Patched Yet?. While this isn't a security blog, last week's ASN.1 vulnerability (MS04-007) requires your attention. Without panic, all Windows NT/2000/XP/2003 systems need this patch. Because of the nature of the vulnerability, systems that accept authenticated connections are especially susceptible. This includes your Exchange Server. As quoted in this ZDNet article, “TruSecure said business should… Continue reading Patched Yet?
Month: February 2004
Back to Software Garden
Back to Software Garden. I have resigned from Interland as an employee and CTO. I will be available to them to provide advice on product and service offerings, and possibly participate on their behalf in various external relationships. I am going back full-time to Software Garden, the tiny company that I founded in 1985. I… Continue reading Back to Software Garden
More KM and e-learning
More KM and e-learning. The interesting areas of overlap IMO cover social learning, communities of practice and peer to peer learning. There is a close relationship between e-learning and KM as both domains seek to increase awareness, increment competencies, stimulate innovation and introduce new ideas. Both areas have tended to focus way too much on… Continue reading More KM and e-learning
'The Working Poor': Can't Win for Losing
'The Working Poor': Can't Win for Losing. David K. Shipler reports from the world of 35 million people, most of them employed, who are not making it in America. By Ron Suskind. [New York Times: Books]
Trippi's back online
Trippi's back online. Joe Trippi (former Dean campaign manager) is back on the Net, posting to his very own blog at Change for America. Stay tuned. [tins ::: Rick Klau's weblog]
It's all about scale
It's all about scale. My discussions at the O'Reilly Emerging Technology Conference today have all revolved around scale. First, I ran into Sam Gassel (old bio here), who architected the backend for CNN.com in the early days and scaled it to amazing levels as web traffic grew. CNN.com was the most demanding web environment I've… Continue reading It's all about scale
Stealing knowledge
Stealing knowledge. Can anyone steal your knowledge? In my understanding of knowledge, i.e., a complex linkage between context, information, personal frameworks and social mediation; it can never be stolen. Sure you may have your ideas copied, your information and documentation purloined, your opinions replicated with attributation, but it is just not possible to duplicate your… Continue reading Stealing knowledge
Preserving knowledge
Preserving knowledge. The key to knowledge preservation is to build a community and retain a relationship. Here tacit transfer takes place as people get to know each other and share emergent insights, implicit knowledge is discovered through dialog and the meaning behind explicit information can be shared. Knowledge comes in 3 flavors: tacit (what you… Continue reading Preserving knowledge
Everything depends upon the context.
Everything depends upon the context.. Documentation & knowledge. A oft repeated question / assertion in KM is the link between explicit documentation and knowledge. The point I'm trying to make, is documentation alone does not = knowledge. To retain knowledge against attrition you have to have a community… [Knowledge-at-work] I have formed the view that… Continue reading Everything depends upon the context.
OCLC refines its ISBN-clustering service
OCLC refines its ISBN-clustering service. Python hacker and OCLC chief scientist Thom Hickey has updated me on the xISBN project: Just thought I'd let you know that we've put up a new version of the ISBN database. We've done a lot of work to pull works with variant titles together (which helps with The Innovator's… Continue reading OCLC refines its ISBN-clustering service