In previous post I introduce a scenario for cooperation between doctors, and show that a personal assistant is a good way to connect those in real time. Here are some additional details that we should consider more carefully. Continue reading
Category Archives: Social Business
Encryption Role in Data Security
Ed Snowdon spoke yesterday at the SXSW conference on the importance of using encryption to keep the data the runs our businesses (and personal life) safe. I refresh the call to eliminate the scary warning that browsers give when using a self-signed encryption key. It does not make anyone safer, and stands in the way of regular usage of HTTPS. Continue reading
How Relevant is the ‘Boundary Worker’ Idea?
IBM has suggested this new term, the Boundary Worker, as a middle point between a service worker and a knowledge worker. Is this really something new, or just the natural progress of a all workers in today’s hyper connected world? Continue reading
Doc Sharing with Live Documents
This is a first impression review of Live Documents, a SaaS model document sharing platform. I discovered the service, signed up for a free account, and these are my notes on what it does. Continue reading
Do Management Gurus Encourage Process Enforcement?
As part of the research for the last keynote I gave, I wanted to see how well known management gurus recommend supporting knowledge workers to be more effective. What I found was surprising and well understood at the same time. Continue reading
A Role by any other Name, is still a Role
Everyone knows what a role is. It is obvious. We talk about them all the time. But every time I hear a programmer say the word “role” my ears pick up. The term is very often misused. How, then, might one use the term correctly and avoid the pitfalls? Continue reading
Why I Still Get Paper Bills
I think it might be Ben Franklin who said “A paper bill is the worst way to get your account statement, except for all the other ways.” Or maybe not. Whatever. I still get a lot of bills on paper delivered through the (physical) mail, and here is why. Continue reading
Seven Domains of Predictability
Looking at the spectrum of different process technologies, we can identify seven distinct categories, and we can organize them according to how predictable the problem is that they address. Continue reading
“Pull” Systems are Antifragile
John Hagel wrote a good review of Nassim Taleb’s book “Antifragile“. Hagel’s book “The Power of Pull” describes a shift in the world from push systems to pull systems. The push system is the epitome of formalize, automated systems. The kind of system that was designed by someone with what I call “enlightenment bias”. They attempt to anticipate everything that might happen, and provide well considered options for it. Continue reading
Rights to Link, Legality of Cache Substitution
The foundation of the web is the ability to embed links from one page to another page. When writing about one topic, and you want to cite another work as a reference, the best possible way to do this is to make a like to that work: the reader can instantly load and view that other page. But what about link rot? What about when the link become broken, because the page on the other end is moved? Last week I made a proposal to eliminate link rot, but this post is about the the right to use it. Continue reading