“Google’s purchase of YouTube has set off a flurry of analysts asking questions like, “Is this the bad old days of dot-com returning?” Or, “Why would anyone pay US$1.65 billion for a year-old company that hasn’t made a dime?” I am afraid these gurus are missing the point. You see, they don’t realize that the Internet has finally sunk to its own level — and that level, my friend, isn’t too high.” – From the news.
Read it loudly: It is NOT YouTube, it is “Social Network”. What is the buzz? What is “Social Networks”?
It is a new approach. It is a different search engine. It called “Social Network Applications”. Social Network refers to structural characteristics such as proximity to others, frequency of social contact and the type of relationship. Search3w Research Team are analyzing various scenarios on how Social Network Applications will apply on future Search Engines development.
The Technology of the Year: Social Network Applications
There is valuable information locked up inside your web of relationships. Who holds the key? The answer is now just a few keystrokes away.
These promising innovations just missed being crowned our Technology of the Year. What started as a bit of Net-induced whimsy is rapidly spawning some of the most interesting business software on the planet. Call them social network applications — computer programs that analyze networks of people, their contacts, and even their ideas. The programs do everything from helping salespeople generate leads to ferreting out connections among criminals to matching people in sprawling corporations with other folks inhouse who are working on similar projects. Social networking applies the power of the network to one of the most fundamental problems in all of business: finding the person who has the critical information you need, right when you need it. Michael Cleland, a vice president at management consultancy Cap Gemini Ernst & Young in Silicon Valley, has already experienced the technology’s potential. Cleland wanted to find an informal contact inside a large semiconductor company to learn more about the chip firm’s consulting needs. Phone calls and e-mail queries turned up nothing, so Cleland tapped into Spoke Connect, a social networking system developed by Palo Altobased Spoke Software. Founded in 2002, Spoke recently attracted $9.2 million in venture funding, and the company’s roster of pilot clients also includes consulting firms EDS (EDS) and A.T. Kearney.
Spoke works by indexing a firm’s e-mail archives, address books, buddy lists, and calendars to build a map of the company’s human network. The software also conducts Web searches to compile profiles about business prospects; these minibiographies are augmented with quotes from online articles to provide background on a potential customer’s interests or mind-set. The software revealed that one of Cleland’s close colleagues was friendly with a manager inside the semiconductor firm. A golf date was arranged, and Cleland got the information he needed. “Without the software, I would never have known about that connection inside the company,” he says. Indeed, Spoke says its pilot clients are seeing a 20 percent increase in the number of leads that salespeople can pursue. New York-based Visible Path notes that its social network tool shortens sales cycles by 27 percent and fattens deals by 10 percent. Its software also mines contact lists and customer-relationship management apps, and evaluates the strength of each relationship by considering factors such as how many e-mails were sent to a target, the ratio of responses, and response time.
Social network analysis first entered popular consciousness in 1967. That is when Harvard psychologist Stanley Milgram asked a group of volunteers to forward letters via acquaintances to a stockbroker who was identified only by his name, job, and general location. Milgram’s “it is a small world after all” conclusion was that instead of taking dozens of hops, as expected, a typical letter reached its destination in just six steps — giving rise to the now-famous “six degrees” theory of social connection. Since then, network analysis techniques have developed in tandem with the evolution of computing power. Graph theory — mathematics that represent objects by vertices and links — made it possible to assign quantitative values to social networks that represent how people interact. More recent advances assess the intimacy of connections using statistical theory that considers specific behavior patterns within a group. Today social network analysts study interactions as complex and varied as viral epidemics, terrorist organizations, and pathways to success in the corporate jungle. The Internet has democratized the field, putting the tools of social network analysis into the hands of, well, anyone who knows someone.
San Francisco-based Friendster, which recently received a reported $13 million in first-round VC funding, is a social networking site for young adults that is basically about social networking for its own sake. Friendster members — 2 million have signed up since the site launched in March — create personal profiles and publicly identify friends who also use the service. They can then browse the profiles of friends, and friends of friends, up to four degrees away.
Other social networking sites are also in the works. Former PayPal (PYPL) exec Reid Hoffman has launched a service called LinkedIn that uses referral networks to connect employers with job seekers. Two other startups, Ryze and ZeroDegrees, help busy businesspeople expand their professional networks. Also in beta is Tribe.net, an effort to meld social networking technology with job listings and community bulletin boards.
Other firms are using social networking for crime prevention and security. Operating on the assumption that birds of a feather tend to flock together, Las Vegas-based Systems Research & Development works with casinos like MGM Grand and Bellagio to identify employees and customers who have “nonobvious relationships” with known criminals or con artists. The CIA has been so impressed by SRD’s software that the agency’s venture
capital arm, In-Q-Tel, invested an undisclosed amount in the firm in 2002. Eventually, social networking technology may play a role in homeland security — say, by helping immigration officials assess the potential threat posed by travelers arriving from overseas.
Yet such possibilities also highlight the Achilles’ heel of social networking technology: privacy. The intensive data mining and background snooping required to develop an accurate picture of social networks is likely to make many citizens (and employees) uneasy — as evidenced by the recent flap over JetBlue’s (JBLU) disclosure of passenger information to a government software contractor. The desire to exploit social networks will inevitably conflict with the desire simply to be left alone. But in the end, the potential value of all that social capital will likely prove too tempting to resist. As it turns out, the old cliche — “It is not what you know, but who you know” — is truer than anyone ever realized.
Friends, you have the answer now why Google purchased YouTube, not for the money the paid, but at least for the idea. Google desperately needs “bottom-to-top” data, not “top-to-bottom” web crawling data as it doing today. Examine it closely: all recent beta products and acquisitions are all around this point – Getting data from the bottom… People like average Joe, Small business owners, etc.