Educational CyberPlayGround ®

knowledge management

Knowledge Management = establish best practice

Knowledge Management - Some of the fundamental questions that need to be answered include the following:

  • What information needs to be written down and organised?
  • What information should be discouraged from being written down because of its minimal value and the fact that it adds to information overload?
  • What information is best left in people's heads, with a skills signpost and contact details which allow that person to be directly communicated with?

2/28/12 Crunch your way through big data on your iPad?
Lucky Sort, is building a visualization and navigation engine called TopicWatch meant for discovering patterns in live data streams. According to Lucky Sort CEO and founder Noah Pepper, "everyone complains about information overload, but until now, there have been few technologies or solutions that can really help a user control and even take advantage of the data deluge in flexible and creative ways."



Every chunk of knowledge has a limited shelf life, becoming, at some point, obsolete – "obsoledge."

Accelerating change speeds up the rate at which knowledge becomes obsoledge. Every passing semi-second, accuracy of our knowledge about our investments, our markets, our competition, our technology and our customers will diminish. Obsoledge costs will be in the form of degraded decision-making.

Recognizing the importance of knowledge capital, places priority emphasis on education and knowledge transfer.
Work will continue to be driven by knowledge. The increased knowledge content of work means that communication and the speed of knowledge transfer will be increasingly critical to the success of business.


"Future Shock" People Suggest 40 Trends for Next 40 Years Launches

June 17, 2010,
Practitioners, researchers, and the public can access information about Department grant programs. Department will make the grantmaking process more transparent to the public by providing easily accessible data about applications as well as applicants and their partners. The site will protect applicants' privacy and proprietary information.
The first competitive grant program featured on is the Investing in Innovation Fund (i3), which received nearly 1,700 applications before the competition closed in May 2010. The public can now view detailed information on all i3 applicants and run customized reports and summary analyses on subsets of applicants. The i3 data reflects the information that the Department received from applicants; it has not been reviewed for eligibility or otherwise modified by the Department. By offering this data, the Department is fulfilling President Obama's promise to provide unprecedented transparency for programs funded by the American Recovery and Reinvestment Act of 2009.

“The public has the right to know more about the efforts we consider funding, what programs and projects we do fund, and what outcomes we are achieving with those efforts,” said Secretary Arne Duncan. “ extends our commitment to transparency and provides additional tools that allow the public to analyze ED's investments.” is designed to be more user-friendly than traditional data sites by providing tools that allow users to visualize the data:

  • Charting and Graphing: includes charting and graphing tools that help the public understand general trends in the data sets. For example, users may select a specific criterion or multiple criteria—e.g. absolute priorities, grant types, and applicant types—and see how many applications meet those criteria.

  • Mapping: incorporates mapping to allow the public to see which initiatives are funded in their communities. Users can view grant applications on a map that includes the option of overlays by congressional districts, with additional overlays planned.

  • Filtering and Searching: lets users narrow the applications to only those of interest based on combinations of criteria. For example, a user could search for all LEA applicants in Texas that applied for grants to address a specific priority.

  • Data Exporting: allows users to export data sets in a file format that can be loaded easily into common spreadsheet and data analysis tools. Users may export either the entire data set or smaller sets that are filtered according to their selected criteria.


Tim Berners-Lee -- W3C director and WWW-Creator [source NYT 1.19. 98] 
"Most of the people who are working on the Web are not doing it because they have a frantic urge to program. They're doing it because they have a vision of how society should be improved. The difference is, now people can make social things possible by creating technology, whereas before, to make social things possible, really all you could do was make laws." [1] From Hans Rosling - exploring the the art of data visualization Knowledge management and Gapfinder Tools

Very interesting look at government data mining

Jeff Jonas' Non-Obvious Relationship Analysis (NORA) was sold to IBM,  which markets it as Entity Analytics

Database Electronic Research&Resources for Information Management


Computer-Security Video - A Short Film About Data Protection

Dr. Seuss Explains Why Computers Sometimes Crash!

(Read this aloud)

If a packet hits a pocket on a socket on a port, and the bus is interrupted at a very last resort, and the access of the memory makes your floppy disk abort, then the socket packet pocket has an error to report.

If your cursor finds a menu item followed by a dash, and the double-clicking icon puts your window in the trash, and your data is corrupted cause the index doesn't hash, then your situation's hopeless and your system's gonna crash!

If the label on the cable on the table at your house, says the network is connected to the button on your mouse, but your packets want to tunnel to another protocol, that's repeatedly rejected by the printer down the hall, and your screen is all distorted by the side effects of gauss, so your icons in the window are as wavy as a souse; then you may as well reboot and go out with a bang, 'cuz sure as I'm a poet, the sucker's gonna hang!

When the copy of your floppy's getting sloppy in the disk, and the macro code instructions is causing unnecessary risk,then you'll have to flash the memory and you'll want to RAM your ROM,
and then quickly turn off the computer and be sure to tell your Mom!



Educational CyberPlayGround: Find free Search Engine databases, Tools, Share Ware,...
Tools, Share Ware, Data Mining sources from the Educationanl CyberPlayGround. ... databases, Tools, Share Ware, and Data Mining sources. SEARCH FREE INFO - CYBRARIANS
2. Selling student information is a common practice.
Service, and data-mining firms that collect and ... encouraged teachers to collect the data from students, which was then ... privacy expectations" concerning the data on his computer even.
3. Educational CyberPlayGround: Researchers Crack Code In Cell Phones
its customers' internet traffic to data-mining equipment installed in ... with methods that erase data less completely but don ... that technique to protect data on its reporters' phones.

4. Massive Tracking of Web Users Planned Via ISPs.
Network analyzes URL click-stream data, such as web pages ... or accidentally misuse this data. You also must trust ... of these sorts of data collection and tracking infrastructures.

5. Personal Computer Security Tools found on the Educational CyberPlayGround®.
PeerMind, a new peer-to-peer monitoring and data mining service for entertainment ... 512.50. Stolen data offered on foreign ... sites offering stolen data and bogus identity

6. Educational CyberPlayGround: Protect your privacy and Find Security, Privacy, K12 ...
its customers' internet traffic to data-mining equipment installed in a secret ... 5. Don't trust your own data about how you use others' data.
7. Educational CyberPlayGround find resources for the Cybrarian and Librarian .
Internet explosion, the most current national data on library use shows that the ... librarians measure the quality of returns in data-mining stints.
8. Educational CyberPlayGround: What is ICANN? What does it really do? What does the ...
No ancillary data mining (e.g. using the queries to generate marketing data that is then sold.) h) Robust ... in local communities can cache the data and create local temporar DNS roots