ILD 831 WEEK 8 POST – RAY R.

The Birth of Artificial Intelligence
Robot and human hands almost touching – 3D render. A modern take on the famous Michelangelo painting in the Sistine Chapel; titled, “The Creation of Adam”.

 

As I read Michele Martin’s blog, A Deep Dive Into Thinking About 21st Century Leadership, the first paragraph immediately caught my attention. She is creating something called a “Leadership Lab” that she plans on launching in January. Back in 1987-1990 I participated in Air Force ROTC in college, and once per week we had “Leadership Lab.” It was designed to teach us, as future Air Force Officers, what leadership was all about. I sometimes laugh because a decent amount of the time was spent teaching us to march in formation, which is an activity that I’ve only done 3 or 4 times since being on active duty. But it did allow each one of us to learn a bit about leadership. When I think about how much leadership has changed in those short 25 years, it amazes me. The Air Force has changed and the world has changed.

When I worked as an I.T. manager, I was enveloped in technology. As a manager, I would quickly be left behind if I didn’t embrace technology. I had that job for about 6 years and saw a huge change in technology over the course of that time. When I started, we were mainly using Windows 95, but had a number of machines running Windows for Workgroups 3.11. By the time I left, we were running Windows 2000, Windows XP, and Windows Server 2003. The operating systems we used didn’t present many management challenges except that we had a continual change in different applications that the company needed in order to run. Keeping up with versions that would run on our changing operating system was a challenge. Also, working with individuals and departments to sift through their “needs” vs. “desires” on software and hardware was a difficult task. It was often my responsibility to decide whether or not a software package was needed out in the field, as well as manage the expectations of the employees in regards to software and hardware.

One of the first things I was exposed to in this course was Nick Bostrom’s talk while at TED in 2015. One thing he talked about was that we need to get a handle on creations such as Artificial Intelligence (AI). He mentioned that there is no OFF switch to the Internet. He believes this could also be the case with Artificial Intelligence. His viewpoint is that we may not be able to turn off an AI entity if it got out of control. He also brought up the point that machine intelligence is the last thing we need to invent. Once machines get more intelligent than the human brain, they will become better at inventing than we are. That is a profound and scary thought. That statement really makes me wonder how much Artificial Intelligence will change our landscape beyond what we currently know.

I was amazed at the statistics Dr. Watwood showed about his blog posts in 2013. Although he only posted 41 times on his blog, he had over 6,600 hits that year from 4,675 unique visitors. That underscores what I tell my students, subordinates, and children, that what you post online can go a lot farther than a person expects it to. I was really glad that we were required to create our own blog and how easy it was to make it look nice. I feel that this could be a useful leadership tool in the future. If nothing else, it is a good way to share information with employees.

During the course I not only had to research a tool on my own, called Padlet, but I was able to see quite a few other Web 2.0 tools that others had researched. Without a doubt this gave me a great overview of some tools that I will be able to implement in classes I teach. I had heard of about 75% of these tools, but had never taken the time to learn about them. So being able to read others’ reports on these tools was great. In addition, I learned about several tools I had never heard of.

Knowledge management (KM) was a topic that came up and it reminded me of the leadership nightmare of how much information is really out there. Just because an organization may have a nice looking knowledge management system in place does not mean that it is used correctly. As I researched the knowledge management systems in the military, I was reminded that there are quite a few disparate systems out there. Each one is used to a different extent, and there is no standard way to organize the data. I may easily be able to access the different KM sites within my organization, but if I can’t think along the same lines as the person who organized it, I’m stuck trying to navigate around to different sections of the page in order to find what I’m looking for. I’ve often found that it’s often easier just to walk to that office and ask them to provide me with what I’m looking for, which is opposite of what a KM system should be.

The last half of the class dealt more with new and emerging technology. Although I keep up with technology fairly well, I have to say that it was still overwhelming. Just the Internet Trends slide show alone boggled my mind that somebody put all of these technological ideas into one presentation. I imagine multiple people were responsible for it, but it still amazed me. Part of the information presented showed me how much technology has changed over the years and how much and how quickly it is predicted to further change. This really underscores how much a leader must stay on top of technology. Some may argue that this is the reason that a leader hires technical experts. I agree that leaders need to surround themselves with people who are the experts in technology. But I also am a firm believer that a leader needs to embrace this technology as well and have a certain level of understanding of it.

I really liked the article entitled, 6 ways work will change in 2016.  The discussion on how some companies will be built to be mobile from inception is a fascinating concept. Most companies nowadays that allow people to work remotely have had to do it as an afterthought. I was really excited to read the prediction that we will see more video and less PowerPoint. Although I really think PowerPoint has been and is a great tool, it is often overused. I can barely work a day in the Air Force without seeing some type of PowerPoint presentation. It has gotten a bit stale and is in need of something different, in my opinion. I do worry about the discussion about work-life balance, as I have already seen that many people, including me, are expected or required to be always on, always responsive, and always available. Gone are the good old days when a person could leave work at 4:30 and not have to think about work again until 8:00 the next morning.

Being a leader has always been a tough task. Since the first time people got together to work towards a common goal, there have been issues. Some people work harder than others, some are smarter than others, some work well with coworkers, some don’t work well at all with others, some are easy to lead, and some are tough to lead. Besides the people aspect, the environment has changed as well. Technology is something that facilitates being a leader, but also can make leadership more difficult. Being a leader means keeping abreast of new developments and everything else happening in the work environment, and that includes technology. In the article, 7 Requirements to Be a Leader Today, Ron Edmundson covers what he believes to be the attributes that leaders should have today. They provide a great summary of what we have covered in this class and I believe a leader will be very effective if these 7 items are embraced.

Advertisements

ILD 831 WEEK 7 POST – RAY R.

Week 7 future-technology

On the Horizon: Emerging Technologies

Future technology is one of my favorite topics, although it is hard to find time to keep up on everything that is currently out there, let alone all of the technology that is predicted to come. So I was glad to be able to view the resources in this class that discussed the most current technology as well as what may be coming. I have seen technology change a lot in my lifetime. In my job as an Air Force navigator I started out navigating across the world using manual methods such as mental and written calculations based on ground speed, heading, wind, and a few other variables. I backed this up using a sextant, from which I took readings from the sun, moon, and stars to help refine my position. Needless to say, this was extremely challenging. I was so happy in the mid 1990s when my squadron purchased crude hand-held Global Positioning Satellite (GPS) units that I could check out for a flight. They were not very fancy, but at least gave me a basic latitude and longitude that I could use to back up my other calculations. Nowadays in the planes I navigate, we have multiple GPS feeds, combined with an Inertial Navigation System (INS) to navigate with. We also have technology to communicate with Air Traffic controllers via a datalink, communicate back to our squadron, and allow our leadership (or anybody with the username and password) to track our aircraft position anywhere in the world. Technology has definitely changed in the 25 years since I joined, and it’s hard for me to imagine where it will be 25 years from now.

As a leader in the Air Force this has huge implications. When I used to navigate using manual methods, virtually all navigators knew the ins and outs of navigation and could easily adapt during equipment malfunctions. Today, there is so much reliance on technology that navigators can easily tend to become nothing more than button pushers without knowing what is happening behind the scenes. As a matter of fact, the Air Force renamed navigators to Combat Systems Officers (CSOs), which more reflects that they operate systems instead of truly navigate. The problem surfaces when equipment fails, which it periodically does. The airplanes I fly in were built from 1957-1963, so they are old. Even though a lot of the equipment has been updated, there are still many old aspects to it, which can cause technology to fail when we need it. If leaders don’t ensure that new CSOs understand and practice “old school” navigation methods, they may find themselves in a dangerous situation when equipment fails and they don’t know how to recover.

As a leader in the college classroom, I also have seen many things change due to technology. When I started teaching 15 years ago, no students brought laptops or tablets to class. The iPhone was still seven years from being introduced. Nowadays almost every student has some type of smartphone and many bring laptops or tablets, hopefully to take notes and not play games during class. Teaching methods have also changed. Many textbooks have an instructor companion site that gives good instructional ideas, PowerPoint presentations, videos, or other items that can be used in class. In most classes that I teach there is also an electronic/online classroom to supplement the brick and mortar classroom. The online classroom is a great repository for PowerPoint presentations, documents, and much more. This lessens the amount of physical paperwork I have to deal with and keep track of as an instructor. In a computer class that I teach, I have software on the instructor PC that allows me to view any of the student PCs in the classroom, if needed. If a student is having a problem on a particular assignment, with a simple keystroke I can take a look from my desk. I don’t use this method, as I prefer to walk over to the student and have some interaction. But the technology also allows me to bring up any student or the instructor’s PC onto the projector screen. This is handy when I have a teaching moment that I want to show to the entire class. In this particular course (ILD 831 – Technology and Leadership) I learned about a lot of technology that I either didn’t know existed, or had never used. I was amazed at how many things that are out there that I could potentially integrate into the learning environment. I look forward to trying some of these tools out. I am also anxious to see how technology in the classroom changes even further in the coming years.

The Internet Trends slideshow really amazed me, even though I feel like I stay up on technology more than the average person. Cell phone penetration changed from 1% of the population in 1995 to 73% of the population in 2014. This doesn’t even account for the increased capability of the cell phones in 2014 compared to those in 1995. Looking at the slide showing how technology has changed from 1975 to the late 1990s and comparing that to how much it’s changed from the late 1990s until today was also astounding. That slide really shows how frantic the technological pace has become. The amount of Internet capacity that is taken up by video is something that I tell students in all of my classes, as I think it is an interesting fact that many do not know. It shows them the heavy load that is being carried across the Internet. The slide show mentioned that 64% of Internet traffic was from video. I personally wonder if too many more people get Netflix, Amazon streaming, Vudu, or other subscriptions, how much the Internet can take without causing a slowdown. I was also interested to see how Internet usage differs around the world, especially in China and India. China’s citizens are using technology, mainly smartphones, to pay their utility bills, apply for passports, look up their driving violations, book hospital appointments, and order food online. This technology is happening in the United States, but has been a lot slower to catch on. From a leadership perspective, in many cases we are going to be forced into having to allow our workers to have access to this type of technology throughout the day.

Kevin Kelly brought up a lot of interesting points in his video. One that really caught my attention was where he discussed the fact that many/most of these devices now have eyes, in the form of a camera. He discusses that not only are we looking into these devices, but they are also looking back at us. There is technology that can track our eyes, for example. He showed an example of a heat map that shows where on a particular page the most attention is being given by our eyes. From that, the website can adapt to how we are using it. It can also potentially recognize our mood and whether or not we’re paying attention. It is much like looking through a two-way mirror except that the software can adapt from our actions. This may be scary to some, but at the same time should hold much promise for future technology. I can see how this could be used to target ads or important information that the content provider wants us to see, by putting it in the areas of the page that our eyes are looking at more often. I’ve already seen how online ads have changed over the past few years. In situations where the user is able to skip an ad after a certain period of time (normally a small number of seconds), the advertisers have become more creative and in that short amount of seconds they try to hook us in so we don’t skip the ad. As a comparison, television ads from years ago didn’t necessarily need to catch our attention that quickly since we had no way to fast forward through them or skip them. As technology changes, advertisers will have to continue to adapt. Leaders should take this as a lesson that we should now continually be adapting in our leadership style and methods to account for changing technology. What works and is in vogue today may not necessarily be effective 5, 10, or 20 years from now.

ILD 831 WEEK 6 POST – RAY R.

history-of-cyber-crime

Computer Crime

The rapid development of computers and networks, including the Internet, has brought huge benefits to people and organizations around the world. With this development comes a threat, as these systems have become a major target of attackers. Additionally, computers have become a tool and a resource for people who want to attack or commit crimes using computer technology. The world has become an increasingly interconnected. A person with a laptop can sit in a restaurant in Instanbul and pay bills, trade stocks, transfer funds between bank accounts, and chat with friends across the world via the Internet. These are the conveniences that many have become accustomed to with today’s communications technology. People in the same scenario with bad intentions could use a stolen identity to grab funds from a victim’s checking account, hack into the stock exchange, or create and send a Trojan horse to spread around the world to gather private information. These are just a few examples of the benefits growing network technology brings, while also highlighting how this easy access can also be a threat.

To set the stage of this threat, it is important to realize that the world is highly connected. Cisco predicts that 50 billion devices will be connected to the Internet by the year 2020. The company’s analysis claimed that 8.7 billion devices were connected to the Internet in 2012. These devices can range from items for personal use such as a smartphone, tablet, laptop, or desktop computer all the way to an Automated Teller Machine (ATM), military network, computers and machines in a water treatment facility, to the processors controlling our electrical system.

Cyber attacks usually consist of directed intrusions into computer networks to steal or alter information or damage the system. Malicious code, such as viruses or worms, can propagate from computer to computer and disrupt their functionality. Denial of service attacks can bombard networks with bogus data so they cannot function properly. Using these types of intrusions, cyber attackers could target financial institutions, communication systems, energy infrastructure, government operations, hospitals, and many more functions that rely on computer networks to operate. Whereas cyber attacks used to be something that were only a nuisance in the I.T. industry, they now have become something that can disrupt the entire U.S. economy. This would affect individuals across the country as well as endanger national security. The ripple effect of this type of disruption would hit the international community as well.

Due to the nature of networked computers (the Internet), attacks no longer require the perpetrator to be in close proximity to the victim. Cyber attacks can be launched from anywhere in the world, at breakneck speed, and at extremely low cost. Additionally, our current technology makes it almost impossible to predict ahead of time when an attack may occur. Also, since cyber attacks require only a computer and an Internet connection, there is not much of a barrier to entry. This means anybody from teenage hackers in their parents’ basements to terrorist groups to actual country-sponsored terrorism have the capability to wreak havoc. The amount of damage inflicted on the victim mostly depends on the level of defenses and technological skill put in place by the target. This has become such a problem that there have been entire segments of government agencies created or restructured to fight and prosecute cyber crime. One example is the FBI’s Cyber Crime Unit and the U.S. Department of Justice’s Computer Crime section.

There are many different motivations for these cyber attackers and criminals. Some many choose to attack just to practice or prove their skills to others. Some may be intent on stealing credit card information or other personal data. Some may be in it for extortion purposes. Still others could be foreign groups or governments trying to steal military secrets or wanting to cause damage to the U.S. economy, infrastructure, or the military. In some cases we may not even know or understand the motive behind attacks.

Nigeria, an African country often attributed to hosting criminals perpetrating computer crimes around the world, brought stakeholders together recently to discuss how to facilitate information security, reduce security breaches, and steps to contain cyber crime in Africa. At the conference, Dr. Martins Ikpehai, chief executive officer for a security firm, went so far as to say that the third world war might be fought on the computer using different attacks launched through the Internet.

There are a lot of examples of types of computer crimes that are committed, according to Terry D. Willis. Disgruntled employees taking action out of anger, revenge, or even what they may term as harmless mischievousness, is one example. What some may consider mischief can actually be a serious computer crime. A good example given by Mr. Willis is a case of a recently graduated young accounting graduate from a California university. She had been hired by an art gallery to accomplish basic bookkeeping duties. When she learned she would not be promoted to an accountant position, she deleted the customer database and sent a false email to all of the gallery’s clients announcing that the gallery was under investigation by the Internal Revenue Service. She also mentioned in the email that a major upcoming gallery event was cancelled. Due to her actions, the art gallery was unable to successful operate for weeks, and incurred losses exceeding $400,000. This young woman’s dreams of becoming a certified public accountant were cut short when she was arrested and convicted on felony charges.

There is no easy solution to these computer crimes. The prevalence of computers, the relatively low cost of computers and Internet access, along with the high amount of connected devices makes this an area that is ripe for crime and abuse. It would be a rare person reading this blog who has not either already been the victim of some level of computer crime or known somebody who has. Going forward, the end user needs to push more for increased security methods, whereas the corporations, utilities, and other organizations should work together to come up with mechanisms to increase security. It is to be determined whether or not the government can effectively help towards increased security as well. Too much government involvement could become governmental interference. Too little government involvement would make it appear that the government doesn’t care, while also leaving it more vulnerable.

ILD 831 WEEK 5 POST – RAY R.

Networked1

Networked workers bring a lot of opportunities as well as challenges to their organization. One of the biggest advantages is that they always have access to information. In any organization in which I’ve worked over the past 15+ years, I don’t remember a day going by where I didn’t need to access some information via the Internet. It has become a way of life within organizations. We have access to so much information that we didn’t have years ago. In an article about networking, Jarche mentioned that connected individuals can now do what only large organizations once could do. If I want to compare my current organization with other organizations in the same industry, I can do that with a few key clicks and a search engine. Many years ago this required a trip to the library. Even if I did want to visit the library, I can visit it virtually through a web browser. Weinberger mentioned that the economics of sharing have changed. He gave an example that the Library of Congress has tens of millions of items in storage because it is very difficult to display and preserve, let alone share these physical objects.

One big advantage this also brings is that workers can work during off-hours, as needed. I can give my employees the flexibility to leave early and finish working from home, as an example. I can even allow them to telecommute the entire day or multiple days. This gives the worker the flexibility to take care of other things such as doctor’s appointments or school functions while still being able to make up their hours during a different part of the day. The downside of this is that the expectation sometimes becomes that we WILL work during off hours. Sometimes we work our entire normal day and then feel that we need to work additional hours during what previously would have been completely off time. This can lead to greater productivity, but also burnout.  Another advantage is being able to work from multiple locations. I teach college classes both in the physical classroom as well as online. Especially for the online courses, I’m able to work from wherever I may be, as long as I have Internet access. I have graded papers and interacted with students from places as far away as Japan and Russia, without many problems. The disadvantage with this is that I sometimes feel that my trips are not as enjoyable, focused, or productive because I always have to check up on schoolwork during the evening. Years ago I would have not had the ability to be online and therefore would have just hired a substitute to take care of things while I was gone. So the increased productivity sometimes does take its toll.

One challenge with networked workers is that it is often hard for supervisors to know exactly what they are doing. This is especially the case for telecommuters. When I was an I.T. manager I used to think it would be extremely difficult to manage telecommuters because I really wouldn’t know for sure that they worked 40 hours in a particular week. I then asked a fellow manager who was responsible for some telecommuters in his department. He told me that he didn’t care if his telecommuters worked 40 hours. He managed by task or project instead. If he gave a telecommuter a project that should last three months, he expected that it would be done in three months. If the person had to work 50 hours per week in order to get it done, that is what should happen. If the person only had to work 30 hours per week to get the same project done, he didn’t mind, as long as it was done correctly. He went further to say that if a person could get the three-month project completed in two months, he didn’t mind if the telecommuter had a month off (excluding required meetings, status reports, etc.) That really opened up my mind to how work should be measured and how to manage telecommuters. Telecommuters are obviously not for everybody. Marissa Meyer, the CEO of Yahoo, decided a few years ago that telecommuters would not be allowed at her company. This was a controversial decision, as critics say morale will plummet, key people will quit, and efforts to enhance collaboration will backfire. But proponents for her decision point out that employees view work more positively when their bosses are physically present and tend to lie more when communicating virtually as opposed to face-to-face, just as a few examples.

One challenge I’ve seen in the military is with the security aspect of being connected. We are able to check email from outside of work as long as we have a physical reader attached to the computer so we can insert our smart-card and enter our credentials. Since most home computers don’t have a smart-card reader built-in, those of us who want or need this capability must purchase an external reader. That is only the first part of the challenge. There are a variety of smart-card readers and special software and drivers need to be installed, which have proven to be difficult to get to work in the past. Once it can be figured out, it works pretty well. But if a person travels, they must remember to bring their smart-card, their reader, and the computer they have the software and drivers installed. All of this has proven to be a hassle for military members, but the security it provides is definitely needed. Without this in place, the senior leaders would most likely not give people the opportunity and flexibility to do work from outside of the office due to the security risk. The risk of intercepting operational, logistical or personnel details via email is too great.

Another challenge is with portable devices. The White House has created specific guidelines for government agencies that choose to allow certain devices, to include mobile smart phones. In my most recent job in the military I was required to carry a Blackberry with me. That meant I not only had to carry my personal iPhone with me throughout the day, but also had to be tied to a second smartphone. Since then the Air Force base where I work has converted to using iPhones. For a long period of time, key personnel had to carry their work iPhone as well as their personal smartphone. It was funny to see a person sometimes carrying two iPhones at the same time. Since then I’ve noticed that some who are issued iPhones install personal apps on their work phones, so they don’t need to carry two devices. Even though it could be a hassle to carry two devices, it does give the senior leaders on the base the opportunity to more easily check their military email without having to carry around a card-reader and laptop. Many senior leaders work long hours and from several locations, and having this capability can greatly increase their productivity.

ILD 831 WEEK 4 POST – RAY R.

The Changing Nature of Work

Work

Weinberger discussed the concept of hyperlinked thinking, which I found very interesting. I was a very early computer and Internet adopter, but I hadn’t thought of work in exactly these terms before. I liked his discussion on how years ago, documents and writing were limited to squeezing things onto a piece of paper. Authors and publishers had limited space, so had to decide what the reader already knew and write accordingly. Hyperlinked writing does away with this need, as a single document can have multiple links that the reader can choose to bypass or click on. If I, as a reader, am not very familiar with the topic, I can click on every hyperlink in the document so I can get more of a broad exposure to the topic. If people are already very familiar with all of the ideas and terminology, they can just read the article itself without expanding any of the hyperlinked documents.  At the risk of using too many hyperlinks, I will make it a point in this blog to include a variety of links to web sites to show examples of some that people may choose to click on or not to click on.

I have noticed that the nature of work has also changed due to this hyperlinked thinking and the web. When I worked at United States Strategic Command, I frequently had to brief a General on issues and get permission to launch an asset (airplane or ship/boat) on a particular mission. I noticed that it was no longer good enough just to give the General some background information and my recommendations on what to do. He often would ask for a lot of very detailed information, as he knew that I had access to this through the Web. If I picture a person in my shoes 30-40 years ago, the General would have known the information was not available and would have to make a decision without it. But now, the General knows that we, as the U.S. military, have a breadth of information at our disposal. As an example, I can access up-to-date intelligence reports and comb through the website and information repository of the Combatant Command called U.S. Central Command (USCENTCOM), which is responsible for the Middle East area of responsibility. I can get all of the pertinent details that the General is looking for, and through email, instant messaging, or a phone call, I can actually talk to an expert halfway across the country or world.

Work has also changed because we are always connected. In the military and my most recent civilian jobs (including teaching), it cannot be as easily done without the web. In the military, our scheduling process is web based, our training is web based, as just a few examples. Prior to a deployment, we are overwhelmed with information. We access websites to tell us the weather forecast, notices from Air Traffic Control centers, reports that show runway and airfield conditions of bases and civilian airports around the world, as well as to decide upon our route of flight. Our systems are so interconnected with each other that if the Internet went down, we would have a tough time.

About 5 years ago, as I was getting qualified in a new aircraft, the final item I needed to accomplish was to take an online test. As I was deploying in about three days, I went to the testing office to take the test. Unfortunately the site was down. The test administrator looked at me and said there is nothing he could do. I explained that I was deploying and there was nobody else that could take my place and that I needed to take the test. I asked him if he had a copy of the test printed out that I could take and he could manually score it. He shrugged his shoulders and said he did not. Luckily I had a few days to spare. I came back the next day and the test was still not accessible. By the end of the day, the site was working again and I took the test. But the leadership lesson in this case is that the person in charge should have made sure that there was a backup method in place, especially since this was a critical deployment item. I think it is important for a leader to recognize when there is a single point of failure. In many situations today, I believe the Internet is a single point of failure. This makes me worry a bit when I think that cyber hackers can bring much of our work to a halt. I feel that leadership should consider having backup and manual processes in place if there are any mission critical activities that could be disrupted.

Husband’s concept of wirearchy brings to light that more and more work is being accomplished online. Collaboration is becoming increasingly important. Besides the typical strictly defined collaboration, there are also informal methods in place. I learned this back in 1995 when I became a part-time Air National Guardsman and had a full-time job as an I.T. manager. I was used to a strict hierarchically defined structure in the Air Force. I wouldn’t dare go directly to the Wing Commander with a problem, complaint or even a suggestion on how to improve efficiency. I would first bring it up to my supervisor, and if the supervisor thought it was worthy, it would start making its way up the chain. This ensured that only the best ideas make it up all the way to the top of the chain. Unfortunately this is also a system where good ideas can die. If anybody up the chain decided that it wasn’t a good idea, it would wilt on the vine at that moment, never to be seen again. In the I.T. company I worked for, I noticed that lines of communication were blurred. My employees had no problem going directly to my boss or to his boss with ideas and information. At first I found this very uncomfortable, but eventually got used to it. If my boss was an expert in something that I wasn’t as familiar with, perhaps it made sense to go to him directly instead of to me. Although I see the merits of this, I have to admit that I sometimes still struggle with that concept, as I feel that I should be in the loop as a supervisor. What I’ve tried to do since then is to make sure my employees know that I am very approachable and that they should keep me in the loop on those types of things as well, in case my boss has questions for me. That seems to solve the issue, while not stifling communication and ideas.

ILD 831 WEEK 3 POST – RAY R.

Knowledge Management
Knowledge Management

Knowledge Management

As I reflected on Weinberger’s concept that knowledge lives in the network rather than in books or people’s heads, it eventually made sense to me. There is so much knowledge in existence today that there is no way it can all live inside one person’s head. We are living in the era where we don’t need to memorize a bunch of data or facts. We can look them up, as needed. Of course that may make many in academic circles cringe. But I don’t mean that we don’t need to continue learning and even memorizing some material. As I reflect back at the knowledge that was available back in the 80’s, when I graduated from high school, for example, information was not readily available.  If I was curious about a movie that I had seen, reviews for a movie I was considering seeing, or an actor from that movie that I wanted to look up, there was not an easy way to do this. Now, with the advent of the Internet Movie Database (IMDB.com), I can have that information within seconds. Earlier this year when my mom was diagnosed with small-cell lymphoma, if it had happened many years ago I would either have to learn all I could from the doctors and nurses or spend many hours in a library researching exactly what this was and its prognosis. Nowadays within an hour I am able to easily read many articles on the topic and learn a great deal about this type of cancer, assuming I sift correctly through what is fact and what is not.

As Nancy Dixon (2009) discussed, knowledge management takes this a step further and is concerned with how to make use of collective knowledge within an organization. Translating that into my life, I see how organizations have progressed from having small amounts of information years ago, to having a lot of disparate information, to making use of this collective knowledge in some way. I don’t believe many (or any?) organizations have perfected this use of information yet, but we are making strides towards that.

In the Air Force we used to have many, loosely organized, “knowledge management” portals called Community of Practice websites (AFMC, 2006). Many organizations and even subsections of organizations had their own sites and were free to hang any information that the personnel saw fit. More and more organizations were using this method, so a lot of information was out there, but it was very difficult to remember where to go to get it. Over time this network grew to over 19,000 Communities of Practice. In 2010 all users received an internal memo saying that funding for these Community of Practice sites had been terminated and they would be shut down effective May 14th, 2011. Because of this, an alternative was needed. Microsoft Sharepoint quickly became the alternative because it was already bought and paid for by the military. At Offutt AFB the leadership systematically organized the Sharepoint sites so they followed a logical hierarchy and structure, whereas the former Communities of Practice were haphazard and did not follow much of a structure. If people can find and access the Offutt Sharepoint site, for example, they can navigate down to any subordinate organization’s Sharepoint site.

Unfortunately the use of the Community of Practice sites and the Sharepoint sites have not necessarily solved the organization of information in a logical way. Many of the sites have turned into repositories of outdated and irrelevant information. Often the original administrators of the site have left the organization and nobody took over the duties. In other cases, there is too much information on the site and the administrator was not or is not skilled in any kind of website design to make the information flow very intuitive. Additionally, it is hard to know where exactly to go for certain information, which often renders the sites useless. We still have a long way to effectively use knowledge management in many organizations, including the military.

Ray R.

ILD 831 Week 2 Post – Padlet.com (Ray R.)

Padlet2

Padlet1

Padlet is a tool that is touted as “possibly the easiest way to create and collaborate in the world,” according to the padlet.com website.  In plain English, Padlet is a virtual wall that allows people (students, coworkers, instructors, etc.) to collaborate and express their thoughts on topics easily.  I think about it as a canvas or sheet of paper.  Collaborators/participants have control of putting their ideas on virtual paper using different types of media (text, documents, pictures, videos, and more) on the page.  It is a visually appealing way to brainstorm, share videos, share files, or share images.  One big benefit is that it is completely free and accessible on any device.

This tool can be used in many leadership situations in the education, healthcare, business, and non-profit worlds, just as a few examples.  In the video I created below, I created an example of using it in a classroom environment.  My scenario was working on a project about Jesuit values.  I recorded a simple brainstorming session where a few people in “cohort 99” started by posting what their favorite Jesuit value is.  This tool seems to be a great way to start collaboration with students with a wide array of technical abilities.  A novice can easily click on the link then click on the wall and start typing.  A person with more technical ability can use the wall in more of a robust fashion, such as posting video, linking to a blog, and much more.  It could be used in the classroom as a journal, to create engaging discussions, brainstorming, and much more.

There are some downsides, however.  The main thing, which also can be looked at as a benefit, is its simplicity.  Padlet doesn’t have any robust type of workflow, for example.  It would be handy for the beginning part of working on a project, such as brainstorming, but would not be suitable for more advanced parts of putting a project together.  Due to its simplicity I think it would get a lot more use in a K-12 education setting.  It still could get use in a college environment, but perhaps only for simpler tasks.

I see a variety of opportunities for this, particularly with younger and inexperienced users.  In an elementary school environment it would be a great way to introduce children to an online collaborative environment.  The teacher could allow each child to answer a question, such as “what was the highlight of your summer?” while also searching the Internet for some pictures to post.  This would be a great icebreaker or an introduction to a class project.  This tool could also be used in the business environment as well.  A team lead or supervisor could use this to keep each team member or subordinate on task for the week.  The supervisor could post a list of tasks and ask each person to keep the board updated with a quick status of the task.  One of the benefits of this tool is that it looks a lot friendlier and more appealing to the eye as compared to a Microsoft Project document, for example.  That doesn’t mean it can take place of the Microsoft Project document, but can still help facilitate information gathering and sharing.

Here is the 6 minute video I created showing how to quickly set up a Padlet page as well as some common settings that a person would want to consider configuring.