Feeds

What’s driving collaboration?

Taggers and microbloggers, eat your hearts out

  • alert
  • submit to reddit

High performance access to file storage

Thanks, folks, for your responses to last week's collaboration poll. Jolly interesting reading it made too. It puts the lie to all these people who claim social tagging tools and microblogging are taking over the business world. They're not.

But then, five years ago, you could have said that blogging and wikis wouldn't penetrate the enterprise. But they have, and continue to do so.

So what the heck is going on? And, more importantly, do we have any clues about the direction the good ship collaboration is taking? Answers aplenty came from the survey.

Let's step back from the tools and examine the drivers for encouraging greater collaboration in the work environment. Accelerating work, retaining knowledge and improving innovation and creativity are the top three reasons to introduce this stuff, by quite a wide margin:

Fig1

But when it comes to what’s happening today, organisations are supporting ‘minimising travel’ and ‘accelerating work’ very well, followed by 'retaining knowledge' and 'improving innovation and creativity'. You’ll note that the highest scoring 'very well' represents just under twenty percent of the responses. You could say that serious collaboration is still a bit of a minority sport:

Fig2

In terms of the tools used to achieve the above results, real-time and asynchronous 'dialogue' tools all scored over 50 percent. We're talking here about wikis, web conferencing, screen-sharing/whiteboarding, instant messaging and VoIP. (Blogging came next, if you're interested, at 38 percent.) At the bottom of the heap were things like freeform tagging and social bookmarking. We are, it would seem, still essentially selfish.

Statistics are all very well, and they generally point to some enthusiasm for taking up collaborative software. However there always has to be one, doesn't there? This person, from an educational establishment in mainland Europe confessed, "The above does not fit well in my organisation. Knowledge retention, innovation/creativity and satisfaction are not considered by management." He or she added, "We don't have time to collaborate much, even though we try."

Tragic, isn’t it? We'll send the therapist round.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Microsoft: Windows version you probably haven't upgraded to yet is ALREADY OBSOLETE
Pre-Update versions of Windows 8.1 will no longer support patches
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.