The Future of Social Collaboration Randy Williams Enterprise Trainer and Evangelist AvePoint.

Slides:



Advertisements
Similar presentations
Yammer Technical Solutions Overview
Advertisements

Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Yammer for Executives Introductions.
SacProNet Sacramento Professional Network 1 Social Media Networking SacProNet Marketing Committee.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Agile insurance carrier - What the carrier has to look like? Glenn Lottering Senior Director, EMEA Insurance Product Strategy and Sales Consulting.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
SharePoint Mobile Improving efficiency of the mobile workforce Anthony Pham Product Support Manager KWizCom
Agenda Affiliate Marketing Background Essentials of Affiliate Marketing Adsmarket Solutions Mission Statement Process Methodology Summary About Adsmarket.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July Thierry Gasser TSP
Driving Engagement Five Reasons to Use SharePoint 2013 Communities.
Corporate Efficiency Meeting Improving Your Business Processes Using SharePoint and Beyond.
1 | © 2011 Oracle Corporation – Proprietary and Confidential.
Learning in White Water CompanyCommand: A Peer Production Case Example.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
SharePoint Server 2013 Features and Scenarios for IT Professionals First Lastname, Title March, 2014 Software Assurance Planning Services.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
Why Go Online? Website Necessities What Consumers Do Online Social Media Use is on the Rise Online Reputation Affects Consumer Decisions Agenda Consumers.
Welcome to Target! Presented by Myra Mawn and Mandy Robertson February 5, 2014.
Social media is no longer a choice but a necessity.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich Copyright.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
© 2009 IBM Corporation Smarter Decisions for Optimized Performance IBM Global Executive Forum Panel Discussion Business Analytics and Optimization Fred.
Blogs and forums Finding ways to engage and interact with your target market both on your own site and within other relative industry forums.
SOCIAL NETWORKING Stephanie Bowling, Jeff Hartman, Taylor Mitchell, Amanda Wilkerson 1.
Strategies for Social Media Marketing. SOCIAL MEDIA & YOUR AUDIENCE Find and engage with current and potential customers online! Social is now the top.
Building a Social Media Presence Participants will look at the BCPS social media outlets (Twitter, Facebook, Flickr, Vimeo, Instagram, blogs) and relevant.
©2012 Microsoft Corporation. All rights reserved..
Globalization. Innovation. Graduation. Marketing Through Social Media PANC Conference Tahira Stalberte Chief Communications Officer Union County Public.
© AvePoint 2013 Delve & The Office Graph: A Crash Course Paul Olenick Director, Product Strategy.
Click to add text © 2011 IBM Corporation From Jam to Action Enabling Organisational Transformation with Social Business Stuart J. McRae Executive Collaboration.
Putting Social Media to Good Use Jeff Moriarty, Sitewire Director Social Media Strategy.
Social Media – Why It Matters & Why You Should CONNECT to.
Yammer: Collaboration Beyond SharePoint Naomi Moneypenny.
Microsoft Virtual Academy Jamie McAllister | SharePoint MVP & Solution Architect Rob Latino | Program Manager in Office 365 Support.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Total Enterprise Mobility Comprehensive Management and Security
Brought to you by Dani Walker on a shoestring LEAD GENERATION.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Planning Engagement Kickoff
Surf smart training.
Office 365 FastTrack Planning Engagement Kickoff
92% of the world’s data was created in the past 2 years
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Impact of IT Consumerisation on Enterprise Security
8/6/2018 3:21 AM THR2261 Groups, and Teams and Sites, Oh My! The Ultimate Office 365 Groups Teardown John Peluso SVP Product Strategy, AvePoint Inc. Microsoft.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Enterprise Productivity Services
Microsoft Services Cloud Productivity Solutions
DESIGN, DEPLOY, COLLABORATE.
Employee Engagement and Empowerment
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
SMB practice development: Security play
Five Reasons to Use SharePoint 2013 Communities
Social Media and Networking: What it is & why it’s important
SMB practice development: Security play
Chris Ince ISO Lead Auditor Security Risk Management Ltd
The Future of Social Collaboration
Grow Your Business with Office 365 Yammer: Working Social
Increase productivity
Agenda About us Industry expertise Service Contact us.
Microsoft Data Insights Summit
08 | Configuring SharePoint Online
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

The Future of Social Collaboration Randy Williams Enterprise Trainer and Evangelist AvePoint

Randy Williams Evangelist / Architect Author

Agenda

Social collaboration notions

Top 10 myths about enterprise social collaboration 1. It is just a social networking site 2. It’s only for the young generation 3. It’s a waste of valuable time 4. It’s not as secure as and legacy apps 5. Social conversations aren’t legal records 6. Social collab and document management aren’t connected 7. It will only suit IT since they are more savvy 8. Roll-out the tool and the rest will follow 9. User-generated content may produce bad or incorrect information 10. Social collaboration activity isn’t going to affect my bottom line

Traditional business  Hierarchical, functional structures  Top-down management  Knowledge is power  Command and control

Business has changed  Hyper-connected and hyper-competitive  Global  Innovation driven  Decentralized  Baby boomer retirement – infusion of fresh blood  BYOD

The Internet generation  The Mindset List (  CD’s are vintage  Friendships are quantified on Facebook  Foursquare isn’t a schoolyard game

What can we learn from this generation

What can we learn?

Share of users who use social networking

Social network users by age 70% between 25 and 54

What are the drawbacks?

 Intellectual property and trade secrets  Sensitive customer information and data  Collaborations on strategy  Personal information  Legal and compliance issues  Information getting in the wrong hands The onslaught of risk and compliance issues related to Information sharing includes: The onslaught of risk and compliance issues related to Information sharing includes:

 Everyone is a content contributor  Don’t we need to preserve our IP?  What about DLP?  How about regulatory & statutory requirements?  In a recent survey*, 61% believe an accidental breach is “somewhat or very likely”

How likely do you think the following privacy breach risks are of occurring? Hackers gaining access 80% 70% 60% 50% 40% 30% 20% 10% 0% Accidental employee breach Accidental 3rd party breach Intentional Employee breach Intentional 3rd party breach 8% 61% 41% 30% 13%

Remember - it’s a trade off Transparency/ Collaboration Data Protection/ Management

Agenda

Introduction

Social Productivity Pillars Fundamentals identity, privacy, managing connections seamless, delightful, complete experiences Conversations make connections People are always available Context enriches interactions You always know what’s happening

My Site Host - The Landing Page

Community Home Page

Communities overview

Communities – design concepts

Tracking your reputation  People reputation is impacted by activities like creating posts, adding replies, etc.  Reputation is per community – reputation in one does not affect others  Reputation model cannot be extended  Community owners control points for each activity

Earning badges  Administrators also configure what point thresholds are required to achieve reputation rankings  Once a member reach a specific level he/she receives a badge that shows achievement goals reached  Achieved badges can be displayed as a ranking level or specific text

SharePoint 2013 Social Demo

Yammer

Yammer & SharePoint – What’s the future?

Agenda

Randy’s guidance on adopting social  Must have a social media strategy  The right guidance for users will vary by industry and culture  Identify community owners  Be sure to have a social policy  How to address inappropriate content  How to improve signal-to-noise ratio  Follow six steps for success

Six steps for success 1. Learn how tools work and what value can they bring 2. Focus on the goals - there should be a well-defined purpose 3. Identify the right tools for the job, keeping other channels in mind 4. Allocate resources to these solutions (it is an investment) 5. Define what success is and how to measure 6. Start small & be flexible – grow & adapt as needed

AvePoint’s “Rules of Engagement” for social  Be transparent  Be judicious  Write what you know  Use a disclaimer  It’s a conversation  Be responsible  Be a leader  Respect proprietary information and content  If it gives you pause, pause

Questions? Thank you