Grrrrrrrrrrrrr.....
Someone here opened up the Soc Net can of worms for us and it has brought nothing but higher bandwidth usage and virii along with it. We've asked for data that would support the idea that these forms of communication are helping our org, but no one has provided such. That being said, we cannot get upper mgt to let us block it. Don Guyer Systems Engineer - Information Services Prudential, Fox & Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 [email protected] <mailto:[email protected]> From: James Rankin [mailto:[email protected]] Sent: Friday, November 13, 2009 4:40 PM To: NT System Admin Issues Subject: Trying to harness social networking I'm finding myself pushed towards a more strategic role in our business and as such I'm trying to make a bit of an impact...one of the ideas I've come up with is that for our customers, email is becoming an outmoded form of communication - people are more likely to communicate via social networking, Facebook and the like. The technical problem I'm hitting is how can we encourage the business to communicate with our customers via social networking without opening it up to abuse? I can't see any way to differentiate between legitimate and illegitimate uses of social networking sites. Does anyone else have the same problem they've had to overcome? I'd like to move forward and embrace the power that social networking sites offer us for communication and engaging with our customers...but at the same time I don't want to take a step back and allow our employees the chance to while away the day chatting with their friends and reduce our overall productivity. Please feel free to encourage me to elaborate because this idea is pretty much in the developmental stage....thanks for any input anyone can give.... TIA, JRR -- "On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question." http://raythestray.blogspot.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
