Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Knowledge management (KM) as a discipline is simultaneously relatively new and very old. We, as people, want to share ' or rather we acknowledge that it is vital; societies were built on the interchange of information and knowledge. Historically, apprenticeships and livery companies ensured the transfer of tacit expert knowledge. We still do this in our personal lives; we share happily with friends and strangers. Yet at work, and particularly in professions, the lack of sharing and capture of contextualized knowledge is so extreme that an entire industry has arisen to help us relearn and apply what should be natural to us.
The Emergence of KM and Portals
Although the term 'knowledge worker' was first coined some 50 years ago, the publishing of 'The Knowledge Creating Company' by Nonaka & Takeuchi in the mid-1990s marked for many, the beginning of KM as it is known today. Defining the distinction between explicit and tacit knowledge, and examining the role of people, process and culture in knowledge management, this book helped to frame the debate and the ensuing movement. The period from the late 90s has been termed the '2nd generation' of KM (David Snowdon, 'Next Generation Knowledge Management,' ' ARK Group 2006). An exploration of the suggested 3rd generation will follow in the next article in this series. It saw an explosion of vendors, conferences and consultants branding their product with the 'knowledge' label ' however, many of these products were not really knowledge tools, but rather information retrieval. While commentators may debate the difference between information management (IM) and KM, this article assumes that KM refers more to the evolution of a rich ecology of contextual knowledge transfer and sharing.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?