Taking a brief break from my break from discussing Social Media to post about this good slide deck from IBM about Social Media and how NOT to use it. The presentation sites more than a dozen examples of how companies have blundered on the web, but my favorite is definitely Ryanair’s press release stating “Ryanair can confirm that a Ryanair staff member did engage in a blog discussion. It is Ryanair policy not to waste time and energy in corresponding with idiot bloggers and Ryanair can confirm that it won’t be happening again. Lunatic bloggers can have the blogosphere all to themselves as our people are far too busy driving down the cost of air travel.”
It describes some etiquette in using social media as a business, but these rules also apply to us as individuals. I mention this in response to observing individuals engage in a social media personal assault.
With any form of broadcast communications (media), you should be sensitive to your audience. But with social media, it is even more important because of the broad reach one person can have and the permanence it has. With social media an individual can broadcast their message as widely as a fortune 500 company with a huge marketing budget, and once posted, it cannot be fully removed. It’s a loaded gun. There is no putting the bullet back once the trigger has been pulled. So when it comes to using it, be judicious. A great rule of thumb is to ask yourself if you would have these 4 people read it: your mother, your child, your future employer, and the person it is talking about. If it can pass this test, it is probably good to publish.
When in doubt, leave it out.
Not to be confused with controversy, which can be healthy as it stimulates discussion and protects us from following on blind faith. Don’t be afraid to point it out when “the Emperor has no clothes.”
iSecurity hole is not so good
Tue, Feb 25th 2014 5:12a David Hablewitz Be wary of using your iWhatever on public networks until the patches are made. The scary part is not knowing how long the “bad guys” have been exploiting this.
http://www.huffingtonpost.com/2014/02/24/apple-security_n_4847109.html [read] Keywords: apple
2014 Winter Olympics Numbers Games
Sun, Feb 23rd 2014 11:11p David Hablewitz When looking at the medal count from the 2014 winter Olympics, at a glance it appears the United States did really well finishing with the second-highest medal count of any country.
But then I saw Norway was in third place, and it made me wonder…
So I drafted a quick spreadsheet (using IBM SmartCloud Docs) and came up with this graphic, of medals per million people in each country. Suddenly the U.S. didn’t do so hot while Norway totally owns the winter games, all 5 mi [read] Keywords: ibm
Computer gaming companies are choosing IBM over Amazon
Sun, Feb 16th 2014 10:12p David Hablewitz A few weeks ago I mentioned on the first day of IBM Connect conference that it is clear now beyond any doubt that computing power is becoming the next utility like electricity, phone, water, and cable TV. I predict that there will come a day in the very near future when few companies will still have their own physical data center. This article is more proof of that as the gaming industry is the first to make this move. But even more interesting is that IBM, not Amazon, Google or Microsoft, [read] Keywords: ibm
IBM published list of business partners certified in SmartCloud mail onboarding
Fri, Feb 7th 2014 5:12a David Hablewitz IBM has published the list of business partners certified in onboarding to IBM SmartCloud mail.
Our company, Divergent Solutions LLC, is one of only 10 companies currently listed for the entire U.S. that IBM has entrusted to perform such migrations. So what exactly does that mean? Well if you are considering a cloud alternative for your company’s email (whether it is currently on Outlook, gmail, or Notes), Divergent Solutions can handle the process from end to end . Licensing, plan [read] Keywords: ibm