Blogging is hard. Okay, the typing isn’t the hard part, it is taking the time required for critical thinking. I needed to experience the life of a blogger for a variety of reasons, but mainly to bring all my thoughts in to one place. I figure some posts will be a swing and a miss, others, to the fence. a Today, its hardly even a… Read More »Blogging is Fundamental
Welcome to my QR Code.
If you are online or read some popular print media, you have likely come across a cryptic symbol like one of those above, and maybe you have wondered about it? It might even look like some sort of bar code you see on packages from the USPS or FedEX, so why is it on webpages and blogs, and even my Sunday sale papers and advertisement? Ladies and gentlemen, meet the 2D world of the two-dimensional matrix Quick Response (QR) barcode.
This bar code was created by Japanese firm TDenso-Wave in 1994 for tracking parts in vehicle manufacturing, the QR code has become one of the most popular types of two-dimensional barcodes, and in a broader context. What makes it unique to the everyday user is not the fact that it takes a QR barcode reader to understand it, but the mere fact that most every person with a smart phone has a QR code scanner built in. Or have the ability to download a QR scanner app for free.
Imagine the amount of fat, bloated programs that hog your computer’s storage and it only seems to grow. Or those wonderful digital cameras and digital video images you have been collecting for the last couple of years. And you wouldn’t want to forget about videos, podcast and other rich media that you just want to hold on to like a digital packrat. So much so that it seems we have to yearly buy larger hard drives, more memory sticks or add portable storage devices to hold all our files like the 21st century version of a time capsule. When it comes to an organization, especially a large one, those costs in hardware and software all translate to money. Well along came Cloud Computing and unless you have been paying close attention you may have never heard the term, but you might have been doing it for a number of years.
Cloud Computing is best explained as IT capabilities offered as a service. The Cloud is a long-used word describing the Internet, but when used with Computing some believe the term is not often understood. To add further confusion, Cloud Computing is similar, but distinctly different from another concept called Software-as-a-Service (SaaS). In comparing the two, an April 2008 Gartner report differentiates the two as “cloud computing refers to the bigger picture…basically the broad concept of using the internet to allow people to access technology-enabled services. SaaS is software that’s owned, delivered, and managed remotely by one or more providers.”
Are you Wiki?
“Wiki” (/wi:ki:/), a Hawaiian word for “fast,” are web pages that can be quickly edited by any visitor. It is a web based program that is used to create collaborative workspaces that users freely create and edit Web page content using any Web browser. Wiki supports hyperlinks and has simple text syntax for creating new pages and cross links between internal pages on the fly.
One of the most popular sites within the public domain is Wikipedia (http://en.wikipedia.org), an encyclopedia written collaboratively by volunteers from all around the world and anyone with internet access can make changes to Wikipedia articles. Since its creation in 2001, Wikipedia attracts 684 million visitors yearly. There are more than 75,000 active contributors working on more than 10,000,000 articles in more than 260 languages. That is a collaboration project to envy.
But did you know that the same wiki capability exists in the .mil domain today? There are a number of wiki software programs and hosts in use for your own collaboration activities on both NIPR and SIPR and you only need be an authorized user of government networks to gain access to these free (to you) resources. Some sites are targeted to specific activities like Intelink (https://www.intelink.gov), which has a goal to promote intelligence dissemination and business workflow. Intelink is actually multiple sites, Intelink-U, Intelink-S and Intelink-TS which are all on various networks.
Author Paul Bryan reported in the Intranet Journal* a result of a survey where an oft heard complaint was about low usage of company portals. In his attempt to narrow factors contributing to negative reviews, one of the key challenges he found was “often a result of focusing on technical requirements rather than the real-life context of the system.” Sounds like another example of missing the other two elements of good KM…the People and Processes that support the underlying Technology. Give ’em a portal but don’t show them why they need it, how to use it, or help them change their internal procedures to support it. As Maxwell Smart would say, “ah, The Oldest Trick in the Book!”
Is that a problem in your work area, are there portals at your disposal that are little understood or seldom used? Who needs these portals anyway, I have lived without them for all this time, why do should I use one now? Be it an organizational Sharepoint server, the Army’s Knowledge Online enterprise portal, or one of the communities of practice that have proliferated in the .mil domain, these online internet (or intranet) presences are something you should be paying attention to. I suggest that you may have the technology, but do your people know how to best employ them and have your operating procedures adapted to using them yet?
If you were at today’s Central Texas’s AAF meeting, I have posted a link to the briefing used for the presentation, feel free to use it for your overview. It is here: Please tell us what you thought of the event! a http://bit.ly/eOxymh
“In the digital age, knowledge is our lifeblood. And documents are the DNA of knowledge.”
-–Rick Thoman, CEO, Xerox
In recognizing the way that the operational Army approaches knowledge management one must acknowledge that where you are at in Army Forces Generation (ARFORGEN) will drive your activities and focus at any given time. When you begin a life-cycle, usually at the conclusion of a operation or deployment as of late, knowledge workers are traditionally gathering observations and best practices, archiving and cataloging good ideas and what worked best, and improving on the processes that did not quite work so well. It is then when equipment (and people) are “reset,” new soldiers come while old soldiers go, and new and overhauled equipment is issued.
During the Ready phase is when the knowledge worker is sharpening their axe and helping the unit to prepare. New equipment is integrated and processes are evaluated. Staffs and operators are trained, standard procedures are developed and drills are established. Units begin checking with their deployed counterparts for possible changes and adjustments to their standing procedures while new and emerging doctrine is review and incorporated in to routine activities.
According to the security firm Symantec more new malicious programs were created in 2008 than useful programs, something they predicted would increase in 2009. And according to a recent report that surveyed over 200 corporate and government IT professionals, 50 percent expressed concern that so-called Generation Y employees were a security concern primarily because of their tendency to frequent social networking sites like Facebook and MySpace.
So my question at hand asks…is the problem the individual and their tendencies to use new mediums to communicate, or is it the technology that allows the security holes to be exploited? That poses a dilemma for organizations grappling with the social-networking phenomenon, or as an expert asked “how do you harness all of the good, but avoid the bad?”