ISBN 9780070139701,Enterprise 2.0 Implementation

Enterprise 2.0 Implementation

Rs446 Rs525 15% OFF

Availability: Out of Stock

(Free Delivery)

We Accept
ISBN 9780070139701
Check delivery information
 
ISBN 9780070139701
Publisher

Tata McGraw - Hill Education

Publication Year 2008
ISBN-13

ISBN 9780070139701

ISBN-10 0070139709
Binding

Paperback

Language (English)
Subject

Education

Facilitate collaboration and foster internal innovation by integrating next-generation Web 2.0 technologies throughout your enterprise IT framework. Packed with real-world examples and timesaving tips, Enterprise 2.0 Implementation shows how to use viral and social networking tools to gain the competitive edge. Get full details on managing corporate blogs, wikis, mashups, RSS feeds, tagging and bookmarking data, and RIAs. You'll also learn how to maximize ROI, use Semantic Web technologies, and implement security. Expand corporate presence to Facebook, MySpace, LinkedIn, and Ning Build internal social networks using open source and commercial applications Reduce infrastructure and IT costs through SaaS vendors Consolidate disparate information using Enterprise 2.0 Discovery Manage wikis, blogs, mashups, and RSS/Atom feeds Set up Rich Internet Applications Develop security, risk management, and disaster recovery strategies Was this product information helpful? Yes No TABLE OF CONTENTS Foreword Acknowledgments Introduction Part I: Overview of Enterprise 2.0 Chapter 1. The Evolving Technology Environment Chapter 2. Enterprise 2.0 ROI Chapter 3. Social Media and Networking Chapter 4. Software as a Service Part II: Implementing Enterprise 2.0 Technologies Chapter 5. Architecting Enterprise 2.0 Chapter 6. Enabling Discovery Chapter 7. Implementing Signals and Syndication Chapter 8. Implementing Wikis Chapter 9. Implementing Blogs Chapter 10. Building Mashup Capabilities Chapter 11. Rich Internet Applications Chapter 12. Implementing Social Networking Chapter 13. The Semantic Web Part III: Managing Enterprise 2.0 Chapter 14. Governance, Risk Management, and Compliance Chapter 15. Security Glossary Index

More from Author

Scroll