Trending Sources

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

Entrepreneurship and flexible security.  notes the article in its opening paragraph.  What should we do?  Work in the Digital Economy. 

Help: why don’t images load in https?

Doc Searls

sure hope there is some way to gang-edit all my posts going back to 2007. Berkman Blogging Harvard Internet problems publishing security

Consulting with Libya in 2007 ? Clay Shirky

Clay Shirky

After Tahrir: Protecting US Muslims from Bigotry » Consulting with Libya in 2007. Over the weekend, Evgeny Morozov asked about my consulting with the Libyan government in 2007. 23 Responses to “Consulting with Libya in 2007” Franky says: March 24, 2011 at 10:35 am. Clay Shirky: Consulting with Libya in 2007.

Wiki 13

Irving Wladawsky-Berger: The Life Cycle of a Business

Irving Wladawsky-Berger

Posted by: Sarah Siegel | April 29, 2007 at 03:28 PM Dear Irving, I am current doing my thesis on IBM's 3D Internet & Virtual Business Opportunity EBO, where the introductory section on business cycles might interest you. The down side (was)a free 60 day “Norton Security Systems” software that is a Nightmare, its complete overkill.

LMS Satisfaction Features and Barriers

Tony Karrer

17 2007 - when their satisfaction score is being reported so low. Update, Nov. Some notes on these numbers. That seems like a disconnect.

Irving Wladawsky-Berger: GIO 3.0 - The 2007 Global Innovation Outlook

Irving Wladawsky-Berger

Similar conversations, focused on Africa and Security and Society will also take place in cities around the world. and GIO 2.0. For GIO 3.0

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? Identity. I see identity management as the real issue that is going to link security and privacy. cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria.

Communication Nation: What do you love?

Dave Gray

11 November 2007 What do you love? This blog is dedicated to that effort. Join the conversation! What do you love? But I do this all the time.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. I got the first phishing email from Citibank, the first bank to be phished. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. I was doing a briefing for the Secret Service. You are not secure. Maybe.

e-Clippings (Learning As Art): 2007 edublog winners announced!

Mark Oehlert

» December 10, 2007 2007 edublog winners announced! Uranium Ore on eBay. Main | Wow.Has it been almost a month?! Lets Talk 2008.

e-Clippings (Learning As Art): 2007 edublog awards are now open for voting.and Im torn

Mark Oehlert

» December 06, 2007 2007 edublog awards are now open for voting.and Im torn Hurry, hurry, step right up and cast your vote!

Harold Jarche » Hockey meets social networking

Harold Jarche

e-Clippings (Learning As Art): Avanoo.a new twist on surveys and collective (or collected?) wisdom

Mark Oehlert

» June 22, 2007 Avanoo.a new twist on surveys and collective (or collected?) and.Should immigrants to the U.S. del.icio.us

e-Clippings (Learning As Art): Reflections from Adaptive Paths UX Week 2007

Mark Oehlert

August 25, 2007 in Conference News , design | Permalink Technorati Tags : Adaptive Path , conferences , design , UXWeek2007 TrackBack TrackBack URL for this entry: [link] Listed below are links to weblogs that reference Reflections from Adaptive Paths UX Week 2007 : Comments The comments to this entry are closed. Total transparency.

Doc Searls Weblog · Maybe they should call it ButtBook

Doc Searls

Pie and Coffee » Items on September 7, 2007 at 12:45 am [.] When will people learn that security through obscurity is not really security?

Doc Searls Weblog · Fiber sales maze

Doc Searls

Plus, stay safe from nasty viruses and spam, and keep your kids safe online with advanced security protection from McAfee®, included free with service.

e-Clippings (Learning As Art): Zone Alarm Listen UP!! This is NOT Customer Service!

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « DevLearn 2007 Update | Main | More DevLearn 2007 Notes: The Great ILS Challenge Results » November 12, 2007 Zone Alarm Listen UP!! RIGHT-click on Uninstall ZoneAlarm Security, then select Properties 04.) Restart your computer.

Irving Wladawsky-Berger: Innovation, Fundamental Research and Universities

Irving Wladawsky-Berger

To the extent we can leverage that knowledge in the applied sphere we can better secure our position in providing value to the global economy.

Communication Nation: Two versions of Googles master plan

Dave Gray

29 October 2007 Two versions of Googles master plan Click the image to see the plan. This blog is dedicated to that effort. 10/29/2007 ????????

Irving Wladawsky-Berger: Hybrid Models of Capitalism

Irving Wladawsky-Berger

Posted by: Jim | December 17, 2007 at 12:13 PM In 1980s, I noticed that many U.S. These are incredibly complex subjects. This is not surprising.

Edge Perspectives with John Hagel: Convergence or Divergence?

John Hagel

Read More] Tracked on September 28, 2007 at 02:19 AM » Which Kind of Security Do You Want? Dont Count On It. Ask five differ.

Irving Wladawsky-Berger: Soft Power, Smart Leadership

Irving Wladawsky-Berger

The Commissions final report will be issued in fall 2007, and will aim to help shape the political debate during the 2008 presidential campaign."

Irving Wladawsky-Berger: A Matter of World Views

Irving Wladawsky-Berger

"We will not succeed simply by military or security means," he says. "It is a political challenge. "Mr. We can always hope

Irving Wladawsky-Berger: The Complex Chemistry between Brands and Customers - Some Personal Experiences

Irving Wladawsky-Berger

link] Posted by: Endre Stølsvik | December 09, 2007 at 12:17 PM Verify your Comment Previewing your Comment Posted by: | This is only a preview.

Irving Wladawsky-Berger: Welcome to Adam Smiths World

Irving Wladawsky-Berger

Does IBM worry about the job security of the Lotus Smartsuite service team ? Then everything changed. Welcome to Adam Smiths world. Sharing ?

Irving Wladawsky-Berger: Talent, Innovation and Competitiveness

Irving Wladawsky-Berger

Strengthening all education - and in particular graduate education - is key to a prosperous and secure future. Your comment could not be posted.

Conference Networking Tools - Do They Work?

Tony Karrer

I just saw a post by Mark Oehlert - Good for introNetworks! - in which he points to introNetworks Secures $2.7 Million in Series A Funding.

Groups vs Networks: The Class Struggle Continues

Stephen Downes: Half an Hour

And I know there are good reasons for that and I know there’s security and all of that, but you know, I mean security is like walls.

Irving Wladawsky-Berger: The Web and the Long, "Soft" War

Irving Wladawsky-Berger

The issues around security and privacy are daunting. The Highlands Forum was organized in 1994 by retired US Navy captain Dick ONeill.

Edge Perspectives with John Hagel: Blindness to the Deep Structures of Globalization

John Hagel

Posted by: Hank Heath | August 23, 2007 at 03:54 PM The manufacturing guys at Evolving Excellence also commented on your article.

e-Clippings (Learning As Art): Must-have Firefox Entensions and Fixes

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « me.dium | Main | Learning Styles and Visualization » August 07, 2007 Must-have Firefox Entensions and Fixes Everybody knows that the entire staff here at e-Clippings World Headquarters uses Firefox. I run mine off my U3 USB drive. del.icio.us

Thoughts on my ASTD TK07 Sessions - Social Bookmarking and Blogging

Tony Karrer

Many people were very concerned about issues of regulating the quality of content and security. think people really saw the potential.

Facebook Enterprise Application

Tony Karrer

WorkBook combines all the capabilities of Facebook with all the controls of a corporate environment, including integration with existing enterprise security services and information sources.

Really Simple People

Stephen Downes: Half an Hour

Posted to the social-network-portability mailing list, December 14, 2007. We want to be ale to do a lot, and do do it reliably and securely. Don't make the tightly secured athenbtication required etc etc version the default. But no data should ever be rejected because it doesn't fit into the model. Seconded. Anyhow, end of rant.

RSS 2

e-Clippings (Learning As Art): Heading Home from I/ITSEC 2007

Mark Oehlert

November 29, 2007 in Conference News | Permalink Technorati Tags : conference , DOD , IITSEC TrackBack TrackBack URL for this entry: [link] Listed below are links to weblogs that reference Heading Home from I/ITSEC 2007 : Comments The comments to this entry are closed. See why we call it IITSEC? This is essentially everyone in the U.S.

stevenberlinjohnson.com: Apple Opens Up

Steven Berlin Johnson

October 18, 2007 in Interface | Permalink TrackBack TrackBack URL for this entry: [link] Listed below are links to weblogs that reference Apple Opens Up : Comments i'm still skeptical of apple opening up their platform, even after this announcement from jobs. Posted by: Answer | October 18, 2007 at 10:52 AM iPhone released in late summer.

Doc Searls Weblog · Making Rules, II

Doc Searls

Doc Searls Weblog Home About Subscribe to feed ‹ Time to write our own rules • Live lunch › Making Rules, II November 26, 2007 in Berkman , Blogging , Business , Future , Ideas , Journalism , Life , News , Past , VRM , problems | 15 comments So many comments , so little time. have to run to a bus in the rain shortly. Later.]

What Are You, Who Are You, And How Do You Know?

Stephen Downes: Half an Hour

Interesting to observe differing attitudes toward privacy and security. Different countries have different rules regarding privacy and security. Privacy and security run right though economic theory, and this is where game theory comes in. Privacy, security, trust, etc., That said. 1. But also - they push crime indoors.

Simple Ethics

Stephen Downes: Half an Hour

One argument for such a rule is that people require security in order to be able to function in a society. The possibility of torture, however slight, undermines that sense of security, with enormous consequences to society as a whole. Responding to Keith Burgess-Jackson, The Logic of Torture. That's why it appears so subjective.

PHI Meets PST: A PST Framework for Personal Health Information

Stephen Downes: Half an Hour

Security Defined The main point: the confidentiality, integrity and availability of the data. Security in PHI Everybody recognizes that PHI is probably the most sensitive information you can hold about a person. We need to shift from the old notion of computer security and move to health informatics. genetic coding. Is it?