Trending Sources

Owning our data

Harold Jarche

With the internet of everything (IoE), once everything is connected, where will our data reside? Do you own your data?

Data 101

cooperation, measurement, security and more

Harold Jarche

Constant, short, safe-to-fail experiments that give us empirical data on what works. call these Friday’s Finds. ” #crapdetection.

New Tools Beget Revolutions: Big Data and the 21st Century Information-based Society

Irving Wladawsky-Berger

While a number of transformative technologies were discussed, big data was the most prominent.    .

Data 55

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

For several years now, big data has been one of the hottest topics in the IT industry.  But, what do we mean by big data

Data 93

Noam Chomsky, security, and equivocal information

David Weinberger

Noam Chomsky and Barton Gellman were interviewed at the Engaging Big Data conference put on by MIT’s Senseable City Lab on Nov. That’s why you should be extremely cautious when you hear an appeal to security. security folks say they are spying on us for our own security, are they saying literally nothing? ”

Who Owns Your Data?

Ellen Wagner

Who actually owns your data?  At first the answer to this question may seem obvious - of COURSE we own our personal health records, education records, financial records. . Data ownership presumes use rights, who can share what, with whom. What But data sharing according to what? It is data anarchy out there. Not even us.

Anticipating the Future of the IT Industry

Irving Wladawsky-Berger

Data Centers → Cloud. Data Analysis → Data Science, Cognitive, AI.

Rethinking Personal Data

Irving Wladawsky-Berger

In 2010, the World Economic Forum (WEF), launched a project on Rethinking Personal Data.  The report’s overall point of view is that personal data is a new asset class touching all aspects of society.  It is potentially as valuable a resource in the 21st century as heavily traded physical goods like oil have been in the past hundred years. 

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society.

Tips 55

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

Many of the previously distributed servers were consolidated in data centers.  . The total number of users rose to 100s of millions.  .

Data 122

The Economic Potential of The Internet of Things

Irving Wladawsky-Berger

Home - Energy management, security, safety, and automation of home chores. Privacy, Security, Confidentiality and IP.  Interoperability. 

Attention Data Nerds: The Mobile Mindset Study and More

Beth Kanter

Source: Mobile Mindset Study. do not go for more than one hour without checking their devices. We constantly connect. Our connection never sleeps.

Study 53

Reality mining, pervasive data capture, and how Big Data can create value

Ross Dawson

CIO magazine did a nice article titled IIIS: Big Data driving new trends which reviews my keynote and the one immediately after from Steve Duplessie , one of the world’s top analysts on data and storage. You can literally get terabytes of data out of just a few hours of this. This goes alongside the ‘reputation economy’.

[liveblog] Noam Chomsky and Bart Gellman at Engaging Data

David Weinberger

I’m at the Engaging Data 2013 conference where Noam Chomsky and Pulitzer Prize winner (twice!) Barton Gellman are going to talk about Big Data in the Snowden Age, moderated by Ludwig Siegele of the Economist. The conference aims at having us rethink how we use Big Data and how it’s used. NC: Big data is very useful.

Data 35

The Future of Financial Services

Irving Wladawsky-Berger

Smart mobile devices, broadband wireless networks, cloud-based services and big data are now ushering the next major phase in the evolution of FS. 

Data 77

Shaping the Future of the Internet

Irving Wladawsky-Berger

Fundamentally, the Internet is a general purpose data network supporting a remarkable variety of applications. Actionable Data.

The New Era of Smart, Connected Products

Irving Wladawsky-Berger

Massive amounts of new product-usage data enable many of those improvements.”  Should the company pursue an open or closed system?; .

Unlocking Data for Philanthropy: Notes from Global Philanthropy Forum Session

Beth Kanter

went to cover one session,   “ Building An Information Infrastructure:  Unlocking Data for Philanthropy.” Notes from Session.

Data 18

The Firm as a Large, Complex, Extended Family

Irving Wladawsky-Berger

Complex Systems Data Science and Big Data Economic Issues Education and Talent Management and Leadership Political Issues Society and Culture

The Digital Evolution Index

Irving Wladawsky-Berger

The report includes a number of insights based on the digital evolution data and the distinct patterns of each evolution zone.  .

How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?

Irving Wladawsky-Berger

These smart products and systems tend to be software-intensive, people-centric, and data-driven.  Why aren’t they simpler?  Cyberattacks. 

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

assets , which can be tangible, e.g., cars, buildings, smartphones; or intangible, e.g., patents, software, data sets. What is identity?

2
2

[liveblog] Data & Technology in Government

David Weinberger

DJ Patil, the first US Chief Data Science, five days into his tenure. Lynn Overmann – Deputy Chief Data Officer, US Dept. ” The velocity is the support of the President who deeply believes in open data and technology. Data scientists are force multipliers. How do we share data better? of Commerce.

From Mass Production to Mass Individualism

Irving Wladawsky-Berger

One is to gather so much data about your customers that you come to know them in a borderline-creepy automated way—that is the M.O.

An Old Friend, - the IBM Mainframe, - Turns 50

Irving Wladawsky-Berger

Moreover, these mission critical applications require the highest degrees of security, availability, systems management and other so-called ilities.

Data 68

The Promise and Challenges of Health Analytics

Irving Wladawsky-Berger

On February 24 I attended a workshop in MIT on the Future of Health Analytics.  What are phenotypes?  How can that be? 

A Kind of Digital “Perfect Storm”

Irving Wladawsky-Berger

Data science applications are starting to get deployed, although we are just beginning to appreciate  their profound implications.

International Organizations and Social Media: News, Engagement, and Social Data for Policy Change

Beth Kanter

Social Media Data and Public Policy. Social Media generates a lot of data or what some have called “ ambient social data.”

Cloud Computing and the Changing Role of the CIO

Irving Wladawsky-Berger

Who is ultimately responsible for the security of the data in question?  CIOs are indeed embracing cloud, but they are being cautious. 

What I Learned From @nancylublin About #dataonpurpose

Beth Kanter

was all about data.   Data was everywhere and it was important to use. Shortly after, they hired a second data scientist, Jeffrey Blandt.  

Leveraging the Passions of Fans

Irving Wladawsky-Berger

The analysis of all that data was then used to develop a new framework to better understand the behaviors and motivations of World Cup fans.

The Data Center in the Cambrian Age

Irving Wladawsky-Berger

And, at the other end of the spectrum, we are seeing the data center itself, whose roots go back to the earliest days of computers, being completely reinvented as well. To help us explore this question, let's look at the evolution of data centers over time. Security is also critical, so few people can get near the actual machines. 

Data, Data Everywhere

George Siemens

Managed well, the data can be used to unlock new sources of economic value, provide fresh insights into science and hold governments to account. Moreover, ensuring data security and protecting privacy is becoming harder as the information multiplies and is shared ever more widely around the world.

The Citi-Imperial Digital Money Readiness Index

Irving Wladawsky-Berger

On January 29 I attended the 2014 Digital Money Symposium in London, co-sponsored by Citi and Imperial College.  What Matters?

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Data breaches: we are concerned not just about the breaches, but also data quality. We need to make sure data is accurate. An organization has clients, which give them data. As more clients are added, and through marketing and other activities, the organization has a great deal of data. Security is not convenient.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. Hackers can use data input, eg. In the U.S.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Fundamentally , the Internet is a general purpose data network supporting a remarkable variety of applications. Period.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? Identity. I see identity management as the real issue that is going to link security and privacy. cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. I got the first phishing email from Citibank, the first bank to be phished. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. I was doing a briefing for the Secret Service. You are not secure. Maybe.

Firewalls and Security in Software as a Service

Tony Karrer

The other big hurdle is the question of security. Generally, I think you will find that hosts provide fairly reasonable control, but you will want to check into their security approach. The security issue not new. The advice from an article in CFO Magazine: Data security. Look at security. That's its job.