Warakorn - Fotolia

The Social Enterprise

Examining how to build Enterprise 2.0 with social software.

Recent Posts

  • How offline social networking works

    Suw Charman-Anderson 25 May 2010
  • This is a great video explaining how the 'Widower effect' works, and how it applies to all offline social networks. In short, what you do and what happens to you is affected by more than just the ...

  • Google to add Blogger to Google Apps

    Suw Charman-Anderson 24 May 2010
  • Google have announced that they are adding a raft of tools to Google Apps, including Blogger. Perhaps it's a sign that Blogger is growing up, although they'll need to develop it much further for it ...

  • Event: Designing social interfaces workshop

    Suw Charman-Anderson 21 May 2010
  • With any luck, tomorrow will see the delivery of Christian Crumlish's book, Designing Social Interfaces, co-written with Erin Malone. I'm really quite excited about getting my own copy and getting ...

  • Fun makes for passionate users

    Suw Charman-Anderson 20 May 2010
  • How much enterprise software is truly fun to use? Aarron Walter discusses the importance of fun in his article Emotional Interface Design: The Gateway to Passionate Users. It's a very interesting ...

  • Incentives don't

    Suw Charman-Anderson 19 May 2010
  • I've featured Dan Pink talking about incentives before, but this animated version of his talk is so spectacular I thought you'd forgive the repetition. (Hat tip Zé, via Steph.)

  • More Twitter research gives us an insight

    Suw Charman-Anderson 18 May 2010
  • Last week I blogged about research by Meeyoung Cha, from Max Planck Institute for Software Systems in Germany, and her colleagues that showed on Twitter, the number of followers you have doesn't ...

  • Making time

    Suw Charman-Anderson 17 May 2010
  • Amber Naslund writes a good post about how important it is to make time to experiment with social media and to explore what it can do for you. It's very easy, she points out, to say that we don't ...




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...