“Encouraging Innovation through Thought Process & Social Collaboration.” © All WWRR

Sunday, January 5, 2014

Too Big to Succeed?

In Stream of Thought™...

Too Big to Succeed? 

Author:
~ Virginia Benedict
   Market Engineering Strategist

We have witness through time, that when companies get too big they become decentralized by default.  Decentralization in oversized companies gives way to disorganized and unproductive practices. That is simply because as the enterprise becomes decentralize, it begins to lose control of its mission, its visibility across business units becomes blurred, and its human assets lose focus and their interests shift to personal goals instead of the goals of the Enterprise.  
  • HR Assets become unmanageable
  • Security takes a toll
  • The enterprise becomes disenfranchised from its business model and goals
  • Quality Control of both products and services becomes a serious liability
Moving into 2014 companies will need proactively to assess their goals and objectives.  If as a business leader you think that the markets have changed and you are adopting, think again… change has not begun to scratch the surface.





Monday, January 21, 2013

Thriving in Cyber Space...





Author: Virginia Benedict

How to Thrive as a Cyber Citizen

Whether you are a Professional cyber dweller, a Social, or both, if you wish to thrive in cyber space, it is imperative that you create a pleasant and affable atmosphere around your cyber-self.

You do not have to ever give out personal data such as your birthday or divulge sensitive company information, etc. In fact, I highly recommend against it.  However, presenting facts regarding your skill sets, career path, industry(ies), hobbies, philosophy, outlook, is the way to go if you wish to develop a strong presence in cyber space.

There is a fine line between elegantly sharing with your peers in an effort to create alliances and recklessly blasting out for the sake of “sharing”.  

ProSocial Platforms such as G+ provide you the ability to design/architect your cyber identity with ease using elegant granular controls. You can decide on the fly what information you wish to make visible to whom when creating or editing your profile.
Likewise, when publishing discussion posts you can decide whether to target the public; all/several, just one of your circles, or one individual in your circles; or a community you own, manage, and/or belong to. 

Practice makes perfect...


Quality Discussion posts are also highly recommended. Always be at your best when navigating in cyber space.   It is important that you have an overall mission and that you are aware of what your vision is if you wish to be more than a casual dweller.

Remember that less is more


and that it is ultimately important that your posts are simply well written. I have always recommended the proper use of paragraphs, syntax, and grammar.

Using a word processor configured to alert for spelling errors, grammar, and style is highly recommended before publishing your post, even if you are a native English speaker. Please note that I specify the importance of English as the publishing language because it has become the Cyber Space Lingua Franca of the Twenty First Century and if you wish to thrive in this space your will need to make the effort to develop your natural language skills-sets to include English.

It is an investment


If you invest adequate time to developing a strong, adaptive, and dynamic foundation you will reap the rewards because others will circle you and thus you will build an expansive Sphere-of-Influence (SOI). 

This foundation must include your Cyber Tech skills.  That is extensively knowing and understanding the features, functionality, and tools offered by the social platform(s) within which you are interacting.  Additionally, understanding your Privacy Rights and the User Agreements the given platform imposes upon its culture will help you stay safe.  I recommend that you review profile settings on a regular basis.  In fact, reading your Privacy Rights, User Agreements and Profile Settings is the first task you must master upon creating an Account and thereafter for maintenance.  I personally recommend browsing your privacy and other settings on a regular basis to ensure that your settings are up to date since quite often platforms update features and functionality.

Join Communities


Joining special interest communities is the best way to begin creating professional alliances or to continue nurturing your existing ones. I do not know about you but my sole cyber space existence throughout the years has been to nurture my existing alliances and to always thrive to create new viable ones.

Everyone has a great deal to offer both professionally and socially.  Most everyone I know or have keenly observed throughout the years have and nurture diverse interests and they graciously want to share.  Hence, a great way to begin building presence is to +1 or Like posts that you find noteworthy and/or match your career path or social interests.  In addition, I navigate to their profile to verify if they are someone, I wish to Circle. I spot-check their followers as well as whom they follow for good measure. 

You see, that is what makes a SocioPro Networking platform a true ProSocial Networking platform... i.e., the ability to seamless circle/connect with anyone you deem worthy of mutual social interaction without negative repercussions from networks that wish to control who you can or cannot interact with.  In true ProSocial platforms such as G+, this is left to the individual and is rightfully a personal decision while providing you with tools for granular control.  Platforms that encourage anti-social behaviors by imposing negative controls do not understand the meaning of social media as a networking medium.

A Social Platform’s Lack of Vision may lead to Anti-Social Control Practices


Platforms that have no inkling on how to monetize their wares gracefully and/or wish to control your interactions, who you can contact, and how, will usually place negative controls even when you are a Premium Customer and follow/respect their User Agreement. 

Some platforms provide you the tools then they punish you for using them.  These platforms give you mix messages on what is and is not “allowed” not to mention that the code is unstable and not secure.

As a Social, dwelling in cyber space, you need to be aware and fully understand these nuances if you want to minimize your exposure and have a user experience as seamless as possible.  

Worthiness...

What do I mean by Worthy?

From a Security Perspective

It is ultimately important that you keep yourself safe.  Architecting and building awareness of your cyber presence means that you may be exposing yourself to people from all lifestyles.  From wonderful, kind, generous, and socially adept individuals all the way to malignant, hackers, dishonest criminals driven by jealousy and petty competition, or self-hate as is usually the force driving these sorts of deviant behaviors.   Hence, you have to develop an eighth intuitive sense.  You need to trust your instincts and hone your people savvy skills more than ever.  Your motto in this realm of probabilities should be “when in doubt, Don’t.” Count to ten and allow yourself to think…

This means that the people that you interact with in cyber space must be who they say they are and that you feel good about interacting with them.

From a Professional Perspective

As a professional doing business in the professional cyber orbit, you want to introduce yourself simply and elegantly.  Always portray a transparent and seamless image.  If you wish to be construed as a trustworthy professional, you must behave like one.  This starts with developing a strong presence by creating an enticing profile.  Again, less is more.

From a Job Seeker Perspective

Marketing your skills-sets effectively is a must-develop skill. That is, whether you are seeking a full-time permanent, free-lance, temp work, or you are promoting your consultancy work.

If you are going to be able to negotiate your remunerations effectively, you will need to start by engineering an excellent campaign.  (I will write a separate blog post to address this topic in detail.  If interested subscribe to this blog or contact me directly.)

Present your target audience with a seamless means of contacting you.  G+ gives you the ability to place an eMail envelop on your profile above your marquee. Other platforms allow you to communicate with others if you both belong to the same group or you are connected.

From a Marketing Perspective

For now all I am going to say here is that traditional methodologies are no longer effective.  Creativity is no longer sufficient when targeting your market.  (I will write a separate blog post to address this topic in detail.  If interested subscribe to this blog or contact me directly.)

From a Social Perspective

Always prepare your face to meet the faces that you meet and always stay safe. 

The following link will help you learn more about how to stay safe:

Real vs. Rogue Security Software – Can You Tell The Difference.

http://blogs.technet.com/b/security/archive/2013/01/03/real-vs-rogue-security-software-can-you-tell-the-difference.aspx


All constructive feedback Welcome!



Sunday, December 23, 2012

...And The WINNER IS!

 Author: Virginia Benedict, Techanalyst
               Content Management/Editor/Creative Director

For the past 20 some odd years I have been evaluating what we refer to in contemporary lingo as Social Media Platforms.  I have been evaluating eMail providers, hardware, software, and security tools, as well. 


 The new kid on the block leaves all other social platforms far, far, waayy far in the dust.  Just like its parent,  is the state-of-the-Art Social Technology.


v Security

 Ø  Security on is not a "whenever possible" predicament.  Google takes its patrons' personal and public security seriously without paying lip service.

§  Personal privacy
§  Granular security settings
§  Ability to block anyone you fairly deem anti-social
§  Ability to seamlessly report privacy issues.  Which, by-the-way, I  rarely have found the need to exercise
§  Intuitively seamless to configure
§  Password secure Account configuration section

v Ease of Use

Ø  With very low learning curve and outstanding technical support both self-        served or hand holding.

v Navigation

Ø  Elegant and seamlessly lending itself to the way you think.

v Help Center

Ø  Absolutely outstanding guide with well produced video streams and unlike other platforms Google offers clear concise explanations/descriptions while in addition maintaining Help Forums and Support Communities.  Every page/profile offers feedback features providing seamless elegant tools for the user to report troubles or share back thank you Kudos and encouragement.

v Profile Features
Ø  Whether you are an Enterprise Professional, a Marketer/PR, an Artist, a Scientist, or retired…  It makes no difference;   has the tools for you to shine.  You can present yourself to your community in any light you wish and as elegant or creative as you wish without being stuffy.
Ø  Speaking of Communities, as always   listened.  Now, Technical Community leaders such as myself can shine even brighter than ever.  However, Communities are not strictly for professionals.  There are communities for every social venture/undertaking you can dream of organizing.
Ø Virtual round tables and online webinars.  With , you can seamlessly organize virtual meetings, virtual round tables, and online webinars, and there is nothing to download.                                    
         As a  Account Owner you simply join the you have been invited to attend or even better you can organize one yourself and invite your community of Circles.
Ø AahhH! Circles! Let us not forget the healthiest way to meet new people, build your professional network, gather your family and friends and granularly share or not share whatever information you like by assigning it public, private, friends, and/or Friends-of-Friends setting on the fly.
                       
 Ø  On  you can configure your profile any way you like within the format

§  Elegant and seamless to set up
§  Outstanding tools all around
§  Ability to individualize your profile
Ø  Ability to make it Enterprise Professional, extreme support of the Arts & Science, Familial, or non-descript
     Ø Integrated Blogging!      is an extension of your profile. With this tool you  can self-publish your work and potentially Monetize your blog using one or both of

the free advertising programs: AdSense and/or Google Affiliate Ads                 
I can go on and on…  and the bottom line is that you just have to try it and speak for yourself…  These are just some of the features and opportunities thatcontributes to the betterment of humans unpretentiously, unencumbered, and unfettered from anti-social practices.
They get it! By George, they Got It. Google Developers These children are doing it. They are forging the path for Peace and Solidarity amongst humans by bringing us together.  By nurturing us through their social tools.

                                                                            Women Techmakers 

My Communities:



    

                                                                                           

                                                                                            

Please Note: To Join these Communities you must send a Request-to-Join [name of community] on subject field for for instructions on the requirements.

Monday, December 17, 2012

Social Engineering, Social Tools, and Human Dispositions

Authored by Virginia Benedict

If you are someone like me, your first instinct is to trust others; your second instinct is to want to trust others; and your otherwise instinct is to resent not being able to trust when you discover that your trust has been betrayed.  Yes, I have found that most humans including myself have an innate subconscious desire to trust.  We take chances and give the benefit of the doubt in the spur of the moment, only to discover that those ‘inspiring’ our trust are the least trustworthy.  This discovery makes us feel powerless and betrayed.  It makes us feel guilty and inadequate for not engaging our instincts and taking control of the situation or redirecting the conversation into a neutral state which would allow us to safely escape the predicament.

If you are very much like me, you do not like confrontations or engaging in negative discourse of any kind.   Hence, we fall victims of ‘Social Engineering’.

I often wonder why I have this dire need to share indiscriminately.  It feels at times as if these individuals intently push me to reveal information they have no business asking of me.  I tell myself over and over, “I trust with my eyes open”, only to discover that when push comes to shove, I give into my innate desire to bond, to trust, to embrace others.

So what exactly is ‘Social Engineering’ and who are these social engineers?  At what point does this behavior become intrusive and at what point does the actor of this behavior can be defined as a perpetrator?

Well ‘social engineering’ is a term coined primarily by Security Professionals when identifying Identity thieves; when in fact, it is a social and behavioral anthropology term governed by anthropomorphic attributions.  Social engineering has a wide behavioral spectrum of vectors and variables stemming from the innate benign to the most egregious intellectual, emotional, and/or physical of assaults on our usually unsuspecting psychic.   All species in the animal kingdom are susceptible to this behavior as both actors and subjects simultaneously.

In other words, at one end of this spectrum, we find ourselves in the primordial state; i.e., at birth, the beginning of a relationship, a first encounter (be it live or in cyber space), a situation we happened to find ourselves in, and so on...

We may be entering this state as a blank slate (as presumed of the state at birth, for example), a neutral state (as when unsuspecting), predisposed (as when we are being targeted and subjected by experts in any field; i.e., advertisers, marketers, and as in the case of Security professionals, perpetrators and opportunists),  

An example of the benign is the social interaction between parents and newborn (assuming healthy individuals) learning and adapting to each other’s personalities; or siblings learning how to play or interact with each other while adapting to each other’s temperament driven role-playing, characteristically speaking.

When in a neutral and/or predisposed state, individuals are in a highly vulnerable position.  This can be the vector driven by experts such as educators, marketers, advertisers, drug pushers (be it illicit or legal), and/or Identity Thieves and other criminal types.

Early childhood Educators, for example, are potent members of a social structure who have the power to type cast our young in so many facets and with each facet driving its own spectrum of behavioral outcomes; thus impacting on the innate personality of the child.  Any of these outcomes can predispose the individual throughout his/her life to be either indiscriminately trusting to a fault or intuitively cautious when trusting.

No matter what the disposition is at any given time if you are like me, your first instinct is to trust, to want to trust, and you regret not being able to when you realized that you do not live in a trustworthy world.

                                                                            ~~ 0 ~~

If you should like to partake in further round table discussions on the subject of social engineering types and outcomes, please feel free to contact me. 
 
Virginia Benedict is available to speak on this subject matter as it relates to technology as social tools, information security and social behavior.

As always, you are welcome to email me your questions and feedback as well.
 
©  All Worldwide Rights Reserved