Trending Sources

cooperation, measurement, security and more

Harold Jarche

Constant, short, safe-to-fail experiments that give us empirical data on what works. call these Friday’s Finds. ” #crapdetection.

Open, Collaborative Trust Frameworks

Irving Wladawsky-Berger

For example, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was launched by the White House earlier this year to enable “Individuals and organizations [to] utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.”

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

For several years now, big data has been one of the hottest topics in the IT industry.  But, what do we mean by big data

Data 80

Rethinking Personal Data

Irving Wladawsky-Berger

In 2010, the World Economic Forum (WEF), launched a project on Rethinking Personal Data.  The report’s overall point of view is that personal data is a new asset class touching all aspects of society.  It is potentially as valuable a resource in the 21st century as heavily traded physical goods like oil have been in the past hundred years. 

Data 31

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Workforce development.

Unlocking Data for Philanthropy: Notes from Global Philanthropy Forum Session

Beth Kanter

went to cover one session,   “ Building An Information Infrastructure:  Unlocking Data for Philanthropy.” Notes from Session.

Data 19

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society.

Tips 31

International Organizations and Social Media: News, Engagement, and Social Data for Policy Change

Beth Kanter

Social Media Data and Public Policy. Social Media generates a lot of data or what some have called “ ambient social data.”

From Mass Production to Mass Individualism

Irving Wladawsky-Berger

The collaborative economy represents the evolution of the social media era.  First is middle-class stagnation.  Trust was face to face.

How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?

Irving Wladawsky-Berger

These smart products and systems tend to be software-intensive, people-centric, and data-driven.  Why aren’t they simpler?  Cyberattacks. 

The Digital Evolution Index

Irving Wladawsky-Berger

The report includes a number of insights based on the digital evolution data and the distinct patterns of each evolution zone.  .

Shaping the Future of the Internet

Irving Wladawsky-Berger

Fundamentally, the Internet is a general purpose data network supporting a remarkable variety of applications. Actionable Data.

The Promise and Challenges of Health Analytics

Irving Wladawsky-Berger

On February 24 I attended a workshop in MIT on the Future of Health Analytics.  What are phenotypes?  How can that be? 

Leveraging the Passions of Fans

Irving Wladawsky-Berger

The analysis of all that data was then used to develop a new framework to better understand the behaviors and motivations of World Cup fans.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Fundamentally , the Internet is a general purpose data network supporting a remarkable variety of applications. Period.

Reflections from 2011 – A World Without Email – The Documentary

Luis Suarez

Collaboration Communities Enterprise2.0 Please do not feel obliged to read through it all, if you wouldn’t want to. Are you ready? etc.).

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

David Townsend New knowledge is best created in collaborative environments. The key question is whether government and industry can collaborate successfully in a complex regulatory environment. The challenge is how to minimize the privacy and security risk without compromising health care. Hackers can use data input, eg.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? Identity. I see identity management as the real issue that is going to link security and privacy. cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria.

Firewalls and Security in Software as a Service

Tony Karrer

One of the interesting outcomes of my recent course - Collaborative Learning Using Web 2.0 The other big hurdle is the question of security. Generally, I think you will find that hosts provide fairly reasonable control, but you will want to check into their security approach. The security issue not new. Look at security.

Tear the walls down: Jericho and the future of enterprise tech

Ross Dawson

As Jericho Forum puts it: The huge explosion in business collaboration and commerce on the Web means that today’s traditional approaches to securing a network boundary are at best flawed, and at worst ineffective. The forum believes responding to the challenges of de-perimeterization must be central to all IT security strategies.

Coherent Implications

Clark Quinn

At the work team level, you want people to be able to communicate with one another effectively, and collaborate to find answers.

I Know It When I See It

Andy McAfee

Established vendors of collaboration software are modifying their offerings and repositioning them as social software platforms that have all the features and functions necessary to support the new modes of interacting and getting work done. –  are just windowdressing on products that are still essentially geared for Collaboration 1.0.

Launch of the Transformation of Government framework

Ross Dawson

Security. Data and storage. Collaborative organizations. Below are key elements of the framework. CONTEXT. Constraints. Bandwidth.

The Fourth Industrial Revolution

Irving Wladawsky-Berger

Most everyone agrees that there was a major qualitative distinction between the First and Second Industrial Revolutions.  Impact on Business.

What's the Future of Jobs?

John Hagel

Sure, data analysts are in hot demand now, but how long will it be before artificial intelligence automates much of this activity? But we will likely be able to create a comfortable living for ourselves, our families and perhaps a few other trusted collaborators. Is STEM our future? Today, I want to be a contrarian. Work versus jobs.

The Blockchain and Open Innovation

Irving Wladawsky-Berger

Transformational innovations don’t always play out as originally envisioned. Once in the marketplace, they seem to acquire a life of their own.

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

This program builds on the National Research Council''s deep connection to the e-learning industry, including collaboration and commercialization across the sector. But more is involved than merely storing data; resources must be secured, backed up, authenticated and synchronized. Engagement is at the core of cMOOC learning.

Can We Truly Be Happy At Work?

Dan Pontefract

” If you stop and think about it, the various data points actually makes a lot of sense. Can we truly be ‘ happy ‘ at work?

Why Blockchains Could Transform How the Economy Works

Irving Wladawsky-Berger

Starting over 50 years ago, institutions have been transforming their paper-based ledgers into highly sophisticated IT applications and data bases. 

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

three stages: observation, manipulation, data What''s available (in NANSLO) - 7 major pieces of apparatus (titration, photosynthesis, gas chromatograph, helholtz coil, airtrack, absorbance spectrometer, microscope) - 30 lab activities - Guided-inquiry based procedures Q: any linkages to eg. the Macbook, Android - web-based applications, eg.

On the Complex Evolution toward Mobile Digital Payments

Irving Wladawsky-Berger

On September 9, Apple announced Apple Pay , an easy, secure way to make mobile payments using their latest devices , - the iPhone 6’s and Apple Watch. 

The Only Person Who Behaves Sensibly Is My Tailor

Charles Jennings

To take an example from the ATD data, the annual report itemises ‘hours per year on ‘learning’ (which means ‘hours per year on training).

Is the cloud hastening the demise of the LMS?

Dawn of Learning

This specification provides a way for courses running in IMS-conformant Learning Management systems to securely access remote content, tools and services, and receive back user’s results. And each of these remote services communicate user interaction data back to the LMS that can be used to contribute to a grade. The Cloud learning

Digital Common Law

Irving Wladawsky-Berger

On May 30 and 31 I attended a meeting in Washington, the Rights and Bytes: Law and Big Data Workshop. They must be formalized and codified into computable algorithms whose performance can continuously improve by leveraging advances in technology, software and algorithms, as well as Big Data and machine learning.  Is this even feasible? 

The Science of Cities

Irving Wladawsky-Berger

Just about all the critical infrastructures and institutions of society come together in a metropolitan area, including transportation, energy, healthcare, commerce, finance, education, security, entertainment, food, water and on and on and on.  These large volumes and varieties of information will likely include personal data

Cloud and “Game Changing” Business Innovation

Irving Wladawsky-Berger

ecosystem connectivity - bring together disparate groups of people, thus facilitating external collaborations with partners and customers.  . Over the past couple of years, the company made the decision to migrate its web site and streaming service from a traditional data center to a cloud environment, - Amazon Web Services. 

The 2016 Look at the Future of Online Learning

Stephen Downes: Half an Hour

In my own work, I am trying to develop systems where the exchange of information - whether they be performance results, test results, environment and infrastructure, or any other personal data, is genuinely voluntary and based on a fair exchange for services, not denial of employment, insurance, or other necessities for life. 5. Fair enough.

Seven Ways Your Organization can Put Privacy Into Practice – and Why

Beth Kanter

Along with that goal is an obligation to raise awareness of the ways in which we’re using the data provided to us by our fans and friends.

The importance of faculty in the higher education experience

Stephen Downes: Half an Hour

We engage in online discussions, conferencing, and collaborative authoring. And on the other hand, looking at overarching competencies like digital literacies such as critical thinking or collaborative decision-making. This is a type of encryption that is used to secure digital currencies. Presentation page. 1. For example.

eLearning Conferences 2013

Tony Karrer

link] December 3-7, 2012 Computer Security Applications Conference , 28 th , annual, Orlando, Florida, USA. Clayton R. Mlýn , Czech Republic.