Trending Sources

Designing outside your comfort zone

Adaptive Path

All too often though, many of us find ourselves designing things for people whose situations bare some pretty strong similarities to our own.

Design 117

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. All experiments must be designed as safe-to-fail. ” @flowchainsensei.

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

In this paper I would like to address the core design elements in the development of a personal learning architecture being developed in the National Research Council''s Learning and Performance Support Systems program. The NRC-designed MOOC differs significantly from traditional courses. Engagement is at the core of cMOOC learning.

The initial design influences everything else

Harold Jarche

Actually, it’s the Architect, because the initial design influences everything else. How is security portrayed?

Complexity and Design in Warfare

Irving Wladawsky-Berger

On March 11 I participated in a workshop in Washington, - Design Unbound , - organized by The Highlands Forum.  Some of the areas explored by the Forum are emerging technologies, organizational development, economic competition, and the changing concept of securityDesigning.  Armed Forces.  CACD [the U.S. Engineering. 

Why models matter

Clark Quinn

Consequently, it’s also one  of the things I push as a key improvement to learning design. It’s a good basis for design, for problem-solving, and for learning. design meta-learning strategy It was only at the top level where you used the basic principles of business to run your organization.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Blockchain Revolution , his 16th book, now explains “How The Blockchain Will Transform Everything From Banking To Government To Our Identities.”.

From Farm to Phone to Table: Sprig comes to the Service Experience Conference

Adaptive Path

We got his non-designer take on the importance of service experience and where he sees a need for service design in the future.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. I got the first phishing email from Citibank, the first bank to be phished. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. I was doing a briefing for the Secret Service. You are not secure. Maybe.

What happens when the home of the future crashes?

Ross Dawson

This is a point that was addressed in my report for Intel Security on Safeguarding the Future of Digital Australia in 2025.

Firewalls and Security in Software as a Service

Tony Karrer

The other big hurdle is the question of security. Generally, I think you will find that hosts provide fairly reasonable control, but you will want to check into their security approach. The security issue not new. The advice from an article in CFO Magazine: Data security. Look at security. That's its job.

Design a Superhero

Adaptive Path

Experiment #1: You are designing the superhero of _travel. In this experiment, I asked a fellow design researcher who loves to travel to help me design the Superhero of Travel. Super-powered magnet automatically removes all metal before security. Experiment #2: You are designing the superhero of _ baseball fandom _.

Designing to encourage “collaborative consumption”

Adaptive Path

The trick to make collaborative consumption work is experience design. Provide comfortable, secure, healthy, and beautiful environments for residents. 5. What might these be like applied to the design of products, softwares, and service experiences? Tags: Conversations Experience Strategy Service Design link].

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

These include social security ID, passport number, driver’s license number, e-mail address, telephone numbers, and login IDs and passwords.

Data 46

Levels of learning experience design

Clark Quinn

This is the realm of learning experience design. Learning experience design can, and should, operate at several levels. You want a minimalist approach that combines effective cognitive design with engaging emotional design. Here we are talking deeper instructional design, information mapping, and aligned social media.

All Social is Learning | Organizational Knowledge Design

Martijn Linssen

All Social is Learning | Organizational Knowledge Design [.] With apologies to any of my new Ed friends, please correct me if I heard wrong!)

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014.

a workable future

Harold Jarche

full report PDF ). Combine the best of investor-owned and commons-based platform models. Solve for both transparency and privacy.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. Who was very professional and as helpful as he could be.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. Who was very professional and as helpful as he could be.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Workforce development.

What does the Internet of Everything mean to you?

Harold Jarche

“Cisco believes that many organizations are already experiencing the Internet of Things (IoT)—the networked connection of physical objects.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Enjoy EUR200 off the course fees if you sign up before 8 August 2014. SenseMaker® is a highly innovative technique to gain insights and support decisions in complex spaces. Amsterdam, 16 and 17 September 2014.

Learning Technologies UK wrap-up

Clark Quinn

There was also a nice session on mobile, with some principles presented and then an interesting case study using iPads under somewhat severe(military) constraints on security. design games meta-learning mobile social technologyOverall, however, the conference was a success: good thinking (more below), good people, and well organized.

Blockchains: the Promise of More Frictionless, Trusted Economies

Irving Wladawsky-Berger

Foremost among them is security. Consequently, there’s no one overall owner responsible for security. Why do firms exist? 

Engaged for work

Harold Jarche

Human creative work is not just art, design, and the like, but includes making valuable things for a specific context, need, or market.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. This proved to be very true. My folders. Again.

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

At the end of August, IBM announced the latest member of its mainframe family, the zEnterprise EC12.  As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. 

Akilah Institute for Women: Social Media Workshop

Beth Kanter

Training DesignAkilah workshop. View more presentations from Beth Kanter. worked with 39 young women between the ages of 18-30. Civil Society 2.0

Coherent Implications

Clark Quinn

You get security concerns here, but you need to find a balance, or you’re cutting off half of the organizational brain! strategy social

Waking up.

Martijn Linssen

For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems. I think we are waking up.

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

To overcome these major challenges we must fundamentally rethink the IoT’s technology strategies, business models and overall designs

Data 116

Transforming the Nighttime Experience for Homeless Children, One Tote Bag at a Time

Adaptive Path

Homelessness is a condition that affects 1.5 million people in the United States each year.

New Adaptive Path Event—Designing Experiences: Financial Services in a Connected Age

Adaptive Path

Our first pop-up is Designing Experiences: Financial Services in a Connected Age. Since the mid-90s, banks and investment brokerages realized that they needed to make their customers feel extremely secure about how their money was being handled, and that a solid user experience was crucial in doing this. Why financial services?

The Future of Work and Learning 2: Chatbots

Jane Hart

Why chatbots? First a bit of background: two things have happened recently that are considered to be big turning points. alerts, reminders, etc).

the network era trinity

Harold Jarche

This reverses the existing practice of corporate training that is designed centrally and distributed through the hierarchy. Awareness. Action.

Reflections from Arts Leaders Workshop: Resilient Leaders from the Inside/Out

Beth Kanter

Relationships, feelings and personal security are important to Amiable Style people. The first session focused on self-awareness skills.

Shaping the Future of the Internet

Irving Wladawsky-Berger

What design choices have led to the Internet as we know it? The Internet was born in 1983,” write Benkler and Clark in the Introduction.

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society.

Tips 52