Strategies For Change
Text Box: Deployment Strategies
Acceptance of truth in some cases:
Yes, Blogs are used by the vain
IM can be disruptive
You may receive spam, spim, Skim(?)
Wikis may be vandalised
Blog comments may get full of Viagra spam
But recognition that it's not always true:
Many Blogs have valuable information
You can normally configure applications (switch
off alerts; hide identity & presence; …)
You can manage potential hacks: require
authentication; disable features; use in a trusted
environment such as on Intranet; …