Archives by date

You are browsing the site archives by date.

The Leading Virtually Digest, November 25, 2008

The Leading Virtually Digest, November 25, 2008

What: Psychology Today Blog article ‘How to Run a Con‘ Posts to which it is related: Leading in Face-to-face Versus Virtual Teams, Building Trust in Virtual Teams Bottom line: The author of this article, a neuroeconomist, describes the neurological basis of a classic con known as the pigeon drop (see a video of this). According to the author, ‘The key… Read more →

Do You Plan for Technology Breakdown?

Do You Plan for Technology Breakdown?

I recently had a problem with my MacBook Pro. The graphics chip went bad, which was a known problem with the particular chip I had. While it was shipped off to Apple for repair, I struggled through more than a week of trying to communicate with team members and keep a normal rate of productivity without the laptop I had… Read more →

The Leading Virtually Digest, November 14, 2008

What:  FaceTime study on the Collaborative Internet (see FaceTime’s summary, or a CNET post about the results) Post to which it relates: Fostering Ambient Awareness in Virtual Teams Bottom line: FaceTime does an annual survey looking not only at use of collaborative technologies by workers, but also what kind of cost that has to companies.  You might be surprised that the… Read more →

An Egregiously Overlooked Use for Virtual Worlds

An Egregiously Overlooked Use for Virtual Worlds

Although many people utilize virtual worlds for purely recreational purposes, there are a lot of companies trying to think of creative business applications for this new technology.  I’m particularly intrigued by the potential uses of virtual worlds in the hiring process.  Some organizations are now holding job fairs, recruiting sessions, and interviews in virtual worlds (see articles from WSJ and… Read more →

The Leading Virtually Digest, November 7, 2008

 What: Wireless encryption code (WPA) has been recently been cracked by researchers Posts to Which it is Related: Pretty much any article on our site Bottom Line: WPA, a popular wireless encryption protocol widely used today by both home wireless internet users and business wireless internet users, has been compromised. A group of researchers found a way to gain access… Read more →