Welcome!

Intelligent Information Sharing

Ted McLaughlan

Subscribe to Ted McLaughlan: eMailAlertsEmail Alerts
Get Ted McLaughlan via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Ted McLaughlan

Here's a very good article concerning the various types of strong identity management, multifactor and two-factor authentication solutions that are necessary for healthcare system and process identity enforcement - recently written by John D. Halamka MD, a self-described Healthcare CIO. Strong Identity Management In this article, Dr. Halamka states that he's had a wide range of experience with many of these token-based and tokenless two-factor authentication methods, including security tokens, smart cards, biometrics, certificates, soft tokens, and cell phone-based approaches. His summarized findings include: Security Tokens - many challenges and prohibitive expenses. Smart cards - a good consideration, though requires installation of many readers. Biometrics - great results, but still requires major technology upgrade for existing PC/LAN infrastructure (this is especiall... (more)

Probably Interesting Information

(Warning – hyper-theoretical stream of probably uninformed semi-consciousness to follow…) In considering the possible types of information that might need to included in Enterprise Information-Sharing programs, while sifting through my TweetDeck, something’s become quite clear – most of our Government information-sharing exercises are all about “Signals”, “Data”, and “Information” that are already known (at some level) to be “required”, “useful”, or “possibly interesting” – judged as so by existing processes, policies, roles, business rules and perhaps knowledgebase ontologies.... (more)

Government Social Media & Cloud Computing

GovIT at Cloud Expo June 23, 2009 - During this morning’s IAC breakfast, discussing “Transparency, Collaboration and Web 2.0”, a panelist made a very interesting point. While the US Federal Government’s use of Internet social media services and cloud-based information-sharing applications is well underway, albeit at the very earliest of stages (mainly due to significant policy, privacy, security and simple “newness” issues), by far one of the major risks lies with accountability. Accountability in collaboration and information-sharing environments is typically achieved to some d... (more)

Corporate Blogging Framework - Where to Start?

There's been a lot published and dissected over the value and methods for successful corporate blogging, and the intersections between corporate and employee use of social media. What's not been discussed much is the application of Systems Engineering Methodology, within the Information Management Architecture Domain, to implementation of corporate blogging. Being that a corporate blogging program is essentially part of a corporation's "Information-Sharing Line of Business", integrated with and supported by other corporate operational domains (like Marketing & Communications, I... (more)

Should Our Business Tweet in the Cloud?

New Media on Ulitzer The jury’s still out for most businesses on whether or not significant effort is made in “tweeting” information via Twitter.com – but the evidence is IN regarding whether or not to simply sign up and prepare to do so. Your company’s online popularity, reputation and ultimately success is derived from two core things – what you say, and what others say about you. Let’s address these communication elements as “attributed source information” (ASI). “Attributed” from the perspective that there is in fact a known source (though it may be an anonymous ID), “source”... (more)