External and Internal Activity Streams
Every now and then I run into something that really gets me thinking. Recently I ran into this presentation.
I went through it several times. And I think I'll do so in the coming days. Really great stuff!!
Activity Streams: what are they, how can we collect and understand them? This presentation focuses on public streams, mostly on the internet. But does this story also extend to the streams behind the firewall, inside organization? I think it should, but I'm thinking about how this should work. Of course the firewalls are coming down. But companies will still be protecting their information to a certain extent. My thesis is: These streams will be most useful if the distinction between protected and public information is mixed.
What do you think? And how do you think one stream of internal and external information can be devised? I'd love to hear your thoughts.
(Note: Thx Tom (@tvgtvg) for the discussion that led to this post!)