crop of digital tools for building, maintaining, and exploiting social networks are both novel and powerful for individuals and enterprises alike. At present most social networking applications – Facebook, Twitter , etc.

2007 28