Networking

09:11 PM
Connect Directly
RSS
E-Mail
50%
50%

Skype In The Workspace: 3 Key Facts

Microsoft's popular Skype videoconferencing service officially goes social with a professional network for SMBs. Here's what you need to know.

3. It Could Be More Social Than Your Social Networks.

Because Skype in the Workspace overlays the platform's various communications services, it might actually make you more social -- even if you won't see the word "social" in Skype's marketing copy. That's because opportunities can lead not just to connections with legions of relatively anonymous Internet users but directly to conversations with actual people.

LinkedIn, for one, has taken steps in that direction by making phone numbers more apparent in its recent revamp. But Skype provides the actual phone or videoconference line, too.

"Making that easy connection and then connecting on Skype and taking the conversation from there seems to be very powerful," Cebeci said. "That's what we heard from the beta customers as well."

Social SMBs should find other elements of Skype's new service familiar, too. Users can offer testimonials about a business and its opportunities or other services, for example -- similar to how LinkedIn users can endorse each others' skills. Opportunities can be "favorite-d," as with favorite tweets or Facebook Likes. Then there's the simple fact that compelling opportunities will create connections -- by any name, they remain the core currency of social networks.

And there's the most obvious social element: Links with other well-known networks. At launch, Skype in the Workplace includes integrations with LinkedIn, Twitter and Google+. When you create an opportunity, you can simultaneously promote it across those networks. Facebook is conspicuously absent from Skype in the Workspace, although it could be added later. For now, the omission is by design.

"Given the professional nature of this, LinkedIn and Twitter seemed to be the most appropriate," Cebeci said.

Attackers are increasingly using a simple method for finding flaws in websites and applications: They Google them. Using Google code search, hackers can identify crucial vulnerabilities in application code strings, providing the entry point they need to break through application security. In our report, Using Google To Find Vulnerabilities In Your IT Environment, we outline methods for using search engines such as Google and Bing to identify vulnerabilities in your applications, systems and services--and to fix them before they can be exploited. (Free registration required.)

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Deb Donston-Miller
50%
50%
Deb Donston-Miller,
User Rank: Apprentice
11/12/2012 | 11:35:00 PM
re: Skype In The Workspace: 3 Key Facts
I always remember a sales director at a company I once worked at admonishing his sales staff to "Pick. Up. The. Phone." I think in many cases "just picking up the phone" via Skype will close some of the gaps we are seeing as companies try to connect the communications dots with social networking technologies.

Deb Donston-Miller
Contributing Editor, The BrainYard
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Twitter Feed