From “learning technologies” to “social technologies”

Jane Hart

Whereas many individuals are happy to use their own social tools to power their own and their team’ activities, most organisations generally prefer them to use some sort of internal enterprise platform to keep the conversations and content private and secure.

The Only Person Who Behaves Sensibly Is My Tailor

Charles Jennings

than others who may have integrated training activities more closely with the workflow (eLearning, ‘brown bag lunches’, on-the-job coaching etc.). Even national security agencies struggle doing that. “The only person who behaves sensibly is my tailor.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Smart Worker : shares what s/he learns

Jane Hart

We need to ensure the privacy and security of our organisation’s content. But if you want to keep the materials as close to the workflow as possible, then other tools are available for in-house, behind-the-firewall, enterprise use. Tweet.

Micro-blogging can help build your organisational culture

Dan Pontefract

Weak chance of disrupting already established workflows. The latter may cause some concern from the vantage point of the Chief Security Office. You're reading fresh content from Dan Pontefract at Brave New Org: “If everyone is moving forward together, then success takes care of itself.”

sCRM, the M:M Customer Crush?

Martijn Linssen

Call it workflow, BPM, you could even compare it with Supply Chain Event Management. and wrap them up in workflow and process in a neat and orderly way (OMG! A few questions: - sCRM does not mean that the old-fashioned CRM with workflow will disappear, does it?

Raising the Dial Tone, Part 2

Martijn Linssen

The problem is that most requirements issued on federal contracts are complete birdcage liner written by people who are either totally unqualified to design a product or produced by a process/workflow that is biased toward the most verbose form of mediocrity (i.e.

Google+ may miss the big opportunity: spanning internal and external social networks

Ross Dawson

The enterprise social network can be secure, built around documents and workflow, enable effective sharing, and facilitate finding and working with people across the organization. I was delighted to get an invite to Google+.

The Link Between BYOD and Increased Productivity

TOPYX LMS

50% of companies have experienced a data breach due to inadequate device security. 43% of companies have unveiled a BYOD security strategy. Companies Forbid BYOD for Security-Related Reasons. This is the main security risk associated with BYOD.

Martian Dougiamas on Moodle

Stephen Downes: Half an Hour

progressive: communication based pedagogies, comment developed modules, drag and drop UIs, mobile platfors, innovative workflows, integration media, etc. Conservative: security, usability, assessment, accrediting identity management, detailed management, tracking and reports, performance and stability. Mobile apple can now talk to Moodle securely. There are many security layers. It is a back door, and needs to be highly highly secure.

Module 186

“Look straight into this camera phone and repeat after me…”

David Weinberger

A press release from the Department of Unwanted Efficiencies: Huntsville, AL – June 1, 2009 – Cabinet NG (CNG), provider of document management and workflow software, today announced that Limestone County, Alabama is using CNG’s document management software to enable a unique Video Hearing application.

Different Ways Nonprofits Are Using Design Thinking to Solve Problems and Achieve Impact

Beth Kanter

My team at ION Studios curated 110 universally adoptable methods of social change and paired them with 10 custom mini-workshops that were designed to be led by and for social sector organizations to build their own innovation workflows.

How Mobility Empowers Work as a State of Mind in the Era of Social Business

Luis Suarez

Increasing “Jointness” and Reducing Duplication in DoD Intelligence

Martijn Linssen

This move was a surprise to many: the stodgy and security conscious IC was moving ahead of many private sector companies with its use of Web 2.0 The underlying assumptions regarding the prevailing finished intelligence workflow have not been questioned.

Five Myths of Social Learning

Xyleme

Leading social media vendors like Jive Software are integrating with the top ECM platforms to provide unified search, workflow, and storage of enterprise and social content, proving a cohesive environment where formal content is supported by an ecosystem of users that contribute expertise and relevant information. Home About Podcasts Videos Xyleme Inc.

IT Doesn’t Matter. Business processes do

Jay Cross

Imagine the potential of: Workflow learning. Ten years ago this May a journalist named Nick Carr stirred up a ruckus with an article in Harvard Business Review claiming that IT Doesn’t Matter.

Constraintstorming

Adaptive Path

Security & Safety. Impact of workflow change on users. Recently, I lead a project that included “designing the future of X”. Any time you have these kinds of projects, the sky can be the limit. But, without limits, the chances of success are often low. Our first step was to conduct a brainstorming session. The goal was to get all the ideas out of our heads and onto the wall. No judgements, just sketch and write as many ideas that came to us.

AWOSS-2011-1

Stephen Downes: Half an Hour

we want to eb able to securely and properly know what we know. the workflows and systems are moving from being application-defined to user-defined. so they can dynamically compose experimental workflows.

Social shifts the focus from Presales to Aftersales

Martijn Linssen

The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter? Business or Pleasure? -

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

NRC''s track record in this sector includes the leadership role it played in the eduSource network of learning object repositories, the Sifter/Filter content recommender later commercialized as Racofi, sentiment analysis in learning, the Synergic3 collaborative workflow system, and more. But more is involved than merely storing data; resources must be secured, backed up, authenticated and synchronized.

Design 197

Wikis and Learning – 60 Resources

Tony Karrer

So, of course, I went to eLearning Learning and I looked at Wiki , Collaborative Learning with Wikis , Wikis and eLearning 2.0 , Wikis Corporate eLearning , Social Learning with Wikis , Wiki Security and a few others. I’m involved in several discussions around how to use Wikis as part of learning solutions. I wanted to collect a few resources around this topic for use in these discussions.

Wiki 161

I Know It When I See It

Andy McAfee

To put some flesh on each of these terms… Freeform means that the technology does not in any meaningful way impose, hardwire, or make and enforce assumptions about - Workflows - Roles - Privileges - Content - Decision right allocations Instead, people come together as equals within the environment created by technology, and do pretty much whatever they want. I’d want that system to have a standard order-to-ship workflow that was very hard to deviate from.

I Know It When I See It : Andrew McAfee’s Blog

Andy McAfee

To put some flesh on each of these terms… Freeform means that the technology does not in any meaningful way impose, hardwire, or make and enforce assumptions about - Workflows - Roles - Privileges - Content - Decision right allocations Instead, people come together as equals within the environment created by technology, and do pretty much whatever they want. I’d want that system to have a standard order-to-ship workflow that was very hard to deviate from.

[berkman] Transforming Scholarly Communication

David Weinberger

We’ll need all that (Lee says) because the workflow for processing all the new info we’re gathering hasn’t kept up with the amount we’re taking in via sensor networks, global databases, laboratory instruments, desktops, etc. For e-scientists and e-researchers, there’s just too much: too much data, too much workflow, too much “opportunity.&#.

Planning and panic

Clark Quinn

I’m reminded of when Don Norman mocked up his new kitchen in cardboard and practiced workflow before settling on a design.) I managed to secure a reddish wood stain and a dark green countertop, and a light tile that will complement both. All morning, a crew has been systematically demolishing our kitchen (one learning: it’s hard to concentrate with regular sounds of destruction in close proximity). This is as planned.

Edge Perspectives with John Hagel: Goldhaber and Attention Economy

John Hagel

Building on the efforts of these great spirits, The Opportunity Services Group (OSG) will establish and manage the world's leading 'workflow market' (i.e.,

e-Clippings (Learning As Art): Reflecting on the e-Learning Guild Annual Gathering

Mark Oehlert

Dont get hung up looking at the 3D virtual world - thats icing - look at what kind of social networking and workflow process support tools are built into it. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « e-Learning Guild Gathering Follow Up Post | Main | Post Conference Clean Up.Social Change, Web 2.0 and design » April 16, 2007 Reflecting on the e-Learning Guild Annual Gathering So Ive done this a bit differently this time.