Category Archives: communication

A guide to Facebook privacy settings

Ghacks has published here a small but useful guide to basi security settings in Facebook.

Suggestions include the fact that “[…] , this menu is entirely customizable. If you do not want anyone who is not on your friends list to access any of your information then you can do this from here. If you don’t mind if friends of friends also have access to your profile then this is an option too. For example, if I wanted everyone to be able to see when my birthday is then I would first click on the ‘Customize Settings’ tab. From here, I would enable everyone to see my birthday. It is as simple as that. Let’s take a closer look at each of the different settings that you can edit when it comes to Facebook privacy. […]

First of all is the ‘Posts by me’ section. This will include any status updates that you write, any wall posts that you make, or any photos that you upload. Obviously, the most sensible thing to do here is to set this to ‘Friends only’. This is because you do not want people that you do not know getting access to things that you have said, or your personal information or images.
The ‘Bio and Favourite Quotations’ section is up to you whether or not you would like to make this section private. However, it is important to remember that you may be putting private information about yourself in the Bio section which others will be able to see if you do allow this section to be public rather than private. The ‘Family and Relationships’ section is another one that is best kept private. The reason for this is because if you allow this information to be public then everyone can see members of your family which not everyone would be comfortable with. Of course, it is up to you, but it is best to be on the safe side. The rest of the information in this section of the privacy settings would usually be better if it were set to ‘Friends Only’, because it is all personal information. […]”

I think the guide is useful despite the fact that this brain confusing level of security that is implemented by Facebook for me is still unreliable and difficult to understand by average user.

This post as a comment also here.

Aiim social roadmap white paper

Aiim (site here), for over 60 years, AIIM has been the leading non-profit organization focused on helping users to understand the challenges associated with managing documents, content, records, and business processes.

Now among other interesting articles, Aiim proposed a”[…] roadmap [that] is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems. […] The social business roadmap consists of eight primary steps. Each step is briefly described here and is addressed in substantially more detail over the course of the document. Links to the eight steps take you to our wiki, where we discuss the “what’s next”, case studies, and your additional thoughts and feedback. […]

Main steps are


  • Emergence. In this step the organization is not using social technologies in any formal or organized way. Instead, individuals or small groups within the organization are experimenting with social technologies to determine whether there is business value to them.
  • Strategy. Once the organization begins to develop experience with social technologies and has identified potential business value from their use, it is important to create a framework that identifies how it expects to use these technologies, and the goals and objectives for their use.
  • Development. With the strategy in place, the organization can make informed decisions about what tools to implement, how to implement them, where to implement them, and how they will potentially scale more broadly within the organization.
  • Monitoring. Initially the organization should spend time monitoring and listening to the conversations taking place in and around a particular tool to get a sense of the nature of the tool, the content of the conversations, the target audiences, and who the leading participants are. This is perhaps more visible in externally focused processes but is important for internal ones as well.
  • Participation. Once the organization has done some listening it will be able to participate more meaningfully and should begin doing so according to what it has learned about the target market and the nature of the conversations on the various tools.
  • Engagement. The goal is for participation to move to engagement – from speaking at or to customers to engaging with them. This means creating processes to respond to issues, both internally and externally, and ensuring that communications are clear, accurate, and authentic.
  • Governance. This step describes the process for developing an effective governance framework for social business processes. Some of the steps are specific to certain tools or capabilities, while others are more broadly applicable, such as an acceptable usage policy.
  • Optimization. Once social business processes are in place, they should be actively managed and reviewed to ensure that the organization is realizing the expected benefits. This includes but is not limited to monitoring the tools in real time, identifying and measuring specific metrics, and training users on new or evolving tools and processes.
  • […]” (full article here, direct download link for white paper here)

    In a complex contest like the one of “going social” I think that a rationalization effort is really important also to avoid smaller organizations getting lost into fuzzy and fancy words.



    Customizing Google results

    Tim Conneally at Beta news reports that “[…]  Google on Thursday introduced an experimental feature which continues its mission to chip away at undesirable search results and information from “content farms”: the ability to block all results from a particular URL.

    Now, when search results are returned, there is a button next to each link labeled “Block all [URLNAME] results.” When clicked, that site is sent to a block list, which can be managed in the user’s Google account.

    “We’re adding this feature because we believe giving you control over the results you find will provide an even more personalized and enjoyable experience on Google. In addition, while we’re not currently using the domains people block as a signal in ranking, we’ll look at the data and see whether it would be useful as we continue to evaluate and improve our search results in the future,” Google search quality engineers Amay Champaneria and Beverly Yang said today. […]” (full article here).

    Jacqui Cheng at Ars technica adds that “[…] The new blacklisting feature is triggered when you perform a Google search, click on a link, and then go backto Google after having decided that link isn’t what you wanted. When you return to Google the second time, a new option appears next to the Cached link that says “Block all [website name] results.” If you’re logged into your Google account (which is required in order to maintain a blacklist), you can then click that link and get a confirmation message that you want to block it.

    Google wrote on its blog that you may not see the site disappear right away if you simply refresh your browser with the same search, but running a new search should get that domain out of your face for good. “The next time you’re searching and a blocked page would have appeared, you’ll see a message telling you results have been blocked, making it easy to manage your personal list of blocked sites,” Google Search quality engineers Amay Champaneria and Beverly Yang wrote. “This message will appear at the top or bottom of the results page depending on the relevance of the blocked pages. […]” (full article here)

    I don’t believe this will give in full control to the user (come on, results mean completeness of search and more practically money), but I appreciate the effort mad by Google to allow users to customize they’re searches.

    This post as a comment also at Betanews and at Ars Technica

    Steve’s way

    At Arcamax ( report that Steve Jobs has been welcomed with a standing ovation at iPad 2 event.I don’t believe that Steve Jobs is someone so dedicated to work that he needs to be present just because is part of his work.Nor I think that Steve is so attached to money to be tehre just because otherwise his company will loose money.What he said is something like “we worked so much for this that I wanted to be here”. And this despite his health.Is something near to natural leadership and is made of a well blended mix between being attached to work, believe in what you do and of course, a little bit of “being at the crenter of spotlight”.I don’t like some things in Apple way, but this appearence is something other companies should be scared of, because of the embedded implications it has, ranging from motivation to money matters.
    This post as a comment also at

    Mobile traffic to increase 26x by 2015 but will infrastructures support it?

    Matthew Lasar at Ars technica ( reports some figures by Cisco Global Mobile Data Traffic Forecast (source here).

    Here are the highlights:'[…]

    • There will be 788 million mobile-only Internet users by 2015.
    • Global mobile data traffic will increase by a factor of 26 by 2015.
    • World mobile data grew by a factor of 2.6 in 2010 from 2009.
    • Average smartphone usage doubled: 79 MB per month, up from 35 MB per month in 2009.
    • Android operating system data use is rapidly catching up to the iPhone.
    • In 2010 almost a third of smartphone traffic was offloaded onto fixed networks via dual-mode or Femtocells.
    • Millions of people around the world have cell phones but no electricity, and by 2015 a majority in the Middle East and Southeast Asia will live “off-grid, on-net.”

    […]” (full article at

    I think that supporting such an expansion is also a challenge of network support, that, in most cases is running at nearly full capacity.

    I’m not confident that in 4 years we can build and reinforce networks more than was done in last 10 years.

    The other fact that is really worrying is that nearly 1/3 of world population will live “on net and off grid”. This is a radical shift, because moves mobile access to primary needs, and I think that accessing the net is important, but not vital nor for development, nor for surviving.

    This post as a comment also at


    Google new browser concept is without URL bar?

    Raymond Wong at Dvice ( reports that some mockups from Google seems to be “[…] killing the URL address bar in its Chrome web browser. Always looking to shave pixels off of its Chrome web browser, Google is toying around with four different layouts that could drastically change the way you browse the web: classic, compact, sidetab and touch. The most notable change is of course the “compact” version that does away with the URL bar, and puts “multiple URL bars into tabs.” It essentially gives you more vertical pixels, which means less scrolling within websites. […]” (full article at, original article at Lifehacker and by Wolfgang Gruener at

    I think that browsing has made lot of step forwards during time, but one thing remained quite the same the URL bar. But I’ m confident that Google usability magicians will be able to imagine something without the bar.

    This post as a comment also at

    Apple launching something big next week?

    Many rumors are going around saying that a major product launch can occur next week.

    Hypothesis are that the occasion is a revised Macbook pro line launch where will be presented a high speed connection based on Intel Light Peak.

    Let’s see what happens… 🙂

    Norton’s Cybercrime Index: good thing or scary threat?

    Austin Carr at Fast company ( reports that Symantec started a service called Norton’s Cybercrime Index ( aimed at advising users on threat level of cyber crime (full article at

    I think that could be useful in some way, but I I’m not quite sure of the final objective of the service, because of course is a matter of commercials and marketing.

    I don’t think the average user could understand and interpret the level of threat he’s exposed by watching the site, but I’m sure that the below the average user will be scared by titles he cannot understand.

    So at the end I would have expected a different approach from Symantec, but let’s see how the service evolves.

    This post as a comment also at

    In defense of Steve Jobs right to be ill

    I see from many source that National Enquirer that someone has conducted an analysis on Steve Jobs health using photos taken folloing him outside cancer treatment centre.

    No guys! This is not freedom nor jornalism. It’s being stupid.

    Steve is a public person and he’s famous. But has the same right of each one of us of having privacy in this moments.

    But what is really awful is the fact that those who said that he has 6 weeks to live made this diagnosis through photos. I ask why those people (that BTW are doctors) are not removed from their associations: this is not something that has been made for saving lives or in emergency, they had the only urgency to become famous discussing with a news magazine.

    Again, this is not journalism nor freedom of speech.

    This is pure gratuitous stupidity, even if is the news is true.


    WordPress manual plugin

    Travis King at Freelance switch ( reviews WordPress manual plugin (full article at

    WordPress manual is “[…] For those who deploy a lot of WordPress sites, you know how much effort it takes to teach the client how to operate the program.

    You may have developed a manual or a series of screencasts on how to use the features in WordPress. But what happens when WordPress receives a complete overhaul making all that work obsolete. Is it back to the drawing board? Well the good news is – if you’re using the WordPress Manual Plugin – all that will be done for you automatically.

    The WordPress Manual Plugin contains over 30 video tutorials that are updated with each new version of WordPress. In addition, all the training material is accessible from the WordPress dashboard […]”

    Worth a read and a try.

    %d bloggers like this: