I n t e r e s t i n g r e a d
(a technology forecast by PricewaterhouseCoopers)
The editors of this year's Collins English Dictionary have made 267 additions, including words which have previously been considered nothing more than sounds.
'words' such as 'hmm' and 'heh' have been included in the dictionary, as have the likes of 'meh' (a sound denoting disapproval) and 'mwah' (sounding like an exaggerated kiss).
Some words are contractions of expressions that have themselves only just become established online, most notably 'noob', for those who cannot be bothered to say – or more probably to write – 'newbie'.
Read more .. ..
In response to: Twittering teens add hundreds of words to dictionary
I think it is a combination of both txt msg and twittering. But tweets have much more visibility ( and findability??) than one-to-one txt msg. The words prolly started with text messaging, and then the twitter gave them visibility.
The following has been reproduced from NIST's common set of definitions around cloud computing and its use cases. Experts at NIST developed this draft definition in collaboration with industry and government. It was developed as the foundation for a NIST special publication that will cover cloud architectures, security, and deployment strategies for the federal government.
Definition of Cloud Computing
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider.
Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines.
Rapid elasticity. Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
Measured Service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
Service Model Architectures
Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.
Community cloud. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise.
Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
Cloud software takes full advantage of the cloud paradigm by being service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability.
Security Advantages with Cloud Computing
- Data Fragmentation and Dispersal
- Dedicated Security Team
- Greater Investment in Security Infrastructure
- Fault Tolerance and Reliability
- Greater Resiliency
- Hypervisor Protection Against Network Attacks
- Possible Reduction of C&A Activities (Access to Pre-Accredited Clouds)
- Simplification of Compliance Analysis
- Data Held by Unbiased Party (cloud vendor assertion)
- Low-Cost Disaster Recovery and Data Storage Solutions
- On-Demand Security Controls
- Real-Time Detection of System Tampering
- Rapid Re-Constitution of Services
- Advanced Honeynet Capabilities
Security Challenges with Cloud Computing
- Data dispersal and international privacy laws
- EU Data Protection Directive and U.S. Safe Harbor program
- Exposure of data to foreign government and data subpoenas
- Data retention issues
- Need for isolation management
- Logging challenges
- Data ownership issues
- Quality of service guarantees
- Dependence on secure hypervisors
- Attraction to hackers (high value target)
- Security of virtual OSs in the cloud
- Possibility for massive outages
- Encryption needs for cloud computing
- Encrypting access to the cloud resource control interface
- Encrypting administrative access to OS instances
- Encrypting access to applications
- Encrypting application data at rest
- Public cloud vs internal cloud security
- Lack of public SaaS version control
Cloud Computing is a IP enabled, scalable, virtualized, multi-tenant, subscription based (or “pay as you”), B2B, service delivery method for business software applications, platform development, and adaptive infrastructure. i.e. SaaS based applications, PaaS based development, IaaS based infrastructure. (DePena, 2009)
Addendum: Cloud Vendor Strategies
VMware: I already have the most popular virtualization software and I will integrate Spring Source and create the best PaaS offering.
Amazon EC2: I am extending my cloud facility to a virtual private environment so that you security concerns are taken care.
Microsoft: I am giving you a platform which is very similar to what you use so that you can seamlessly extend your application to the cloud and even the developers can continue to use the same set of tools.
SalesForce.com: I am giving you a Force.com with which you can build what you need over and above what I provide out of the box.
Google App Engine: I am creating a platform with which you get access to my complete infrastructure – practically unlimited processing power & storage and all my existing services.
Banerjee, U. (2009, August 16). Cloud Strategy. Retrieved September 05, 2009, from Udayan Banerjee’s Blog – From The Other Side: http://setandbma.wordpress.com/2009/09/03/cloud-strategy/
DePena, R. (2009, August 16). The Beauty Of The Cloud. Retrieved September 05, 2009, from Competitive Business Innovations: http://raydepena.wordpress.com/2009/08/16/the-beauty-of-the-cloud/
Mell, P., & Grance, T. (2009, August 8). National Institute of Standards and Technology - Cloud Computing. Retrieved September 4, 2009, from National Institute of Standards and Technology: http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
“Culture is an indirect variable, culture can’t be generated!”
When twittering about Lotus Connections, please make sure to add #lotusconnections to the tweets.
The professional life of the independent knowledge worker occurs in four different modes: insanity, give-back, work, and fun.
- If you are serving people you don't like to be with and are not getting paid, that is insanity.
- If you are serving people you enjoy being with but are not getting paid, that is give-back.
- If you are serving people you don't like to be with but are getting paid, that is work.
- If you are serving people you enjoy being with and are getting paid, that is fun.
First, find people you enjoy serving. Read more
Next, find problems you enjoy solving. Read more
| || |
Scale is the oxygen that feeds collaboration.
“Enterprise 2.0 tools are different from traditional IT systems. Traditional IT enables transactions; Enterprise 2.0 enables interactions.
When we use Enterprise 2.0, we're not transacting with a system; we're interacting with other people. And as Metcalf's Law famously states, the more people there are in that network, the more interactions each individual can have with his or her peers, and the more value that individual derives from participation in the network.
When organizations really embrace Enterprise 2.0, however, they almost always play in multiple sections of the Value Matrix, launching solutions like collaborative intranets, ideation portals, private extranets, Those solutions, almost by definition, require scale.
Scale is the oxygen that feeds collaboration.” (Idinopulos, 2009)
| || |
But scaling a e2.0 pilot is also a trap.
“And by the time you've scaled it, there are huge sunk costs. Anybody taking part in a trial is subject to Staw's Escalation Bias - the more effort you put into something, the more likely you are to show a potentially irrational commitment to it. Social Media is particularly susceptible to this due to the nature of its lobster trap and the flipside of Metcalfe's Law, enclosure.” (Bostock, 2009)
| || |
Beware of Self-Justification and Escalation Commitment
"[W]ithin investment decision contexts, negative consequences may actually cause decision makers to increase the commitment of resources and undergo the risk of further negative consequences” (Staw, 1976)
Bostock, S. (2009, September 07). Kill the pilots: Scale is the oxygen that feeds collaboration. Retrieved September 11, 2009, from @siibo: http://siibo.blogspot.com/2009/09/kill-pilots-scale-is-oxygen-that-feeds.html
Idinopulos, M. (2009, August 27). Enterprise 2.0: Skip the Pilot. Retrieved September 2009, 2009, from SocialText: http://www.socialtext.com/blog/2009/08/enterprise-20-skip-the-pilot.html
Staw, B. M. (1976). Knee-deep in the big muddy: a study of escalating commitment to a chosen course of action. Organizational behavior and human performance , 27-44.
In response to: Amazingly Creative 404 (File Not Found) Page
Greenpeace.org has a interesting 404 error msg as well:
1. The page may be extinct, like many whales, chimpanzees, and gorillas in the wild could be without your help.
DotSpotSaqib Ali: Interesting 404 Error Msg
2. The page may have moved, like many Pacific Islanders will have to do when their homes sink beneath the waves due to global warming.
3. You may have made a mistake typing the address, or we made a mistake creating a link. Mistakes happen. Chernobyl and Bhopal should have taught us that they can have devastating consequences, which is why releasing inadequately tested genetically engineered crops into nature is stupid and dangerous.
The following three-part presentation explores why merely implementing a wiki style knowledge management system, such as Sharepoint or Confluence does not work for an enterprise, and why social software, like Lotus Connections are required to create a collaborative culture in an enterprise.
People at the Center
The Rotisserie implements an innovative approach to online discussion that encourages measured, thoughtful discourse in a way that that traditional threaded messaging systems do not. The basic concept of the threaded messaging board is to enable broadcast-to-broadcast communication among a group of people, meaning that every participant in the conversation receives every post from every other participant. This mode of discussion inevitably leads to the domination of the discussion by a few very verbal participants and silence by the lurking majority. The Rotisserie breaks this mode by assigning every post within the conversation to another, specific participant for response. The resulting conversation guarantees that every post will be responded to by at least one other participant and that every participant must respond directly to the post of another participant.
This would be a nice to have feature in Lotus Connections.
Please share your thoughts in the comments section below.
John Gruber writes:
It’s not that Steve Jobs is fearless, but rather that he’s afraid of not changing. Where other CEOs can’t bring themselves to do something different, Jobs can’t bring himself to keep doing the same thing.
Read More .. ..
Clay Shirky once made the following observation:
"Every time social software improves, it is followed by changes in the way groups work and socialize. One consistently surprising aspect of social software is that it is impossible to predict in advance all of the social dynamics it will create.”
If your organization currently uses Lotus Connections, and you have stumbled upon some new (unexpected) social dynamics with the use of the software, please share them here.
Patent Application Abstract
A method, system and computer program product for enlivening conference calls. Noise detectors are placed on the telephone lines for the participants to a conference call. These noise detectors are used to monitor for noise on the telephone lines. A pre-selected stored sound (e.g., an interjection such as a laugh) may be generated if there is a period of silence on one of the telephone lines that exceeds a threshold, if noise is detected on a telephone line associated with a pre-selected individual, or if noise is detected on a pre-selected telephone line. Further, a request may be received from one of the participants of the conference call to play a provided interjection. The received interjection is later generated during the conference call. By including interjections during the conference call at appropriate times, the conference call may be enlivened and more interesting to the participants.
Read more .. ..