SlideShare a Scribd company logo
1 of 9
Social Media
Intranet Social Media
Collaboration
SharePoint MySite
Tagging Communities Richer Profiles Document Ratings Enterprise Search
Intranet Social Media
Intranet

More Related Content

What's hot (8)

Real-Time Marketing in a world of Search and Social
Real-Time Marketing in a world of Search and SocialReal-Time Marketing in a world of Search and Social
Real-Time Marketing in a world of Search and Social
 
Sharepoint Server 2010 Product Comparison
Sharepoint Server 2010 Product ComparisonSharepoint Server 2010 Product Comparison
Sharepoint Server 2010 Product Comparison
 
SharePointSocialService
SharePointSocialServiceSharePointSocialService
SharePointSocialService
 
Personal Branding Through Linked In
Personal Branding Through Linked InPersonal Branding Through Linked In
Personal Branding Through Linked In
 
Social Is The Next Search2010
Social Is The Next Search2010Social Is The Next Search2010
Social Is The Next Search2010
 
Sharepoint 2010 social features
Sharepoint 2010 social featuresSharepoint 2010 social features
Sharepoint 2010 social features
 
BPC10 BuckleyMetadata-share
BPC10 BuckleyMetadata-shareBPC10 BuckleyMetadata-share
BPC10 BuckleyMetadata-share
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 

Viewers also liked (8)

Understanding entrepreneurship
Understanding entrepreneurshipUnderstanding entrepreneurship
Understanding entrepreneurship
 
Pratuang
PratuangPratuang
Pratuang
 
Job Hunting 101
Job  Hunting 101Job  Hunting 101
Job Hunting 101
 
Tantawan
TantawanTantawan
Tantawan
 
Cyber Bullying new
Cyber Bullying newCyber Bullying new
Cyber Bullying new
 
C:\fake path\aturan dasar pengembangan ktsp
C:\fake path\aturan dasar pengembangan ktspC:\fake path\aturan dasar pengembangan ktsp
C:\fake path\aturan dasar pengembangan ktsp
 
Aturan Dasar Pengembangan Ktsp
Aturan Dasar Pengembangan KtspAturan Dasar Pengembangan Ktsp
Aturan Dasar Pengembangan Ktsp
 
Tantawan
TantawanTantawan
Tantawan
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

Social Media and the Intranet

Editor's Notes

  1. Social media class we learned – how to apply social media to outside marketing and branding.Lots of tools under the umbrella of Social Media
  2. How can we apply social media to the intranet at Credit Union One?Currently working on a project to develop an internal Intranet project. Talk about this project and give some background of where we are at with the project. Main tool for the intranet: SharePoint.
  3. Is there a way to take the external social media tools and put them under the umbrella of the CUONE intranet?SharePoint provides us with some ways to do this.
  4. Is collaboration in the current CUONE organization and network set up possible. Main branch at Ferndale and all the separate disconnected branches.Use the R: drive for document storage, but is there true collaboration?Is collaboration Important?
  5. Collaboration within a company is EVERYTHING!’In the design of the intranet site and as the IT department we need to provide the tools that will help the employees collaborate better while doing their jobs.Why is it important? Opens the doors for independent voices Representation of unique and diverse points of view The more voices, the better chance of developing solutions and strategies that meet our members needs. Collaboration bridges gaps – gender, generational, social Helps to merge resourcesHow can we support collaboration using Social Media tools on an Intranet.
  6. SharePoint provides many tools to aid in collaboration. Document Libraries Collaborative workspaces Shared calendars Alerts Notifications Connections with team members Many more…But we’re going to talk about one specific method here that takes some of that into consideration…Refer to your handouts please…
  7. What’s on the horizon with Sharepoint 2010.Tagging – allowing users to add tags and entries to identify content within sharepointCommunities – create user communities within SharePoint through Blogs, Wikis, Podcasts, workspaces and more.Richer Profiles – enhancements to profiles to incorporate them into searches and documents and allow you to rate documents and make things that you find useful.Document Ratings – rating a document based on how useful it is, and this rating is taken into considerations for searches within SharePoint.Enterprise Search – Vastly improved searching feature in SharePoint 2010 that includes the enhancements mentioned above, is faster and includes relevance factors, such as tagging, rating and usage. And much more.
  8. Using SharePoint we can bring the functionality and even some of the external social media tools under the umbrella of the CUONE intranet.
  9. So, through the Intranet project, I’m hoping that CUONE will not only make use of the external social media tools we learned about in this class, but also include SharePoint as a way to internally jump on the bandwagon.