JISC Gaining Business Intelligence from User Activity Data

28
Abundance is nothing to be scared of But beware a world of endless abstractions

description

 

Transcript of JISC Gaining Business Intelligence from User Activity Data

Page 1: JISC Gaining Business Intelligence from User Activity Data

Abundance is nothing to be scared ofBut beware a world of endless abstractions

Page 2: JISC Gaining Business Intelligence from User Activity Data

The net is making discovery an even more anarchic and rich activity than it’s ever been before.

Page 3: JISC Gaining Business Intelligence from User Activity Data
Page 4: JISC Gaining Business Intelligence from User Activity Data
Page 5: JISC Gaining Business Intelligence from User Activity Data

© Mendeley

Page 6: JISC Gaining Business Intelligence from User Activity Data
Page 7: JISC Gaining Business Intelligence from User Activity Data

Robin Sloan/Matt Thompsonrobinsloan.com/epic

Creative Commons licence

Page 8: JISC Gaining Business Intelligence from User Activity Data
Page 9: JISC Gaining Business Intelligence from User Activity Data

Clever rhyme

Guitar solo Intricate arrangement

Page 10: JISC Gaining Business Intelligence from User Activity Data

“My favourite music is the music I haven’t yet heard”

John Cage

© William Gedney

Page 11: JISC Gaining Business Intelligence from User Activity Data
Page 12: JISC Gaining Business Intelligence from User Activity Data
Page 13: JISC Gaining Business Intelligence from User Activity Data
Page 14: JISC Gaining Business Intelligence from User Activity Data
Page 15: JISC Gaining Business Intelligence from User Activity Data
Page 16: JISC Gaining Business Intelligence from User Activity Data
Page 17: JISC Gaining Business Intelligence from User Activity Data
Page 18: JISC Gaining Business Intelligence from User Activity Data
Page 19: JISC Gaining Business Intelligence from User Activity Data

“The earth is seethingwith incoherent power andunorganised intelligence”

John Buchan

Page 20: JISC Gaining Business Intelligence from User Activity Data
Page 21: JISC Gaining Business Intelligence from User Activity Data

Jennings’ Law:

People make most of their

discoveries elsewhere.

Page 22: JISC Gaining Business Intelligence from User Activity Data
Page 23: JISC Gaining Business Intelligence from User Activity Data
Page 24: JISC Gaining Business Intelligence from User Activity Data

Rock’n’RollSpirit

NetPlatform & processing

BlogsFlesh

Page 25: JISC Gaining Business Intelligence from User Activity Data

source: Ross Dawson (2007)www.futureexploration.net

Page 26: JISC Gaining Business Intelligence from User Activity Data

Photo: John Hartnup, www.flickr.com/people/hartnupj licensed under creative commons

Page 27: JISC Gaining Business Intelligence from User Activity Data

The world we inhabit is abundant beyond our wildest imagination. There are trees, dreams, sunrises; there are thunderstorms, shadows, rivers; there are wars, flea bites, love affairs; there are the lives of people, Gods, entire galaxies. The simplest human action varies from one person and occasion to the next…

Only a tiny fragment of this abundance affects our minds. This is a blessing, not a drawback. A superconscious organism would not be superwise, it would be paralyzed.

Page 28: JISC Gaining Business Intelligence from User Activity Data

You’ve gotta feel it in your blood and in your guts! If you wanna rock, you gotta break the rules. You gotta get mad at the man! And right now, I’m the man. That’s right, I’m the man, and who’s got the guts to tell me off? Huh? Who’s gonna tell me off?