Feeds

The IT manager's guide to social computing

Behind the firewall

Eight steps to building an HP BladeSystem

So much social computing depends on people giving freely. Their reasons may be selfish (I want to be known as an expert on x) but they post articles, snippets and links to stuff they find interesting and their visitors benefit too.

Some people consider themselves too busy, but social computing offers time-saving opportunities which might, just might, persuade them to participate. Some people are conditioned to be consumers, rather than suppliers, of information. For the best results in the social computing world, give is as important as take.

If a particular wiki page, a blogger or a forum is of interest to you, then you can usually pick up its RSS or Atom feed. You are then only ‘pinged’ when something changes on the page of interest. Some email programs can ‘aggregate’ these feeds, some people prefer to use a purpose-built aggregator. In any event, you no longer have to visit pages in case they’ve changed. You will be tipped off.

You can search the social computing datastores by keyword search, Google style, but you will know from this that the results are not always quite what you hoped for. Having said that, keyword search is already more popular than navigating intranets by menus or the indexes compiled by the web team.

Tagging, that is adding keywords to the material you create, provides a quick way for people to see that the terms are an important element of what you’ve posted. Better than this, though, is the ability of visitors to pages to add their own tags. These lead to the emergence of a folksonomy. This is something like a taxonomy but far less rigid and more likely contain the sort of terms that users prefer.

You can then look for information by its tags and see who else is using the same tags and find out more about them. Depending on how diligently tagging is adopted, it is possible to divine a huge amount about a user’s interests, as well as finding other material which they like and which might, therefore, interest you. This downside of tagging is that you might reveal more about yourself than you intended.

Adoption rates

Social computing technologies are intended to be easy to learn and use. Just as the PC took off inside the organisation with the arrival of the spreadsheet, and email took off with the arrival of the @, so social computing is expected to take off with the advent of easy-to-use tools.

Socialtext, for example, is a business wiki/blog software provider which (astonishingly, some might say) introduced WYSIWYG (what you see is what you get) editing earlier this year. Adoption rates at client Dresdner Kleinwort Wasserstein (DrKW) immediately soared.

It pays to approach social software implementation carefully. It requires senior management commitment. Even in the labs examples mentioned earlier, the projects had board level support, even though IT wasn’t involved in the early stages. At DrKW up to an hour was set aside to run people through the basics.

The general idea has to be to show support from the top, to fill the initial wikis and blogs with interesting stuff to make users curious. They are then encouraged to participate and are praised when they do. Criticism needs to be handled very carefully in the early stages. As more people participate, the greater the value of the network and the more benefits will flow from the exchange of information. It does seem, though, that after the initial seeding and the visible participation and support of management, users need to feel that it is their system and nurture it according to their own requirements.

The claimed benefits, especially for wikis, are that collaborative projects are accelerated, emails are hugely reduced, innovation happens through serendipitous connections, unnecessary barriers are broken down and the risks posed by leaving staff are reduced because their contributions remain.

IT can play a significant role in terms of providing a secure computing platform and taking care of backups. It can implement the software as web services or use external hosts. Either way, IT’s job would be to facilitate then get out of the way. This is not meant unkindly, but the management part relates primarily to providing the tools, the communication capability and the hardware. It may extend to exchanging information feeds and links between existing and new systems.

The systems described are typically low cost, yet they bring practical and highly valued capabilities to knowledge workers. Some IT departments have realised that these new tools can help users act as a surrogate helpdesk, dramatically cutting the cost of IT support as users help each other out for free. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.