All in Social Media

How Involved Should Customers Be in Managing Their Own Technical Support?

Last week I wrote about my experiences when my main laptop computer died. The bright spot was that I learned about the value of remotely-sourced database access through my use of DabbleDB. The dark side: my experience with my computer vendor’s Gold service plan. Looking back, I can see advantages and disadvantages of using social media and social networking technologies as components in overall customer and technical support situations.

Overlapping and Evolving Online Communities are becoming the Rule, Not the Exception

I received an email last night from a reader of this blog asking me to comment on cost estimates he had received for the development of a new social networking service. He wants to offer targeted services to a specific but large population segment. His thinking corresponds with a lot of interest people have these days for applying social networking techniques in a profitable or meaningful way to different population groups — young people, old people, professionals, managers, sports enthusiasts, podcasters, jobseekers, lonely hearts — you name it. If there isn’t already a MySpace/YouTube/Linkedin clone targeting any group that can write a check or reach a keyboard, there soon will be.
I received the following email from fellow blogger Chris Law (1000 Flowers Bloom) in response to my article Web 2.0 and Maintaining the Integrity of Online Intellectual Property: I really like your article. One thing that I think is very much related is what happens if it’s not a document? What if it’s say the classified listings on my site that are then being mashed up with a Google Map?
I haven’t really decided how “revolutionary” web 2.0 applications are. One school of thought is that web 2.0 applications like blogs, podcasts, and wikis are “just another set of channels” to be considered in the overall mix of ways to manage communications with one’s target markets and customers. There’s another school of thought, though, that suggests that the interactivity and social networking aspects of Web 2.0 are finamentally changing the balance of power and influence in the marketplace in a profound way. I come down somewhere in the middle.

Who Controls Personal Data?

Back in the Day, my favorite Latin quote was an example of the Ablative Absolute: “Eo Imperium Tenente, Eventum Timeo.” Loosely translated, this means, “Because he holds the power, I fear the outcome.” In some ways, fear and uncertainty exist today since, in many cases, people don’t understand, or even know, who has the “power” over how their personal data are used.

Proposed: A Choice-Based Approach to Controlling the Commercial Exploitation of Personal Data

Today significant commercial trafficking occurs in personal information. Credit bureaus, research companies, insurance firms, and corporations regularly buy and sell personal information. While much of this trafficking may be benign, most is either unknown to, or beyond the control of, the individuals this personal information describes.