Trending Sources

Designing outside your comfort zone

Adaptive Path

All too often though, many of us find ourselves designing things for people whose situations bare some pretty strong similarities to our own.

Design 120

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. All experiments must be designed as safe-to-fail. ” @flowchainsensei.

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

In this paper I would like to address the core design elements in the development of a personal learning architecture being developed in the National Research Council''s Learning and Performance Support Systems program. The NRC-designed MOOC differs significantly from traditional courses. Engagement is at the core of cMOOC learning.

The initial design influences everything else

Harold Jarche

Actually, it’s the Architect, because the initial design influences everything else. How is security portrayed?

Mission Bicycle and Adaptive Path: Experience Design in Retail

Adaptive Path

Zack had plans for the shop’s interior design, but the experience of the retail environment was still missing. The only hook?

All Social is Learning | Organizational Knowledge Design

Martijn Linssen

All Social is Learning | Organizational Knowledge Design [.] With apologies to any of my new Ed friends, please correct me if I heard wrong!)

What happens when the home of the future crashes?

Ross Dawson

This is a point that was addressed in my report for Intel Security on Safeguarding the Future of Digital Australia in 2025.

Thoughts on privacy

Doc Searls

Another speaker was  Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Some examples: Privacy by Design  is a policy and code development movement led by  Ann Cavoukian , the Information & Privacy Commissioner of Ontario.

News 110

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. ATM fraude is an example.

Why models matter

Clark Quinn

Consequently, it’s also one  of the things I push as a key improvement to learning design. It’s a good basis for design, for problem-solving, and for learning. design meta-learning strategy It was only at the top level where you used the basic principles of business to run your organization.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Blockchain Revolution , his 16th book, now explains “How The Blockchain Will Transform Everything From Banking To Government To Our Identities.”.

From Farm to Phone to Table: Sprig comes to the Service Experience Conference

Adaptive Path

We got his non-designer take on the importance of service experience and where he sees a need for service design in the future.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. I got the first phishing email from Citibank, the first bank to be phished. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. I was doing a briefing for the Secret Service. You are not secure. Maybe.

Firewalls and Security in Software as a Service

Tony Karrer

The other big hurdle is the question of security. Generally, I think you will find that hosts provide fairly reasonable control, but you will want to check into their security approach. The security issue not new. The advice from an article in CFO Magazine: Data security. Look at security. That's its job.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Enjoy EUR200 off the course fees if you sign up before 8 August 2014. SenseMaker® is a highly innovative technique to gain insights and support decisions in complex spaces. Amsterdam, 16 and 17 September 2014.

Designing to encourage “collaborative consumption”

Adaptive Path

The trick to make collaborative consumption work is experience design. Provide comfortable, secure, healthy, and beautiful environments for residents. 5. What might these be like applied to the design of products, softwares, and service experiences? Tags: Conversations Experience Strategy Service Design link].

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Workforce development.

Data 73

Levels of learning experience design

Clark Quinn

This is the realm of learning experience design. Learning experience design can, and should, operate at several levels. You want a minimalist approach that combines effective cognitive design with engaging emotional design. Here we are talking deeper instructional design, information mapping, and aligned social media.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014.

What does the Internet of Everything mean to you?

Harold Jarche

“Cisco believes that many organizations are already experiencing the Internet of Things (IoT)—the networked connection of physical objects.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. Who was very professional and as helpful as he could be.

Reflections from Arts Leaders Workshop: Resilient Leaders from the Inside/Out

Beth Kanter

Relationships, feelings and personal security are important to Amiable Style people. The first session focused on self-awareness skills.

Shaping the Future of the Internet

Irving Wladawsky-Berger

What design choices have led to the Internet as we know it? The Internet was born in 1983,” write Benkler and Clark in the Introduction.

Data 51

Engaged for work

Harold Jarche

Human creative work is not just art, design, and the like, but includes making valuable things for a specific context, need, or market.

Learning Technologies UK wrap-up

Clark Quinn

There was also a nice session on mobile, with some principles presented and then an interesting case study using iPads under somewhat severe(military) constraints on security. design games meta-learning mobile social technologyOverall, however, the conference was a success: good thinking (more below), good people, and well organized.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. This proved to be very true. My folders. Again.

Akilah Institute for Women: Social Media Workshop

Beth Kanter

Training DesignAkilah workshop. View more presentations from Beth Kanter. worked with 39 young women between the ages of 18-30. Civil Society 2.0

Coherent Implications

Clark Quinn

You get security concerns here, but you need to find a balance, or you’re cutting off half of the organizational brain! strategy social

Transforming the Nighttime Experience for Homeless Children, One Tote Bag at a Time

Adaptive Path

Homelessness is a condition that affects 1.5 million people in the United States each year.

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

At the end of August, IBM announced the latest member of its mainframe family, the zEnterprise EC12.  As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. 

The Future of Work and Learning 2: Chatbots

Jane Hart

Why chatbots? First a bit of background: two things have happened recently that are considered to be big turning points. alerts, reminders, etc).

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society.

Data 55

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

To overcome these major challenges we must fundamentally rethink the IoT’s technology strategies, business models and overall designs

Data 122

New Adaptive Path Event—Designing Experiences: Financial Services in a Connected Age

Adaptive Path

Our first pop-up is Designing Experiences: Financial Services in a Connected Age. Since the mid-90s, banks and investment brokerages realized that they needed to make their customers feel extremely secure about how their money was being handled, and that a solid user experience was crucial in doing this. Why financial services?

The Long Term Impact of AI on Jobs - Some Lessons from History

Irving Wladawsky-Berger

The concerns surrounding AI’s long term impact may well be in a class by themselves.  What impact will AI have on jobs? How should we respond? 

Issues 135

Waking up.

Martijn Linssen

For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems. I think we are waking up.

the network era trinity

Harold Jarche

This reverses the existing practice of corporate training that is designed centrally and distributed through the hierarchy. Awareness. Action.

Social Media Planning and Evaluation for NGOs | Full Circle Associates

Nancy White

Part of this work has been to  comb through resources and create some launch pads that are relevant to NGOs and non profits. Keep what is working.

The Blockchain and Open Innovation

Irving Wladawsky-Berger

Transformational innovations don’t always play out as originally envisioned. Once in the marketplace, they seem to acquire a life of their own.