The Top Ten Emerging Technologies of 2016
AUGUST 16, 2016
The technologies on the list are not new. Artificial Intelligence. The Internet of Things. Autonomous Vehicles. The Blockchain.
“Flexible Security”: A Sensible Social Policy for our Digital Age
JULY 7, 2015
Entrepreneurship and flexible security. The authors have a very clear answer to this question. What should we do?
Education Technology Strategies - Day One
Stephen Downes: Half an Hour
FEBRUARY 3, 2015
lessons scripted around 1:1 laptop); IT issues - we were a Windows network, with everything on our own domain - we needed to open eg printing etc O - consumer technology far more accessible in 2012 esp. Using technology to find more (vs. Question - Kylie, are you frustrated when you go to the one class with no tech? Which 6?"
Better Education Through Technology
Stephen Downes: Half an Hour
JANUARY 10, 2011
There is no person needed to take our money, and nobody needed to watch over the car while we're gone (if security is required it is centralized using surveillance cameras). But they could instead higher fewer people, pay them more, and use technology to make up the difference. Many good school systems excel without much technology.
Noam Chomsky, security, and equivocal information
NOVEMBER 17, 2013
He reiterated his earlier call for us to understand the NSA surveillance scandal within an historical context that shows that governments always use technology for their own worst purposes. Chomskey said: Governments have been doing this for a century, using the best technology they had. I’m sure Gen. 15 when Prof. ” Prof.
The Long Term Impact of AI on Jobs - Some Lessons from History
JULY 26, 2016
Like no other technology, AI forces us to explore the very boundaries between machines and humans. What impact will AI have on jobs?
The President’s Commission on Enhancing National Cybersecurity
MAY 23, 2016
The Commission is composed of twelve individuals from the world of business, technology and academia. Today, money is mostly intangible.
Anticipating the Future of the IT Industry
MARCH 22, 2016
Computing has constantly changed shape and location - mainly as a result of new technology, but often also because of shifts in demand.”.
Network Era Fluency
JULY 8, 2013
While my personal data may not be that important in the great scheme of things, networked data drive advertising, brands, and security systems.
The Future of Financial Services
JUNE 23, 2015
Beyond technology, the evolution of FS will be influenced by a variety of economic, social and political factors. Rapid Change/Many Suppliers.
What happens when the home of the future crashes?
JULY 21, 2015
In today’s program there was plenty to talk about on the predictions of new technologies in the bathroom, bedroom, kitchen, and living room.
Shaping the Future of the Internet
FEBRUARY 16, 2016
Complex Systems Data Science and Big Data Economic Issues Education and Talent Innovation Political Issues Society and Culture Technology and Strateg
Computing Beyond Moore’s Law
APRIL 5, 2016
Most smartphones include a number of specialized chips for dealing with multimedia content, user interactions, security and other functions.
Reflections on Bitcoin
FEBRUARY 11, 2014
Complex Systems Digital Money and Payments Economic Issues Innovation Political Issues Society and Culture Technology and Strategy
The Collapse of Complex Business Models ? Clay Shirky
APRIL 1, 2010
From the Q&A after, it was clear that for them, the question wasn’t whether the internet was going to alter their business, but about the mode and tempo of that alteration. That kind of question comes up a lot. This is, as Tainter notes in his book, an open question. the question “What is emerging?”
Reflections on Linux and Mainframes
SEPTEMBER 1, 2015
Especially, I would add, for those transactions that require the highest degrees of security, availability and data privacy.
In Honour of Ada Lovelace
OCTOBER 14, 2014
She not only learns from the writing process, she may get a comment or question or two that helps to reinforce the learning. Back to Claire.
The New Era of Smart, Connected Products
NOVEMBER 26, 2014
Data strategy : What data must the company capture, secure, and analyze to maximize the value of its offering?; .
After Facebook fails
MAY 23, 2012
Making the rounds is The Facebook Fallacy , a killer essay by Michael Wolff in MIT Technology Review. When I first wrote that, I said 2012.
More Reflections on SharePoint and Picking Technology | Full Circle Associates
JANUARY 5, 2010
Some of the questions turning in my mind are: * What was MS Sharepoint initially conceived to be? This proved to be very true. My folders.
Jobs in the Age of Watson
NOVEMBER 26, 2011
On October 31, I participated in a symposium sponsored by MIT’s Center for Digital Business on The Race Against the Machine: The Future of Technology and Employment. match between Watson , IBM’s question-answering system, three students from the Harvard Business School and three students from MIT’s Sloan School of Management.
Security Issues and and Business Opportunities - Panel
Stephen Downes: Half an Hour
JULY 30, 2007
The key question is whether government and industry can collaborate successfully in a complex regulatory environment. We see the 'why do you need that information' question coming from young people - older people are more trusting. The challenge is how to minimize the privacy and security risk without compromising health care.
Earth to Mozilla: Come back home
APRIL 12, 2014
Google is nearly worthless when shopping for items that don’t involve technology. We need to find our soul and our spirit.” Stop it.
A Kind of Digital “Perfect Storm”
SEPTEMBER 4, 2013
For a while now, companies have been racing to try to keep with the relentless advances of digital technologies. IBM barely survived. .
Reinventing Society in the Wake of Big Data
MARCH 20, 2013
These are both good, succinct descriptions from the point of view of the technologies used to store, manage, access and analyze the data.
It’s 2013. Why are we still in login hell?
AUGUST 2, 2013
infrastructure problems Technology read it and decide to make a comment under it. I’ve done this before, so I don’t expect problems.
How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?
APRIL 7, 2015
Security : how to prevent intentional manipulation by unauthorized parties;” and . What is it that makes these systems so intrinsically complex?
The Digital Evolution Index
AUGUST 25, 2015
Last year, the Fletcher School of Law and Diplomacy at Tufts University published Digital Planet: Readying for the Rise of the e-Consumer.
Models for Learning Questions
AUGUST 26, 2009
Questions There were some great questions during the session. Unfortunately, we didn't have much time to discuss. 1) Two issues that come up, at least in the world of training in a government environment, is that of a) security of information, and b) control of the information given to the learner to make sure it is accurate.
Privacy, Security and Trust: Challenges for the Intangible Economy
Stephen Downes: Half an Hour
AUGUST 2, 2007
How do I as a paranoid security person deal with all the baggage I bring to the discussion? Identity. I see identity management as the real issue that is going to link security and privacy. cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria.
An Old Friend, - the IBM Mainframe, - Turns 50
APRIL 15, 2014
These are questions I’ve long been thinking about. On April 7, 1964, IBM announced the Systems/360 family of mainframes.
The Untethered, Hyperconnected Enterprise
JUNE 8, 2012
But lots of questions remain as to what those implications might be. Top down strategy plans take too long to formulate and generally don’t work so well because technologies and markets are changing so fast. Senior executives want to use the latest technologies in their work. Agility beats strategy every time.
The Slow, Steady March Towards Digital Money
FEBRUARY 17, 2015
The Readiness Index aimed to answer two important questions: . The answers to this question are organized into three main insights. .
Cloud Computing and the Changing Role of the CIO
JUNE 5, 2013
This raises a number of serious questions, especially when something goes wrong. CIOs are indeed embracing cloud, but they are being cautious.
Social Business in the Age of the Customer
OCTOBER 18, 2012
Starting about a decade ago with the rise of Web 2.0 , we have seen the explosive growth of social media technologies, - e.g., blogs, wikis and podcasts, - as well as platforms like Twitter, Facebook and YouTube with hundreds of millions of users. What is the primary responsibility of a business? its partners and customers.
Global Trends 2030 - Living Through a Transformative Period
JANUARY 9, 2013
But, they could lead to radically different worlds depending on how they interact with what the report calls game-changers, each of which raises unanswerable questions about the very different directions the megatrends might follow. But, in fact, technological changes play a major role in each of the four megatrends. increases.
Reflections on the Nature of Human Organizations
OCTOBER 31, 2012
To help us reflect on this question, let’s first consider why cities exist in the first place. As I thought about these questions concerning the nature of cities, I was reminded of the seminal work of the eminent British economist Ronald Coase. Urbanization is one of the major forces transforming societies all over the world.
Hurricane Sandy: a 21st Century Wake-Up Call?
NOVEMBER 28, 2012
Therefore ICT access and usage are key enablers of countries’ overall technological readiness.” . Eisenhower. This was hardly the case. .
CoP Series #10: Stewarding Technology for Community
MARCH 24, 2009
Elearning is growing and evolving hand in glove with a constellation of technologies that have their roots in a number of places.
Is There a STEM Crisis or a STEM Surplus?
AUGUST 9, 2016
Their answer, as is often the case with such complex questions, is that both sides are right. It all depends. workforce. level (e.g.,