วันจันทร์ที่ 24 พฤศจิกายน พ.ศ. 2551

Knowledge management

Knowledge management

Knowledge Management (KM) comprises a range of practices used in an organisation to identify, create, represent, distribute and enable adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organisational processes or practice. An established discipline since 1995, KM includes courses taught in the fields of business administration, information systems, management, and library and information sciences [1]. More recently, other fields, to include those focused on information and media, computer science, public health, and public policy, also have started contributing to KM research. Many large companies and non-profit organisations have resources dedicated to internal KM efforts, often as a part of their 'Business Strategy', 'Information Technology', or 'Human Resource Management' departments [2]. Several consulting companies also exist that provide strategy and advice regarding KM to these organisations.
KM efforts typically focus on organisational
objectives such as improved performance, competitive advantage, innovation, the sharing of lessons learned, and continuous improvement of the organisation. KM efforts overlap with Organisational Learning, and may be distinguished from by a greater focus on the management of knowledge as a strategic asset and a focus on encouraging the exchange of knowledge. KM efforts can help individuals and groups to share valuable organisational insights, to reduce redundant work, to avoid reinventing the wheel per se, to reduce training time for new employees, to retain intellectual capital as employees turnover in an organisation, and to adapt to changing environments and markets

http://en.wikipedia.org/wiki/Knowledge_management

copyright

COPYRIGHT

Copyright is a legal concept, enacted by governments, giving the creator of an original work of authorship exclusive rights to control its distribution for a certain time period, after which the work enters the public domain. Generally, it is "the right to copy", but usually provides the author with other rights as well, such as the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other, related rights. It is an intellectual property form (like the patent, the trademark, and the trade secret) applicable to any expressible form of an idea or information that is substantive and discrete. Copyright was initially conceived as a way for governments in Europe to restrict printing; the contemporary intent of copyright is to promote the creation of new works by giving authors control of and profit from them.
Copyright has been internationally standardized, lasting between fifty to a hundred years from the author's death, or a finite period for anonymous or corporate authorship; some jurisdictions have required formalities to establishing copyright, most recognize copyright in any completed work, without formal registration. Generally, copyright is enforced as a
civil matter, though some jurisdictions do apply criminal sanctions.
Most
jurisdictions recognize copyright limitations, allowing "fair" exceptions to the author's exclusivity of copyright, and giving users certain rights. The development of the Internet, digital media, computer network technologies, such as peer-to-peer filesharing, have prompted reinterpretation of these exceptions, introduced new difficulties in enforcing copyright, and inspired additional challenges to copyright law's philosophic basis. Simultaneously, businesses with great economic dependence upon copyright have advocated the extension and expansion of their copy rights, and sought additional legal and technological enforcement.

http://en.wikipedia.org/wiki/Copyrights

วันจันทร์ที่ 10 พฤศจิกายน พ.ศ. 2551

History of information systems

The study of information systems originated as a sub-discipline of computer science in an attempt to understand and rationalize the management of technology within organizations. It has matured into a major field of management, that is increasingly being emphasized as an important area of
research in management studies, and is taught at all major universities and business schools in the world. Börje Langefors introduced the concept of "Information Systems" at the third International Conference on Information Processing and Computer Science in New York in 1965. [4]
Information technology is a very important malleable resource available to executives.[5] Many companies have created a position of Chief Information Officer (CIO) that sits on the executive board with the Chief Executive Officer (CEO), Chief Financial Officer (CFO), Chief Operating Officer (COO) and Chief Technical Officer (CTO).The CTO may also serve as CIO, and vice versa.

http://en.wikipedia.org/wiki/Information_Systems

วันจันทร์ที่ 3 พฤศจิกายน พ.ศ. 2551

computer history

The first computers were people! That is, electronic computers (and the earlier mechanical computers) were given this name because they performed the work that had previously been assigned to people. "Computer" was originally a job title: it was used to describe those human beings (predominantly women) whose job it was to perform the repetitive calculations required to compute such things as navigational tables, tide charts, and planetary positions for astronomical almanacs. Imagine you had a job where hour after hour, day after day, you were to do nothing but compute multiplications. Boredom would quickly set in, leading to carelessness, leading to mistakes. And even on your best days you wouldn't be producing answers very fast. Therefore, inventors have been searching for hundreds of years for a way to mechanize (that is, find a mechanism that can perform) this task.

วันจันทร์ที่ 27 ตุลาคม พ.ศ. 2551

Evaluation

Evaluation

Evaluation is systematic determination of merit, worth, and significance of something or someone using criteria against a set of standards. Evaluation often is used to characterize and appraise subjects of interest in a wide range of human enterprises, including the arts, criminal justice, foundations and non-profit organizations, government, health care, and other human services.

Evaluation standards and meta-evaluation

Depending on the topic of interest, there are professional groups which look to the quality and rigor of the evaluation process. One guiding principle within the U.S. evaluation community, energetically supported by Michael Quinn-Patton has been that evaluations be useful.
Furthermore, the international organizations such as the I.M.F. and the World Bank have independent evaluation functions. The various funds, programmes, and agencies of the United Nations has a mix of independent, semi-independent and self-evaluation functions, which have organized themselves as a system-wide UN Evaluation Group (UNEG)
[1], that works together to strengthen the function, and to establish UN norms and standards for evaluation. There is also an evaluation group within the OECD-DAC, which endeavors to improve development evaluation standards. [2]
The Joint Committee on Standards for Educational Evaluation [3] has developed standards for educational programmes, personnel, and student evaluation. The Joint Committee standards are broken into four sections: Utility, Feasibility, Propriety, and Accuracy. Various European institutions have also prepared their own standards, more or less related to those produced by the Joint Committee. They provide guidelines about basing value judgments on systematic inquiry, evaluator competence and integrity, respect for people, and regard for the general and public welfare.
The American Evaluation Association has created a set of Guiding
Principles [4] for evaluators. The order of these principles does not imply priority among them; priority will vary by situation and evaluator role. The principles run as follows:
Systematic
Inquiry: Evaluators conduct systematic, data-based inquiries about whatever is being evaluated.
Competence: Evaluators provide competent performance to stakeholders.
Integrity / Honesty: Evaluators ensure the honesty and integrity of the entire evaluation process. Respect for People: Evaluators respect the security, dignity and self-worth of the respondents, program participants, clients, and other stakeholders with whom they interact.
Responsibilities for General and Public Welfare: Evaluators articulate and take into account the diversity of interests and values that may be related to the general and public welfare

Depending on the topic of interest, there are professional groups which look to the quality and rigor of the evaluation process. One guiding principle within the U.S. evaluation community, energetically supported by Michael Quinn-Patton has been that evaluations be useful.


Search engine and Information literacy


Advanced site search engine


The FreeFind search-engine was designed from the ground-up to deliver high-quality, high-performance search capabilities to your web site. The distributed design operates across multiple load-balanced servers to deliver maximum up-time and the fastest performance.
The advanced design enables FreeFind to deliver professional quality search capabilities to hundreds of thousands of websites simultaneously.
This high-performance search engine can be installed on your website and fully customized with your site's look and feel in minutes, today.


"Information Literacy Skills"


For many teachers, their memories of completing a research report focus on being assigned a topic, being sent to the library, feeling lucky if they could find more than one resource (with the encyclopedia serving as the main source), and writing up the report using their own words. Most frequently, their biggest problem was not being able to find enough information in outdated books and encyclopedias.
Fast forward to the twenty-first century. The amount of information available over the Internet, on the news, and in newspapers, magazines, and books is astonishing and overwhelming. Students now are literally surrounded with Web pages of information, CD-ROMs with interactive programs, books, magazines, and other multimedia products. Most frequently, the biggest problem students face is finding too much information and not knowing what to do with it. Before students can be taught to understand concepts and skills and be asked to use their multiple intelligences, they need specific tools to work with the large amount of information at their fingertips. Without these skills, students feel like innocent lambs being thrown to the information wolves.


http://www.il.mahidol.ac.th/th/index.php/resources/professional-development/24-professional-development/618-information-literacy-skills.html?tmpl=component&print=1&page=

http://www.freefind.com/details.html

วันจันทร์ที่ 6 ตุลาคม พ.ศ. 2551

True internet gateway





Discover a new world of communication with the complete range of communication services from TRUE

True provides communication services from anything in an entry level though to gigabit broadband networks. These cover fixed-line telephones, mobile phones, wireless systems, the Internet, broadband communications and teleconference facilities. These services bring Thailand into line with world standard communication and add value to the lives of Thai people and the economy of the nation.

Introducing True Internet Gateway (TIG) A 100% True subsidiary

Established in March 2006, True Internet Gateway is a world-class specialized International Internet Gateway Services Company. With 100% support from TRUE Corporation PLC, its mother company, TIG is more than capable in providing Interconnection of all kinds, freeing up the bottle neck of the country that has been there due to lack of market competition.

What TIG Offers You

Under True, Thailand’s convergence leader, TIG together with the rest of its subsidiary collegiate companies is the one and only company that is capable of offerring you the following.

100% Total accessibility
Total reliability
Total flexibility
Complete cost-efficiency gateway related services to local
or international carriers worldwide
TIG, The first private company to be fully operable in the gateway industry since telecommunication liberalization.

TIG was granted the first license for national’s International Internet Gateway & Internet Exchange by the National Telecommunication Commission of Thailand, on May 19th, 2006. It is the first privately owned company that has fully completed the IIG license process under Thailand’s license-base regulatory regime. In fact, it is Thailand’s first private gateway to be operable on its own without having to go through the incumbents’ gateways


Thai Telecom Reform has developed step by step and paved the way for the liberalization process

his development follows the Telecom Development Master Plan (1997). The National Telecommunications Commission (NTC) was formally established on January 1st, 2005, to regulate the industry. First steps included the separation of the commercial operation from the regulatory functions of both TOT and CAT. The following step was the actual establishment of NTC, the National Telecommunications Commission.



Benefits of NTC Telecom Regulations

How the objectives of NTC Telecom Regulations benefit you. Promote universal access to basic telecom services

Foster competitive markets to promote efficient supply, good quality and advanced technology of service all at realistic prices
Prevent abuse of market power
Promote investment to expand the telecom network
Promote public confidence in the telecom market through transparent regulatory & licensing processes
Protect consumer rights, including privacy rights
Promote the increased telecom connectivity of all users through efficient interconnection arrangement
Opitimize use of scarce resources, spectrum, numbers and rights of way
The elimination of Digital Divide resulted in the opening up and governing of the Internet market both upstream and downstream in the Internet Supply Chain

This was an essential part of liberalization. In the upstream supply chain, previously there was only one state-owned enterprise that took care of wholesale international Internet services and all other related businesses, i.e. International Private Leased Circuit (IPLC).

Regulations now distinguish upstream telecommunication licenses into voice and non-voice (i.e. Internet and Data). Each service will require a specific separate license for the operator to be eligible to provide service. TRUE Internet Gateway Co., Ltd. received a Type II International Internet Gateway & Internet Exchange License on May 19th, 2006. The license is valid for 5 years until May 18th, 2011.

วันจันทร์ที่ 29 กันยายน พ.ศ. 2551

spider man :enimies




Spider-Man has one of the best-known rogues galleries in comics. Spider-Man's most infamous and dangerous enemies are generally considered to be the Green Goblin, Doctor Octopus and Venom[28] . Others include the Lizard, the Chameleon, the Hobgoblin, Kraven the Hunter, Carnage, the Scorpion, the Sandman, the Rhino, Mysterio, the Vulture, Electro, the Kingpin, Hydro-Man, the Shocker, and Morlun. As with Spider-Man, the majority of these villains' powers originate with scientific accidents or the misuse of scientific technology, and they tend to have animal-themed costumes or powers. At times these villains have formed groups such as the Sinister Six to oppose Spider-Man.

วันจันทร์ที่ 22 กันยายน พ.ศ. 2551

spider-man



With great power comes great responsibility
In 2002, one of the world's most popular comic book heroes made his leap to the big screen. Released in conjunction with the 40th anniversary of the web-slinger's first appearance in a comic book, Spider-Man centers on an ordinary student named Peter Parker who, after being bitten by a genetically-altered spider, gains superhuman strength and the spider-like ability to cling to any surface. He vows to use his abilities to fight crime.

Orphaned at an early age, Peter Parker lives in Queens, New York with his beloved Aunt May and Uncle Ben. Peter leads the life of a normal student, working as a photographer at the school paper, pining after his beautiful next-door neighbor Mary Jane Watson and hanging out with his buddy Harry Osborn.

On a school field trip where Peter and his classmates are given a science demonstration on arachnids, Peter is bitten by a genetically-altered spider. Soon after, he discovers that he has gained unusual powers - the strength and agility of a spider along with a keen, ESP-like "spider sense".

At first, Peter decides to use these powers to make money to impress Mary Jane. He appears in a wrestling match and, armed with his new spider strength, wins the match in record time. But the crooked wrestling match promoter refuses to award Peter the prize money. Moments later, the promoter is robbed and Peter has the opportunity to catch the burglar fleeing from the promoter's office, but because he wants revenge Peter refuses to stop him. Tragically, the burglar kills Peter's Uncle Ben during a carjacking as he flees the scene of the crime.

As Spider-Man, Peter apprehends the burglar but is plagued with guilt for not being a hero sooner. During his time of turmoil, Peter remembers something Uncle Ben once told him: "With great power, comes great responsibility." Peter takes this to heart and decides to use his extraordinary powers to fight crime and protect the city as Spider-Man.

Meanwhile, megalomaniacal businessman Norman Osborn, Harry's father, is undergoing some changes of his own. An experimental formula has gone awry, increasing his intelligence and strength but also driving him insane. He is now the Green Goblin, Spider-Man's arch-enemy, who will put young Peter Parker's vow to fight crime and help innocent people to the ultimate test.

Source

วันจันทร์ที่ 8 กันยายน พ.ศ. 2551

betty boop

Betty Boop Flip Flops Animal Magnetism



These cushy printed ladies flip flops are comfortable for you to walk in all day long. Made in adult sizes.




Price $15.95
http://www.bettyboopstore.com/beboflflanma.html

วันจันทร์ที่ 1 กันยายน พ.ศ. 2551




Pochette Milla MM


A tribute to Milla Jovovich, the multi-talented model and actress, the MM pouch, in Monogram canvas, has a refined metalic signature and a golden chain attachment on both sides.
Size: 0.7" x 4.2" x 7.9"
- Monogram canvas and microfiber lining

- Golden brass pieces- Zipper closure

- One interior patch pocket

- Hand held or carried on the wrist

- Golden metal chain for attaching to the D-ring found on many bags of the House

- Metalic Montorgueil city range signature

PRODUCT ID: M60094

วันจันทร์ที่ 25 สิงหาคม พ.ศ. 2551

It's Me....MJ







The Keepall 55 with shoulder strap

The Keepall is a classic of the Louis Vuitton travel bag collection. This large version in Monogram canvas features a removable leather shoulder strap and a removable ID holder.
Size: 21.6" x 12.2" x 9.4"
- Monogram canvas, brown canvas lining, natural cowhide trim

- Golden brass pieces
- Double zip closure- Rounded leather handles
- Removable leather shoulder strap- Removable leather ID holder
- Padlock
- Cabin size
PRODUCT ID: M41414







http://http://www.louisvuitton.com/web/flash/index.jsp;jsessionid=XSAXDXYRGGCRACRBXUFFAGIKEG4RAUPU?buy=1&langue=en_US&direct1=home_entry_us