Skip to main content

Home/ Groups/ Dogs-to-Stars Enterprises
Steve King

The Known, the Unknown, and the Unknowable in Financial Risk ... - 0 views

  •  
    I'm not sure I fully understand the KuU distinction.. but there seems to be thread of this stuff in high end risk theory.. leading back to this paper and beyond Gomory, R. (1995), "The Known, the Unknown and the Unknowable," Scientific American, June.
Steve King

Technology Review: Technology's disasters share long trail of hubris - 0 views

  • Bea categorizes disasters into four groups. One such group is when an organization simply ignores warning signs through overconfidence and incompetence. He thinks the BP spill falls into that category. Bea pointed to congressional testimony that BP ignored problems with a dead battery, leaky cement job and loose hydraulic fittings.
Steve King

UC Berkeley, Management of Technology (MOT) Program Course: Human and Organizational Fa... - 0 views

  • This course advances the concept that humans and their organizations are an integral part of the engineering paradigm and that it is up to engineering to learn how to better integrate considerations of people into engineering systems of all types. This course focuses this concept on the assessment and management of the risks associated with engineered systems during their life-cycle (concept development through decommissioning). Risks (likelihoods and consequences) are addressed in the contexts of the desired quality from an engineered system including serviceability (fitness for purpose), safety (freedom from undue exposure to harm), compatibility (on time, on budget, with happy customers including the environment), and durability (freedom from unexpected degradations in the other quality characteristics). Reliability is introduced to enable assessment of the wide variety of hazards, uncertainties, and variabilities that are present during the life-cycle of an engineered system. Proactive (get ahead of the challenges), Reactive (learn the lessons from successes and failures), and Interactive (realtime assessment and management of unknown knowables and unknown unknowables) strategies are advanced and illustrated to assist engineers in the assessment and management of risks.
Steve King

Technology Review: The Semantic Web Goes Mainstream - 0 views

  • Another technique that Twine uses is graph analysis. This idea, explains Spivack, is similar to the thinking behind the "social graph" that Mark Zuckerberg, the founder of Facebook, extols: connections between people exist in the real world, and online social-networking tools simply collect those connections and make them visible. In the same way, Spivack says, Twine helps make the connections between people and their information more accessible. When data is tagged, it essentially becomes a node in a network. The connections that each node has to other nodes (which could be other data, people, places, organizations, projects, events, et cetera) depend on their tags and the statistical relevance they have to the tags of other nodes. This is how Twine determines relevance when a person searches through his or her information. The farther away a node is, the less relevant it is to a user's search
dhtobey Tobey

Google Prediction API - Google Code - 0 views

  • The Prediction API enables access to Google's machine learning algorithms to analyze your historic data and predict likely future outcomes. Upload your data to Google Storage for Developers, then use the Prediction API to make real-time decisions in your applications
  •  
    Potential analytic toolkit for analyzing behavior trends in best practices
dhtobey Tobey

Integrated Arts Marketing - 0 views

  • Latest Blog Posts Top 10 Questions Businesses Asked Us About Facebook Marketing John Clevenger 02-Jul-2010
  • Integrated Arts Marketing The rapid adoption of Facebook, Twitter, LinkedIn and other social networking sites has brought a sea change to the way people communicate, interact and relate. Initially these social media channels were used exclusively for social interaction; but today they are integral parts of Fortune 500 corporate communications. Any organization that wants to succeed must effectively leverage social media. Traditional marketing channels are increasingly ineffective as the primary marketing strategy. Social media marketing is the wave of the future, and it produces truly remarkable results.
  •  
    New business launched by former top salesperson at Hotel Information Systems. 
dhtobey Tobey

Custom Time Management Training Online - Priacta - 0 views

  •  
    Total, Relaxed Organization Online Training puts you in control of your time with precise, step-by-step instructions-then it follows up until your new habits are comfortable and effective. And there's no guesswork-it's customized for your favorite PDA, task list, calendar, and email client! Interesting example for integrating mobile learning, method delivery, and expert access.
Steve King

nCircle Products - Suite360 Intelligence Hub - 0 views

  • nCircle Suite360 Intelligence Hub™ is the reporting and analytics platform for nCircle’s integrated auditing solutions. Suite360 aggregates the detailed information gathered by nCircle IP360, nCircle Configuration Compliance Manager (CCM) and PCI scan results, utilizing advanced analytics to provide a comprehensive, unified, and enterprise-wide view of security and compliance.
Steve King

.:: iSec Consulting ::. - 0 views

shared by Steve King on 04 Jul 10 - Cached
  • Complex Event Processing (CEP) is a technology which has been used for many years in the Aerospace and Defence Industry for Situational Awareness and Data Fusion modules in Command, Control, Communications, Computing and Intelligence Systems (aka C4I).   Currently CEP is being rediscovered as a foundation for new class of extremely effective Business Intelligence, Security and System/Network/SCADA Monitoring solutions in industries like Financial Services, Telecommunications, Oil and Gas, Manufacturing, Logistics etc.
Steve King

Critical Infrastructure Cyber Security Blog, Wurldtech - 0 views

shared by Steve King on 04 Jul 10 - Cached
  • As of today, the Common Vulnerabilities and Exposures (CVE) database, hosted by Mitre Corporation (http://cve.mitre.org/) for the Department of Homeland Security (DHS), contains 34,542 entries. That may not seem like a large number, but any one of those entries can translate to multiple instances in the field. While the contents of this database are very important in the IT world to help security practitioners ply their trade, build rule sets, etc., there is a glaring lack of information on industrial control systems (ICS). A search of the CVE database using “SCADA” or “DCS” or “PLC” as a search ...
Steve King

AchillesINSIDE™ - 0 views

  • By leveraging the proprietary data in Delphi™, the world’s largest database of industrial system vulnerabilities, Wurldtech has created a solution specifically designed to help reduce the cost and complexity of mitigation activities for process control networks by integrating specific vulnerability intelligence into common security enforcement devices such as firewalls and intrusion detections systems. This allows common IT infrastructure to be tailored for industrial network environments and continuously updated with specific rule-sets and signatures, protecting control systems immediately, substantially reducing the frequency of patching activities and reducing overall costs. This update and support service is called AchillesINSIDE™.
Steve King

Staff home - 1 views

  •  
    Enter 12-25-1969 and "jo" for John Brenan
Steve King

..:: AggFlow - Optimize, Maximize, Profitize ::.. - 1 views

  • AggFlow, the world's most sophisticated plant simulation and flow analysis software, has been developed specifically for the aggregate and mining industry to maximize production and improve profitability.
  •  
    some interesting graphic modeling
Steve King

Umberto - know the flow / Material Flow Networks - The Method - 0 views

shared by Steve King on 02 Jul 10 - Cached
  • Complex loops refeeding material or recycling loops can be displayed and calculated within the material flow networks.
  •  
    Umberto is expensive but seems to be successful at modeling complex energy and materials flows.. includes library of process patterns with metrics and math for each
Steve King

Institute for Water Quality, Resources and Waste Management, TU Vienna - 0 views

  • STAN (short for subSTance flow ANalysis) is a freeware that helps to perform material flow analysis according to the Austrian standard ÖNorm S 2096 (Material flow analysis - Application in waste management).
Steve King

Sankey Helper 2.4.1 by G.Doka - 0 views

  • Sankey Helper v2.4 helps you design Sankey diagrams from Excel data ... in Excel !
Steve King

What is a Sankey-Diagram? - 0 views

  • Intro What is a Sankey-Diagram? References Demo version Full version   Know-How Games Software Recommendations Pinchleni Software   What is a Sankey-Diagram? A Sankey diagram is a graphic illustration of flows, like energy, material or money flows. Usually the flows are illustrated as arrows. The width of the arrows is proportional to the size of the represented flow. Sankey diagrams are a better way to illustrate which flows represent advantages and what flows are responsible for waste and emission
Steve King

e!sankey - show the flow / Good reasons to use e!Sankey - 0 views

  • Sankey diagrams are a specific type of flow chart, in which the width of the arrows is shown proportionally to the flow quantity. They are typically used to visualize energy or material transfers between processes. The flow arrows can be color-coded to indicate the type of the flow (energy, mass, costs, etc).
  •  
    Sankey diagrams are a specific type of flow chart, in which the width of the arrows is shown proportionally to the flow quantity. They are typically used to visualize energy or material transfers between processes. The flow arrows can be color-coded to indicate the type of the flow (energy, mass, costs, etc).
dhtobey Tobey

MedHomeInfo - Your Resource for Becoming a Medicare Medical Home - 0 views

  • Welcome to MedHomeInfo, the resource for physicians and practices that want to participate in the Medicare Medical Home Demonstration (MMHD)
  •  
    Community Desktop prospect for Patient-Centered Medical Home
  •  
    We should add this .org as a prospect for a VivoWorks communiity desktop.
Steve King

Virtual Strategy Magazine - PC Hypervisors Virtually Change Everything - 0 views

  • With VDI, virtual desktop images are stored in a data center and provided to a client via the network. The virtual machines will include the entire desktop stack, from operating system to applications to user preferences, and management is provided centrally through the backend virtual desktop infrastructure.   The promise is that VDI will replace the need for myriad systems management and security tools that are currently deployed. No more demands for traditional desktop management tools for OS deployment, patch management, anti-virus, personal firewalls, encryption, software distribution and so on. In fact, many are suggesting that we can return to thin client computing models
  •  
    Not sure exactly how this applies to VW internal IT infrastructure and client facing apps.. but I'm sure it does! especially if we could have client VWsuite VMs running in our data center so that we abstract all the different GME/OnP/LP/KE/CRM platforms into a single VM client interface that anyone can log into with no complexity
‹ Previous 21 - 40 of 104 Next › Last »
Showing 20 items per page