Skip to main content

Home/ elearning 2.0/ Group items matching "names" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Graham Atttwell

Knowledge-at-work: Boundary objects and KM - 5 views

  •  
    " Boundary object (BO), originally introduced by Starr (1989), is a concept to refer to objects that serve an interface between different communities of practice. Boundary objects are an entity shared by several different communities but viewed or used differently by each of them. As Star points out, boundary objects in an organization work because they necessarily contain sufficient detail to be understandable by both parties, however, neither party is required to understand the full context of use by the other - boundary objects serve as point of mediation and negotiation around intent. Boundary objects are flexible enough to adapt to local needs and have different distinct identities in different communities, but at the same time robust enough to maintain a common identity across the boundaries to be a place for shared work. Boundary objects are not necessarily physical artifacts such as a map between two people: they can be a set of information, conversations, interests, rules, plans, contracts, or even persons. It is around BOs that Communities of Practice (CoPs) often gather. BOs are 'used' by members of different communities in very different ways, although the representation is shared. BOs are an important class of knowledge artifacts. They are center stage in the dynamics of knowledge exchange. BOs are also known as CISs (common information spaces). Examples: Reports are a classic example of traces as boundary objects that the professionals and other members share. Faxed documents and email massages are also the boundary object among distributed members. Information spaces, where particpants gather to exchange information, co-ordinate activites and create knowledge are another example of BOs A library catalog, an order entry process, travel assistance request form, an organizational knowledge map, i.e. one of the products from your knowledge mapping project! Mapping BOs: Boundary objects are a very useful way to structure and
Mark Chambers

Wallwisher.com :: Words that stick - 14 views

  •  
    A Wall that allows virtual sticky notes to be stored on the web - Walls can be private or public an can be edited by names groups or the public
tee jesud

jesus: Jesus came and spoke to them, saying, - 0 views

  •  
    go and teach all nations, baptizing them in the name of the Father, and of the Son, and of the Holy Spirit
tee jesud

jesus: Jesus answered them, If you believe, whatever (all things) you ask in prayer, you will receive. - 0 views

  •  
    And the multitudes that went ahead of him, and those who followed, cried, saying, "Hosanna to the Son of David: Blessed is he who comes in the name of the Lord; Hosanna in the highest.
tee jesud

jesus: Jesus often withdrew to lonely places and prayed. - 0 views

  •  
    Father God. If Jesus needed to spend time alone with You, how much more do I! Please forgive me when I think that I can rush through the day without committing it all to You, and receiving Your love and wisdom. Help me to place today into Your hands, to ask for Your advice and learn how to accept what You say. Most of all, I do need to know that You love me, and I need to learn to love You best of all: so please help me to make the time to pray and find a place where we will not be disturbed. In Jesus' Name. Amen.
tee jesud

jesus: Jesus said, My prayer is not for them only, but for all who will have faith in me through their word - 0 views

  •  
    And now I will be no longer in the world, but they are in the world and I come to you. Holy Father, keep them in your name which you have given to me, so that they may be one even as we are one.
web chennai

Website Designing, Domain Registration and Web Hosting in Chennai, Tamilnadu, India - 0 views

Web Chennai Dot Com for Domain Name Registration, Website Designing, Windows Web Hosting, Seo Services, Web Design Development Company in Chennai india, Linux Web Server, Submission, Search Engine ...

Domain Name Registration Website Designing Windows Web Hosting Services Design Development Company in Chennai india Linux Server Submission Search Engine _ SES Optimization SEO Marketing SEM Transfer SSL Digital Certificates Host Unlimted Emails Dot Com w

started by web chennai on 09 Feb 11 no follow-up yet
Martin Burrett

Art cyclopedia: The Fine Art Search Engine - 0 views

  •  
    A search engine for art and artists. Find what you are looking for by name, location or artistic style. http://ictmagic.wikispaces.com/Art,+Craft+&+Design
Martin Burrett

Spin and spell - 0 views

  •  
    An interesting spelling game for younger children where you spin a wheel to spell the name of an object. http://ictmagic.wikispaces.com/English
Leo de Carvalho

eLearn: Feature Article - E-learning 2.0 - 0 views

  •  
    E-learning as we know it has been around for ten years or so. During that time, it has emerged from being a radical idea-the effectiveness of which was yet to be proven-to something that is widely regarded as mainstream. It's the core to numerous business plans and a service offered by most colleges and universities.And now, e-learning is evolving with the World Wide Web as a whole and it's changing to a degree significant enough to warrant a new name: E-learning 2.0.
Leo de Carvalho

eLearn: Feature Article - E-learning 2.0 - 0 views

  •  
    E-learning as we know it has been around for ten years or so. During that time, it has emerged from being a radical idea-the effectiveness of which was yet to be proven-to something that is widely regarded as mainstream. It's the core to numerous business plans and a service offered by most colleges and universities.And now, e-learning is evolving with the World Wide Web as a whole and it's changing to a degree significant enough to warrant a new name: E-learning 2.0.
Hendy Irawan

Logical Fallacies and How to Spot Them - 0 views

  •  
    "In the Evolution vs. Creationism debate, it is important to be able to spot all the logical fallacies that Creationists tend to throw around. This essay covers many bare essentials of logical thinking, as well as ways to critically evaluate an argument. The logical fallacies listed here are the ones most often used by Creationists, although Creationists have, to date, used almost every single logical fallacy in existence to "prove" their case. Each fallacy will have its own little paragraph, describing it, why it is fallacious and how to counter it. Enjoy! THE STRAWMAN ATTACK: The strawman is, perhaps, the most heavily-employed tactic used by Creationists. The strawman attack's name comes from the idea of setting up a strawman and knocking it down. The strawman is a false man, metaphorically representing a false argument. The strawman attack is a very dishonest one. Creationists ruthlessly use this tactic to win public support. In essence, the strawman attack is putting words in your opponent's mouth and then attacking the resulting position, while simultaenously evading the real argument."
Martin Burrett

MuMu Player - 0 views

  •  
    This is an easy to use site for sharing music and podcast audio files and talk about them. The group can upload your files together. Share a link to invite into the room. Sadly, the rooms not password protected, but making the room name, and therefore the link suitable cryptic will make it unlikely anyone will stumble across it. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Nigel Coutts

The Power of Teams - The Learner's Way - 0 views

  •  
    Sometimes it is worth stating the obvious, giving time and thought to what we easily take for granted. In doing so we name the things we value most and give them the value they deserve. The value of teams is one such ideal, we know that teams have value, we probably even know what it feels like to be a part of a great team but too often we take this feeling as understood and don't stop to consider what makes it worth chasing.
Nigel Coutts

The power of powerful ideas shared simply - The Learner's Way - 0 views

  •  
    Some statements stand out in your memory for the power with which they resonate through you mind. I recall the first time I encountered the question posed by Alan November "Who owns the learning?" on the cover of his book of the same name. In four words, Alan poses a question that strikes at the heart of education and encourages us to re-think our approach. If we believe that the learner should own the learning, what are the implications of this for our teaching? Like a stone dropped on the surface of a calm pond, the ripples from a powerful idea spread, expand and gain strength. 
justquestionans

Computer Science homework help - Just Question Answer - 0 views

  •  
    This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well. Section 1: Written Paper 1. Write a six to eight (6-8) page paper in which you: a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: i. FISMA ii. Sarbanes-Oxley Act iii. Gramm-Leach-Bliley Act iv. PCI DSS v. HIPAA vi. Intellectual Property Law b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements. c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements. d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Martin Burrett

Metro Map Creator - 0 views

  •  
    "A useful site for creating metro maps. Use it in creating writing to map out a character's travels, make Monopoly-like games or make classroom posters showing connected words, names, ideas or topics."
hottblogger

Kiran Vastunisth Samanya Hindi Pdf (किरण वस्तुनिष्ठ सामान्य हिंदी) | Web Mentorz - 0 views

  •  
    You Can Download For Free General Hindi Book Pdf For Free Useful For All Competitive Exams. The Name Of The Book Is Kiran General Hindi Book Only On Webmentorz.com
nolanhout

Infopro Learning's GnosisConnect LMS features in eLearning Industry's Top 10 Cloud-based LMS for Corporate Training - 0 views

  •  
    Infopro Learning's GnosisConnect LMS features on the prestigious list, named among the best Cloud LMS systems designed for Corporate Training.
Nigel Coutts

Transforming Homework to Home Learning - The Learner's Way - 0 views

  •  
    A recent strategy to alter the negative image that homework has built is to re-brand it as "home learning". But is this enough and if we are going to "get it right" what do we need to change besides the name?
« First ‹ Previous 61 - 80 of 130 Next › Last »
Showing 20 items per page