“Flexible Security”: A Sensible Social Policy for our Digital Age
JULY 7, 2015
Entrepreneurship and flexible security. notes the article in its opening paragraph. What should we do? Work in the Digital Economy.
cooperation, measurement, security and more
AUGUST 28, 2015
Every fortnight I curate some of the observations and insights that were shared on social media. call these Friday’s Finds. ” #crapdetection.
Are Your Social Media and Other Accounts Secure?
MAY 30, 2013
This could happen to any of us. So, how can you make your social media and other account more secure? Privacy is also important.
Mistakes & Security
JANUARY 6, 2012
— “Security is mostly a superstition. “1 tip for managing creative people: don’t.” ” @flowchainsensei.
Help: why don’t images load in https?
MAY 14, 2016
Berkman Blogging Harvard Internet problems publishing securitySame goes for the ProjectVRM blog as well. Or so I gather. WordPress removes them.
We know we’ve traded away privacy. But for exactly what security?
SEPTEMBER 15, 2013
It has been said that “security” is not found in apprehending a guilty party but in preventing the harm from occurring. While this notion can surely be overextended, it can also be understood to justify a certain degree of intelligence gathering in the service of safety and security.
Noam Chomsky, security, and equivocal information
NOVEMBER 17, 2013
That’s why you should be extremely cautious when you hear an appeal to security. It literally carries no information, even in the technical sense: it’s completely predictable and thus carries no info. I don’t doubt that the US security folks believe it, but it is without meaning. Thus, the security claim isn’t made on its own.
Adventure & security
JUNE 5, 2013
Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. So new wine for new wineskins, it's a simple test and while it has a delight of adventure it is far from secure.
Security vs. Utility
SEPTEMBER 12, 2009
icon icons location bar Mozilla security tool bar What’s the name for that?) only discovered that feature by experimenting around.
[shorenstein][liveblog] Juliette Kayyem on communicating about security
APRIL 1, 2015
Juliette Kayyem , a former Boston Globe columnist, a commentator, Homeland Security advisor to Gov. Deval Patrick, and a former candidate for governor of Massachusetts, is giving a Shorenstein Center talk about how to talk with the public about security issues. She learned that last lesson from her security experience. Response.
Security Alert Related to Snowden?
AUGUST 3, 2013
Is this weekend''s security aler t related to the Snowden case? Not one given to conspriracy, but we just have had the head of the NSA lie to Congress and the American public, with no penalty. The attorney general had to declare publicly he would not be tortured. When has the US had to promise not to torture an American citizen?
If credit card companies cared about security…
DECEMBER 11, 2011
When there’s a security issue, they wouldn’t robocall people and ask them to provide personal information. They would robocall people and ask them to call the number on the back of their cards. 2. They would put people’s photographs on their credit cards.
Smart and secure grids and militaries
MAY 11, 2009
Andy is an MIT and DC energy tech guy (and, it turns out, a neighbor) who writes two blogs: The Smart Grid Security Blog and the DoD Energy Blog. Tags: ecology power military security experts The Wired.com piece I wrote about Robin Chase prompted Andrew Bochman to send me an email. So many things in the world to care about!
Pseudorandom Thoughts on Privacy, Security and Trust
Stephen Downes: Half an Hour
JULY 31, 2007
system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Security is not convenient.
Security Issues and and Business Opportunities - Panel
Stephen Downes: Half an Hour
JULY 30, 2007
The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. In the U.S. Patriot Act - impact on B.C. not abroad.
Google: Make security the default (Now with Iranian tweets)
JUNE 16, 2009
Tags: google security iran twitter
Privacy, Security and Trust: Challenges for the Intangible Economy
Stephen Downes: Half an Hour
AUGUST 2, 2007
How do I as a paranoid security person deal with all the baggage I bring to the discussion? Identity. I see identity management as the real issue that is going to link security and privacy. cannot engage most security professionals in discussions about privacy. Communication Security Establishment (CSE) common criteria.
Citicard does its best to train us in horrible security practices
APRIL 7, 2011
Citibank continues to train its customers to use terrible security processes. This morning I got a call from a robot that claimed to be from Citibank. When I refused to type in my zip code, and then waited for two minutes of repeated requests to do so, it transferred me to a human who wanted me to give him my name and password.
Putting It All Together. Privacy, Security, Cybercrime and Safety
Stephen Downes: Half an Hour
AUGUST 1, 2007
So I forwarded it to the security team saying 'login in and fix what is wrong'. I got the first phishing email from Citibank, the first bank to be phished. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. I was doing a briefing for the Secret Service. You are not secure. Maybe.
Disruptive technologies 2015-2016
JANUARY 12, 2015
Topics include cyber security, mobile payments, drones, bitcoin, social media, digital, omnichannel, attribution, cx, music, movies, Hollywood 25 Disruptive Technology Trends 2015 – 2016 from Brian Solis. Social learning
Firewalls and Security in Software as a Service
MAY 22, 2006
The other big hurdle is the question of security. Generally, I think you will find that hosts provide fairly reasonable control, but you will want to check into their security approach. The security issue not new. The advice from an article in CFO Magazine: Data security. Look at security. That's its job.
Shifting IT delivery to tablets: The strategic issues
MAY 28, 2012
What will it take to successfully shift IT delivery to these devices given the security worries, legacy IT landscape, BYOD, and other issues Tablets are likely to become the primary computing experience for workers over the next few years.
Report: The Future of Digital Australia in 2025 and what Australians think
JUNE 1, 2014
All the assets are on the Intel Security 2025 site. I’ll comment more on both the report and the survey results later this week.
Latest: Equity crowdfunding coming shortly? Congress offers bipartisan support
NOVEMBER 3, 2011
Amends the Securities Exchange Act of 1934 to exclude persons holding crowdfunded securities under this Act from application of “held of record” requirements with respect to mandatory registration of securities. Authorizes an issuer to rely upon certifications provided by investors.
The President’s Commission on Enhancing National Cybersecurity
MAY 23, 2016
Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Workforce development.
Inside Britain's highest security psychiatric hospital
APRIL 21, 2009
The Independent has an article giving a rare look inside Broadmoor Hospital , one of only four high security psychiatric hospital in the UK, which houses some of the most severely dangerous offenders with mental illness. The only other recent example I can think of was a 2004 edition of BBC All in the Mind that you can still listen to online.
Airport psych security: snake oil on a plane?
MAY 27, 2010
Nature has an extensive article on the 'deception detection training' that's been widely rolled out for airport security staff and anti-terrorism police despite that fact that is has barely been publicly tested. Link to Nature 'Airport security: Intent to deceive
What does the Internet of Everything mean to you?
AUGUST 4, 2014
“Cisco believes that many organizations are already experiencing the Internet of Things (IoT)—the networked connection of physical objects.
One More Industry Where Employment is Dropping as Output Rises
APRIL 24, 2013
” This employment decline has taken place despite the fact that US financial industry profits are at an all-time high. The Wall St. Do you
Tear the walls down: Jericho and the future of enterprise tech
NOVEMBER 16, 2011
As Jericho Forum puts it: The huge explosion in business collaboration and commerce on the Web means that today’s traditional approaches to securing a network boundary are at best flawed, and at worst ineffective. The forum believes responding to the challenges of de-perimeterization must be central to all IT security strategies.
More Reflections on SharePoint and Picking Technology | Full Circle Associates
JANUARY 5, 2010
It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor. My folders.
Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle
AUGUST 22, 2016
Blockchain Revolution , his 16th book, now explains “How The Blockchain Will Transform Everything From Banking To Government To Our Identities.”.
What will universities monetize in the future?
MARCH 12, 2014
The badges and competency-based learning movement may challenge assessment, but at this point it remains reasonably secure.
What happens when the home of the future crashes?
JULY 21, 2015
This is a point that was addressed in my report for Intel Security on Safeguarding the Future of Digital Australia in 2025.
The Top Ten Emerging Technologies of 2016
AUGUST 16, 2016
The technologies on the list are not new. Artificial Intelligence. The Internet of Things. The Internet of Things (IoT) has also been long in coming.
Why fix a problem that doesn’t exist?
MAY 9, 2016
We all know what this symbol means: Two people are not allowed to share an iPad. Just kidding. It means the lavatory in the airplane is occupied. Also that it can be used by persons of either gender. Which gender you are is of no concern to the airline. Or to the lavatory. Because it doesn’t matter. They’ve done that for a long time.
The future of learning is the future of work
JANUARY 31, 2013
– The Regeneration of Meaning. Hyperlinks subvert hierarchy, for good and not so good. Learning Work
The Economic Potential of The Internet of Things
JULY 14, 2015
Home - Energy management, security, safety, and automation of home chores. Privacy, Security, Confidentiality and IP. Interoperability.
eBang Theory, Say "Hey" to High Quality Online Learning That Scales
MAY 11, 2011
wrote a report entitled The e-Bang Theory: Education Industry Overview 1999 Illuminismo, Volume 2 (San Francisco: Banc of America Securities Equity Research, Montgomery Division, September 1999). Once upon a time, equity analyst Howard Block, Ph.D. This report is the one. eLearning Innovation Internet Online Education Trends
The Rise of the On-Demand Economy
MARCH 10, 2015
firm will keep expanding and adding people as long as doing so is less expensive than securing the additional services in the marketplace.