Security vs. Utility

Doc Searls

I only discovered that feature by experimenting around. The feature also violates normal expectations of what happens when you click once (place cursor), twice (select word), or three times (select all) on text, but I don’t mind. icon icons location bar Mozilla security tool bar

LTI (Learning Tools Interoperability): One of the Features of a Good LMS


. In the initial stages of choosing a learning management system (LMS), people often wonder what the features of a good LMS are. Learning Tools Interoperability (LTI): One of the Features of a Good LMS. More accurately, LTI is a feature that every great eLearning system possesses.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

LMS Satisfaction Features and Barriers

Tony Karrer

Then it asks questions such as satisfaction level, satisfaction with particular features, are you planning to replace, primary barriers, importance of features, etc. They can be used to see how LMS vendors stack up against particular features. Update, Nov.

About face

Doc Searls

Tacit knowledge and short term memory are both features of human knowing and communication, not bugs. If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.”

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

What are “make it or break it&# features we should ask for, which would guarantee that a useful community collaboration platform can be built on MS Sharepoint? A feature is something that makes a tool usable. ) The wysiwyg feature, makes it easier for non-geeks to use.

Enterprise microblogging: measuring true value "is relative"

Martijn Linssen

why not both Home About Contact Friday, 14 January 2011 Enterprise microblogging: measuring true value "is relative" Yammer announced a new feature yesterday : Leaderboards Leaderboards gives users access to statistics about their network activity. Business or Pleasure? -

The New Polymath Booktour - Amsterdam

Martijn Linssen

why not both Home About Contact Wednesday, 14 July 2010 The New Polymath Booktour - Amsterdam Amsterdam event 13:00 - 13:45, 21st July 2010, Capgemini, Amsterdam, Hoogoorddreef 15 Featured Speaker : Vinnie Mirchandani, author of the recently published book, The New Polymath.

Using Agile Processes to Develop AI-Based Solutions

Irving Wladawsky-Berger

It’s also quite applicable for mission critical software and infrastructure projects where security, availability, scalability and other ilities are paramount. First, the researchers create a test-bed prototype of the new AI features in Adobe’s cloud.

The Urgent Need to Strengthen the Nation’s Resilience

Irving Wladawsky-Berger

These included a significant expansion of government support for scientific research in universities and R&D labs, leading to product innovations from the private sector and better weapons from the defense industry, - and making the US the most prosperous and secure nation in the world.

Issues 218

The Economic Value of Digital Identity

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Identity plays a major role in our everyday life.

Data 201

Is this a Virtual Office?

Nine Shift

It doesn''t look like it has a watercooler or chat area for personal networking and team building, but other features seem to be getting us closer to Virtual Office software. They live above the water line, and it''s pretty secure from predators, like wolves

e-Clippings (Learning As Art): Hey buddy, can you spare $1600?

Mark Oehlert

"As you should know by now this amazing keyboard features a tiny screen on each key. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Seafood Selector from the Environmental Defense Fund | Main | Check out Spore on the iPhone!

e-Clippings (Learning As Art): Kindle.The Universal Textbook?

Mark Oehlert

Not a bad feature list. Again this is first gen and just like with the iPhone, I'm sure there is a software/firmware upgrade path to add some of this features.

Blockchain Beyond the Hype

Irving Wladawsky-Berger

Even The Economist has been guilty of overselling when it featured blockchain in the cover of its October 31, 2015 issue with the tag line “The Trust Machine: How the technology behind Bitcoin could change the world.” . Blockchain is 100% secure and tamper-proof.

Data 170

Leveraging AI to Transform Government

Irving Wladawsky-Berger

Since the LA Airport police doesn’t have enough officers to staff checkpoints at all times on the eight roads leading to the airport, the USC team developed an AI system to make security schedules unpredictable.

Data 144

e-Clippings (Learning As Art): Recent Podcasts from Harvard and Wesley Freyer on Innovation, Learning Orgs and IP

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « The World Continues to Get Spikier, not Flatter | Main | Netvibes Ginger - Promote on Blog Feature test » March 06, 2008 Recent Podcasts from Harvard and Wesley Freyer on Innovation, Learning Orgs and IP HBR IdeaCast 80: Where Does Strategic Innovation Come From?

Free-Market, Free-Trade Capitalism at a Crossroads

Irving Wladawsky-Berger

In a similar way, dependence on the profit motive, and on individual entitlements based on private ownership, are seen as archetypal features of capitalism. The global economy has undergone considerable change over the past few decades. Results have been mixed.

Issues 185

Pioneering New Seminar for Community College Presidents

Nine Shift

Security was tight at the new Nine Shift seminar for community college administrators. The new seminar, which featured 21 Strategic Planning Action Recommendations for Community Colleges, featured a new 21st century mission for community colleges.

Cryptocurrencies and Blockchains - How Are They Doing After 10 Years?

Irving Wladawsky-Berger

Bitcoin aimed to become a decentralized cryptocurrency and digital payment system that would enable the secure exchange of digital money without the need for central government authorities or financial intermediaries.

Price 159

Municipal nets, municipal electric power, and learning from history

David Weinberger

Here’s a scan of the table of contents of a 1906 (yes, 1906) issue of Moody’s that features a symposium on “Municipal Ownership and Operation.” The debate over whether municipalities should be allowed to provide Internet access has been heating up. Twenty states ban it.

How Will AI Likely Impact How We Work, Live and Play?

Irving Wladawsky-Berger

Public safety and security. “One of the more successful uses of AI analytics is in detecting white collar crime, such as credit card fraud. The auto industry has been adding L1 features to cars for over 40 years, and more advanced L2 features for the past two decades.

System 251

Do Low-Cost, All-Inclusive LMS Packages Exist?


Also, eLearning training tools, administration functions, mobile accessibility, and social media communication features make LMSs attractive to organizations. Features like these have rendered eLearning systems irreplaceable to many companies.

Cost 98

The Economic Value of Artificial Intelligence

Irving Wladawsky-Berger

Highest potential use cases: Autonomous fleets for ride sharing; Semi-autonomous features such as driver assist; Engine monitoring and predictive, autonomous maintenance. Highest potential use cases: Autonomous trucking and delivery; Traffic control and reduced congestion; Enhanced security.

Data 243

What is an LMS?


Training content is written and arranged into a secure online location. What Features Does an LMS Have? Not all LMSs have the exact same features. Mobile learning is a common and crucial corporate LMS feature.

Why Blockchains Could Transform How the Economy Works

Irving Wladawsky-Berger

The October 31 issue of The Economist featured the blockchain in its cover : “The Trust Machine: How the technology behind Bitcoin could change the world.” Blockchains enable institutions who don’t know or trust each other to build highly secure and scalable ledgers of all sorts.

Issues 253

Do you really need all this personal information, @RollingStone?

Doc Searls

Existing law provides for the confidentiality of personal information in various contexts and requires a business or person that suffers a breach of security of computerized data that includes personal information, as defined, to disclose that breach, as specified.

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society. A few weeks ago, the World Economic Forum (WEF) published its annual list of the Top Ten Emerging Technologies for 2016.

Tips 207

From “learning technologies” to “social technologies”

Jane Hart

Whereas many individuals are happy to use their own social tools to power their own and their team’ activities, most organisations generally prefer them to use some sort of internal enterprise platform to keep the conversations and content private and secure.

The Problem With 'A National Effort in Online Education'

Stephen Downes: Half an Hour

Learning management systems gradually added all of these features to their platforms. They also secured institutional lock-in by integrating student management and authentication systems, essentially granting a large degree of corporate control over the learning experience. Alex Usher points out quite correctly that universities will need to be online by the fall. We're not likely to be out of the Covid woods by then, and in-person classes will likely be limited and few.

The New Era of Smart, Connected Products

Irving Wladawsky-Berger

Product strategy : Which set of smart, connected product capabilities and features should the company pursue?; . Data strategy : What data must the company capture, secure, and analyze to maximize the value of its offering?; .

The Future of Learning Management Systems: Development, Innovation and Change

Stephen Downes: Half an Hour

But over time the LMS companies began adding features, sometimes of questionable value. But these are features that are ‘bolted on’. Feldstein’s law: over time any ed tech application adds features and looks like a poorly designed LMS. Comment: has there been less feature bloat?

System 192

Why an LMS is a Safe Business Investment


Obviously, the financial future of the eLearning market is secure. TOPYX is an award-winning eLearning system that big-name companies Like Honeywell, 3M and Intel Security use. Quality LMSs are secure business investments.

The Best of Both Worlds: LMS for Learners and Trainers


Learners tend to prefer user-friendly LMSs that feature easy-to-access content, whereas trainers prefer learning management systems that make curating content simple. This type of LMS stores all of a company’s information in one online, secure location.

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

Supporting 100s of billions of IoT devices at radically lower costs requires a decentralized peer-to-peer architecture, capable of near unlimited scalability, privacy, security and the ability to handle trustless transactions. “In

Data 274

Blockchain and the Future of the Firm

Irving Wladawsky-Berger

But, not only are large companies alive and well, but as The Economist noted in a 2016 article , “the most striking feature of business today is not the overturning of the established order.

The Art of the Ask

Seb Paquet

Old-school ways of organizing gatherings, like traditional conferences, which feature a few people in broadcast mode and the others quietly sitting in rows, are ludicrously bad at this. Secure food and hot beverages for collaborators.

[liveblog] Paul Frazee on the Beaker Browser

David Weinberger

This lets Beaker provide some unusual features: A “fork button” is built into the browser itself so you can modify the site you’re browsing. Secure distribution. At the Web 1.0 conference , Paul Frazee. is talking about a browser — a Chrome fork — he’s been writing to browse the distributed Web. NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness. Over-emphasizing small matters.

3 Reasons Why Every LMS Needs Tin Can API Functionality


Solid security using Oauth. Those who want an LMS installation and launch to be enjoyable and successful should make it a priority to invest in an eLearning system featuring Tin Can API. Not All Learning Management Systems Feature Experience API.

System 100

Period architecture, majestic views, history of madness

Mind Hacks

The estate agents want to play on the often genuinely beautiful architecture and, more oddly, the security of the sites, while papering over the fact the buildings had anything to do with mental illness.

Micro-Blogging is Good for Leadership, Good for Your Culture

Dan Pontefract

I personally don’t care what tool, application or technology is being used to drive enterprise-wide micro-blogging, but it must be secure and ideally it’s behind the firewall. If security is sorted out, the risk as I see it is if employees use the tool as a life-casting option.

nordic finds

Harold Jarche

What passes for the efforts to build the “digital grid” might, in fact, be an attempt to privatise municipal services – a staple feature of Blackstone Urbanism, not a radical departure from it. The first job-security council was founded in 1972, the most recent one was established in 2012.

PKM 142

Google vs. Apple control freakism

David Weinberger

Rich Cannings , Android security lead, blogged about remotely removing an app from people’s Android phones [excerpted]: Recently, we became aware of two free applications built by a security researcher for research purposes. After the researcher voluntarily removed these applications from Android Market, we decided, per the Android Market Terms of Service, to exercise our remote application removal feature on the remaining installed copies to complete the cleanup.

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. Over the years, the IBM mainframes have continued to carefully design the hardware and operating systems software together to optimize performance and industrial strength, e.g., security, systems management, availability and other ilities.