Yammer’s Integration With SharePoint – Part 2

Yammer’s Integration With SharePoint – Part 2

Read Part 1

Future Road Map of SharePoint-Yammer Integration

According to Jared Spataro, Senior Director, Microsoft Office Division, who also leads the SharePoint business and works closely with Adam Pisoni and David Sacks on Yammer integration, their next step would be integration with Office365. Summer of this year will witness an update in Office 365 service and customers will be able to replace the SharePoint newsfeed with Yammer. This feature is desired as many customers are worried about confusing their users with two different feeds, and this update will allow them to simply replace the “Newsfeed” link on the Office 365 global navigation bar with a link to Yammer.com. According to Spataro, “We’ll also ship a Yammer app in the SharePoint Store so that end users can easily embed a Yammer group feed into a SharePoint site, creating a connection between groups and sites that will deliver the best of both worlds. The SharePoint newsfeed will continue to be the default social experience in Office 365, but the option to replace it with Yammer will be a valuable first step in the overall integration process.

The next step on the roadmap is known as “Deeper Integration” planned in fall this year, which will bring another update to Office 365 and deepen the integration. It will allow Single Sign-on (SSO) and seamless navigation. It means when user will click on Yammer link in the Office365 global navigation bar, Yammer will appear immediately below with links to get back to Office 365 services like Sites and Outlook. This converged look will also have new rich document capabilities and will integrate Office Web Apps to add editing and co-editing of Word, PowerPoint, and Excel documents. The bigger vision is making Yammer an underlying enterprise social layer across Office, Exchange, Lync, and Dynamics integrated into SharePoint, which seems a long term and complex endeavor.

The next year will witness continued updating of Office 365 with new social enhancements that would appear every three months. Incremental enhancements will combine social, collaboration, email, messaging, video, voice and line of business applications.

Industry Impact Analysis of Yammer SharePoint Integration

Gartner analyst Larry Cannell believes that this integration could be market-changing but what matters is how much time it takes. He said that companies shouldn’t start planning ahead of the time just based on Microsoft promises, and should not scrap their current enterprise social networking plans or implementation if they are fulfilling their requirement.

The long-term vision described at the SharePoint Conference was aspirational in nature. Microsoft’s post references this when talking about ‘Connected Experiences and says they will combine social, collaboration, email, instant messaging, voice, video, and line of business applications in innovative new ways.’ However, this is mostly a summary of what Microsoft already has said and enterprises should not get swept up in these grand visions and lose focus on what is really being delivered”, he writes in his blog. “Replacing SharePoint’s newsfeed is not as simple as embedding a Yammer feed”.

Companies need to evaluate their need of enterprise social collaboration and should not over-rely on promises before something concrete is visible from this integration.

By Krishan Lal Khatri

About Krishan Lal Khatri

Krishan is a technology researcher and writer with over 12 years experience in telecommunication industry. He has a masters degree in Electronic Engineering and is member of IEEE and ISOC. He has worked with leading telecommunication service providers in Pakistan and United Arab Emirates for 10 years and then switched to teaching and research by joining a public sector university. He is currently pursuing PhD in Electrical Engineering.

View All Articles

Sorry, comments are closed for this post.

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…