The document discusses the Emerging Technologies Team (ETT) at the NIH Library and their efforts to develop staff competencies in emerging technologies through training. The ETT helped develop objectives for staff performance plans that included mobile computing and social media. They provided training to staff through brown-bag sessions, show-and-tell demonstrations, and a "Reference Assistant Tech Challenge" that guided staff through technology modules over time. Evaluation of training included surveys of staff and lessons learned highlighted the importance of planning, making training relevant, and allowing sufficient time for implementation.
Basic introduction to computer literacy, terma, computer components, advantages and disadvantages of computers, networks, the Internet and World Wide Web, and different types of software and computers. And describe the role of each element of an information system.
Basic introduction to computer literacy, terma, computer components, advantages and disadvantages of computers, networks, the Internet and World Wide Web, and different types of software and computers. And describe the role of each element of an information system.
Netnography: Overview and How to (Schulich School of Business, MBA class, Soc...elpinchito
This is a slide deck used for 'Netnography: Overview & How-to' presentation on Feb. 15, 2012. The presentation (watch the YouTube video below) was a part of the class assignments for "Social Media Marketing" class taught by Robert Kozinets at Schulich School of Business, York University. In this presentation, topics such as why netnography is useful for marketing research and what the researchers have to keep in mind are explored with some specific examples.
The video on the first slide is a teaser for this presentation.
The link to the recorded presentation: https://www.youtube.com/watch?v=UWApBu2ERTU&context=C31c1b83ADOEgsToPDskJO-DQt8ZUtzIA-tdvMiOHd
How Technology is Changing Our Faith & Worship: Whether We Know it Or NotAdam Walker Cleaveland
So many churches today are feeling the pressure to become "relevant" and "hip" and use as much technology as possible in the midst of worship. We will discuss reasons why you should and shouldn't use new forms of media in your church's worship. We'll also look at the ways in which the technology of our times can actually not only change the practices of our churches, but our theology as well - and whether that's a good thing or not. Finally, we'll look at some examples of practical ways that you can faithfully use technology in your worship gatherings.
Lareen Newman, 'The overlooked impact of basic reading and education leve ls ...Agnes Gulyas
Lareen Newman, Flinders University, Australia, 'The overlooked impact of basic reading and education levels on Internet use' presented at 'Communities in the Digital Age' International Symposium, Canterbury Christ Church University, UK, 12 June 2013
Describes intermediated technology use in resource-constrained urban slums, including mechanisms, interface requirements, and its broader effects. Can help designers of technology for "developing" regions.
Designing and deploying mobile user studies in the wild: a practical guideKaren Church
This tutorial was presented as part of Mobile HCI 2012 in San Francisco on the 19th September 2012. The tutorial aims to provide a practical guide to conduct mobile field studies based on the learning outcomes of the research I've been involved in while working as a Research Scientist in Telefonica Research, Barcelona. I cover how to design effective mobile field studies, the importance of mobile prototyping, the impact of various design choices on the study setup and deployment, how to engage participants and how to avoid ethical and legal issues. I've also tried to include listings of useful resources for those who are interested in conducting mobile field studies of their own.
More details: http://mm2.tid.es/mhcitutorial/
Karen Church
Research Scientist
Telefonica Research
www.karenchurch.com
@karenchurch
Strategic scenarios in digital content and digital businessMarco Brambilla
This lesson was given in May 2009 at MIP, Politecnico di Milano. The audience included members of the Acer academy program.
Rights on reused content are maintained by respective owners.
See further information on my activity at:
http://home.dei.polimi.it/mbrambil/
and:
http://twitter.com/marcobrambi
ICT Workplan
1. Establish a Farmphone system based on Freedomfone in Sindh province.
2. Demonstrate and test the “Seeing is Believing” app developed by ACIAR/UC
3. Conduct youth survey to specifically explore the establishment of an ICT skills project (Community Service Centre model)
4. Establish links with UAF’s CyberExtension project Zarai Baithak (http://zaraibaithak.com/)
5. Connect with Dairy, Citrus and Mango teams once the ICT trials have been undertaken in March
Netnography: Overview and How to (Schulich School of Business, MBA class, Soc...elpinchito
This is a slide deck used for 'Netnography: Overview & How-to' presentation on Feb. 15, 2012. The presentation (watch the YouTube video below) was a part of the class assignments for "Social Media Marketing" class taught by Robert Kozinets at Schulich School of Business, York University. In this presentation, topics such as why netnography is useful for marketing research and what the researchers have to keep in mind are explored with some specific examples.
The video on the first slide is a teaser for this presentation.
The link to the recorded presentation: https://www.youtube.com/watch?v=UWApBu2ERTU&context=C31c1b83ADOEgsToPDskJO-DQt8ZUtzIA-tdvMiOHd
How Technology is Changing Our Faith & Worship: Whether We Know it Or NotAdam Walker Cleaveland
So many churches today are feeling the pressure to become "relevant" and "hip" and use as much technology as possible in the midst of worship. We will discuss reasons why you should and shouldn't use new forms of media in your church's worship. We'll also look at the ways in which the technology of our times can actually not only change the practices of our churches, but our theology as well - and whether that's a good thing or not. Finally, we'll look at some examples of practical ways that you can faithfully use technology in your worship gatherings.
Lareen Newman, 'The overlooked impact of basic reading and education leve ls ...Agnes Gulyas
Lareen Newman, Flinders University, Australia, 'The overlooked impact of basic reading and education levels on Internet use' presented at 'Communities in the Digital Age' International Symposium, Canterbury Christ Church University, UK, 12 June 2013
Describes intermediated technology use in resource-constrained urban slums, including mechanisms, interface requirements, and its broader effects. Can help designers of technology for "developing" regions.
Designing and deploying mobile user studies in the wild: a practical guideKaren Church
This tutorial was presented as part of Mobile HCI 2012 in San Francisco on the 19th September 2012. The tutorial aims to provide a practical guide to conduct mobile field studies based on the learning outcomes of the research I've been involved in while working as a Research Scientist in Telefonica Research, Barcelona. I cover how to design effective mobile field studies, the importance of mobile prototyping, the impact of various design choices on the study setup and deployment, how to engage participants and how to avoid ethical and legal issues. I've also tried to include listings of useful resources for those who are interested in conducting mobile field studies of their own.
More details: http://mm2.tid.es/mhcitutorial/
Karen Church
Research Scientist
Telefonica Research
www.karenchurch.com
@karenchurch
Strategic scenarios in digital content and digital businessMarco Brambilla
This lesson was given in May 2009 at MIP, Politecnico di Milano. The audience included members of the Acer academy program.
Rights on reused content are maintained by respective owners.
See further information on my activity at:
http://home.dei.polimi.it/mbrambil/
and:
http://twitter.com/marcobrambi
ICT Workplan
1. Establish a Farmphone system based on Freedomfone in Sindh province.
2. Demonstrate and test the “Seeing is Believing” app developed by ACIAR/UC
3. Conduct youth survey to specifically explore the establishment of an ICT skills project (Community Service Centre model)
4. Establish links with UAF’s CyberExtension project Zarai Baithak (http://zaraibaithak.com/)
5. Connect with Dairy, Citrus and Mango teams once the ICT trials have been undertaken in March
Infusionsoft Socially Enabled Internal Communication ProposalKimberle Morrison
We're growing and needed a more effective and scalable way to communicate internally. This presentation outlines our process and the rationale behind how and why we decided to go with a socially enabled system for communication and collaboration
In order to improve personal and organizational knowledge, people have to take time to make sense of the information torrent. If not, it remains merely information. Unfortunately, many of today’s knowledge workers don’t have the time, discipline or the essential skills to select, filter, evaluate and comprehend their multifarious information sources. This can lead to missed opportunities, poor decision-making and suboptimal performance. The 21st century knowledge worker needs to be confident and comfortable with using social technologies and engaging with communities and social learning networks to update his or her knowledge in order to remain relevant. This session explores some of the tools, skills and processes that can help with information sense-making, and looks at the emergent roles of the Community Manager and Digital Curator in delivering value to learning networks.
Employee Comms during times of disruptionLiveTiles
This slide deck supports a presentation (and a blog, see link below) which addresses the difficult challenges of driving employee engagement in a digital workplace taking (and the working from home phenomenon) specific lessons from the area of community engagement during disaster response operations.
Moving Beyond the Knowledge Base to the Social Knowledge ExchangeBlue Economy Agency
In today’s world, effective knowledge sharing within an organization helps to attract talent, to build revenue and to inspire innovation, all of which lead to competitive advantage. Historically, the dissemination of information has happened through a system of content platforms and static document sharing, often via email. Those old paradigms no longer apply in the real-time socially connected world of today. Leveraging social platforms to tap the collective mindshare of the organization is not only important, it's mission critical for success.
These slides from our recent webinar with ClimateWorks and Forrester Research demonstrate how innovation is pushing the boundaries of knowledge management and moving us into the era of the Social Knowledge Exchange.
Kate Leggett, Forrester’s leading expert analyst on knowledge management will lead the conversation and provide industry trends and insights on the future of the Social Knowledge Exchange. We'll also hear from Sarah Nichols, Director of Knowledge Management for ClimateWorks, a foundation dedicated to supporting public policies that prevent dangerous climate change, and learn how ClimateWorks uses its social intranet to:
Create a central services portal that connects its global network of non-profits
Connect systems of record to systems of engagement
Develop innovative UX search and content discovery mechanisms
Apply best practices to increase intranet adoption and usage.
Analytical Methods for Systematic Review SupportDouglas Joubert
This talk provided a quick overview of the involvement of two NIH Informationists in an a systematic review, and highlight ways in which other library professionals might incorporate these practices into their systematic review programs.
Using Social Technologies for Public Health, 2014Douglas Joubert
Our 2014 presentation to the students of the “New Social Technologies and Social Media Approaches for Health”
Location: At the JHU Bloomberg School of Public Health in Baltimore, Maryland
Keeping up with Public Health Series: A Pilot Project for Public Health Resea...Douglas Joubert
Presented at the 2014 Annual Meeting of the Medical Library Association, as part of the Building from Common Ground: Partnerships with Faculty, Practitioners, Librarians, and the Community for Community-Based Participatory Research panel
2013 Johns Hopkins School of Public Health LectureDouglas Joubert
Course lecture for the Johns Hopkins School of Public Health lecture: A New View: Improving Public Health through Innovative Social and Behavioral Tools and Approaches.
Includes an overview to the social and participatory aspects of the Web, an overview of social media tools, and commonly used metrics for evaluating specific social media tools. Additionally, case examples will be provided on the use of social media in health communication and public health.
Presentation describes creating a culture of assessment at your institution. And outlines a study of four analytical questions developed by the AAHSL Task Force On Qualitative Assessment.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
20240605 QFM017 Machine Intelligence Reading List May 2024
Developing Staff Competencies in Emerging Technologies
1. 1
CRICS9 Panel 5
Developing Staff Competencies in
Emerging Technologies
Douglas J. Joubert, MS, MLIS
Alicia A. Livinski, MA, MPH
MaShana Davis, MSIS
NIH Library | Office of Research Services | National Institutes of Health
Disclaimer
The views expressed in this presentation are
those of the speakers and do not reflect the
official policy or position of the National
Institutes of Health Library, the NIH, or the
Department of Health and Human Services.
2. 2
Who we are
Literature
Planning
Strategy
Training
Development
Staff Performance
How we did it
Implementation Assessment
Lessons Learned
Case Study Strategy
3. 3
Changes in Technology
Changes in Behavior
We looked at Learning Theories
Information Literacy
Digital Literacy
Other Library Programs
Changes in technology
“Consumers want their information when they
want it, how they want it, and in whatever
quantities they want it.”
~Price Waterhouse Study~
Changes in user behavior
4. 4
New normal: 1999
• Most of “us” were
not active users of
the Internet.
• Active Users were:
• Male
• White
• College educated
• Dial-up at 32/kbits
• Directory and
portal search
Image: introduction to the Internet, Byron Soulsby.
• Chat rooms
Adapted from Pew Internet & American Life Project, 2011
New normal: now
• Broadband
• Mobile
• Less SES stratification
• Less generational
variance
• Social networking and
content creation
• Video on demand
Image Source: Business Insider "Incredible Things That Happen Every 60
Seconds On The Internet"
Adapted from Pew Internet & American Life Project, 2011
5. 5
The mobile landscape - data
• “The Mobile Difference:” mobile users are more likely to
update, to share, to create, to forward, and to record.
• 31% of text message users prefer texting to voice calls,
and young adults stand out in their use of text messaging.
• More than a quarter (28%) of all American adults use
mobile or social location-based services of some kind.
• Several demographic groups have higher than average
levels of smartphone adoption.
Pew Internet 2011 Trend Data: http://www.pewinternet.org/Trend-Data.aspx
What does this mean for
organizations?
• SNS allow for immediate, spontaneous creation of
networks.
• The ability to create new pathways to users and
stakeholders.
• Social networks and social media becoming more
important in community building and maintenance.
• Use social media to develop a culture of listening.
Rainie. Lee. (2011). The social media landscape
6. 6
Disruption is our friend
“We are living in a time where technology is
connecting us to an increasingly networked world.
We see it in our personal lives first. However it is
having a profound effect on the way in which
health organizations and non-profits do their work,
communicate to stakeholders, and deliver their
programs.”
E-Mediate Day 1: A Networked Mindset To Capacity Building (2011), Beth Kanter.
Planning
7. 7
How the pieces fit together
NIHL 2011 Strategic Plan
NIHL Objectives on Mobile
ETT Mission
Staff Development Mobile Deployment
Emerging
Technologies
Mobile Training
Competencies
8. 8
The Emerging Technologies Team (
ETT) and its role in training
The team helps to support mobile computing,
social media, and other technologies critical to
science and medicine.
Staff performance
• Supervisors reached out to ETT to assist in developing
objectives for performance plans (PMAP’s).
• PMAPs needed to include activities focused on mobile
and Web 2.0.
Focus on Focus on Include Social
Teleworking Mobile Media, Web 2.0
(Jan 2011) (Feb 2011) (May 2011)
9. 9
Planning…targets
• Compile a list of available devices and their platform:
Apple, Blackberry, Android.
• Identify and document issues related to authentication on
mobile devices (iOS and Android).
• Planning for and supporting multiple devices.
• Partner with other techie folks on campus.
• Sustaining the program.
Planning…mobile
• Deciding who gets what.
• Device negotiation with vendors.
• Contract negotiation with vendors.
• Figuring out what is allowed by HHS & NIH CIOs.
• Deciding how to train staff on using their mobile
devices.
10. 10
Planning…training
• Supporting staff development across platforms.
• What should be our training priorities?
• What training models have been successful and will they
work at the NIHL?
• Brown-bags versus hands-on.
• Accommodating adult learners.
• Librarians, Informationist, support staff, and the
business office.
Development &
Implementation
11. 11
Development…mobile
IAB Branch Chief met with ETT to discuss device deployment.
ETT met with all library staff outlining team objectives, mobile
deployment, and staff training.
IAB Branch Chief sent out survey asking staff about
preferences for a mobile device.
Development…training
Developed curriculum that included a variety of methods for
educating staff, developed a staff technology challenge, and
leading by example.
Developed methods to evaluate staff competencies with their
devices.
We really wanted to build a community of learners that was
focused on mobile, social media, and emerging technologies.
12. 12
How we did it
• Brown-bags for staff education.
• Meet and Greet sessions with the ETT.
• Mobile “show and tell.”
• Reference Assistant (RA) Tech Challenge.
• Informal Communities of Practice.
• ETT served as “ambassadors” for the technology.
Mobile device deployment
18 BlackBerry Devices
14 Android Devices
12 iPads
44
14 staff never had a mobile device at work
3 did not have a personal cell phone
13. 13
Staff brown bags
Mobile Dropbox
Computing Twitter and File
101 Sharing
Cloud
Blogs and Social
Computing
RSS Bookmarks
and Google
Spatial
Literacy and Crowd- SM & Public
Mapping sourcing Health
Assessment
14. 14
Evaluation
• Surveys (used Google Forms & SurveyMonkey).
• App evaluation form.
• Device evaluation form.
• Survey on mobile device (perceptions about
getting the device).
• Narrative summary if devices were returned.
• Narrative Reports (iPads only).
Evaluation?
• Was harder than it should have been.
• Reluctance of staff to complete
evaluation forms & provide feedback
(except when something didn’t work).
• Difficult to come up with outcome
measures – esp. those relevant to
our type of library.
• Was not able to work on evaluation
plan before distributing devices.
15. 15
Lessons Learned
Lessons learned [1]
• How do we encourage the discovery of new services and
applications.
• Evaluating staff competencies with their devices.
• Time to develop & conduct the trainings.
• Determine how to evaluate? What to evaluate?
16. 16
Lessons learned: [2]
• Planning and establishing goals at the outset are
essential.
• Distribution of work: be prepared for a lot of hand-holding
to get people up to speed.
• Jumping through government-specific TOS jargon/policies
(iTunes, 3G, repurposing the BlackBerry devices).
Lessons learned: [3]
• Squeezing in time here and there to focus on this entire
initiative does not work very well.
• Make what you are doing relevant. You cannot make
people excited about something.
• Innovation is hard. Even if you have the support of
leadership, implementing something new is not easy.
• We had to become innovative in figuring out ways to
encourage staff without explicitly providing instructions.
17. 17
Case Study: Reference Assistant
(RA) Tech Challenge
Timeline*
Feb 2011 P1 – First Meeting and developing PMAPs
Mar – Apr 2011 P2 – Brainstorming and finalizing PMAPs
May 2011 P3 – Literature Review and Planning
Jun 2011 P4 – Developing content
P5 – Developing Module Goals, Objectives, and
Jul 2011
Milestones
Aug 2011 M1 – Introduction and Getting to Know Google
Sep 2011 M2 – Blogs and Wiki’s Module
Oct 2011 M3 – Spatial Literacy and Online Mapping
Nov 2011 M4 – Online Photo Sharing
Dec 2011 M4 – Social Networks and Online Communities
Jan 2012 A1 – Assessment and Debriefing with Supervisor
18. 18
Map Training to Performance Plans
"Every staff person is required,
as part of their annual
performance review, to do a
certain number of learning
opportunities and sharing
activities. These can be from
large to small, and the credit is
earned by both doing and
sharing."
Sandra Smith, Learning and Development Manager at the Denver Public Library.
23 Things - Commonalities
1. Facilitated learning.
2. Primary web-based resource for information.
3. The “23 Things” timetable announced in advance.
4. Includes reflection & interaction.
5. Each topic has an introductory lead.
6. Combination of face-to-face and online only.
7. Celebration at the end of modules.
8. Voting for favorite activities.
9. Certificate for those completing all 23 Things.
Source (adapted):Yoshikawa & Webber, 2011.
19. 19
23 Things – Original guidelines*
1. Encourage networking and shared learning.
2. Encourage traditional and face-to-face communication.
3. Encourage group discovery.
4. Accommodate non-techies and different learning styles.
5. Focus on discovery, not skill building.
6. Reward staff for learning.
7. Encourage staff to play.
* That we identified with, and would work for us. Source (adapted):Yoshikawa & Webber, 2011.
Learning Dimensions
Self-directed
Use of Own Experience
Sharing and Collaboration
Motivation
Adapted from Smith, M. K. (2002,) "Malcolm Knowles, informal adult education,…
20. 20
RATECH learning objectives
• As much as possible, the modules should be self-
directed.
• Doug & another NIHL staff person available as backup.
• Use personal experiences as a resource for learning.
• Blog about their experiences, mapping through their
lens, photos and networks from their life.
Adapted from Smith, M. K. (2002,) "Malcolm Knowles, informal adult education,…
RATECH learning objectives
• Immediately apply what they learn through exercises,
sharing, and group discussion.
• We had a journal club at the end of each section.
• RA’s had the option to lead each journal club.
• Try to motivate by internal rather than external factors.
• “I feel that I need to be up-to-date to help our patrons.”
Adapted from Smith, M. K. (2002,) "Malcolm Knowles, informal adult education,…
21. 21
RATECH format
Module Assessment
Launch of Learning
Assessment Debriefing
of Module Session
RATECH Modules
Blogs & Wikis
Online images & photo
sharing
23. 23
2012: Integration of Learning
2011: Internal Training
Dimensions of [building] capacity
E-Mediate Day 1: A Networked Mindset To Capacity Building (2011), Beth Kanter.
24. 24
Sharing Content
http://www.delicious.com/joubertd
http://www.scoop.it/t/social-technologies-and-public-health
http://go.usa.gov/v4w
Thank-you
Questions?
Doug Joubert: douglas.joubert@nih.gov
Alicia Livinski: alicia.livinski@nih.gov
DIVISION OF LIBRARY SERVICES
OFFICE OF RESEARCH SERVICES
NATIONAL INSTITUTES OF HEALTH
U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES