Securing the Foundations of our Digital Economy
JANUARY 2, 2017
On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The attacker has the advantage.
“Flexible Security”: A Sensible Social Policy for our Digital Age
JULY 7, 2015
Entrepreneurship and flexible security. The authors have a very clear answer to this question. What should we do? Social Safey Nets.
The Top Ten Emerging Technologies of 2016
AUGUST 16, 2016
The technologies on the list are not new. The full report includes a longer, one-page description of each of these technologies.
Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle
AUGUST 22, 2016
Why wasn’t stronger security designed into the original Internet protocols? The book is organized into three main sections. If we will it.”.
Education Technology Strategies - Day One
Stephen Downes: Half an Hour
FEBRUARY 3, 2015
lessons scripted around 1:1 laptop); IT issues - we were a Windows network, with everything on our own domain - we needed to open eg printing etc O - consumer technology far more accessible in 2012 esp. dates to classical Greece How does technology change this? - Using technology to find more (vs. CERN ? Which 6?"
[liveblog] Data & Technology in Government
FEBRUARY 26, 2015
Part of the importance of this is that students at the Kennedy School are agitating for a much strong technology component to their education on the grounds that these days policy makers need to be deeply cognizant of the possibilities technology offers, and of the culture of our new technology development environment. FitBit).
The Long Term Impact of AI on Jobs - Some Lessons from History
JULY 26, 2016
Automation anxieties continued to resurface in the 20th century, right along with accelerating technology advances. How should we respond?
Blockchain Can Reshape Financial Services… But it Will Take Significant Time and Investment
SEPTEMBER 19, 2016
Today, multiple technologies poised to drive the next wave of financial services innovation are converging in maturity.” DLT is one such technology.
The Growing Importance of Storytelling in the Business World
MARCH 13, 2017
This is now the case with blockchain and related technologies. Communications have played a major role in my work over the past few decades.
The President’s Commission on Enhancing National Cybersecurity
MAY 23, 2016
The Commission is composed of twelve individuals from the world of business, technology and academia. Today, money is mostly intangible.
Network Era Fluency
JULY 8, 2013
While my personal data may not be that important in the great scheme of things, networked data drive advertising, brands, and security systems.
Blockchains: the Promise of More Frictionless, Trusted Economies
OCTOBER 11, 2016
Why wasn’t stronger security designed into the original Internet infrastructure? Foremost among them is security. Why do firms exist?
AI and Public Policy
JANUARY 23, 2017
Throughout history, humans have both shaped and adapted to new technologies. These warning should be taken very seriously. Hype vs reality.
Anticipating the Future of the IT Industry
MARCH 22, 2016
Computing has constantly changed shape and location - mainly as a result of new technology, but often also because of shifts in demand.”.
The Collapse of Complex Business Models ? Clay Shirky
APRIL 1, 2010
From the Q&A after, it was clear that for them, the question wasn’t whether the internet was going to alter their business, but about the mode and tempo of that alteration. That kind of question comes up a lot. This is, as Tainter notes in his book, an open question. the question “What is emerging?”
In Honour of Ada Lovelace
OCTOBER 14, 2014
She not only learns from the writing process, she may get a comment or question or two that helps to reinforce the learning. Back to Claire.
The Future of Financial Services
JUNE 23, 2015
Beyond technology, the evolution of FS will be influenced by a variety of economic, social and political factors. Rapid Change/Many Suppliers.
Jobs in the Age of Watson
NOVEMBER 26, 2011
On October 31, I participated in a symposium sponsored by MIT’s Center for Digital Business on The Race Against the Machine: The Future of Technology and Employment. match between Watson , IBM’s question-answering system, three students from the Harvard Business School and three students from MIT’s Sloan School of Management.
After Facebook fails
MAY 23, 2012
Making the rounds is The Facebook Fallacy , a killer essay by Michael Wolff in MIT Technology Review. When I first wrote that, I said 2012.
More Reflections on SharePoint and Picking Technology | Full Circle Associates
JANUARY 5, 2010
Some of the questions turning in my mind are: * What was MS Sharepoint initially conceived to be? This proved to be very true. My folders.
Reflections on Bitcoin
FEBRUARY 11, 2014
A few weeks ago, technology journalist Glenn Fleishman wrote an article refuting a number of Andreessen’s arguments.
Security Issues and and Business Opportunities - Panel
Stephen Downes: Half an Hour
JULY 30, 2007
The key question is whether government and industry can collaborate successfully in a complex regulatory environment. We see the 'why do you need that information' question coming from young people - older people are more trusting. The challenge is how to minimize the privacy and security risk without compromising health care.
The New Era of Smart, Connected Products
NOVEMBER 26, 2014
In many companies, smart, connected products will force the fundamental question, What business am I in? ” Another very big deal.
Reflections on Linux and Mainframes
SEPTEMBER 1, 2015
Especially, I would add, for those transactions that require the highest degrees of security, availability and data privacy.
The Untethered, Hyperconnected Enterprise
JUNE 8, 2012
But lots of questions remain as to what those implications might be. Top down strategy plans take too long to formulate and generally don’t work so well because technologies and markets are changing so fast. Senior executives want to use the latest technologies in their work. Agility beats strategy every time.
Earth to Mozilla: Come back home
APRIL 12, 2014
So to explicitly address the question of whether sponsored tiles (aka “ads”) could be included as part of a content offering, the answer is yes.
Models for Learning Questions
AUGUST 26, 2009
Questions There were some great questions during the session. 1) Two issues that come up, at least in the world of training in a government environment, is that of a) security of information, and b) control of the information given to the learner to make sure it is accurate. Avoid the Culture Question 3. Great question.
A Kind of Digital “Perfect Storm”
SEPTEMBER 4, 2013
For a while now, companies have been racing to try to keep with the relentless advances of digital technologies. IBM barely survived. .
It’s 2013. Why are we still in login hell?
AUGUST 2, 2013
infrastructure problems Technology I read it and decide to make a comment under it. I write it and go to log in. So go to I click on that.
Reinventing Society in the Wake of Big Data
MARCH 20, 2013
These are both good, succinct descriptions from the point of view of the technologies used to store, manage, access and analyze the data.
Privacy, Security and Trust: Challenges for the Intangible Economy
Stephen Downes: Half an Hour
AUGUST 2, 2007
How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria. Trojans.
What happens when the home of the future crashes?
JULY 21, 2015
In today’s program there was plenty to talk about on the predictions of new technologies in the bathroom, bedroom, kitchen, and living room.
Computing Beyond Moore’s Law
APRIL 5, 2016
I’ve been thinking about this question for a while. The 4004 , Intel’s first commercial microprocessor, was launched in November, 1971.
How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?
APRIL 7, 2015
Security : how to prevent intentional manipulation by unauthorized parties;” and . What is it that makes these systems so intrinsically complex?
The Digital Evolution Index
AUGUST 25, 2015
Last year, the Fletcher School of Law and Diplomacy at Tufts University published Digital Planet: Readying for the Rise of the e-Consumer.
Social Business in the Age of the Customer
OCTOBER 18, 2012
Starting about a decade ago with the rise of Web 2.0 , we have seen the explosive growth of social media technologies, - e.g., blogs, wikis and podcasts, - as well as platforms like Twitter, Facebook and YouTube with hundreds of millions of users. What is the primary responsibility of a business? Customer value is different.
Reflections on the Nature of Human Organizations
OCTOBER 31, 2012
To help us reflect on this question, let’s first consider why cities exist in the first place. Urbanization has been steadily accelerating since the industrial revolution as a result of the migration of jobs from farms to factories as well as the major advances in technologies, communications and transportation. billion to 9.3 or 2.2.
An Old Friend, - the IBM Mainframe, - Turns 50
APRIL 15, 2014
What enables it to keep reinventing itself while embracing the latest technologies , including the Mobile Internet, Cloud Computing and Big Data?
Cloud and “Game Changing” Business Innovation
MAY 23, 2012
Along with the Economist Intelligence Unit , the IBM study surveyed 572 business and technology executives around the world to learn how organizations use cloud today and how they plan to use it in the future. It urges business leaders to reflect on the potential of cloud-enabled business models by asking themselves a few simple questions:
The Slow, Steady March Towards Digital Money
FEBRUARY 17, 2015
The Readiness Index aimed to answer two important questions: . The answers to this question are organized into three main insights. .