Trending Sources

Designing outside your comfort zone

Adaptive Path

All too often though, many of us find ourselves designing things for people whose situations bare some pretty strong similarities to our own.

Design 117

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The attacker has the advantage.

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. All experiments must be designed as safe-to-fail. ” @flowchainsensei.

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

In this paper I would like to address the core design elements in the development of a personal learning architecture being developed in the National Research Council''s Learning and Performance Support Systems program. The NRC-designed MOOC differs significantly from traditional courses. Engagement is at the core of cMOOC learning.

The initial design influences everything else

Harold Jarche

Actually, it’s the Architect, because the initial design influences everything else. How is security portrayed?

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. It's complicated.

Why models matter

Clark Quinn

If we understand the structure of a cyber system, we can anticipate security threats. Consequently, it’s also one of the things I push as a key improvement to learning design. It’s a good basis for design, for problem-solving, and for learning. design meta-learning strategy That was then, this is now.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Why wasn’t stronger security designed into the original Internet protocols? The book is organized into three main sections. Period.

From Farm to Phone to Table: Sprig comes to the Service Experience Conference

Adaptive Path

We got his non-designer take on the importance of service experience and where he sees a need for service design in the future.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. You are not secure. Web designers and coders, they're not doing anything about it. It is important that you know why I am so trustworthy. Maybe.

Design a Superhero

Adaptive Path

Experiment #1: You are designing the superhero of _travel. In this experiment, I asked a fellow design researcher who loves to travel to help me design the Superhero of Travel. Super-powered magnet automatically removes all metal before security. Experiment #2: You are designing the superhero of _ baseball fandom _.

What happens when the home of the future crashes?

Ross Dawson

This is a point that was addressed in my report for Intel Security on Safeguarding the Future of Digital Australia in 2025.

Firewalls and Security in Software as a Service

Tony Karrer

The other big hurdle is the question of security. Generally, I think you will find that hosts provide fairly reasonable control, but you will want to check into their security approach. The security issue not new. The advice from an article in CFO Magazine: Data security. Look at security. That's its job.

Designing to encourage “collaborative consumption”

Adaptive Path

The trick to make collaborative consumption work is experience design. Provide comfortable, secure, healthy, and beautiful environments for residents. I’m curious what a slow experience design movement looks like? What might these be like applied to the design of products, softwares, and service experiences? link].

Levels of learning experience design

Clark Quinn

This is the realm of learning experience design. Learning experience design can, and should, operate at several levels. You want a minimalist approach that combines effective cognitive design with engaging emotional design. Here we are talking deeper instructional design, information mapping, and aligned social media.

All Social is Learning | Organizational Knowledge Design

Martijn Linssen

All Social is Learning | Organizational Knowledge Design [.] With apologies to any of my new Ed friends, please correct me if I heard wrong!)

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Workforce development.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. Who was very professional and as helpful as he could be.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. Who was very professional and as helpful as he could be.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content.

What does the Internet of Everything mean to you?

Harold Jarche

“Cisco believes that many organizations are already experiencing the Internet of Things (IoT)—the networked connection of physical objects.

a workable future

Harold Jarche

full report PDF ). Combine the best of investor-owned and commons-based platform models. Solve for both transparency and privacy.

The Growing Importance of Storytelling in the Business World

Irving Wladawsky-Berger

Let me know discuss the use of blockchain technologies for enhancing the overall security and efficiency of our transactional systems.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

These include social security ID, passport number, driver’s license number, e-mail address, telephone numbers, and login IDs and passwords.

Data 42

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Enjoy EUR200 off the course fees if you sign up before 8 August 2014. SenseMaker® is a highly innovative technique to gain insights and support decisions in complex spaces. Amsterdam, 16 and 17 September 2014.

Learning Technologies UK wrap-up

Clark Quinn

There was also a nice session on mobile, with some principles presented and then an interesting case study using iPads under somewhat severe(military) constraints on security. design games meta-learning mobile social technologyI’ve already covered Roger Schank ‘s keynote , but I want to pick up on a couple of other things.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. This proved to be very true. My folders. Again.

Engaged for work

Harold Jarche

Human creative work is not just art, design, and the like, but includes making valuable things for a specific context, need, or market.

Akilah Institute for Women: Social Media Workshop

Beth Kanter

Training DesignAkilah workshop. View more presentations from Beth Kanter. I worked with 39 young women between the ages of 18-30.

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. The hardware and software were generally designed separately and not tuned to each other.

Blockchains: the Promise of More Frictionless, Trusted Economies

Irving Wladawsky-Berger

Why wasn’t stronger security designed into the original Internet infrastructure? Foremost among them is security. The result?

Waking up.

Martijn Linssen

For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems. I think we are waking up.

Coherent Implications

Clark Quinn

You get security concerns here, but you need to find a balance, or you’re cutting off half of the organizational brain! strategy social

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

To overcome these major challenges we must fundamentally rethink the IoT’s technology strategies, business models and overall designs.

New Adaptive Path Event—Designing Experiences: Financial Services in a Connected Age

Adaptive Path

Our first pop-up is Designing Experiences: Financial Services in a Connected Age. Since the mid-90s, banks and investment brokerages realized that they needed to make their customers feel extremely secure about how their money was being handled, and that a solid user experience was crucial in doing this. Why financial services?

Transforming the Nighttime Experience for Homeless Children, One Tote Bag at a Time

Adaptive Path

Homelessness is a condition that affects 1.5 million people in the United States each year. 1 in 30 children will experience homelessness every year.

The Future of Work and Learning 2: Chatbots

Jane Hart

Why chatbots? First a bit of background: two things have happened recently that are considered to be big turning points. alerts, reminders, etc).

the network era trinity

Harold Jarche

This reverses the existing practice of corporate training that is designed centrally and distributed through the hierarchy. Awareness. Action.

Reflections from Arts Leaders Workshop: Resilient Leaders from the Inside/Out

Beth Kanter

Relationships, feelings and personal security are important to Amiable Style people. The first session focused on self-awareness skills.