“Flexible Security”: A Sensible Social Policy for our Digital Age
JULY 7, 2015
Entrepreneurship and flexible security. The authors have a very clear answer to this question. What should we do?
The Top Ten Emerging Technologies of 2016
AUGUST 16, 2016
The technologies on the list are not new. Artificial Intelligence. The Internet of Things. Autonomous Vehicles. The Blockchain.
Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle
AUGUST 22, 2016
Blockchain Revolution , his 16th book, now explains “How The Blockchain Will Transform Everything From Banking To Government To Our Identities.”.
Education Technology Strategies - Day One
Stephen Downes: Half an Hour
FEBRUARY 3, 2015
lessons scripted around 1:1 laptop); IT issues - we were a Windows network, with everything on our own domain - we needed to open eg printing etc O - consumer technology far more accessible in 2012 esp. Using technology to find more (vs. Question - Kylie, are you frustrated when you go to the one class with no tech? Which 6?"
Noam Chomsky, security, and equivocal information
NOVEMBER 17, 2013
He reiterated his earlier call for us to understand the NSA surveillance scandal within an historical context that shows that governments always use technology for their own worst purposes. Chomskey said: Governments have been doing this for a century, using the best technology they had. I’m sure Gen. 15 when Prof. ” Prof.
The Long Term Impact of AI on Jobs - Some Lessons from History
JULY 26, 2016
Like no other technology, AI forces us to explore the very boundaries between machines and humans. What impact will AI have on jobs?
Blockchain Can Reshape Financial Services… But it Will Take Significant Time and Investment
SEPTEMBER 19, 2016
Today, multiple technologies poised to drive the next wave of financial services innovation are converging in maturity.” DLT is one such technology.
Blockchains: the Promise of More Frictionless, Trusted Economies
OCTOBER 11, 2016
Foremost among them is security. Consequently, there’s no one overall owner responsible for security. Why do firms exist?
The President’s Commission on Enhancing National Cybersecurity
MAY 23, 2016
The Commission is composed of twelve individuals from the world of business, technology and academia. Today, money is mostly intangible.
Network Era Fluency
JULY 8, 2013
While my personal data may not be that important in the great scheme of things, networked data drive advertising, brands, and security systems.
Anticipating the Future of the IT Industry
MARCH 22, 2016
Computing has constantly changed shape and location - mainly as a result of new technology, but often also because of shifts in demand.”.
The Collapse of Complex Business Models ? Clay Shirky
APRIL 1, 2010
From the Q&A after, it was clear that for them, the question wasn’t whether the internet was going to alter their business, but about the mode and tempo of that alteration. That kind of question comes up a lot. This is, as Tainter notes in his book, an open question. the question “What is emerging?”
The Future of Financial Services
JUNE 23, 2015
Beyond technology, the evolution of FS will be influenced by a variety of economic, social and political factors. Rapid Change/Many Suppliers.
In Honour of Ada Lovelace
OCTOBER 14, 2014
She not only learns from the writing process, she may get a comment or question or two that helps to reinforce the learning. Back to Claire.
Reflections on Bitcoin
FEBRUARY 11, 2014
Complex Systems Digital Money and Payments Economic Issues Innovation Political Issues Society and Culture Technology and Strategy
After Facebook fails
MAY 23, 2012
Making the rounds is The Facebook Fallacy , a killer essay by Michael Wolff in MIT Technology Review. When I first wrote that, I said 2012.
Jobs in the Age of Watson
NOVEMBER 26, 2011
On October 31, I participated in a symposium sponsored by MIT’s Center for Digital Business on The Race Against the Machine: The Future of Technology and Employment. match between Watson , IBM’s question-answering system, three students from the Harvard Business School and three students from MIT’s Sloan School of Management.
More Reflections on SharePoint and Picking Technology | Full Circle Associates
JANUARY 5, 2010
Some of the questions turning in my mind are: * What was MS Sharepoint initially conceived to be? This proved to be very true. My folders.
Security Issues and and Business Opportunities - Panel
Stephen Downes: Half an Hour
JULY 30, 2007
The key question is whether government and industry can collaborate successfully in a complex regulatory environment. We see the 'why do you need that information' question coming from young people - older people are more trusting. The challenge is how to minimize the privacy and security risk without compromising health care.
The New Era of Smart, Connected Products
NOVEMBER 26, 2014
Data strategy : What data must the company capture, secure, and analyze to maximize the value of its offering?; .
Reflections on Linux and Mainframes
SEPTEMBER 1, 2015
Especially, I would add, for those transactions that require the highest degrees of security, availability and data privacy.
Earth to Mozilla: Come back home
APRIL 12, 2014
Google is nearly worthless when shopping for items that don’t involve technology. We need to find our soul and our spirit.” Stop it.
The Untethered, Hyperconnected Enterprise
JUNE 8, 2012
But lots of questions remain as to what those implications might be. Top down strategy plans take too long to formulate and generally don’t work so well because technologies and markets are changing so fast. Senior executives want to use the latest technologies in their work. Agility beats strategy every time.
A Kind of Digital “Perfect Storm”
SEPTEMBER 4, 2013
For a while now, companies have been racing to try to keep with the relentless advances of digital technologies. IBM barely survived. .
Models for Learning Questions
AUGUST 26, 2009
Questions There were some great questions during the session. Unfortunately, we didn't have much time to discuss. 1) Two issues that come up, at least in the world of training in a government environment, is that of a) security of information, and b) control of the information given to the learner to make sure it is accurate.
It’s 2013. Why are we still in login hell?
AUGUST 2, 2013
infrastructure problems Technology read it and decide to make a comment under it. I’ve done this before, so I don’t expect problems.
Reinventing Society in the Wake of Big Data
MARCH 20, 2013
These are both good, succinct descriptions from the point of view of the technologies used to store, manage, access and analyze the data.
Computing Beyond Moore’s Law
APRIL 5, 2016
Most smartphones include a number of specialized chips for dealing with multimedia content, user interactions, security and other functions.
Privacy, Security and Trust: Challenges for the Intangible Economy
Stephen Downes: Half an Hour
AUGUST 2, 2007
How do I as a paranoid security person deal with all the baggage I bring to the discussion? Identity. I see identity management as the real issue that is going to link security and privacy. cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria.
How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?
APRIL 7, 2015
Security : how to prevent intentional manipulation by unauthorized parties;” and . What is it that makes these systems so intrinsically complex?
What happens when the home of the future crashes?
JULY 21, 2015
In today’s program there was plenty to talk about on the predictions of new technologies in the bathroom, bedroom, kitchen, and living room.
The Digital Evolution Index
AUGUST 25, 2015
Last year, the Fletcher School of Law and Diplomacy at Tufts University published Digital Planet: Readying for the Rise of the e-Consumer.
Shaping the Future of the Internet
FEBRUARY 16, 2016
Complex Systems Data Science and Big Data Economic Issues Education and Talent Innovation Political Issues Society and Culture Technology and Strateg
Social Business in the Age of the Customer
OCTOBER 18, 2012
Starting about a decade ago with the rise of Web 2.0 , we have seen the explosive growth of social media technologies, - e.g., blogs, wikis and podcasts, - as well as platforms like Twitter, Facebook and YouTube with hundreds of millions of users. What is the primary responsibility of a business? its partners and customers.
Reflections on the Nature of Human Organizations
OCTOBER 31, 2012
To help us reflect on this question, let’s first consider why cities exist in the first place. As I thought about these questions concerning the nature of cities, I was reminded of the seminal work of the eminent British economist Ronald Coase. Urbanization is one of the major forces transforming societies all over the world.
The Slow, Steady March Towards Digital Money
FEBRUARY 17, 2015
The Readiness Index aimed to answer two important questions: . The answers to this question are organized into three main insights. .
An Old Friend, - the IBM Mainframe, - Turns 50
APRIL 15, 2014
These are questions I’ve long been thinking about. On April 7, 1964, IBM announced the Systems/360 family of mainframes.
Cloud Computing and the Changing Role of the CIO
JUNE 5, 2013
This raises a number of serious questions, especially when something goes wrong. CIOs are indeed embracing cloud, but they are being cautious.
Cloud and “Game Changing” Business Innovation
MAY 23, 2012
Along with the Economist Intelligence Unit , the IBM study surveyed 572 business and technology executives around the world to learn how organizations use cloud today and how they plan to use it in the future. The survey finds that cloud is still in the early stages of deployment, but its use is expected to grow over the next few years.
Hurricane Sandy: a 21st Century Wake-Up Call?
NOVEMBER 28, 2012
Therefore ICT access and usage are key enablers of countries’ overall technological readiness.” . Eisenhower. This was hardly the case. .