accommodating knowledge in the age of ebologna: from commodity to living context

Size: px
Start display at page:

Download "accommodating knowledge in the age of ebologna: from commodity to living context"

Transcription

1 isko 2006: knowledge organization for a global learning society wissensorganisation für den bologna prozess vienna, july 6, 2006 accommodating knowledge in the age of ebologna: from commodity to living context reinhard keil, universität paderborn

2 What is more important than sex?

3 Knowledge: Two complementary perspectives Knowledge as commodity transportation) Stored in documents and databases Complemented by metadata and ontologies Knowledge as living context transformation Created, Modified Interpreted Evaluated Arranged Deleted, in socially mediated learning processes Requires Non-sequential writing (Nelson)

4 Well-structured and formalized entities have to be embedded into cooperative interactions

5 What is interactivity? To interact (Webster): to act mutually, to perform reciprocal acts Interactions between humans and computers and interactions among human beings What do they have in common? Both are based on the exchange of symbols but only humans communicate (mutual understanding). Interactivity as a quality that can be assigned to a person or a device is a creation in the context of the modern computer. Heidi Schelhowe: Das Medium aus der Maschine (Transl. by RK)

6 Analogue media are based on inscription technologies Phonograph (two essential inventions): physics: making sound visible engineering: inscribe sound in carrier material (wax). Characteristic trait: signs once inscribed or recorded cannot be treated as manipulable objects anymore. By means of technology only the carrier material can be processed not the signs or symbols itself. Manipulating the carrier material instead of the symbols requires extensive skills and competences. Learners (users) are confined to reading only. Media (learning) objects as passive typography

7 Semantic relations of authors and readers are different G. Jean: Die Geschichte der Schrift. Ravensburger Taschenbuch, 1991 Knowledge is continually processed, reformulated, modified, extended, linked, etc. Maintaining a living body of knowledge requires many skills and resources. Inscription technologies do only provide means for manipulating the carrier materials. Semantic relations of the reader have to be embodied outside of the primary medium.

8 A first Hypertext System? The book wheel made it easier for the reader to arrange related books. Pages may have semantic relations. Exchanging books or flipping pages destroys these spatial relations. Agnos Ramelli, 1588 Cleaning up someone s desk destroys his work to a considerable degree. Note: Books can be arranged, not the content of a book Links cannot be physically attached neither to a book nor some information in the book.

9 elearning: An old hat on top of new technology Organization Create Medium Use Author Channel Technology Carrier Reader Teachers write (authoring tools) Students read (browser) Learning Environment: Transport of Documents Feedback is reduced to predefined answers (multiple choice) and system responses or has to be given via separate media channels (no object persistency) Enhancements for retrieval (metadata, ontologies), but One-Way-Road to Learning without non-sequential (co-operative) writing: indirect Interaction.

10 Can a machine interact? Can the designer know? Are you sure? Yes No Not really Are you?? There is no reason for a technical system to ask questions, because no one is listening to the answer. A piece of instructive software is an inscription of the designer s anticipation of the situation at hand. The designer requires the user to confirm his last entry he is not interested in his existential orientations. He should offer choices and make his design decisions transparent rather than speculating about his intentions. It almost always fails!

11 Can humans interact? Only indirect interaction organisation production chan. medium techn. carrier usage Author Analogue media have clearly separated channels for sending and receiving. The resulting media discontinuities could be avoided by digital media! organisation 2 Reader usage Medium 2 production chan. 2 techn. 2 carrier 2

12 Re-defining interactivity: Interactivity is an essential quality of active semiotics, with other words: active semiotics = responsiveness + interactivity responsiveness: Continuous background process evaluates arrangement of symbols during its construction and provides immediate feedback (i.e. spell checker, tool tip, database query) interactivity: The recognized object (sign or symbol) itself can be manipulated and not the carrier material only (new primary media functions arranging, marking up, linking, ) distributed cooperation: objects can be manipulated cooperatively and stored in virtual knowledge spaces

13 Active typography: the vision Today documents and applications form the core of digital media use. They represent sort of a typographic prison. Standard formats allow us to furlough to some extent. Only real interactivity objects that can be manipulated and evaluated (executed) can provide us with the full potential of digital media. But Granularity and standards of knowledge changes (new ontologies required). semantic interoperability

14 Semantic interoperability The ultimate goal: Every digital object, once into the system should not be re-entered even if different functions shall be applied to it Two important domains Cooperative distributed and continuous modification of objects Interaction across functional (applications) and organizational boundaries service infrastructures (as complement to maintaining object and device repositories such as books, computers, servers, etc.) Essential constraint: ebologna requires to act across organizational, institutional and national boundaries

15 Dimensions of embedment The Graz-Model of classification of collaboration support Aspects of cooperative learning. Differentiate team content and process

16 migrating to active typography Intertwined writing and reading of of objects (not only application sharing) Support of all forms of cooperation and distributed writing (direct interaction: human to human) Assigning roles to every user allowing him or her to write and to define who may read it Embodying a tight coupling of action-recognition through virtual social spaces Reduce media discontinuities not only on the level of object transportation but also object transformation. Viewing learning processes as continuous processes of transformation of learning objects (not just reading or executing them)

17 Pervasive elearning: integration, not isolated reading access places/ time knowledge organization distributed continuous Virtual knowledge spaces as foci and loci of learning and knowledge organization. Synchronous and asynchronous manipulation of objects according to the principle of self-administration. Not independence of time and space, but integration of distributed activities!

18 Co-operative virtual knowledge spaces Persistent areas (rooms) are connected through gates (doors links) and contain people, documents und tools (programs) which can be manipulated in synchronous and asynchronous ways. communication functions are tied to objects. Sophisticates means for role and rights management allow for the flexible realization of different scenarios ranging from traditional presentations to complex forms of self-regulated knowledge organization.

19 Structuring knowledge & discourse Single data set and a single framework of application

20 Objects become manipulable instances of knowledge

21 service-portfolios in an integrated service infrastructure complex services integrated knowledge management authoring support interactive study service interactive syllabus & ECTS accounting mobile teacher s workplace user services basic services media management Information retrieval account management (data domains) data protection (backup, archives) roles / rights management access management (entry) service portfolio accounting content synchronisation (notebook/server) student workplace content, library publication services (Web-Server, ) communication services ( , chat, ) university portal technical infrastructure networks (LAN, WLAN, ) server (DNS, NIS, ) security (Firewall, VPN, )

22 Providing functions through open interfaces

23 Layers of integration

24 From desktop to digital library Different views on the same objects

25 Conclusio Computers were innovative tools to free humans from weary mental labor Virtual knowledge spaces should be a means to free humans from computers

Question/Answer Transaction Protocol Overview First Committee Working Draft NISO Committee AZ: September 22, 2003

Question/Answer Transaction Protocol Overview First Committee Working Draft NISO Committee AZ: September 22, 2003 Question/Answer Transaction Protocol Overview First Committee Working Draft NISO Committee AZ: September 22, 2003 NISO Committee AZ is developing a Question/Answer Transaction (QAT) Protocol to support

More information

Vendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities

Vendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities Vendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities April, 2013 gaddsoftware.com Table of content 1. Introduction... 3 2. Vendor briefings questions and answers... 3 2.1.

More information

IBM Enterprise Content Management Product Strategy

IBM Enterprise Content Management Product Strategy White Paper July 2007 IBM Information Management software IBM Enterprise Content Management Product Strategy 2 IBM Innovation Enterprise Content Management (ECM) IBM Investment in ECM IBM ECM Vision Contents

More information

Ontology based Recruitment Process

Ontology based Recruitment Process Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany mochol@inf.fu-berlin.de

More information

OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL

OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL OVERVIEW OF JPSEARCH: A STANDARD FOR IMAGE SEARCH AND RETRIEVAL Frédéric Dufaux, Michael Ansorge, and Touradj Ebrahimi Institut de Traitement des Signaux Ecole Polytechnique Fédérale de Lausanne (EPFL)

More information

Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum.

Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum. Independent Insight for Oriented Practice An SOA Roadmap John C. Butler Chief Architect A CBDI Partner Company www.cbdiforum.com Agenda! SOA Vision and Opportunity! SOA Roadmap Concepts and Maturity Levels!

More information

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8

THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8 THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

2 AIMS: an Agent-based Intelligent Tool for Informational Support

2 AIMS: an Agent-based Intelligent Tool for Informational Support Aroyo, L. & Dicheva, D. (2000). Domain and user knowledge in a web-based courseware engineering course, knowledge-based software engineering. In T. Hruska, M. Hashimoto (Eds.) Joint Conference knowledge-based

More information

A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS

A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS Ionela MANIU Lucian Blaga University Sibiu, Romania Faculty of Sciences mocanionela@yahoo.com George MANIU Spiru Haret University Bucharest, Romania Faculty

More information

Master Data Management

Master Data Management Master Data Management Managing Data as an Asset By Bandish Gupta Consultant CIBER Global Enterprise Integration Practice Abstract: Organizations used to depend on business practices to differentiate them

More information

ADO and SQL Server Security

ADO and SQL Server Security ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services

More information

Integrating the customer experience through unifying software - The Microsoft Vision

Integrating the customer experience through unifying software - The Microsoft Vision VAASAETT - RESPOND 2010 Integrating the customer experience through unifying software - The Microsoft Vision Principal Author Andreas Berthold- van der Molen, Microsoft EMEA Contents The New Energy Ecosystem

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Corticon Success at Unum Best Practices in Enterprise-Wide Deployment. Bob Whyte

Corticon Success at Unum Best Practices in Enterprise-Wide Deployment. Bob Whyte Corticon Success at Unum Best Practices in Enterprise-Wide Deployment Bob Whyte 1 AGENDA Introduction Unum Timeline what happened when Evolution progressive change & lessons Business rules construction

More information

Inmagic Content Server v9 Standard Configuration Technical Guidelines

Inmagic Content Server v9 Standard Configuration Technical Guidelines Inmagic Content Server v9.0 Standard Configuration Technical Guidelines 5/2006 Page 1 of 15 Inmagic Content Server v9 Standard Configuration Technical Guidelines Last Updated: May, 2006 Inmagic, Inc. All

More information

Creating a Corporate Integrated Data Environment through Stewardship

Creating a Corporate Integrated Data Environment through Stewardship The Open Group Creating a Corporate Integrated Data Environment through Stewardship Enterprise Architecture Practitioners Conference Given January 2007 San Diego Presented by: Robert (Bob) Weisman CGI

More information

QAD Business Intelligence Data Warehouse Demonstration Guide. May 2015 BI 3.11

QAD Business Intelligence Data Warehouse Demonstration Guide. May 2015 BI 3.11 QAD Business Intelligence Data Warehouse Demonstration Guide May 2015 BI 3.11 Overview This demonstration focuses on the foundation of QAD Business Intelligence the Data Warehouse and shows how this functionality

More information

An Object Model for Business Applications

An Object Model for Business Applications An Object Model for Business Applications By Fred A. Cummins Electronic Data Systems Troy, Michigan cummins@ae.eds.com ## ## This presentation will focus on defining a model for objects--a generalized

More information

The Business Value of a Web Services Platform to Your Prolog User Community

The Business Value of a Web Services Platform to Your Prolog User Community The Business Value of a Web Services Platform to Your Prolog User Community A white paper for project-based organizations that details the business value of Prolog Connect, a new Web Services platform

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

C2030-280.Examcollection.Premium.Exam.34q

C2030-280.Examcollection.Premium.Exam.34q C2030-280.Examcollection.Premium.Exam.34q Number: C2030-280 Passing Score: 800 Time Limit: 120 min File Version: 32.2 http://www.gratisexam.com/ Exam Code: C2030-280 Exam Name: IBM Cloud Computing Infrastructure

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,

More information

Glossary of terms used in the survey

Glossary of terms used in the survey Glossary of terms used in the survey 5 October 2015 Term or abbreviation Audio / video capture Refers to the recording of audio and/or video. API Application programming interface, how a computer program

More information

Migrating From a Peer-to- Peer Workgroup to Small Business Server 2008. By Manjunath Narayanan and Perumal Raja Dell Enterprise Product Group

Migrating From a Peer-to- Peer Workgroup to Small Business Server 2008. By Manjunath Narayanan and Perumal Raja Dell Enterprise Product Group Migrating From a Peer-to- Peer Workgroup to Small Business Server 2008 By Manjunath Narayanan and Perumal Raja Dell Enterprise Product Group CONTENTS 1.0. Introduction 3 2.0. What is Small Business Server

More information

elearning Content Management Middleware

elearning Content Management Middleware elearning Content Management Middleware Chen Zhao Helsinki 18.2.2004 University of Helsinki Department of Computer Science Authors Chen Zhao Title elearning Content Management Middleware Date 18.2.2004

More information

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010

W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010 W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

A. Document repository services for EU policy support

A. Document repository services for EU policy support A. Document repository services for EU policy support 1. CONTEXT Type of Action Type of Activity Service in charge Associated Services Project Reusable generic tools DG DIGIT Policy DGs (e.g. FP7 DGs,

More information

How To Use The Dcml Framework

How To Use The Dcml Framework DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application

More information

Five best practices for deploying a successful service-oriented architecture

Five best practices for deploying a successful service-oriented architecture IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative

More information

HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013

HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013 HTML5 Data Visualization and Manipulation Tool Colorado School of Mines Field Session Summer 2013 Riley Moses Bri Fidder Jon Lewis Introduction & Product Vision BIMShift is a company that provides all

More information

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System

More information

info@hensongroup.com www.hensongroup.com

info@hensongroup.com www.hensongroup.com With the Henson Group s solution, companies can: Reduce IT help desk costs Improve employee productivity Better allocate IT resources and position IT as a strategic asset Easily manage and maintain a self-service

More information

Microsoft Windows Storage Server 2003 R2

Microsoft Windows Storage Server 2003 R2 Microsoft Windows Storage Server 2003 R2 Getting Started Guide Abstract This guide documents the various features available in Microsoft Windows Storage Server 2003 R2. Rev 1. 2005 Microsoft Corporation.

More information

2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.

2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management. 3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema

More information

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Brochure Achieving security with cloud data protection. Autonomy LiveVault Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server

More information

Framework as a master tool in modern web development

Framework as a master tool in modern web development Framework as a master tool in modern web development PETR DO, VOJTECH ONDRYHAL Communication and Information Systems Department University of Defence Kounicova 65, Brno, 662 10 CZECH REPUBLIC petr.do@unob.cz,

More information

INFORMING A INFORMATION DISCOVERY TOOL FOR USING GESTURE

INFORMING A INFORMATION DISCOVERY TOOL FOR USING GESTURE INFORMING A INFORMATION DISCOVERY TOOL FOR USING GESTURE Luís Manuel Borges Gouveia Feliz Ribeiro Gouveia {lmbg, fribeiro}@ufp.pt Centro de Recursos Multimediáticos Universidade Fernando Pessoa Porto -

More information

Chapter 11 Mining Databases on the Web

Chapter 11 Mining Databases on the Web Chapter 11 Mining bases on the Web INTRODUCTION While Chapters 9 and 10 provided an overview of Web data mining, this chapter discusses aspects of mining the databases on the Web. Essentially, we use the

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

EnergySync and AquaSys. Technology and Architecture

EnergySync and AquaSys. Technology and Architecture EnergySync and AquaSys Technology and Architecture EnergySync and AquaSys modules Enterprise Inventory Enterprise Assets Enterprise Financials Enterprise Billing Service oriented architecture platform

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

A Guide Through the BPM Maze

A Guide Through the BPM Maze A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM

More information

Microsoft 10534 - Planning and Designing a Microsoft Lync Server 2010 Solution

Microsoft 10534 - Planning and Designing a Microsoft Lync Server 2010 Solution 1800 ULEARN (853 276) www.ddls.com.au Microsoft 10534 - Planning and Designing a Microsoft Lync Server 2010 Solution Length 5 days Price $4169.00 (inc GST) Overview This five-day instructor-led course

More information

ACCESSING WEB ARCHIVES

ACCESSING WEB ARCHIVES ACCESSING WEB ARCHIVES There are two collections of archived websites available via Explore the British Library: The Legal Deposit UK Web Archive, archived through legal deposit regulations introduced

More information

Mobile Learning and ADL s Experience API

Mobile Learning and ADL s Experience API Mobile Learning and ADL s Experience API Kristy Murray, Peter Berking, Jason Haag, and Nikolaus Hruska * Introduction The Advanced Distributed Learning (ADL) Initiative s Sharable Content Object Reference

More information

INFORMATION SECURITY GUIDELINES

INFORMATION SECURITY GUIDELINES INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS: Scope of Document 1 Data Definition Guidelines (Appendix 1).2 Data Protection Guidelines (Appendix 2).3 Protection of Electronic or Machine- Readable

More information

Executive Mobile UC for Business

Executive Mobile UC for Business UC for Business NEC Australia nec.com.au Table of Contents Introduction...3 Mobility...3 What is Mobility?...3 Physical Architecture...3 UCB Mobility...4 - Cellular Application...4 Desktop functionality

More information

System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria

System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic

More information

Computing & Communications Services

Computing & Communications Services 2010 Computing & Communications Services 2010 / 09 / 28 Kent Percival, M.Sc., P.Eng. Expanding CCS Storage Services CCS now provides storage to individuals and departments. This investigation considers

More information

SPLITTING TUTOR ROLES: SUPPORTING ONLINE-LEARNERS WITH GROUP TUTORS AND SUBJECT TUTORS

SPLITTING TUTOR ROLES: SUPPORTING ONLINE-LEARNERS WITH GROUP TUTORS AND SUBJECT TUTORS Nübel, I/ Kerres, M (2004): Splitting tutor roles: supporting online-learners with group tutors and subject tutors. In: Bernath, U./ Szücs, A. (Eds.): Proceedings of the 3 rd Eden Research Workshop. Oldenburg:

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Software Application: CampusCruiser Portal Interface

Software Application: CampusCruiser Portal Interface Software Application: CampusCruiser Portal Interface The technology landscape for the 21 st century college and university is transforming at lightning speed. In order to keep pace with new technology

More information

In ediscovery and Litigation Support Repositories MPeterson, June 2009

In ediscovery and Litigation Support Repositories MPeterson, June 2009 XAM PRESENTATION (extensible TITLE Access GOES Method) HERE In ediscovery and Litigation Support Repositories MPeterson, June 2009 Contents XAM Introduction XAM Value Propositions XAM Use Cases Digital

More information

Archiving Systems. Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie. uwe.borghoff@unibw.

Archiving Systems. Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie. uwe.borghoff@unibw. Archiving Systems Uwe M. Borghoff Universität der Bundeswehr München Fakultät für Informatik Institut für Softwaretechnologie uwe.borghoff@unibw.de Decision Process Reference Models Technologies Use Cases

More information

Reassessing Conventional Paradigms for Document Description

Reassessing Conventional Paradigms for Document Description Reassessing Conventional Paradigms for Document Description by Tom Delsey We are currently in a transitional state, adapting cataloguing conventions and rules to accommodate the description of newly emerging

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Significance of Proficient Event Logs Archiving in prevailing over Compliance Worries Whitepaper. 2013 www.lepide.com

Significance of Proficient Event Logs Archiving in prevailing over Compliance Worries Whitepaper. 2013 www.lepide.com Significance of Proficient Event Logs Archiving in prevailing over Compliance Worries Whitepaper 2013 www.lepide.com 1. Introduction Event logs archiving has gained immense significance in the light of

More information

IBM Lotus Domino Document Manager 6.5.1

IBM Lotus Domino Document Manager 6.5.1 Collaborative document management for the enterprise IBM 6.5.1 Highlights Provides high-value, low-cost Manages documents for document management for IBM Lotus Notes, Microsoft organization-wide applicability

More information

Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act

Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act White Paper Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act The recent activation of the privacy requirement of the Health Insurance Portability

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

BusinessObjects XI. New for users of BusinessObjects 6.x New for users of Crystal v10

BusinessObjects XI. New for users of BusinessObjects 6.x New for users of Crystal v10 BusinessObjects XI Delivering extreme Insight Bringing information to new users, in new ways, with unmatched simplicity and context. Broadest and deepest end user capabilities from reporting, to query

More information

Delivery date: 18 October 2014

Delivery date: 18 October 2014 Genomic and Clinical Data Sharing Policy Questions with Technology and Security Implications: Consensus s from the Data Safe Havens Task Team Delivery date: 18 October 2014 When the Security Working Group

More information

Course Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion.

Course Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion. Key Data Course #: 2553A Number of Days: 3 Format: Instructor-Led This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and

More information

Assessment of Software for Government

Assessment of Software for Government Version 1.0, April 2012 Aim 1. This document presents an assessment model for selecting software, including open source software, for use across Government, and the wider UK public sector. 2. It is presented

More information

Introducing Web Conferencing Tools

Introducing Web Conferencing Tools Introducing Web Conferencing Tools A Towards Maturity paper providing information and support for those new to web conferencing tools June 09 Introduction... 2 What is web conferencing?... 2 Benefits of

More information

Collaborative Software Engineering: A Survey

Collaborative Software Engineering: A Survey Collaborative Software Engineering: A Survey Agam Brahma November 21, 2006 Abstract This paper surveys recent work in the field of collaborative software engineering and relates it to concepts discussed

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

Data Migration through an Information Development Approach An Executive Overview

Data Migration through an Information Development Approach An Executive Overview Data Migration through an Approach An Executive Overview Introducing MIKE2.0 An Open Source Methodology for http://www.openmethodology.org Management and Technology Consultants Data Migration through an

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

Data Management Plans - How to Treat Digital Sources

Data Management Plans - How to Treat Digital Sources 1 Data Management Plans - How to Treat Digital Sources The imminent future for repositories and their management Paolo Budroni Library and Archive Services, University of Vienna Tomasz Miksa Secure Business

More information

MaximumOnTM. Bringing High Availability to a New Level. Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology

MaximumOnTM. Bringing High Availability to a New Level. Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology MaximumOnTM Bringing High Availability to a New Level Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology Introduction While businesses have become increasingly dependent on computer-based

More information

Indirect DRM Evaluation Architecture

Indirect DRM Evaluation Architecture Gregory Heileman 1 Henry Jerez 2 1 Joud Khoury 1 1 Department of Electrical and Computer Engineering University of New Mexico 2 Corporation for National Research Initiatives Virtual Goods, October 11,

More information

Office SharePoint Server 2007

Office SharePoint Server 2007 Top 10 Benefits of WSS 3.0 Office SharePoint Server 2007 1. Improve team productivity with easy-to-use collaborative tools Connect people with the information and resources they need. Users can create

More information

Educational Gateway Development

Educational Gateway Development Educational Gateway Development Bela MARKUS, Hungary Key words: Education and life long learning, knowledge transfer and sharing. SUMMARY The paper is dealing with the experiences of a MINERVA project

More information

WaterfordTechnologies.com Frequently Asked Questions

WaterfordTechnologies.com Frequently Asked Questions WaterfordTechnologies.com Frequently Asked Questions 1 E-Mail How is an archive different than a backup? MailMeter email archiving captures a copy of every email that is sent or received through your email

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

IT Service Management aus der Cloud

IT Service Management aus der Cloud IT Service Management aus der Cloud V05_10/1 www.solvedirect.com SolveDirect! " Who we are SolveDirect is the expert for smart service integration! " What we offer Cutting-edge solutions: easy and affordable

More information

Inmagic Content Server Workgroup Configuration Technical Guidelines

Inmagic Content Server Workgroup Configuration Technical Guidelines Inmagic Content Server Workgroup Configuration Technical Guidelines 6/2005 Page 1 of 12 Inmagic Content Server Workgroup Configuration Technical Guidelines Last Updated: June, 2005 Inmagic, Inc. All rights

More information

ACADEMIC RESEARCH INTEGRATION SYSTEM

ACADEMIC RESEARCH INTEGRATION SYSTEM ACADEMIC RESEARCH INTEGRATION SYSTEM Iulia SURUGIU 1 PhD Candidate, University of Economics, Bucharest, Romania E-mail: : iulia_surugiu2003@yahoo.com Manole VELICANU PhD, University Professor, Department

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

WHITE PAPER Improving User Productivity and Saving Communications Costs with Microsoft Office Communications Server and Enterprise Instant Messaging

WHITE PAPER Improving User Productivity and Saving Communications Costs with Microsoft Office Communications Server and Enterprise Instant Messaging WHITE PAPER Improving User Productivity and Saving Communications Costs with Microsoft Office Communications Server and Enterprise Instant Messaging Sponsored by: Microsoft Robert P. Mahowald March 2010

More information

Life of a Packet CS 640, 2015-01-22

Life of a Packet CS 640, 2015-01-22 Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have

More information

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction

More information

Tips for Taking Online Classes. Student Success Workshop

Tips for Taking Online Classes. Student Success Workshop Tips for Taking nline Classes Student Success Workshop Types of Distance Learning Distance learning occurs outside of the traditional classroom setting. These classes may take place over the internet (i.e.

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Data Management Roadmap

Data Management Roadmap Data Management Roadmap A progressive approach towards building an Information Architecture strategy 1 Business and IT Drivers q Support for business agility and innovation q Faster time to market Improve

More information

Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration

Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration Problem Cloud computing offers massive scalability - in virtual computing power, storage, and applications resources - all at almost

More information

Miracle Integrating Knowledge Management and Business Intelligence

Miracle Integrating Knowledge Management and Business Intelligence ALLGEMEINE FORST UND JAGDZEITUNG (ISSN: 0002-5852) Available online www.sauerlander-verlag.com/ Miracle Integrating Knowledge Management and Business Intelligence Nursel van der Haas Technical University

More information

Context-Aware Workplace Learning Support: Concept, Experiences, and Remaining Challenges

Context-Aware Workplace Learning Support: Concept, Experiences, and Remaining Challenges Andreas Schmidt Simone Braun Context-Aware Workplace Learning Support: Concept, Experiences, and Remaining Challenges FZI Research Center for Information Technologies Information Process Engineering Karlsruhe,

More information

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS) Payment Card Industry Data Security Standard (PCI / DSS) InterSect Alliance International Pty Ltd Page 1 of 12 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance

More information

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Client Management Suite 7.6 powered by Altiris technology Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often

More information