Trending Sources

In Defense of Data Centrism

Martijn Linssen

No comments Trackbacks/Pingbacks Tweets that mention In Defense of Data Centrism | Organizational Knowledge Design -- Topsy.com - [.]

Data 27

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

For example, Google's code search. system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Security is not convenient. It's complicated.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Blockchain Revolution , his 16th book, now explains “How The Blockchain Will Transform Everything From Banking To Government To Our Identities.”.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content.

The Future of Work and Learning 2: Chatbots

Jane Hart

search for relevant or customised content (or courses) on say YouTube, Wikipedia or Coursera. Why chatbots? Take for instance,  Alice and Evie.

Waking up.

Martijn Linssen

“Fixing search” or “refreshing the taxonomy” fails to address the core problem. I think we are waking up.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. This proved to be very true. My folders. Again.

Doc Searls Weblog · Maybe they should call it ButtBook

Doc Searls

Please note that you will only appear in searches outside Facebook when your search settings are set to “Everyone&#. Hey, Buddy.

Reflections on Bitcoin

Irving Wladawsky-Berger

Just about every aspect of the world’s economy is involved.  that all the parties involved understand.  Others are pretty negative.  .

Social Media Planning and Evaluation for NGOs | Full Circle Associates

Nancy White

Do a search to see who has linked to that post? (Do you know how to do this on Google, Yahoo or Microsoft search? Keep what is working.

The postal model of privacy

Doc Searls

It was a pivotal moment in the debate, because the metaphor illustrated clearly how the Internet was designed to respect privacy. In The Only Way to Restore Trust in the NSA , security guru Bruce Schneier writes, “The public has no faith left in the intelligence community or what the president says about it. Respect, that is.

e-Clippings (Learning As Art): "MIT Researchers Advance Lecture Capture with Search Capabilities" (Campus Technology)

Mark Oehlert

You can try it for yourself here. Are we really getting closer to a debate about the role/function/value of resident higher education experiences?

What Universities Must Learn About Social Networks

Jay Cross

How do I search for information?”. Very much like the continuous changes in social network software, network security is a day to day concern.

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

Most people think that big data is about what people do online, like posts on Facebook or searches on Google.  But, is it worth it? 

Data 93

Becoming MOOC

Stephen Downes: Half an Hour

student who cannot navigate complex websites, search for and assess resources, or make new friends through a social network may have difficulty navigating through a cMOOC. And in order to preserve and promote self-efficacy, design is important. Cognitive Flow: The Psychology of Great Game Design. There are two types of MOOCs.

e-Clippings (Learning As Art): Zone Alarm Listen UP!! This is NOT Customer Service!

Mark Oehlert

Normally I run Zone Alarms security suite of products and I generally think they are the best out there - they are certainly better than Norton in terms of being Norton being such a resource hog. I was having this problem though with my anti-virus not updating (hang in there, there is a point). Thank you for choosing Zone Labs Security!

eLearning Conferences 2013

Tony Karrer

link] December 3-7, 2012 Computer Security Applications Conference , 28 th , annual, Orlando, Florida, USA. Clayton R. Mlýn , Czech Republic.

New Tools Beget Revolutions: Big Data and the 21st Century Information-based Society

Irving Wladawsky-Berger

On May 22 I attended the 2013 MIT Sloan CIO Symposium.  All while the windows of opportunity and response will continue to shrink. 

Data 55

eLearning Conferences 2012

Tony Karrer

link] December 5-6, 2011 Learning Space Design Summit, 2 nd , Melbourne, Australia. Clayton R. You can contact him at: crwr77@gmail.com. Online.

Beyond Free ? Open Learning in a Networked World

Stephen Downes: Half an Hour

Because the problem isn''t the way we design our courses. Design is only one way, and, I would submit, a limited way of looking at the problem.

7 Shifts: The Future of Social Media and Internal Communications

Ross Dawson

Social search will drive value. The promise of social search will finally bear fruit, with for once enterprise technology moving ahead of consumer tech. As companies virtualise, using workers and contractors around the world, work processes will be designed to be used equally well by people both inside and outside the organisation.

The edX, Udacity and Coursera Showdown

Dan Pontefract

February 20 – First official Udacity courses launch - CS 101: Building a Search Engine and CS 373: Programming a Robotic Car. Money.

FAQ 37

The Social Organisation Manifesto

Martijn Linssen

op 5/27/2010 02:18:00 AM Labels: 2.0 , adapt , change , E2.0 , maturity , Social Business Design , trust 1 reacties: eva.santisteban said.

e-Clippings (Learning As Art): "Is Web 2.0 Safe?" (MSN article)

Mark Oehlert

Safe?" (MSN article) Here is the shocking synopsis of this article : Security needs to be better in Web 2.0 del.icio.us books futures Web 2.0

eLearning Conferences 2011

Tony Karrer

link] December 6-10, 2010 Computer Security Applications Conference, 26 th , Austin, Texas, USA. You can contact him at: crwr77@gmail.com.

The 2016 Look at the Future of Online Learning

Stephen Downes: Half an Hour

We've been through this with learning objects, with learning design, and more: the problem of learning is not a search problem. The same people offering these programs will resist to the end the idea of the average (low-paying) student designing their own programmes. The first was the obvious basis in technology. Fair enough.

The edX, Udacity and Coursera Showdown

Dan Pontefract

February 20 – First official Udacity courses launch - CS 101: Building a Search Engine and CS 373: Programming a Robotic Car. Money.

FAQ 33

Earth to Mozilla: Come back home

Doc Searls

Ads in search turn out to be useful.  We need to find our soul and our spirit.” ” That spirit is embodied in the Mozilla Manifesto.

Jive 112

Beyond Assessment ? Recognizing Achievement in a Networked World

Stephen Downes: Half an Hour

It''s the basis for instructional design. You start with what you want them to learn, design an experience, cause them to learn it, build in some checks, and see that this has all happened in the end. ALT, the Association for Learning Technology, in Britain, is designing and creating badges as part of its ocTEL MOOC. Figure 1.

e-Clippings (Learning As Art): Single-Site Browsers: Interesting Design Development or Battle for the Desktop?

Mark Oehlert

In the beginning there were dumb clients and the server reigned supreme. Then came the powerful desktops and the server lost control. Confused? Great.

e-Clippings (Learning As Art): 12th Annual Webby Award Winners.Nicely done and nicely designed.

Mark Oehlert

Love the design. love the Webby Awards. Thought they were a bit cheesy at first but what do I know? So use them as that. from there. del.icio.us

e-Clippings (Learning As Art): The Invention of Good Games:Understanding Learning Design in Commercial Video Games (Katrin Becker thesis)

Mark Oehlert

"In order to design educational games that remain effective as bothgames and as learning objects, it is necessary to understand howsuccessful games teach. Using methodology adapted from reverse engineering calledinstructional decomposition, both macro and micro design elements canbe identified. del.icio.us books futures Web 2.0

Reflections on the Nature of Human Organizations

Irving Wladawsky-Berger

Transaction costs are incurred in obtaining goods and services outside the firm, such as searching for the right people, negotiating a contract, coordinating the work, managing intellectual property and so on.  Urbanization is one of the major forces transforming societies all over the world.  billion, passing from 7.0 billion to 9.3

e-Clippings (Learning As Art): Good for introNetworks!

Mark Oehlert

introNetworks Secures $2.7 e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Fleck.Web page annotation | Main | Great Web Comic and the Guy Gets Fired!? » May 17, 2007 Good for introNetworks! Comments The comments to this entry are closed. Clay Shirky My latest additions to del.icio.us del.icio.us

[dpla] Europeana

David Weinberger

You need it, but you it shouldn’t be the focus of your efforts. Q: What is your differentiator? A: Secure material from institutions, and openness. Q: What are your use cases? A: It’s the only place you can search across libraries, museums. We do provide a search engine that you can use on your Web site.

Let’s help Airbnb rebuild the bridge it just burned

Doc Searls

You should help the prison system rebrand their “full body cavity search” As a traveler myself, I was one of the 25% selected for “enhanced trust” I have over 50 positive reviews from guests and hosts alike. You have my social security number from when you sent me tax documents. like having the choice. Really??

Digital Common Law

Irving Wladawsky-Berger

While broad parameters of law continue to be set by legislatures, executive branch agencies and courts, the point of this social-legal-technical ecosystem is to embed as many fundamental principles of decision-making, oversight, and enforcement as possible into the software design and network protocols themselves.”  . Is this even feasible? 

Open, Collaborative Trust Frameworks

Irving Wladawsky-Berger

For example, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was launched by the White House earlier this year to enable “Individuals and organizations [to] utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.”

e-Clippings (Learning As Art): Video Killed the Radio Star but What About the Instructional Designer?

Mark Oehlert

Main | Alternative and Activist Search Engines » June 21, 2007 Video Killed the Radio Star but What About the Instructional Designer?

e-Clippings (Learning As Art): Engaging Web design from Dutch dept. store HEMA (props to my dad for the link)

Mark Oehlert

» January 30, 2008 Engaging Web design from Dutch dept. Re-installing Zone Alarm AV on my other machine.AGAIN! thanks for the post.