Professional Documents
Culture Documents
C LOUD S URFER
Deep Profile Tag-Cloud Service
March 18, 2010
Team Simplicity
HCDE 518
Fernmarie Brady
Tom Fisher
Tim Garret
Sarah Warren
Table of Contents
Summary of Benefits............................................................................................................................2
Executive Summary
Cloud Surfer is a service that provides a deep profile for an individual in the form of a portable
keyword tag-cloud sidebar “plug-in” that represents the person's expertise (and other categories).
With the person's approval, it “bolts on” to their profile page at the social communities they
belong to, such as LinkedIn, and possibly also the intranet of the enterprise that they work for.
It requires little effort by them to make, can be customized, and belongs to them.
It's free for life. It benefits social networks and businesses because profiles are often incomplete.
It also organizes the network by knowledge. With the add-on, you can quickly understand a
person's expertise without having to decipher it from their job title etc. By clicking on a keyword
tag in a person's tag cloud, you can find other people (and also information for the tag).
How it works
The Cloud Surfer service automatically pulls keyword tags by data mining a person's interactions-
from the information that they create, share, and pay attention to. It creates a keyword tag cloud
representation of your expertise (etc.) that is relevant. Unprofessional or inappropriate tags are
removed automatically.
1
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
Summary of Benefits
Key benefits that make a difference: We identify a deeper profile as the thing that makes the
most difference to strategic networkers. To be successful, they need to be able to deeply profile
others and be profiled, and automatically provide value to others.
Benefits to strategic networkers and the social communities they belong to:
• Intranet search is often poor. Many times it is under funded and content lacks structured
metadata (Peter Morville, 2009). Letting employees tag content makes it easier to find.
This substantially improves productivity, because it reduces the enormous amount of time
spent by employees searching for information or subject experts within their organization
• The tool is free for life.
• Users can immediately improve their profile on any of their existing communities.
• The tool will extract valuable identity information by leveraging from the data you already
create-no extra time is required.
• The tool automatically creates the deep profile that strategic networkers desperately need.
• Automatically adds value with every interaction.
• It's useful because you can find experts or find information (bookmarked by “experts”).
Benefit to companies:
• Improves productivity, because it reduces the enormous amount of time lost by employees
searching for information, or experts within their organization.
• Employees can find people with the expertise to provide answers to questions (that can't be
answered by Google or need to be verified by a trusted source).
• Employees can find information easily.
• Employees can find each other because they are connected by their knowledge
and interests.
2
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
What gives leaders with a strategic network a competitive advantage is that when the time comes
to make decisions that address the future of their organization, they already have people they trust
in place who can provide them with fresh perspectives on the challenges they face. These persons
are other business unit managers in lateral and vertical positions, both within their company and
external to it.
3
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
Bob is a 34 year old Principal Software Manager at events per week in order to start getting use the notion
SoftTech and, he also aspires to emerge as a business of networking, and to learn how to do it effectively.
leader in the upcoming years. Even though Bob is an Eventually, he was exposed to new business
excellent manager, to him meeting new people, and opportunities and met individuals who offered
having spontaneous encounters with others can be perspectives on what the future might hold for his
dreadfully painful. Nonetheless, he know he is bound business – that is what he desperately needed to
for greater things and his desire to grow within his succeed.
business is far greater than his discomfort with people. Today, Bob considers himself a strong networker, but
Therefore, Bob decided to stretch him self outside his finding new people is a time consuming task, not to
comfort zone in order to reach his business objectives. mention the effort that he has to go through in order
He started by leveraging from his personal/business to find ways to add value to his existing and prospective
network, but he quickly realized that he was struggling, network.
he was not reaching his goals from tapping into his own
network. Hence, he sought to acquire a new strategy. Bob highly desires a tool that would facilitate his deep
profiling of others, a way to meet prospects face to
After reading the HBR article “How Leaders Create face, and an automatic way to find insights on how he
and Build Networks” Bob realized that the word can establish a trusting relationship with others. He is
“work” is part of networking. He was delighted to learn looking for ways to sustain his level of networking
that his mistake was failing to embrace strategic exposure. Once he accomplishes this, he can dedicate
networking, up until that point he was only using his more time to generating new ideas for his business—
personal and operational network. He immediately rather than spending valuable time trying to figure out
knew that he must attend at least two networking who can help him execute those ideas.
4
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
The biggest insight from face-to-face networking, was that people like to deeply profile others
before meeting them. This supported our findings that a deeper profile is the thing that would
make the most difference to strategic networkers. Establishing a sense of trust and managing the
vast amount of information available from web sources, email, and live events was also identified as
a concern.
These findings drove the team to explore the development of a broader application that addressed
the uncontrollable use of the myriad of online applications people use in the “wild”.
To reach the broadest audience, we focused on identifying behaviors and mapping features that
would help people make meaningful strategic connections.
5
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
1. The best time to build a strategic network is before you need to leverage it.
You have to give a lot to your network before attempting to extract value.
“An important part of personal development networking and strategic development networking is
‘giving’ to the network quite a bit before trying to get something out of the network. To do a good
job of exchanging value (and scaling to hundreds if not thousands of participants), you need to
have good profiles of the other users and a good profile of yourself.” -Skip Walter/HBR
2. Most people already have content all over the place whether it's local or at various
places online.
“We need to help people link all their disconnected content together into a single online
identity—the Centralized Me. it's badly needed because our content is all over the place.”
-Michael Arrington
6
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
7
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
How It Works
There are two primary customers/applications:
1. Business intranets
Automated profiling begins by collecting content they have published to the companies intranet.
The second step is to index an employees e-mail. In her book “The Social Factor”, Maria Azua,
vice president of Cloud Computing Enablement for IBM Enterprise Initiatives, explains the
technical details of how this is done (special note—privacy concerns and recommendations for
how data is handled are italicized):
Linguistic tools can extract relevant keywords while cloaking the context of the private
communication. Keywords are then stored in a hidden, indexed portion of the profile, or they
can be clustered and placed in the profile. Searches for these keywords or related topics
(using the technique of expanded search term with a thesaurus) results in a hit on the target’s
profile. Although this technique works well, it has one drawback. Although most companies have a
policy that all e-mail and other employee communications are not private, some sensitivity should be
exercised with regard to the perception of employee privacy. At a minimum, the employee should
have the opportunity to edit the keywords to filter out anything they consider non-business-related.
This review of keyword topics, however, places the burden back on the employees to interact with
their profiles. One solution is to use subject taxonomies. These are terms relevant to the enterprise,
which are used to cluster topics. Based on document or e-mail scanning, a small set of higher-level
categories can then be suggested to an employee using these terms. When accepted, the terms would
help identify employees with the strongest affinities to a category and would be displayed when
browsing or searching for similar content.
Additional profiling sources for the other touch point that people have across the web can also be
included, starting with primary sources (see figure 1-Table: A person's primary sources of social
interactions). These sources are also discussed in the Social Communities section immediately
following.
8
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
Communication
Description Examples
interactions
E-mail & attachments A person's e-mails and attached files. PDF's, Word files
Blog An individual's journal that he makes public for all to see, inviting Blogger, WordPress
responsive comments from his readers.
Wiki A (public, protected or private) Web site where multiple people can pbwiki, wikispaces
collaborate to create a work together by easily adding to or editing
the content of the site.
Microblog A “mini blog” consisting of 140 characters or less (the maximum Twitter, Plurk, Jaiku
visible on cell phone screens) that answers the basic question
“What are you doing?” This message goes to the cell phones or
computers of those who choose to receive your updates.
Status update A form of microblogging, though it's frequently called a status Facebook, MySpace,
update on these sites. LinkedIn
Social networking site A Web site that allows people to share information about LinkedIn, Facebook,
themselves and to search for others for the purpose of giving MySpace, XING
information, receiving information, or forming beneficial
relationships.
Discussion forum A place where questions can be posed to the public or a specific Yahoo! Answers
(answers) community and then answers and threaded comments can be LinkedIn Answers
viewed by all. Slashdot
Content interactions Description Example
9
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
Email
Notes
Contacts
Profile Data View
RSS Aggregated content from
Web services data sources and data Manually added
Email API enrichment to form profile Tags
Content
Make
Blogs
Groups
Search Analysis
Forums Sort Synthesis
Flicker
10
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
System Monetization
Except for businesses, the service will be monetized by keyword advertising placed on search results
pages that result from someone clicking on a keyword tag. The communities listed below are
examples of walled gardens that could add value to their users by purchasing our product:
11
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
The estimated time saved accessing data is calculated as the product of:
• Average time spent searching for data in folders, sending emails to asking for references etc.
(second column)
• An average number of instances in which the same search is performed on a monthly basis
(third column)
• Number of users that access data (fourth column)
Total dollars saved by small organizations:
The total dollars saved per month is calculated by multiplying 35 hours (2100 minutes) by the
hourly rate of the employee.
If we assume a hourly rate of $100.00 per employee, then the total monthly savings for a small
organization can add up to: $3,500
Of course, these are conservative estimates. In reality, individuals spend much more than 3
minutes per each search, and we can expect to support large organizations with hourly rates
much higher than $100.00 per person.
12
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
Bibliography
The Social Factor, Maria Azua (IBM, 2010)
Pro Web 2.0 Mashups: Remixing Data and Web Services by Raymond Yee (Apress, 2008)
Information trapping : real-time research on the web by Tara Calishain (Peachpit, 2007)
Webbots, Spiders, and Screen Scrapers by Michael Schrenk (No Starch Press, 2007)
Google Hacks, Third Edition by Paul Bausch, Tara Calishain, and Rael Dornfest (O'Reilly and
Associates, 2006)
Designing Social Interfaces, 1st Edition by Christian Crumlish; Erin Malone (O'Reilly, 2009)
Social Media At Work: How Networking Tools Propel Organizational Performance, by Arthur L.
Jue, Jackie Alcalde Marr, and Mary Ellen Kassotakis (Jossey-Bass, A Wiley Imprint, 2010)
13
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
Appendix
14
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
15
T e a m S im p l i c i t y R e d es i g n R e c o m m e n d a t i o n C lo u d Su r f e r
16