Welcome!

Related Topics: Agile Computing

Agile Computing: Blog Feed Post

Seven Lessons We Learned from Our Social Networking Journey

Initially our network security team was concerned but top management presence helped

Any case study is about a success story and there are 2 ways to present it.

The first way is to explain how series of deliberate and logical decisions have led to the success. The steps may include iteration and failure but those are presented as a part of the overall process. The process is based on a vision and a clear goal and the people behind knew what they were doing. There is a clear demonstration of cause and effect relationship. It is presented as a chain of action taken, each action resulting in a logical outcome with the underlying assumption that the process is repeatable for similar situation.

The second way is to tell the truth.

Real story rarely proceeds on a straight line. Initial plan gets modified or even abandoned, the vision evolves, the goal changes. There are many failures on the way and there are unexpected success which are nowhere in the original vision. And, finally there is some amount of luck and coincidence!

Some of the successful steps taken would be the result of logical deliberation while others may be a result of organizational politics or taken to satisfy somebody’s gut feeling (? whim). Part of the result might just have happened because of change in the environment or as a byproduct of some other decision.

In other words, real story is always messy!

Our Social Networking Story

Our Yammer network grew from almost nothing to cover 40% of our people within two months. This had happened without any internal promotion. This happened almost a year back and since then the usage has been growing continuously.

Why did it happen? We don’t really have much of a clue!

To be fair to us, we did have an Enterprise 2.0 roadmap which was initiated about two and a half years back. Even before we made our roadmap, I had also created a Yammer account but that was lying dormant with around 30 users.

As a part of our roadmap we had rolled out a WIKI (using Media Wiki) with some success, a BLOG (using WordPress) with reasonable success (*) and an Enterprise Social Media (using Elgg) which totally failed. We analyzed the failure and concluded that to have any change of success we need a social media which has a user interface which is similar to Facebook or LinkedIn. Off course, there were a group of people who thought neither do we need an enterprise social media platform nor will any such platform succeed.

[* I call Blogging a reasonable success because the stats compared quiet favorably with IBM’s published case study – IBM had approximately 1 in 25 employee blogging vs. our stats of 1 in 20]

Then...Yammer just took off!



Was there a conscious plan to adopt it?
… No.

Did we promote it internally? … No.

Was there any correlation between our decision to look for a Facebook or LinkedIn lookalike platform and the takeoff of Yammer? … Not likely – it happened more than 3 month after the decision. Though it is very tempting to state that they are correlated, my discussion with the early adopters did not bring out any such correlation.

Did top management participate? Did their participation help? … Very likely – about a month after it started taking off, our CEO, head of HR and other senior managers joined in. The pace accelerated after that and it is visible in the graph.

What is Yammer?

If you are not aware what Yammer is and not yet Googled it then here is the link. Any organization can setup an account where people can login if they have an email address in the specified domain of the organization. The interface is more like Google+ though there is no concept of a circle or friend.

What do people use Yammer for?

Basically it is used to share stuff – both light material like jokes and heavy stuff like technical article. Several (more than 200) special interest groups have former … some are very active while others are dormant.

People also crib about what they don’t like – about the available facilities … about the company. Surprisingly, some of these cribs get addressed.

Any achievements, especially group achievements, gets posted and liked … it becomes an instant form of recognition.

Any posts by our CEO and other senior managers have been popular and generates quite a bit of discussion.

Some groups have used it to announce internal events.

Sometimes, it has also been used to get feedback before introducing something new.

People have tried using it for finding solution for technical problem and locating people with specific expertise … but other methods like sending email to our “TechShare” mailing list has been more popular and effective.

In a nutshell, people are using it effectively for different reason but we still have no way to quantify the benefit.

Did we face any problem?

Once in a while people post inappropriate jokes. All we had to do was to tell them that some people might find it offensive – they have taken it off voluntarily. Interested people have created a group for posting jokes with a warning…

All fun loving staff who wants to share jokes are welcome!! Serious types please beware before joining this group!! Your emotions are at stake!

Initially our network security team was concerned but top management presence helped.

Many of our people work in our customer environment where the network policies are dictated by the customer. So, for some people Yammer access is not possible during office hours.

What did we learn? ...4 dos

  1. Expect the unexpected – look at our Yammer success
  2. Senior management participation helps – to quote one of the early adopters …“where else will you get an opportunity to interact with our CEO?”
  3. Be patient – collaboration does not happen overnight
  4. Better to treat you employees as adults – pointing out inappropriate behavior is generally sufficient

And...3 don’ts

  1. Do not try to sell social networking – it may be counter productive
  2. Do not look for an ROI – it may be difficult to quantify unless you fudge the figure
  3. Do not expect social networking to solve all problems – I am always suspicious of any solution which promises to solve all problems!

Finally...

Are these lessons of any use to you? May be … may be not.

You should take each of these advice with a pinch of salt and see if it makes sense in your situation.

I would not be surprised if you come up with a list which is diametrically opposite to this.

More Stories By Udayan Banerjee

Udayan Banerjee is CTO at NIIT Technologies Ltd, an IT industry veteran with more than 30 years' experience. He blogs at http://setandbma.wordpress.com.
The blog focuses on emerging technologies like cloud computing, mobile computing, social media aka web 2.0 etc. It also contains stuff about agile methodology and trends in architecture. It is a world view seen through the lens of a software service provider based out of Bangalore and serving clients across the world. The focus is mostly on...

  • Keep the hype out and project a realistic picture
  • Uncover trends not very apparent
  • Draw conclusion from real life experience
  • Point out fallacy & discrepancy when I see them
  • Talk about trends which I find interesting
Google

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...