accommodating knowledge in the age of ebologna: from commodity to living context
|
|
- Juniper Gerald Mitchell
- 8 years ago
- Views:
Transcription
1 isko 2006: knowledge organization for a global learning society wissensorganisation für den bologna prozess vienna, july 6, 2006 accommodating knowledge in the age of ebologna: from commodity to living context reinhard keil, universität paderborn
2 What is more important than sex?
3 Knowledge: Two complementary perspectives Knowledge as commodity transportation) Stored in documents and databases Complemented by metadata and ontologies Knowledge as living context transformation Created, Modified Interpreted Evaluated Arranged Deleted, in socially mediated learning processes Requires Non-sequential writing (Nelson)
4 Well-structured and formalized entities have to be embedded into cooperative interactions
5 What is interactivity? To interact (Webster): to act mutually, to perform reciprocal acts Interactions between humans and computers and interactions among human beings What do they have in common? Both are based on the exchange of symbols but only humans communicate (mutual understanding). Interactivity as a quality that can be assigned to a person or a device is a creation in the context of the modern computer. Heidi Schelhowe: Das Medium aus der Maschine (Transl. by RK)
6 Analogue media are based on inscription technologies Phonograph (two essential inventions): physics: making sound visible engineering: inscribe sound in carrier material (wax). Characteristic trait: signs once inscribed or recorded cannot be treated as manipulable objects anymore. By means of technology only the carrier material can be processed not the signs or symbols itself. Manipulating the carrier material instead of the symbols requires extensive skills and competences. Learners (users) are confined to reading only. Media (learning) objects as passive typography
7 Semantic relations of authors and readers are different G. Jean: Die Geschichte der Schrift. Ravensburger Taschenbuch, 1991 Knowledge is continually processed, reformulated, modified, extended, linked, etc. Maintaining a living body of knowledge requires many skills and resources. Inscription technologies do only provide means for manipulating the carrier materials. Semantic relations of the reader have to be embodied outside of the primary medium.
8 A first Hypertext System? The book wheel made it easier for the reader to arrange related books. Pages may have semantic relations. Exchanging books or flipping pages destroys these spatial relations. Agnos Ramelli, 1588 Cleaning up someone s desk destroys his work to a considerable degree. Note: Books can be arranged, not the content of a book Links cannot be physically attached neither to a book nor some information in the book.
9 elearning: An old hat on top of new technology Organization Create Medium Use Author Channel Technology Carrier Reader Teachers write (authoring tools) Students read (browser) Learning Environment: Transport of Documents Feedback is reduced to predefined answers (multiple choice) and system responses or has to be given via separate media channels (no object persistency) Enhancements for retrieval (metadata, ontologies), but One-Way-Road to Learning without non-sequential (co-operative) writing: indirect Interaction.
10 Can a machine interact? Can the designer know? Are you sure? Yes No Not really Are you?? There is no reason for a technical system to ask questions, because no one is listening to the answer. A piece of instructive software is an inscription of the designer s anticipation of the situation at hand. The designer requires the user to confirm his last entry he is not interested in his existential orientations. He should offer choices and make his design decisions transparent rather than speculating about his intentions. It almost always fails!
11 Can humans interact? Only indirect interaction organisation production chan. medium techn. carrier usage Author Analogue media have clearly separated channels for sending and receiving. The resulting media discontinuities could be avoided by digital media! organisation 2 Reader usage Medium 2 production chan. 2 techn. 2 carrier 2
12 Re-defining interactivity: Interactivity is an essential quality of active semiotics, with other words: active semiotics = responsiveness + interactivity responsiveness: Continuous background process evaluates arrangement of symbols during its construction and provides immediate feedback (i.e. spell checker, tool tip, database query) interactivity: The recognized object (sign or symbol) itself can be manipulated and not the carrier material only (new primary media functions arranging, marking up, linking, ) distributed cooperation: objects can be manipulated cooperatively and stored in virtual knowledge spaces
13 Active typography: the vision Today documents and applications form the core of digital media use. They represent sort of a typographic prison. Standard formats allow us to furlough to some extent. Only real interactivity objects that can be manipulated and evaluated (executed) can provide us with the full potential of digital media. But Granularity and standards of knowledge changes (new ontologies required). semantic interoperability
14 Semantic interoperability The ultimate goal: Every digital object, once into the system should not be re-entered even if different functions shall be applied to it Two important domains Cooperative distributed and continuous modification of objects Interaction across functional (applications) and organizational boundaries service infrastructures (as complement to maintaining object and device repositories such as books, computers, servers, etc.) Essential constraint: ebologna requires to act across organizational, institutional and national boundaries
15 Dimensions of embedment The Graz-Model of classification of collaboration support Aspects of cooperative learning. Differentiate team content and process
16 migrating to active typography Intertwined writing and reading of of objects (not only application sharing) Support of all forms of cooperation and distributed writing (direct interaction: human to human) Assigning roles to every user allowing him or her to write and to define who may read it Embodying a tight coupling of action-recognition through virtual social spaces Reduce media discontinuities not only on the level of object transportation but also object transformation. Viewing learning processes as continuous processes of transformation of learning objects (not just reading or executing them)
17 Pervasive elearning: integration, not isolated reading access places/ time knowledge organization distributed continuous Virtual knowledge spaces as foci and loci of learning and knowledge organization. Synchronous and asynchronous manipulation of objects according to the principle of self-administration. Not independence of time and space, but integration of distributed activities!
18 Co-operative virtual knowledge spaces Persistent areas (rooms) are connected through gates (doors links) and contain people, documents und tools (programs) which can be manipulated in synchronous and asynchronous ways. communication functions are tied to objects. Sophisticates means for role and rights management allow for the flexible realization of different scenarios ranging from traditional presentations to complex forms of self-regulated knowledge organization.
19 Structuring knowledge & discourse Single data set and a single framework of application
20 Objects become manipulable instances of knowledge
21 service-portfolios in an integrated service infrastructure complex services integrated knowledge management authoring support interactive study service interactive syllabus & ECTS accounting mobile teacher s workplace user services basic services media management Information retrieval account management (data domains) data protection (backup, archives) roles / rights management access management (entry) service portfolio accounting content synchronisation (notebook/server) student workplace content, library publication services (Web-Server, ) communication services ( , chat, ) university portal technical infrastructure networks (LAN, WLAN, ) server (DNS, NIS, ) security (Firewall, VPN, )
22 Providing functions through open interfaces
23 Layers of integration
24 From desktop to digital library Different views on the same objects
25 Conclusio Computers were innovative tools to free humans from weary mental labor Virtual knowledge spaces should be a means to free humans from computers
Question/Answer Transaction Protocol Overview First Committee Working Draft NISO Committee AZ: September 22, 2003
Question/Answer Transaction Protocol Overview First Committee Working Draft NISO Committee AZ: September 22, 2003 NISO Committee AZ is developing a Question/Answer Transaction (QAT) Protocol to support
More informationVendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities
Vendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities April, 2013 gaddsoftware.com Table of content 1. Introduction... 3 2. Vendor briefings questions and answers... 3 2.1.
More informationIBM Enterprise Content Management Product Strategy
White Paper July 2007 IBM Information Management software IBM Enterprise Content Management Product Strategy 2 IBM Innovation Enterprise Content Management (ECM) IBM Investment in ECM IBM ECM Vision Contents
More informationOntology based Recruitment Process
Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany mochol@inf.fu-berlin.de
More informationOVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL
OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL Frédéric Dufaux, Michael Ansorge, and Touradj Ebrahimi Institut de Traitement des Signaux Ecole Polytechnique Fédérale de Lausanne (EPFL)
More informationIndependent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum.
Independent Insight for Oriented Practice An SOA Roadmap John C. Butler Chief Architect A CBDI Partner Company www.cbdiforum.com Agenda! SOA Vision and Opportunity! SOA Roadmap Concepts and Maturity Levels!
More informationTHE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8
THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,
More informationRSS Cloud Solution COMMON QUESTIONS
RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included
More information2 AIMS: an Agent-based Intelligent Tool for Informational Support
Aroyo, L. & Dicheva, D. (2000). Domain and user knowledge in a web-based courseware engineering course, knowledge-based software engineering. In T. Hruska, M. Hashimoto (Eds.) Joint Conference knowledge-based
More informationA HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS
A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS Ionela MANIU Lucian Blaga University Sibiu, Romania Faculty of Sciences mocanionela@yahoo.com George MANIU Spiru Haret University Bucharest, Romania Faculty
More informationMaster Data Management
Master Data Management Managing Data as an Asset By Bandish Gupta Consultant CIBER Global Enterprise Integration Practice Abstract: Organizations used to depend on business practices to differentiate them
More informationADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
More informationIntegrating the customer experience through unifying software - The Microsoft Vision
VAASAETT - RESPOND 2010 Integrating the customer experience through unifying software - The Microsoft Vision Principal Author Andreas Berthold- van der Molen, Microsoft EMEA Contents The New Energy Ecosystem
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationCorticon Success at Unum Best Practices in Enterprise-Wide Deployment. Bob Whyte
Corticon Success at Unum Best Practices in Enterprise-Wide Deployment Bob Whyte 1 AGENDA Introduction Unum Timeline what happened when Evolution progressive change & lessons Business rules construction
More informationInmagic Content Server v9 Standard Configuration Technical Guidelines
Inmagic Content Server v9.0 Standard Configuration Technical Guidelines 5/2006 Page 1 of 15 Inmagic Content Server v9 Standard Configuration Technical Guidelines Last Updated: May, 2006 Inmagic, Inc. All
More informationCreating a Corporate Integrated Data Environment through Stewardship
The Open Group Creating a Corporate Integrated Data Environment through Stewardship Enterprise Architecture Practitioners Conference Given January 2007 San Diego Presented by: Robert (Bob) Weisman CGI
More informationQAD Business Intelligence Data Warehouse Demonstration Guide. May 2015 BI 3.11
QAD Business Intelligence Data Warehouse Demonstration Guide May 2015 BI 3.11 Overview This demonstration focuses on the foundation of QAD Business Intelligence the Data Warehouse and shows how this functionality
More informationAn Object Model for Business Applications
An Object Model for Business Applications By Fred A. Cummins Electronic Data Systems Troy, Michigan cummins@ae.eds.com ## ## This presentation will focus on defining a model for objects--a generalized
More informationThe Business Value of a Web Services Platform to Your Prolog User Community
The Business Value of a Web Services Platform to Your Prolog User Community A white paper for project-based organizations that details the business value of Prolog Connect, a new Web Services platform
More informationChapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
More informationC2030-280.Examcollection.Premium.Exam.34q
C2030-280.Examcollection.Premium.Exam.34q Number: C2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: C2030-280 Exam Name: IBM Cloud Computing Infrastructure
More informationJOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
More informationGlossary of terms used in the survey
Glossary of terms used in the survey 5 October 2015 Term or abbreviation Audio / video capture Refers to the recording of audio and/or video. API Application programming interface, how a computer program
More informationMigrating From a Peer-to- Peer Workgroup to Small Business Server 2008. By Manjunath Narayanan and Perumal Raja Dell Enterprise Product Group
Migrating From a Peer-to- Peer Workgroup to Small Business Server 2008 By Manjunath Narayanan and Perumal Raja Dell Enterprise Product Group CONTENTS 1.0. Introduction 3 2.0. What is Small Business Server
More informationelearning Content Management Middleware
elearning Content Management Middleware Chen Zhao Helsinki 18.2.2004 University of Helsinki Department of Computer Science Authors Chen Zhao Title elearning Content Management Middleware Date 18.2.2004
More informationW H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010
W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation
More informationService-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
More informationA. Document repository services for EU policy support
A. Document repository services for EU policy support 1. CONTEXT Type of Action Type of Activity Service in charge Associated Services Project Reusable generic tools DG DIGIT Policy DGs (e.g. FP7 DGs,
More informationHow To Use The Dcml Framework
DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application
More informationFive best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
More informationHTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013
HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013 Riley Moses Bri Fidder Jon Lewis Introduction & Product Vision BIMShift is a company that provides all
More informationBusiness-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
More informationinfo@hensongroup.com www.hensongroup.com
With the Henson Group s solution, companies can: Reduce IT help desk costs Improve employee productivity Better allocate IT resources and position IT as a strategic asset Easily manage and maintain a self-service
More informationMicrosoft Windows Storage Server 2003 R2
Microsoft Windows Storage Server 2003 R2 Getting Started Guide Abstract This guide documents the various features available in Microsoft Windows Storage Server 2003 R2. Rev 1. 2005 Microsoft Corporation.
More information2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.
3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run
More informationSetup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
More informationSoftware Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
More informationBrochure Achieving security with cloud data protection. Autonomy LiveVault
Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server
More informationFramework as a master tool in modern web development
Framework as a master tool in modern web development PETR DO, VOJTECH ONDRYHAL Communication and Information Systems Department University of Defence Kounicova 65, Brno, 662 10 CZECH REPUBLIC petr.do@unob.cz,
More informationINFORMING A INFORMATION DISCOVERY TOOL FOR USING GESTURE
INFORMING A INFORMATION DISCOVERY TOOL FOR USING GESTURE Luís Manuel Borges Gouveia Feliz Ribeiro Gouveia {lmbg, fribeiro}@ufp.pt Centro de Recursos Multimediáticos Universidade Fernando Pessoa Porto -
More informationChapter 11 Mining Databases on the Web
Chapter 11 Mining bases on the Web INTRODUCTION While Chapters 9 and 10 provided an overview of Web data mining, this chapter discusses aspects of mining the databases on the Web. Essentially, we use the
More informationGetting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
More informationEnergySync and AquaSys. Technology and Architecture
EnergySync and AquaSys Technology and Architecture EnergySync and AquaSys modules Enterprise Inventory Enterprise Assets Enterprise Financials Enterprise Billing Service oriented architecture platform
More informationARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org
More informationvirtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06
virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification
More informationNASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
More informationA Guide Through the BPM Maze
A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM
More informationMicrosoft 10534 - Planning and Designing a Microsoft Lync Server 2010 Solution
1800 ULEARN (853 276) www.ddls.com.au Microsoft 10534 - Planning and Designing a Microsoft Lync Server 2010 Solution Length 5 days Price $4169.00 (inc GST) Overview This five-day instructor-led course
More informationACCESSING WEB ARCHIVES
ACCESSING WEB ARCHIVES There are two collections of archived websites available via Explore the British Library: The Legal Deposit UK Web Archive, archived through legal deposit regulations introduced
More informationMobile Learning and ADL s Experience API
Mobile Learning and ADL s Experience API Kristy Murray, Peter Berking, Jason Haag, and Nikolaus Hruska * Introduction The Advanced Distributed Learning (ADL) Initiative s Sharable Content Object Reference
More informationINFORMATION SECURITY GUIDELINES
INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS: Scope of Document 1 Data Definition Guidelines (Appendix 1).2 Data Protection Guidelines (Appendix 2).3 Protection of Electronic or Machine- Readable
More informationExecutive Mobile UC for Business
UC for Business NEC Australia nec.com.au Table of Contents Introduction...3 Mobility...3 What is Mobility?...3 Physical Architecture...3 UCB Mobility...4 - Cellular Application...4 Desktop functionality
More informationSystem Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria
System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic
More informationComputing & Communications Services
2010 Computing & Communications Services 2010 / 09 / 28 Kent Percival, M.Sc., P.Eng. Expanding CCS Storage Services CCS now provides storage to individuals and departments. This investigation considers
More informationSPLITTING TUTOR ROLES: SUPPORTING ONLINE-LEARNERS WITH GROUP TUTORS AND SUBJECT TUTORS
Nübel, I/ Kerres, M (2004): Splitting tutor roles: supporting online-learners with group tutors and subject tutors. In: Bernath, U./ Szücs, A. (Eds.): Proceedings of the 3 rd Eden Research Workshop. Oldenburg:
More informationSecure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationSoftware Application: CampusCruiser Portal Interface
Software Application: CampusCruiser Portal Interface The technology landscape for the 21 st century college and university is transforming at lightning speed. In order to keep pace with new technology
More informationIn ediscovery and Litigation Support Repositories MPeterson, June 2009
XAM PRESENTATION (extensible TITLE Access GOES Method) HERE In ediscovery and Litigation Support Repositories MPeterson, June 2009 Contents XAM Introduction XAM Value Propositions XAM Use Cases Digital
More informationArchiving Systems. Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie. uwe.borghoff@unibw.
Archiving Systems Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie uwe.borghoff@unibw.de Decision Process Reference Models Technologies Use Cases
More informationReassessing Conventional Paradigms for Document Description
Reassessing Conventional Paradigms for Document Description by Tom Delsey We are currently in a transitional state, adapting cataloguing conventions and rules to accommodate the description of newly emerging
More informationSmall Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
More informationSignificance of Proficient Event Logs Archiving in prevailing over Compliance Worries Whitepaper. 2013 www.lepide.com
Significance of Proficient Event Logs Archiving in prevailing over Compliance Worries Whitepaper 2013 www.lepide.com 1. Introduction Event logs archiving has gained immense significance in the light of
More informationIBM Lotus Domino Document Manager 6.5.1
Collaborative document management for the enterprise IBM 6.5.1 Highlights Provides high-value, low-cost Manages documents for document management for IBM Lotus Notes, Microsoft organization-wide applicability
More informationInternet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act
White Paper Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act The recent activation of the privacy requirement of the Health Insurance Portability
More informationService Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
More informationBusinessObjects XI. New for users of BusinessObjects 6.x New for users of Crystal v10
BusinessObjects XI Delivering extreme Insight Bringing information to new users, in new ways, with unmatched simplicity and context. Broadest and deepest end user capabilities from reporting, to query
More informationDelivery date: 18 October 2014
Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group
More informationCourse Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion.
Key Data Course #: 2553A Number of Days: 3 Format: Instructor-Led This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and
More informationAssessment of Software for Government
Version 1.0, April 2012 Aim 1. This document presents an assessment model for selecting software, including open source software, for use across Government, and the wider UK public sector. 2. It is presented
More informationIntroducing Web Conferencing Tools
Introducing Web Conferencing Tools A Towards Maturity paper providing information and support for those new to web conferencing tools June 09 Introduction... 2 What is web conferencing?... 2 Benefits of
More informationCollaborative Software Engineering: A Survey
Collaborative Software Engineering: A Survey Agam Brahma November 21, 2006 Abstract This paper surveys recent work in the field of collaborative software engineering and relates it to concepts discussed
More informationSOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
More informationData Migration through an Information Development Approach An Executive Overview
Data Migration through an Approach An Executive Overview Introducing MIKE2.0 An Open Source Methodology for http://www.openmethodology.org Management and Technology Consultants Data Migration through an
More informationRemote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
More informationData Management Plans - How to Treat Digital Sources
1 Data Management Plans - How to Treat Digital Sources The imminent future for repositories and their management Paolo Budroni Library and Archive Services, University of Vienna Tomasz Miksa Secure Business
More informationMaximumOnTM. Bringing High Availability to a New Level. Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology
MaximumOnTM Bringing High Availability to a New Level Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology Introduction While businesses have become increasingly dependent on computer-based
More informationIndirect DRM Evaluation Architecture
Gregory Heileman 1 Henry Jerez 2 1 Joud Khoury 1 1 Department of Electrical and Computer Engineering University of New Mexico 2 Corporation for National Research Initiatives Virtual Goods, October 11,
More informationOffice SharePoint Server 2007
Top 10 Benefits of WSS 3.0 Office SharePoint Server 2007 1. Improve team productivity with easy-to-use collaborative tools Connect people with the information and resources they need. Users can create
More informationEducational Gateway Development
Educational Gateway Development Bela MARKUS, Hungary Key words: Education and life long learning, knowledge transfer and sharing. SUMMARY The paper is dealing with the experiences of a MINERVA project
More informationWaterfordTechnologies.com Frequently Asked Questions
WaterfordTechnologies.com Frequently Asked Questions 1 E-Mail How is an archive different than a backup? MailMeter email archiving captures a copy of every email that is sent or received through your email
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationIT Service Management aus der Cloud
IT Service Management aus der Cloud V05_10/1 www.solvedirect.com SolveDirect! " Who we are SolveDirect is the expert for smart service integration! " What we offer Cutting-edge solutions: easy and affordable
More informationInmagic Content Server Workgroup Configuration Technical Guidelines
Inmagic Content Server Workgroup Configuration Technical Guidelines 6/2005 Page 1 of 12 Inmagic Content Server Workgroup Configuration Technical Guidelines Last Updated: June, 2005 Inmagic, Inc. All rights
More informationACADEMIC RESEARCH INTEGRATION SYSTEM
ACADEMIC RESEARCH INTEGRATION SYSTEM Iulia SURUGIU 1 PhD Candidate, University of Economics, Bucharest, Romania E-mail: : iulia_surugiu2003@yahoo.com Manole VELICANU PhD, University Professor, Department
More informationService Oriented Architecture (SOA) An Introduction
Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages
More informationWHITE PAPER Improving User Productivity and Saving Communications Costs with Microsoft Office Communications Server and Enterprise Instant Messaging
WHITE PAPER Improving User Productivity and Saving Communications Costs with Microsoft Office Communications Server and Enterprise Instant Messaging Sponsored by: Microsoft Robert P. Mahowald March 2010
More informationLife of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
More informationYiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
More informationTips for Taking Online Classes. Student Success Workshop
Tips for Taking nline Classes Student Success Workshop Types of Distance Learning Distance learning occurs outside of the traditional classroom setting. These classes may take place over the internet (i.e.
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationData Management Roadmap
Data Management Roadmap A progressive approach towards building an Information Architecture strategy 1 Business and IT Drivers q Support for business agility and innovation q Faster time to market Improve
More informationCloud Cube Model: Selecting Cloud Formations for Secure Collaboration
Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Problem Cloud computing offers massive scalability - in virtual computing power, storage, and applications resources - all at almost
More informationMiracle Integrating Knowledge Management and Business Intelligence
ALLGEMEINE FORST UND JAGDZEITUNG (ISSN: 0002-5852) Available online www.sauerlander-verlag.com/ Miracle Integrating Knowledge Management and Business Intelligence Nursel van der Haas Technical University
More informationContext-Aware Workplace Learning Support: Concept, Experiences, and Remaining Challenges
Andreas Schmidt Simone Braun Context-Aware Workplace Learning Support: Concept, Experiences, and Remaining Challenges FZI Research Center for Information Technologies Information Process Engineering Karlsruhe,
More informationPayment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)
Payment Card Industry Data Security Standard (PCI / DSS) InterSect Alliance International Pty Ltd Page 1 of 12 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance
More informationSymantec Client Management Suite 7.6 powered by Altiris technology
Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often
More information