Five Core Tenets of the Social Intranet

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five tenets of the new social intranet, as described by Chris Lynch from TIBCO Software Inc..

According to Chris Lynch from TIBCO Software Inc., there’s been no shortage of people saying that social computing represents the next wave of the corporate intranet, the latter being a piece of technology that’s been perpetually disappointing. For a place that’s supposed to be the starting point of people’s day, it has never lived up to that expectation.

The first wave of intranets were static, imposing too much friction for end-users who wanted to post new information. People had to wait for their IT department to hack HTML code and update the page. Then came the second generation of intranets — the self-service variety — that brought more functional use, but ultimately the most time you spent there was during your first and last week working at the company. They also lacked a critical element: People. Who does what? And who can help me get my job done better?

So naturally, enterprise social computing came to save the day and deliver that critical people element, right?

Well, yes, but that isn’t the most complicated part of the equation.

The new intranet will be a heterogeneous environment of systems across the whole company — and the challenges of actionable integration points and relevancy will far outweigh the people part of the equation. What the social intranet won’t be is a homogeneous, monolithic software stack that only incorporates people and systems based on one vendor’s view of the world. As a new generation of CIOs take the ranks, they’re realizing such a strategy for their corporate intranet isn’t “good enough” at all.

More Slideshows:


Top 20 Android Apps in the U.S.The top Android apps ranked by usage.

How to Stay in Business: Key Considerations for Disaster Recovery Steps to help you take advantage of the cloud for disaster recovery.

Five Online Services that Mean BusinessEnsure your business has access to the tools that can make it work better.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

email6-190x128 Six Tools to Help You Gain Control of Your Inbox

We spend hours every day sorting through incoming messages in an attempt to keep on top of projects, but have to deal with tons of spam, scams and less than productive trash. ...  More >>

DataM31-190x128 Five Ways Dirty Data Is Killing Marketing Performance

As marketing becomes increasingly data driven, it’s time for marketers to make data quality a top priority. ...  More >>

UnitrendsDogAteHomework0x A Presidential History of the 'Dog Ate My Email' Excuse

Ever since email first entered the White House, presidential administrations have used the "I lost my email" excuse to evade all sorts of controversies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date