Security vs. Utility

Doc Searls

I only discovered that feature by experimenting around. The feature also violates normal expectations of what happens when you click once (place cursor), twice (select word), or three times (select all) on text, but I don’t mind. icon icons location bar Mozilla security tool bar

LTI (Learning Tools Interoperability): One of the Features of a Good LMS


. In the initial stages of choosing a learning management system (LMS), people often wonder what the features of a good LMS are. Learning Tools Interoperability (LTI): One of the Features of a Good LMS. More accurately, LTI is a feature that every great eLearning system possesses.

LMS Satisfaction Features and Barriers

Tony Karrer

Then it asks questions such as satisfaction level, satisfaction with particular features, are you planning to replace, primary barriers, importance of features, etc. They can be used to see how LMS vendors stack up against particular features. Update, Nov.

About face

Doc Searls

Tacit knowledge and short term memory are both features of human knowing and communication, not bugs. If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.”

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

What are “make it or break it&# features we should ask for, which would guarantee that a useful community collaboration platform can be built on MS Sharepoint? A feature is something that makes a tool usable. ) The wysiwyg feature, makes it easier for non-geeks to use.

Enterprise microblogging: measuring true value "is relative"

Martijn Linssen

why not both Home About Contact Friday, 14 January 2011 Enterprise microblogging: measuring true value "is relative" Yammer announced a new feature yesterday : Leaderboards Leaderboards gives users access to statistics about their network activity. Business or Pleasure? -

The New Polymath Booktour - Amsterdam

Martijn Linssen

why not both Home About Contact Wednesday, 14 July 2010 The New Polymath Booktour - Amsterdam Amsterdam event 13:00 - 13:45, 21st July 2010, Capgemini, Amsterdam, Hoogoorddreef 15 Featured Speaker : Vinnie Mirchandani, author of the recently published book, The New Polymath.

Ngram Faceoff: Hope and fear | Daniel Pink

Dan Pink

Ngram Faceoff: Hope and fear During this quiet holiday week, we’ve decided to roll out a new feature on the Pink Blog — something we call the Ngram Faceoff. Thanks… here’s the best one I came up with: “He who sacrifices freedom for security deserves neither.”

The Economic Value of Digital Identity

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Identity plays a major role in our everyday life.

Data 214

Leveraging AI to Transform Government

Irving Wladawsky-Berger

Since the LA Airport police doesn’t have enough officers to staff checkpoints at all times on the eight roads leading to the airport, the USC team developed an AI system to make security schedules unpredictable.

Data 130

Is this a Virtual Office?

Nine Shift

It doesn''t look like it has a watercooler or chat area for personal networking and team building, but other features seem to be getting us closer to Virtual Office software. They live above the water line, and it''s pretty secure from predators, like wolves

Free-Market, Free-Trade Capitalism at a Crossroads

Irving Wladawsky-Berger

In a similar way, dependence on the profit motive, and on individual entitlements based on private ownership, are seen as archetypal features of capitalism. The global economy has undergone considerable change over the past few decades. Results have been mixed.

Issues 201

Blockchain Beyond the Hype

Irving Wladawsky-Berger

Even The Economist has been guilty of overselling when it featured blockchain in the cover of its October 31, 2015 issue with the tag line “The Trust Machine: How the technology behind Bitcoin could change the world.” . Blockchain is 100% secure and tamper-proof.

Data 185

e-Clippings (Learning As Art): Hey buddy, can you spare $1600?

Mark Oehlert

"As you should know by now this amazing keyboard features a tiny screen on each key. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Seafood Selector from the Environmental Defense Fund | Main | Check out Spore on the iPhone!

e-Clippings (Learning As Art): Kindle.The Universal Textbook?

Mark Oehlert

Not a bad feature list. Again this is first gen and just like with the iPhone, I'm sure there is a software/firmware upgrade path to add some of this features.

e-Clippings (Learning As Art): Recent Podcasts from Harvard and Wesley Freyer on Innovation, Learning Orgs and IP

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « The World Continues to Get Spikier, not Flatter | Main | Netvibes Ginger - Promote on Blog Feature test » March 06, 2008 Recent Podcasts from Harvard and Wesley Freyer on Innovation, Learning Orgs and IP HBR IdeaCast 80: Where Does Strategic Innovation Come From?

Cryptocurrencies and Blockchains - How Are They Doing After 10 Years?

Irving Wladawsky-Berger

Bitcoin aimed to become a decentralized cryptocurrency and digital payment system that would enable the secure exchange of digital money without the need for central government authorities or financial intermediaries.

Price 171

Pioneering New Seminar for Community College Presidents

Nine Shift

Security was tight at the new Nine Shift seminar for community college administrators. The new seminar, which featured 21 Strategic Planning Action Recommendations for Community Colleges, featured a new 21st century mission for community colleges.

The Economic Value of Artificial Intelligence

Irving Wladawsky-Berger

Highest potential use cases: Autonomous fleets for ride sharing; Semi-autonomous features such as driver assist; Engine monitoring and predictive, autonomous maintenance. Highest potential use cases: Autonomous trucking and delivery; Traffic control and reduced congestion; Enhanced security.

Data 251

How Will AI Likely Impact How We Work, Live and Play?

Irving Wladawsky-Berger

Public safety and security. “One of the more successful uses of AI analytics is in detecting white collar crime, such as credit card fraud. The auto industry has been adding L1 features to cars for over 40 years, and more advanced L2 features for the past two decades.

System 262

Do Low-Cost, All-Inclusive LMS Packages Exist?


Also, eLearning training tools, administration functions, mobile accessibility, and social media communication features make LMSs attractive to organizations. Features like these have rendered eLearning systems irreplaceable to many companies.

Cost 98

Municipal nets, municipal electric power, and learning from history

David Weinberger

Here’s a scan of the table of contents of a 1906 (yes, 1906) issue of Moody’s that features a symposium on “Municipal Ownership and Operation.” The debate over whether municipalities should be allowed to provide Internet access has been heating up. Twenty states ban it.

What is an LMS?


Training content is written and arranged into a secure online location. What Features Does an LMS Have? Not all LMSs have the exact same features. Mobile learning is a common and crucial corporate LMS feature.

Why Blockchains Could Transform How the Economy Works

Irving Wladawsky-Berger

The October 31 issue of The Economist featured the blockchain in its cover : “The Trust Machine: How the technology behind Bitcoin could change the world.” Blockchains enable institutions who don’t know or trust each other to build highly secure and scalable ledgers of all sorts.

Issues 262

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society. A few weeks ago, the World Economic Forum (WEF) published its annual list of the Top Ten Emerging Technologies for 2016.

Tips 207

The New Era of Smart, Connected Products

Irving Wladawsky-Berger

Product strategy : Which set of smart, connected product capabilities and features should the company pursue?; . Data strategy : What data must the company capture, secure, and analyze to maximize the value of its offering?; .

Blockchain and the Future of the Firm

Irving Wladawsky-Berger

But, not only are large companies alive and well, but as The Economist noted in a 2016 article , “the most striking feature of business today is not the overturning of the established order.

coffee, communities, and condescension

Harold Jarche

We also decided that future meetings will be recorded and that I will look into creating a secure online space for written conversations and sharing our knowledge. I did not notice that others were copied on the tweet, as this was a new feature on Twitter at the time.

The Future of Learning Management Systems: Development, Innovation and Change

Stephen Downes: Half an Hour

But over time the LMS companies began adding features, sometimes of questionable value. But these are features that are ‘bolted on’. Feldstein’s law: over time any ed tech application adds features and looks like a poorly designed LMS. Comment: has there been less feature bloat?

System 192

Why an LMS is a Safe Business Investment


Obviously, the financial future of the eLearning market is secure. TOPYX is an award-winning eLearning system that big-name companies Like Honeywell, 3M and Intel Security use. Quality LMSs are secure business investments.

The Best of Both Worlds: LMS for Learners and Trainers


Learners tend to prefer user-friendly LMSs that feature easy-to-access content, whereas trainers prefer learning management systems that make curating content simple. This type of LMS stores all of a company’s information in one online, secure location.

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

Supporting 100s of billions of IoT devices at radically lower costs requires a decentralized peer-to-peer architecture, capable of near unlimited scalability, privacy, security and the ability to handle trustless transactions. “In

Data 278

3 Reasons Why Every LMS Needs Tin Can API Functionality


Solid security using Oauth. Those who want an LMS installation and launch to be enjoyable and successful should make it a priority to invest in an eLearning system featuring Tin Can API. Not All Learning Management Systems Feature Experience API.

System 100

nordic finds

Harold Jarche

What passes for the efforts to build the “digital grid” might, in fact, be an attempt to privatise municipal services – a staple feature of Blackstone Urbanism, not a radical departure from it. The first job-security council was founded in 1972, the most recent one was established in 2012.

PKM 151

[liveblog] Paul Frazee on the Beaker Browser

David Weinberger

This lets Beaker provide some unusual features: A “fork button” is built into the browser itself so you can modify the site you’re browsing. Secure distribution. At the Web 1.0 conference , Paul Frazee. is talking about a browser — a Chrome fork — he’s been writing to browse the distributed Web. NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness. Over-emphasizing small matters.

On cryptocurrencies, blockchain and all that

Doc Searls

“A digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. For example, some tokens, depending on their features, may be subject to US federal or state securities laws.

Reflections on Linux and Mainframes

Irving Wladawsky-Berger

In my opinion, the most important part of the announcement is LinuxONE’s support of the advanced encryption features that have been built into the latest mainframes models, enabling them to support up to 8,000 highly secure Linux systems in one machine. .

The Art of the Ask

Seb Paquet

Old-school ways of organizing gatherings, like traditional conferences, which feature a few people in broadcast mode and the others quietly sitting in rows, are ludicrously bad at this. Secure food and hot beverages for collaborators.

Period architecture, majestic views, history of madness

Mind Hacks

The estate agents want to play on the often genuinely beautiful architecture and, more oddly, the security of the sites, while papering over the fact the buildings had anything to do with mental illness.

Google vs. Apple control freakism

David Weinberger

Rich Cannings , Android security lead, blogged about remotely removing an app from people’s Android phones [excerpted]: Recently, we became aware of two free applications built by a security researcher for research purposes. After the researcher voluntarily removed these applications from Android Market, we decided, per the Android Market Terms of Service, to exercise our remote application removal feature on the remaining installed copies to complete the cleanup.

Why Online Learning Is Important In the Workplace  


When online learning is delivered through a full featured, cloud-based learning management system, the chances are good that the ROI will be high. Those searching for a great LMS should look for a flat-rate platform that is full featured and cloud based.

ROI 80

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. Over the years, the IBM mainframes have continued to carefully design the hardware and operating systems software together to optimize performance and industrial strength, e.g., security, systems management, availability and other ilities.

The Link Between BYOD and Increased Productivity


50% of companies have experienced a data breach due to inadequate device security. 43% of companies have unveiled a BYOD security strategy. Companies Forbid BYOD for Security-Related Reasons. This is the main security risk associated with BYOD.