Knowledge Abundance

Gerry McGovern opens a recent article with an incredibly clear statement about the current environment for KM:

We are in an era of knowledge abundance. Traditional management theory focuses on knowledge scarcity. We need new management strategies to deal with so much communication and so much knowledge.

This is why blogging, RSS, newsreaders, wikis and similar technologies are coming to the fore now. They are effective tools for communicating in an environment of abundance. Love that quote! This will definitely be making its way into my presentations (with attribution, of course).

Content Garden Hoses

Photo by Nikolaus Büttner.
Photo by Nikolaus Büttner.

In the past I have always described the task of coherently organizing the flood of content that ASHA produces as trying to sip from a full blast fire hose. However, as I kicked around the idea with some folks at work as I prepared for a presentation, I realized that ASHA doesn’t have a single content fire hose. ASHA, which has dozens of decentralized content producing groups, actually has the equivalent of several hundred content garden hoses. Taken individually or in small groups, they are easy to manage. However, when you have 100 garden hoses pointed at you, you get just as wet as getting hit by a fire hose.

So there you have my deep thought of the day. I mainly wanted to share the photo above that I found on Flickr. I’ll be using it in my presentation. Very apt.

NYT Paywall

David Weinberger provides a good analysis of why the New York Times putting its editorial writers behind a paywall is a bad move: Joho the Blog: The NY Times world of pain.

I just heard (!) that the Times is going to start charging $50/year to read its op-ed columnists. (That will also get you access to their archives.) I feel their pain, even as I think it’s the wrong decision.

The Times is watching its value erode. Electronic distribution is only going to become a bigger part of the picture, its readership is exulting in the exposes of the failures of the MSM to provide full and accurate coverage — the real story about the Newsweek brouhaha is why we are so eager to hear about ways the MSM is failing — and the authority of The Times is being challenged by a new news architecture that denies the necessity of having gatekeepers at all. In this face of all this confusion, the Times has made some smart moves, including giving a backdoor to permalinks to its articles and moving towards dynamically building “topic pages” that aggregate info”

MSM stands for main stream media. This issue is relevant to MSAs as well (main stream associations).

Tagging Enterprise IA

Lou Rosenfeld has begun a group tagging project, using del.icio.us to track links related to enterprise information architecture. Bloug: Experimenting with Tagging:

Do you use del.icio.us? And are you interested in enterprise information architecture? Then consider tagging your EIA bookmarks with the tag ‘enterprise_ia’. If at least a few of us start doing this, then, as the tag gods suggest, we’ll all benefit from each other’s research by monitoring the tag at ‘http://del.icio.us/tag/enterprise_ia’. Please spread the word to anyone who you think might be interested.

See del.icio.us/tag/enterprise_ia and del.icio.us/rss/tag/enterprise_ia to subscribe.

Lou also raises the question of how to increase precision in social tagging. I’m not sure that’s the right question. Folksonomy doesn’t seem to be about precision. It can be mined by someone who wants to create precise references but the point of it is not to have formal indexing structures. It’s hard to let go of that (I say from personal experience).

Password Generator

Nic Wolff has posted a really cool tool: Password generator

So, this is a little Javascript program that will concatenate two fields and MD5 them. The idea is that you choose one master password to secure all your others, and then generate passwords for each site, server, router, &c. by putting a completely obvious name for that resource in the “Site name” field.

Half the web seems to be linking to this but I thought I would get in on it too. Looks like a great way for simplifying your personal logins while still being very secure.

AJAX in CMS Screencast

CMS Watch posted a nice screencast a while back that demonstrates how some CMS packages are currently using AJAX techniques to enhance their user interfaces. Definitely worth checking out. I especially like the autocomplete feature for users tagging content with keywords from a controlled vocabulary. (Thanks to Mark T for posting about this and bringing it back to my attention.)

Somewhat Unrelated Links Gathering Dust

I have a bad habit of stashing links to stuff I want to blog here and there (well, mostly here) and then never getting around to posting about them. In an effort to circumvent my usual behavior, here are a few slightly dusty links.

Extreme Usability
Great post about the benefits of pairing a usability/interface person with an engineer to rapidly iterate improvements in design. I’ve had the same experience when working side-by-side with our web admin.

Password Design Pattern
Good tips on designing password protection systems. Directly related to my earlier post today.

IBM Gets Folksy
Post about how IBM plans to implement folksonomy tagging to its massive intranet operation.

Managing Logins for a Members-only Web Site

How to manage member access to member-only areas of an association’s web site is a common question posted to the ASAE Technology listserv. Since I’ve answered it a few times I thought I would go ahead and post my stock reply here to save some typing in the future. 🙂

Many associations, when they first create a member-only area of their web site, have used a member’s ID number and last name to control access. However, that same information is usually listed on mailing labels and membership cards. This method is very easy to set up, administer and communicate to members. However, having that info on mailing labels is definitely a security risk. The size of the risk really depends upon what they can do with the account once they login. If it’s just to view content (usually the case for early efforts), the risk is relatively low. If it can include e-commerce transactions or editing the members’ data in your association management system (what most associations want to add or expand upon now), then the risk is pretty high. Either way, I think it is smart to move to something more secure.

When I came to ASHA in 2000 we were using the same account number/last name scheme for access and that info was and is on every mailing label and membership card. We then implemented a username/password system that allowed the user to create their own login name and password. Over time, we found many members had problems remembering the login name they had created for themselves. A few years later we migrated to using their e-mail address as their login name which has dramatically reduced support calls for lost user names (many of our members call us instead of using the account help tools on the site). Based on our own experience, I would recommend going with e-mail as the login name. That seems to be the emerging standard around the web for many major sites out there (Amazon being the most notable).

Some gotchas to look out for when using e-mail as the username:

  • Each member must provide a unique e-mail address. Sometimes this is an issue when a spouse shares the same account and is also a member.
  • You should provide instructions on free services that members without an e-mail address can use to get one (there are still some people without e-mail addresses!). This is also useful in the spouse shared address situation.
  • Clearly state how the address will be used by the association when the members supplies it to ease privacy/spam concerns on the part of the member
  • Consider your response to members who refuse to supply you with an e-mail address but want access to the member-only content and services (I have encountered this a few times).
  • Members should be able to change their e-mail address at any time without having to re-register with the site. In technical terms, test for e-mail uniqueness but don’t use it as the primary key for the record.

Finally, you will need to associate the login with their account number in some way. You might ask for their member ID number at the time they register or associate the login with their account later through some other process. I strongly suggest automating the process as much as possible while still preventing the same ID number from being associated with more than one login.

Hopefully the above info will help you get a jump start on the design (or redesign) of your web site login system.