Feeds

The IT manager's guide to social computing

Behind the firewall

High performance access to file storage

So much social computing depends on people giving freely. Their reasons may be selfish (I want to be known as an expert on x) but they post articles, snippets and links to stuff they find interesting and their visitors benefit too.

Some people consider themselves too busy, but social computing offers time-saving opportunities which might, just might, persuade them to participate. Some people are conditioned to be consumers, rather than suppliers, of information. For the best results in the social computing world, give is as important as take.

If a particular wiki page, a blogger or a forum is of interest to you, then you can usually pick up its RSS or Atom feed. You are then only ‘pinged’ when something changes on the page of interest. Some email programs can ‘aggregate’ these feeds, some people prefer to use a purpose-built aggregator. In any event, you no longer have to visit pages in case they’ve changed. You will be tipped off.

You can search the social computing datastores by keyword search, Google style, but you will know from this that the results are not always quite what you hoped for. Having said that, keyword search is already more popular than navigating intranets by menus or the indexes compiled by the web team.

Tagging, that is adding keywords to the material you create, provides a quick way for people to see that the terms are an important element of what you’ve posted. Better than this, though, is the ability of visitors to pages to add their own tags. These lead to the emergence of a folksonomy. This is something like a taxonomy but far less rigid and more likely contain the sort of terms that users prefer.

You can then look for information by its tags and see who else is using the same tags and find out more about them. Depending on how diligently tagging is adopted, it is possible to divine a huge amount about a user’s interests, as well as finding other material which they like and which might, therefore, interest you. This downside of tagging is that you might reveal more about yourself than you intended.

Adoption rates

Social computing technologies are intended to be easy to learn and use. Just as the PC took off inside the organisation with the arrival of the spreadsheet, and email took off with the arrival of the @, so social computing is expected to take off with the advent of easy-to-use tools.

Socialtext, for example, is a business wiki/blog software provider which (astonishingly, some might say) introduced WYSIWYG (what you see is what you get) editing earlier this year. Adoption rates at client Dresdner Kleinwort Wasserstein (DrKW) immediately soared.

It pays to approach social software implementation carefully. It requires senior management commitment. Even in the labs examples mentioned earlier, the projects had board level support, even though IT wasn’t involved in the early stages. At DrKW up to an hour was set aside to run people through the basics.

The general idea has to be to show support from the top, to fill the initial wikis and blogs with interesting stuff to make users curious. They are then encouraged to participate and are praised when they do. Criticism needs to be handled very carefully in the early stages. As more people participate, the greater the value of the network and the more benefits will flow from the exchange of information. It does seem, though, that after the initial seeding and the visible participation and support of management, users need to feel that it is their system and nurture it according to their own requirements.

The claimed benefits, especially for wikis, are that collaborative projects are accelerated, emails are hugely reduced, innovation happens through serendipitous connections, unnecessary barriers are broken down and the risks posed by leaving staff are reduced because their contributions remain.

IT can play a significant role in terms of providing a secure computing platform and taking care of backups. It can implement the software as web services or use external hosts. Either way, IT’s job would be to facilitate then get out of the way. This is not meant unkindly, but the management part relates primarily to providing the tools, the communication capability and the hardware. It may extend to exchanging information feeds and links between existing and new systems.

The systems described are typically low cost, yet they bring practical and highly valued capabilities to knowledge workers. Some IT departments have realised that these new tools can help users act as a surrogate helpdesk, dramatically cutting the cost of IT support as users help each other out for free. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.