Welcome!

Related Topics: Agile Computing

Agile Computing: Blog Feed Post

Seven Lessons We Learned from Our Social Networking Journey

Initially our network security team was concerned but top management presence helped

Any case study is about a success story and there are 2 ways to present it.

The first way is to explain how series of deliberate and logical decisions have led to the success. The steps may include iteration and failure but those are presented as a part of the overall process. The process is based on a vision and a clear goal and the people behind knew what they were doing. There is a clear demonstration of cause and effect relationship. It is presented as a chain of action taken, each action resulting in a logical outcome with the underlying assumption that the process is repeatable for similar situation.

The second way is to tell the truth.

Real story rarely proceeds on a straight line. Initial plan gets modified or even abandoned, the vision evolves, the goal changes. There are many failures on the way and there are unexpected success which are nowhere in the original vision. And, finally there is some amount of luck and coincidence!

Some of the successful steps taken would be the result of logical deliberation while others may be a result of organizational politics or taken to satisfy somebody’s gut feeling (? whim). Part of the result might just have happened because of change in the environment or as a byproduct of some other decision.

In other words, real story is always messy!

Our Social Networking Story

Our Yammer network grew from almost nothing to cover 40% of our people within two months. This had happened without any internal promotion. This happened almost a year back and since then the usage has been growing continuously.

Why did it happen? We don’t really have much of a clue!

To be fair to us, we did have an Enterprise 2.0 roadmap which was initiated about two and a half years back. Even before we made our roadmap, I had also created a Yammer account but that was lying dormant with around 30 users.

As a part of our roadmap we had rolled out a WIKI (using Media Wiki) with some success, a BLOG (using WordPress) with reasonable success (*) and an Enterprise Social Media (using Elgg) which totally failed. We analyzed the failure and concluded that to have any change of success we need a social media which has a user interface which is similar to Facebook or LinkedIn. Off course, there were a group of people who thought neither do we need an enterprise social media platform nor will any such platform succeed.

[* I call Blogging a reasonable success because the stats compared quiet favorably with IBM’s published case study – IBM had approximately 1 in 25 employee blogging vs. our stats of 1 in 20]

Then...Yammer just took off!



Was there a conscious plan to adopt it?
… No.

Did we promote it internally? … No.

Was there any correlation between our decision to look for a Facebook or LinkedIn lookalike platform and the takeoff of Yammer? … Not likely – it happened more than 3 month after the decision. Though it is very tempting to state that they are correlated, my discussion with the early adopters did not bring out any such correlation.

Did top management participate? Did their participation help? … Very likely – about a month after it started taking off, our CEO, head of HR and other senior managers joined in. The pace accelerated after that and it is visible in the graph.

What is Yammer?

If you are not aware what Yammer is and not yet Googled it then here is the link. Any organization can setup an account where people can login if they have an email address in the specified domain of the organization. The interface is more like Google+ though there is no concept of a circle or friend.

What do people use Yammer for?

Basically it is used to share stuff – both light material like jokes and heavy stuff like technical article. Several (more than 200) special interest groups have former … some are very active while others are dormant.

People also crib about what they don’t like – about the available facilities … about the company. Surprisingly, some of these cribs get addressed.

Any achievements, especially group achievements, gets posted and liked … it becomes an instant form of recognition.

Any posts by our CEO and other senior managers have been popular and generates quite a bit of discussion.

Some groups have used it to announce internal events.

Sometimes, it has also been used to get feedback before introducing something new.

People have tried using it for finding solution for technical problem and locating people with specific expertise … but other methods like sending email to our “TechShare” mailing list has been more popular and effective.

In a nutshell, people are using it effectively for different reason but we still have no way to quantify the benefit.

Did we face any problem?

Once in a while people post inappropriate jokes. All we had to do was to tell them that some people might find it offensive – they have taken it off voluntarily. Interested people have created a group for posting jokes with a warning…

All fun loving staff who wants to share jokes are welcome!! Serious types please beware before joining this group!! Your emotions are at stake!

Initially our network security team was concerned but top management presence helped.

Many of our people work in our customer environment where the network policies are dictated by the customer. So, for some people Yammer access is not possible during office hours.

What did we learn? ...4 dos

  1. Expect the unexpected – look at our Yammer success
  2. Senior management participation helps – to quote one of the early adopters …“where else will you get an opportunity to interact with our CEO?”
  3. Be patient – collaboration does not happen overnight
  4. Better to treat you employees as adults – pointing out inappropriate behavior is generally sufficient

And...3 don’ts

  1. Do not try to sell social networking – it may be counter productive
  2. Do not look for an ROI – it may be difficult to quantify unless you fudge the figure
  3. Do not expect social networking to solve all problems – I am always suspicious of any solution which promises to solve all problems!

Finally...

Are these lessons of any use to you? May be … may be not.

You should take each of these advice with a pinch of salt and see if it makes sense in your situation.

I would not be surprised if you come up with a list which is diametrically opposite to this.

More Stories By Udayan Banerjee

Udayan Banerjee is CTO at NIIT Technologies Ltd, an IT industry veteran with more than 30 years' experience. He blogs at http://setandbma.wordpress.com.
The blog focuses on emerging technologies like cloud computing, mobile computing, social media aka web 2.0 etc. It also contains stuff about agile methodology and trends in architecture. It is a world view seen through the lens of a software service provider based out of Bangalore and serving clients across the world. The focus is mostly on...

  • Keep the hype out and project a realistic picture
  • Uncover trends not very apparent
  • Draw conclusion from real life experience
  • Point out fallacy & discrepancy when I see them
  • Talk about trends which I find interesting
Google

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...