knowledge management
Knowledge Management = establish best practice
Knowledge Management - Some of the fundamental questions that need to be answered include the following:
- What information needs to be written down and organised?
- What information should be discouraged from being written down because of its minimal value and the fact that it adds to information overload?
- What information is best left in people's heads, with a skills signpost and contact details which allow that person to be directly communicated with?
2/28/12 Crunch your way through big data on your iPad?
Lucky Sort, is building a visualization
and navigation engine called TopicWatch meant for discovering patterns in live data
streams. According to Lucky Sort CEO and founder Noah Pepper, "everyone complains about information
overload, but until now, there have been few technologies or solutions that can really help a user control
and even take advantage of the data deluge in flexible and creative ways."
HIGH COSTS OF “OBSOLEDGE” WILL IMPACT GLOBAL COMPETITIVENESS
Every chunk of knowledge has a limited shelf life, becoming, at some point, obsolete -
"obsoledge."
Accelerating change speeds up the rate at which knowledge becomes obsoledge. Every passing semi-second, accuracy of our knowledge about our investments, our markets, our competition, our technology and our customers will diminish. Obsoledge costs will be in the form of degraded decision-making.
KNOWLEDGE IS A MAJOR SOURCE OF CAPITAL
Recognizing the importance of knowledge capital, places priority emphasis on education and knowledge
transfer.
Work will continue to be driven by knowledge. The increased knowledge content of work means that
communication and the speed of knowledge transfer will be increasingly critical to the success of
business.
"Future Shock" People Suggest 40 Trends for Next 40 Years
Data.ed.gov Launches
June 17, 2010 Data.ed.gov,
Practitioners, researchers, and the public can access information about Department grant
programs. Department will make the grantmaking process more transparent to the public by
providing easily accessible data about applications as well as applicants and their partners. The site
will
protect applicants' privacy and proprietary information.
The first competitive grant program featured on Data.ed.gov is the Investing in Innovation Fund (i3), which received
nearly 1,700 applications before the competition closed in May 2010. The public can now view detailed
information on all i3 applicants and run customized reports and summary analyses on subsets of applicants.
The i3 data reflects the information that the Department received from applicants; it has not been
reviewed
for eligibility or otherwise modified by the Department. By offering this data, the Department is
fulfilling
President Obama's promise to provide unprecedented transparency for programs funded by the American
Recovery and Reinvestment Act of 2009.
“The public has the right to know more about the efforts we consider funding, what programs and projects we do fund, and what outcomes we are achieving with those efforts,” said Secretary Arne Duncan. “Data.ed.gov extends our commitment to transparency and provides additional tools that allow the public to analyze ED's investments.”
Data.ed.gov is designed to be more user-friendly than traditional data sites by providing tools that allow users to visualize the data:
-
Charting and Graphing: Data.ed.gov includes charting and graphing tools that help the public understand general trends in the data sets. For example, users may select a specific criterion or multiple criteria—e.g. absolute priorities, grant types, and applicant types—and see how many applications meet those criteria.
-
Mapping: Data.ed.gov incorporates mapping to allow the public to see which initiatives are funded in their communities. Users can view grant applications on a map that includes the option of overlays by congressional districts, with additional overlays planned.
-
Filtering and Searching: Data.ed.gov lets users narrow the applications to only those of interest based on combinations of criteria. For example, a user could search for all LEA applicants in Texas that applied for grants to address a specific priority.
-
Data Exporting: Data.ed.gov allows users to export data sets in a file format that can be loaded easily into common spreadsheet and data analysis tools. Users may export either the entire data set or smaller sets that are filtered according to their selected criteria.
Tim Berners-Lee -- W3C director and WWW-Creator [source NYT 1.19. 98]
"Most of the people who are working on the Web are not doing it because they have a frantic urge to
program. They're doing it because they have a vision of how society should be improved. The difference
is, now people can make social things possible by creating technology, whereas before, to make social
things
possible, really all you could do was make laws." [1]
Gapfinder.org From Hans Rosling - exploring the the art of data visualization Knowledge management and Gapfinder Tools
Very
interesting look at government data mining
Jeff Jonas' Non-Obvious
Relationship Analysis (NORA) was sold to IBM, which markets it as Entity Analytics
Database Electronic Research&Resources for Information Management
WHY DID MY COMPUTER CRASH?
Computer-Security Video - A Short Film About Data Protection
Dr. Seuss Explains Why Computers Sometimes Crash!
(Read this aloud)
If a packet hits a pocket on a socket on a port, and the bus is interrupted at a very last resort, and the
access of the memory makes your floppy disk abort, then the socket packet pocket has an error to report.
If your cursor finds a menu item followed by a dash, and the double-clicking icon puts your window in the trash, and your data is corrupted cause the index doesn't hash, then your situation's hopeless and your system's gonna crash!
If the label on the cable on the table at your house, says the network is connected to the button on your mouse, but your packets want to tunnel to another protocol, that's repeatedly rejected by the printer down the hall, and your screen is all distorted by the side effects of gauss, so your icons in the window are as wavy as a souse; then you may as well reboot and go out with a bang, 'cuz sure as I'm a poet, the sucker's gonna hang!
When the copy of your floppy's getting sloppy in the disk, and the macro code instructions is causing
unnecessary risk,then you'll have to flash the memory and you'll want to RAM your ROM,
and then quickly turn off the computer and be sure to tell your Mom!
RESOURCES
Educational CyberPlayGround: Find free Search Engine databases, Tools,
Share Ware,...
Tools, Share Ware, Data Mining sources from the Educationanl
CyberPlayGround. ... databases, Tools, Share Ware, and Data Mining
sources. SEARCH FREE INFO - CYBRARIANS
2. Selling student information is a common
practice.
Service, and data-mining firms that collect and ... encouraged teachers
to
collect the data from students, which was then ... privacy expectations" concerning
the data on his computer even.
3. Educational CyberPlayGround: Researchers Crack Code In Cell
Phones
its customers' internet traffic to data-mining equipment installed
in
... with methods that erase data less completely but don ... that technique to protect
data on its reporters' phones.
4. Massive Tracking of Web Users Planned Via ISPs.
Network analyzes URL click-stream data, such as web pages ... or accidentally misuse this
data. You also must trust ... of these sorts of data collection and
tracking infrastructures.
5. Personal Computer Security Tools found on the Educational
CyberPlayGround®.
PeerMind, a new peer-to-peer monitoring and data mining service for
entertainment ... 512.50. Stolen data offered on foreign ... sites offering stolen
data and bogus identity
6. Educational CyberPlayGround: Protect your privacy and Find
Security, Privacy, K12 ...
its customers' internet traffic to data-mining equipment installed
in
a secret ... 5. Don't trust your own data about how you use others'
data.
7. Educational CyberPlayGround find resources
for
the Cybrarian and Librarian .
Internet explosion, the most current national data on library use shows that the ...
librarians measure the quality of returns in data-mining stints.
8. Educational CyberPlayGround: What is ICANN? What does
it really do? What does the ...
No ancillary data mining (e.g. using the queries to generate marketing
data that is then sold.) h) Robust ... in local communities can cache the
data and create local temporar DNS roots