Business Collaboration: Yammer’s Integration With SharePoint – Part 1

Yammer’s Integration with SharePoint 

Engaging Social Experience to Enhance Productivity of Business Collaboration

Part-I

Microsoft’s acquisition of Yammer in mid 2012 for $1.2 billion has been continuously drawing IT managers’ attention as they looked upon SharePoint-Yammer integration as eye candy in business collaboration platform. Recently, Microsoft updated their roadmap issued in November last year and announced a detailed roadmap at Convergence 2013 for enterprise social collaboration through Yammer’s integration into SharePoint.

How Yammer Enhances SharePoint Experience

Before we discuss the updated roadmap, let’s have a look at Yammers social media platform capabilities that can enhance user experience in Microsoft SharePoint, one of the popular business collaboration platforms.

Yammer is the first and most powerful enterprise social network. It’s integration with SharePoint, the enterprise business collaboration platform, turns business collaboration into a mobile, social, and engaging experience. Yammer adds a real-time social layer to business collaboration core capabilities of SharePoint, which is regarded as a vehicle for more productivity by virtue of its capabilities for team and company-wide collaboration around files and projects, and conversations. Yammer mobile applications keep the users connected to conversations inside SharePoint while they are on the go.

How it works and Future Promises

Yammer feed that includes “My Feed” and “Group Feeds” can be embedded virtually into SharePoint sites to facilitate conversations within teams and among teams within a company. It also allows sending and tracking private messages to coworkers using a separate private messages tab, while new messages are managed through @mentions, replies, etc.

Since the integration supports single sign-on, SharePoint authentication credentials are sufficient to simultaneously log into Yammer through a single entry point. SharePoint’s built-in Web Part controls and templates are used to manage the Primary Yammer Web Part. Users without Yammer account can also view conversations if Yammer administrator configures read-only Yammer feeds. Unread Yammer messages are directly tracked in SharePoint. The recent addition is “Yammer Web Part for Office365” that enables embedding Yammer feeds using a web part specifically built for Office365 pages. The users can send links to documents, announcements and tasks from SharePoint to Yammer feeds for real-time collaboration. Searching is more informative and easy as relevant Yammer messages are displayed beside SharePoint search results. Activity Streams allow sharing of activity happening in SharePoint with your colleagues on Yammer.

Next…

Future Road Map of SharePoint-Yammer Integration

By Kristian Lal Khatri

About Krishan Lal Khatri

Krishan is a technology researcher and writer with over 12 years experience in telecommunication industry. He has a masters degree in Electronic Engineering and is member of IEEE and ISOC. He has worked with leading telecommunication service providers in Pakistan and United Arab Emirates for 10 years and then switched to teaching and research by joining a public sector university. He is currently pursuing PhD in Electrical Engineering.

View All Articles

Sorry, comments are closed for this post.

Comics
Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…