knowledge management
Knowledge Management = establish best practice
Knowledge Management - Some of the fundamental questions that need to be answered include the following:
- What information needs to be written down and organised?
- What information should be discouraged from being written down because of its minimal value and the fact that it adds to information overload?
- What information is best left in people's heads, with a skills signpost and contact details which allow that person to be directly communicated with?
2/28/12 Crunch your way through big data on your iPad?
Lucky Sort
, is building a visualization and navigation engine called
TopicWatch
meant for discovering patterns in live data streams. According to
Lucky Sort CEO and founder Noah Pepper, "everyone complains about
information overload, but until now, there have been few
technologies or solutions that can really help a user control and
even take advantage of the data deluge in flexible and creative
ways."
HIGH COSTS OF “OBSOLEDGE” WILL IMPACT GLOBAL COMPETITIVENESS
Every chunk of knowledge has a limited shelf life, becoming, at
some point, obsolete - "
obsoledge
."
Accelerating change speeds up the rate at which knowledge becomes obsoledge. Every passing semi-second, accuracy of our knowledge about our investments, our markets, our competition, our technology and our customers will diminish. Obsoledge costs will be in the form of degraded decision-making.
KNOWLEDGE IS A MAJOR SOURCE OF CAPITAL
Recognizing the importance of knowledge capital, places priority
emphasis on education and knowledge transfer.
Work will continue to be driven by knowledge. The increased
knowledge content of work means that communication and the speed
of knowledge transfer will be increasingly critical to the success
of business.
"Future Shock" People Suggest 40 Trends for Next 40 Years
June 17, 2010
Data.ed.gov
,
Practitioners, researchers, and the public can access
information about Department grant programs.
Department will make the grantmaking process more transparent to
the public by providing easily accessible data about applications
as well as applicants and their partners. The site will protect
applicants' privacy and proprietary information.
The first competitive grant program featured on Data.ed.gov is the
Investing in Innovation Fund (i3)
, which received nearly 1,700 applications before the competition
closed in May 2010. The public can now view detailed information
on all i3 applicants and run customized reports and summary
analyses on subsets of applicants. The i3 data reflects the
information that the Department received from applicants; it has
not been reviewed for eligibility or otherwise modified by the
Department. By offering this data, the Department is fulfilling
President Obama's promise to provide unprecedented transparency
for programs funded by the American Recovery and Reinvestment Act
of 2009.
“The public has the right to know more about the efforts we consider funding, what programs and projects we do fund, and what outcomes we are achieving with those efforts,” said Secretary Arne Duncan. “Data.ed.gov extends our commitment to transparency and provides additional tools that allow the public to analyze ED's investments.”
Data.ed.gov is designed to be more user-friendly than traditional data sites by providing tools that allow users to visualize the data:
-
Charting and Graphing: Data.ed.gov includes charting and graphing tools that help the public understand general trends in the data sets. For example, users may select a specific criterion or multiple criteria—e.g. absolute priorities, grant types, and applicant types—and see how many applications meet those criteria.
-
Mapping: Data.ed.gov incorporates mapping to allow the public to see which initiatives are funded in their communities. Users can view grant applications on a map that includes the option of overlays by congressional districts, with additional overlays planned.
-
Filtering and Searching: Data.ed.gov lets users narrow the applications to only those of interest based on combinations of criteria. For example, a user could search for all LEA applicants in Texas that applied for grants to address a specific priority.
-
Data Exporting: Data.ed.gov allows users to export data sets in a file format that can be loaded easily into common spreadsheet and data analysis tools. Users may export either the entire data set or smaller sets that are filtered according to their selected criteria.
Tim Berners-Lee
-- W3C director and WWW-Creator [source NYT 1.19. 98]
"Most of the people who are working on the Web are not doing it
because they have a frantic urge to program. They're doing it
because they have a vision of how society should be improved. The
difference is, now people can make social things possible by
creating technology, whereas before, to make social things
possible, really all you could do was make laws." [
1
]
Gapfinder.org From Hans Rosling - exploring the the art of data visualization Knowledge management and Gapfinder Tools
Very interesting look at government data mining
Jeff Jonas'
Non-Obvious Relationship Analysis (NORA)
was sold to IBM, which markets it as
Entity Analytics
Database Electronic Research&Resources for Information Management
WHY DID MY COMPUTER CRASH?
Computer-Security Video - A Short Film About Data Protection
Dr. Seuss Explains Why Computers Sometimes Crash!
(Read this aloud)
If a packet hits a pocket on a socket on a port, and the bus is
interrupted at a very last resort, and the access of the memory
makes your floppy disk abort, then the socket packet pocket has an
error to report.
If your cursor finds a menu item followed by a dash, and the double-clicking icon puts your window in the trash, and your data is corrupted cause the index doesn't hash, then your situation's hopeless and your system's gonna crash!
If the label on the cable on the table at your house, says the network is connected to the button on your mouse, but your packets want to tunnel to another protocol, that's repeatedly rejected by the printer down the hall, and your screen is all distorted by the side effects of gauss, so your icons in the window are as wavy as a souse; then you may as well reboot and go out with a bang, 'cuz sure as I'm a poet, the sucker's gonna hang!
When the copy of your floppy's getting sloppy in the disk, and the
macro code instructions is causing unnecessary risk,then you'll
have to flash the memory and you'll want to RAM your ROM,
and then quickly turn off the computer and be sure to
tell your Mom!
RESOURCES
Educational CyberPlayGround: Find free Search Engine databases,
Tools, Share Ware,...
Tools, Share Ware,
Data
Mining
sources from the Educational CyberPlayGround. ... databases,
Tools, Share Ware, and
Data
Mining
sources. SEARCH FREE INFO - CYBRARIANS
2.
Selling student information is a common practice.
Service, and
data
-
mining
firms that collect and ... encouraged teachers to collect the
data
from students, which was then ... privacy expectations" concerning
the
data
on his computer even.
3.
Educational CyberPlayGround: Researchers Crack Code In Cell
Phones
its customers' internet traffic to
data
-
mining
equipment installed in ... with methods that erase
data
less completely but don ... that technique to protect
data
on its reporters' phones.
4.
Massive Tracking of Web Users Planned Via ISPs.
Network analyzes URL click-stream
data
, such as web pages ... or accidentally misuse this
data
. You also must trust ... of these sorts of
data
collection and tracking infrastructures.
5.
Personal Computer Security Tools found on the Educational
CyberPlayGround®.
PeerMind, a new peer-to-peer monitoring and
data
mining
service for entertainment ... 512.50. Stolen
data
offered on foreign ... sites offering stolen
data
and bogus identity
6.
Educational CyberPlayGround: Protect your privacy and Find
Security, Privacy, K12 ...
its customers' internet traffic to
data
-
mining
equipment installed in a secret ... 5. Don't trust your own
data
about how you use others'
data
.
7.
Educational CyberPlayGround find resources for the Cybrarian and
Librarian .
Internet explosion, the most current national
data
on library use shows that the ... librarians measure the quality
of returns in
data
-
mining
stints.
8.
Educational CyberPlayGround: What is ICANN? What does it really
do? What does the ...
No ancillary
data
mining
(e.g. using the queries to generate marketing
data
that is then sold.) h) Robust ... in local communities can cache
the
data
and create local temporar DNS roots