SlideShare a Scribd company logo
1 of 12
Download to read offline
© 2011 IBM Corporation
Der IBM JamCamp Bus
zu Gast bei der BWI
Die Zukunft von eMail und die mögliche Rolle
von sozialen Netzwerken in Streitkräften
Marco Schrader – Vertriebsleiter IBM Collaboration Solutions,
FK d.R.
Oktober 2011
© 2011 IBM Corporation2
Agenda
 Zu meiner Person
 Die Zukunft von eMail
 Welche Rolle können soziale
Netzwerke in den Streitkräften
spielen?
 Q & A
© 2011 IBM Corporation3
Zu meiner Person
 Jugend und Schule in Göttingen
 12 Jahre Marineoffizier
 Seit 2006 im Bereich IBM Lotus /
Collaboration Solutions
 Aktiver Reserveoffizier im Bereich
Presse- und Öffentlichkeitsarbeit der
Marine
 Webaffin
 Auto- und Motorrad-verrückt, Segler
 Junger Vater
© 2011 IBM Corporation4
Die Zukunft von eMail
 Was ist eMail heute?
– Delegations Machine?
– Ein Gefängnis?
– Inflationär und überlaufen, dadurch
unproduktiv?
– Immer das Beste Werkzeug für eine
Aufgabe?
– Ersatz für Wissensmanagement?
 Ist eMail noch state-of-the-art?
 Hat Jeder gelernt eMail effektiv zu nutzen?
– Mail Anhänge und deren Größe
– Größe von Verteilern, reply-2-all Unsitte
→ eMail ist ein gutes
Kommunikations-Werkzeug, jedoch
ein schlechtes Collaborations-Tool.
Luis Suarez, IBM
© 2011 IBM Corporation5
Das Problem ist,
zu wenig Menschen haben diese Einsicht
bislang.
Doch es besteht Hoffnung:
- immer mehr Organisationen führen eMail-freie Tage ein.
- Collaboration Werkzeuge für Gruppen setzen sich langsam durch
- eine neue Generation von Nutzern kommt zu uns
(“eMail is so last week”)
© 2011 IBM Corporation6
Meine / IBMs Prognose
 Email wird weiter existieren
 Email wird langsam an Bedeutung
verlieren
 Email wird zu seinen Wurzeln
zurückkehren
 Social Software wird die Bedeutung
übernehmen, die eMail abgibt; und
wird somit seine eigene Bedeutung
zusätzlich erhöhen.
Video abspielen
© 2011 IBM Corporation
Welche Rolle können
soziale Netzwerke (oder
allgemeiner Social Software
generell) in Streitkräften
spielen?
© 2011 IBM Corporation8
Die Bundeswehr war sehr früh mit Social Software Projekten aktiv
 Frühe Projekte mit Communities und Chats im
Bereich Nachwuchswerbung und
Nachwuchsgewinnung (karriere.bundeswehr.de).
Erfolgreicher großer Wiki bei der Luftwaffe.
jedoch:
 Know-how (Aufbau) jedoch zumeist extern bei den
eingekauften Agenturen.
 Kleinere Echtzeit- / Chat-Projekte in verschiedenen
Bereichen der Streitkräft (Marine, höhere
Kommandobehörden ect.)
 Kein flächendeckender Rollout im Inneren, immer
kleine Inseln, Fokus nach Außen
© 2011 IBM Corporation9
Welche Rolle kann Social Software spielen?
Aus meiner Sicht, eine ENTSCHEIDENDE!
 Sowohl nach Innnen als auch nach Außen kann
Social Sofware eine entscheidende Rolle spielen.
 Einige der dringendsten Herrausforderungen der
Streitkräfte, können unterstützt durch Social
Software angegangen werden:
– Potentialhebung und Vernetzung bei und von
Reservisten
– Informelle Weiterbildung
– Wissensmanagement, Vorschlagswesen
– Lessons-Learnt Aufarbeitung
– Gründung von flexiblen ad-hoc
Wissensräumen (zB Lybien, Piraterie, UN-
Recht ect.)
– Presse- und Öffentlichkeitsarbeit
 Gleichzeitig gehe ich aktiv mit diesem wichtigen
Thema um und biete eine sichere und kontrollierte
Alternative zu öffentlichen “Tummelplätzen”
© 2011 IBM Corporation10
Was kann die Bundeswehr gewinnen? Wo liegen die Gefahren?
 Aus weniger Ressourcen Mehr herausholen
Vernetzung und Kommunikation ist der Befähiger.
 Wertvoller Beitrag zur Motivation und Arbeitsplatz
Attraktivität
 Thema “eingestufte Informationen” - Umgang mit
diesen → Social Media Guidelines,
Gruppenbildung
 Haftung (im Wiki stand, man kann das Triebwerk
auch so und so warten...)
• © IBM Corporation 2011. All Rights Reserved.
• The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in
this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject
to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in
this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the
applicable
license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will
result in any specific sales, revenue growth or other results.
• If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience
will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the
workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
• If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and
performance characteristics may vary by customer.
• Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus®
Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to
http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product
names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation.
IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation
in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
• If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
• If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
• If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
• If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:
Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and
other countries.
• If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:
UNIX is a registered trademark of The Open Group in the United States and other countries.
• If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
• If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank,
Acme)
please update and insert the following; otherwise delete:
All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only.
Legal Disclaimer

More Related Content

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Social business bwi_bundeswehr_10_2011_pdf

  • 1. © 2011 IBM Corporation Der IBM JamCamp Bus zu Gast bei der BWI Die Zukunft von eMail und die mögliche Rolle von sozialen Netzwerken in Streitkräften Marco Schrader – Vertriebsleiter IBM Collaboration Solutions, FK d.R. Oktober 2011
  • 2. © 2011 IBM Corporation2 Agenda  Zu meiner Person  Die Zukunft von eMail  Welche Rolle können soziale Netzwerke in den Streitkräften spielen?  Q & A
  • 3. © 2011 IBM Corporation3 Zu meiner Person  Jugend und Schule in Göttingen  12 Jahre Marineoffizier  Seit 2006 im Bereich IBM Lotus / Collaboration Solutions  Aktiver Reserveoffizier im Bereich Presse- und Öffentlichkeitsarbeit der Marine  Webaffin  Auto- und Motorrad-verrückt, Segler  Junger Vater
  • 4. © 2011 IBM Corporation4 Die Zukunft von eMail  Was ist eMail heute? – Delegations Machine? – Ein Gefängnis? – Inflationär und überlaufen, dadurch unproduktiv? – Immer das Beste Werkzeug für eine Aufgabe? – Ersatz für Wissensmanagement?  Ist eMail noch state-of-the-art?  Hat Jeder gelernt eMail effektiv zu nutzen? – Mail Anhänge und deren Größe – Größe von Verteilern, reply-2-all Unsitte → eMail ist ein gutes Kommunikations-Werkzeug, jedoch ein schlechtes Collaborations-Tool. Luis Suarez, IBM
  • 5. © 2011 IBM Corporation5 Das Problem ist, zu wenig Menschen haben diese Einsicht bislang. Doch es besteht Hoffnung: - immer mehr Organisationen führen eMail-freie Tage ein. - Collaboration Werkzeuge für Gruppen setzen sich langsam durch - eine neue Generation von Nutzern kommt zu uns (“eMail is so last week”)
  • 6. © 2011 IBM Corporation6 Meine / IBMs Prognose  Email wird weiter existieren  Email wird langsam an Bedeutung verlieren  Email wird zu seinen Wurzeln zurückkehren  Social Software wird die Bedeutung übernehmen, die eMail abgibt; und wird somit seine eigene Bedeutung zusätzlich erhöhen. Video abspielen
  • 7. © 2011 IBM Corporation Welche Rolle können soziale Netzwerke (oder allgemeiner Social Software generell) in Streitkräften spielen?
  • 8. © 2011 IBM Corporation8 Die Bundeswehr war sehr früh mit Social Software Projekten aktiv  Frühe Projekte mit Communities und Chats im Bereich Nachwuchswerbung und Nachwuchsgewinnung (karriere.bundeswehr.de). Erfolgreicher großer Wiki bei der Luftwaffe. jedoch:  Know-how (Aufbau) jedoch zumeist extern bei den eingekauften Agenturen.  Kleinere Echtzeit- / Chat-Projekte in verschiedenen Bereichen der Streitkräft (Marine, höhere Kommandobehörden ect.)  Kein flächendeckender Rollout im Inneren, immer kleine Inseln, Fokus nach Außen
  • 9. © 2011 IBM Corporation9 Welche Rolle kann Social Software spielen? Aus meiner Sicht, eine ENTSCHEIDENDE!  Sowohl nach Innnen als auch nach Außen kann Social Sofware eine entscheidende Rolle spielen.  Einige der dringendsten Herrausforderungen der Streitkräfte, können unterstützt durch Social Software angegangen werden: – Potentialhebung und Vernetzung bei und von Reservisten – Informelle Weiterbildung – Wissensmanagement, Vorschlagswesen – Lessons-Learnt Aufarbeitung – Gründung von flexiblen ad-hoc Wissensräumen (zB Lybien, Piraterie, UN- Recht ect.) – Presse- und Öffentlichkeitsarbeit  Gleichzeitig gehe ich aktiv mit diesem wichtigen Thema um und biete eine sichere und kontrollierte Alternative zu öffentlichen “Tummelplätzen”
  • 10. © 2011 IBM Corporation10 Was kann die Bundeswehr gewinnen? Wo liegen die Gefahren?  Aus weniger Ressourcen Mehr herausholen Vernetzung und Kommunikation ist der Befähiger.  Wertvoller Beitrag zur Motivation und Arbeitsplatz Attraktivität  Thema “eingestufte Informationen” - Umgang mit diesen → Social Media Guidelines, Gruppenbildung  Haftung (im Wiki stand, man kann das Triebwerk auch so und so warten...)
  • 11.
  • 12. • © IBM Corporation 2011. All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. • If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. • If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. • Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. • If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. • If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. • If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. • If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. • If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only. Legal Disclaimer