Digital Identity - the Key to Privacy and Security in the Digital World
AUGUST 29, 2016
Digital technologies are increasingly intertwined with the evolution of blockchain infrastructures. Let me summarize some of what I learned.
“Flexible Security”: A Sensible Social Policy for our Digital Age
JULY 7, 2015
Entrepreneurship and flexible security. notes the article in its opening paragraph. What should we do? Work in the Digital Economy.
The Top Ten Emerging Technologies of 2016
AUGUST 16, 2016
The technologies on the list are not new. Artificial Intelligence. The Internet of Things. Autonomous Vehicles. The Blockchain.
Disruptive technologies 2015-2016
JANUARY 12, 2015
In the embedded presentation below, Brian Solis explores some of the biggest technology trends and possible twists on the horizon for 2015 and 2016. Social learning
From “learning technologies” to “social technologies”
JUNE 14, 2012
Member profiling. Activity streams. Real-time updates. Threaded discussions. Notifications. Group spaces. File sharing areas. Social learning
Noam Chomsky, security, and equivocal information
NOVEMBER 17, 2013
He reiterated his earlier call for us to understand the NSA surveillance scandal within an historical context that shows that governments always use technology for their own worst purposes. Chomskey said: Governments have been doing this for a century, using the best technology they had. I’m sure Gen. 15 when Prof. ” Prof.
Better Education Through Technology
Stephen Downes: Half an Hour
JANUARY 10, 2011
There is no person needed to take our money, and nobody needed to watch over the car while we're gone (if security is required it is centralized using surveillance cameras). But they could instead higher fewer people, pay them more, and use technology to make up the difference. Many good school systems excel without much technology.
Sunrise: The technologies that will change our lives
JUNE 24, 2012
Yesterday morning I appeared on the Sunrise national breakfast program together with science broadcaster Dr Karl Kruszelnicki , being interviewed about the big ideas and new technologies that will change our lives. Future of retail Technology trendsThe video clip is below.
Enterprise Social Technology – Review
FEBRUARY 26, 2011
Social technologies are a fact in the workplace and this book provides a comprehensive overview of the issues. Books
We know we’ve traded away privacy. But for exactly what security?
SEPTEMBER 15, 2013
Moreover, as technology and society evolve, the equilibrium points may shift. It has been said that “security” is not found in apprehending a guilty party but in preventing the harm from occurring. Not everyone, nor every culture, will find the same point of equilibrium. How can we reason with lack of stuff to reason about?
Education Technology Strategies - Day Two
Stephen Downes: Half an Hour
FEBRUARY 4, 2015
So the Achieving Excellents has four major objectives: - achieving excellence - ensuring equity - promoting well-being - competence We''ve also been partnering with the Council of Directors of Educations (CODE - ''superintendants'') - this boosts what we know about technology and enabling innovations. How do we build on this? From 68%.
Jobs, work and technology
DECEMBER 2, 2011
Social networking tools make it easier for people to communicate and collaborate with colleagues over wide distances and thus improve the collective intelligence of the team. And, systems like Watson will be extensively used to help experts deal with highly complex problems in areas like medicine, finance and national security.
How Luxembourg is playing to become a technology hub
MAY 31, 2012
As such the government and business sectors are seeking to build Luxembourg into a technology hub, with ICT named by the government as the third of five pillars for national development. It will be interesting to see how well Luxembourg continues to build itself as a technology hub, drawing on its traditional strengths.
International Women’s Day: Using Technology to Empower Women and Girls
MARCH 8, 2016
Here’s two programs that use technology to support women and girls and are an inspiration. March 8th is International Women’s Day.
Learning Technologies UK wrap-up
JANUARY 31, 2011
I had the pleasure of speaking at the Learning Technologies ’11 conference, talking on the topic of games. I’ve already covered Roger Schank ‘s keynote , but I want to pick up on a couple of other things. design games meta-learning mobile social technologyIt was hard to see everything I wanted to, with four tracks.
Security vs. Utility
SEPTEMBER 12, 2009
icon icons location bar Mozilla security tool bar Tags: Technology problems chrome Firefox Firefox 3.5.3 What’s the name for that?)
[liveblog] Data & Technology in Government
FEBRUARY 26, 2015
Part of the importance of this is that students at the Kennedy School are agitating for a much strong technology component to their education on the grounds that these days policy makers need to be deeply cognizant of the possibilities technology offers, and of the culture of our new technology development environment. FitBit).
The Long Term Impact of AI on Jobs - Some Lessons from History
JULY 26, 2016
Like no other technology, AI forces us to explore the very boundaries between machines and humans. What impact will AI have on jobs?
Competing Against “Digital Invaders”
OCTOBER 4, 2016
This competitive shift is caused primarily by rapidly changing technologies and markets. Let me briefly discuss each.
Blockchain Can Reshape Financial Services… But it Will Take Significant Time and Investment
SEPTEMBER 19, 2016
Today, multiple technologies poised to drive the next wave of financial services innovation are converging in maturity.” DLT is one such technology.
Report: The Future of Digital Australia in 2025 and what Australians think
JUNE 1, 2014
All the assets are on the Intel Security 2025 site. I’ll comment more on both the report and the survey results later this week.
Blockchains: the Promise of More Frictionless, Trusted Economies
OCTOBER 11, 2016
Foremost among them is security. Consequently, there’s no one overall owner responsible for security. Why do firms exist?
The President’s Commission on Enhancing National Cybersecurity
MAY 23, 2016
The Commission is composed of twelve individuals from the world of business, technology and academia. Today, money is mostly intangible.
What does the Internet of Everything mean to you?
AUGUST 4, 2014
InternetOfEverything Technology – Cisco on Slideshare. Here is how the Internet of Everything is viewed from multiple perspectives.
Owning our data
JULY 8, 2014
The Respect Network is an early example of this move, providing a secure network to share private data. InternetOfEverything Technology
Network Era Fluency
JULY 8, 2013
While my personal data may not be that important in the great scheme of things, networked data drive advertising, brands, and security systems.
The Economic Potential of The Internet of Things
JULY 14, 2015
Like many technological advances, the Internet of Things (IoT) has been long in coming. Privacy, Security, Confidentiality and IP.
Is FinTech Forcing Banking to a Tipping Point?
APRIL 11, 2016
Complex Systems Digital Money and Payments Economic Issues Innovation Political Issues Society and Culture Technology and Strategy
Apple’s content blocking is chemo for the cancer of adtech
AUGUST 26, 2015
So rampant, in fact, that T.Rob Wyatt, a security expert, calls adtech “the new digital cancer.” advertising Technology VRMThe tide of popular sentiment is turning against tracking-based advertising — and Apple knows it. ” This is aimed straight at tracking-based advertising, known in the trade as adtech.
The Rise of the On-Demand Economy
MARCH 10, 2015
firm will keep expanding and adding people as long as doing so is less expensive than securing the additional services in the marketplace.
The Evolution of the Internet of Very Smart Things
OCTOBER 15, 2014
This transformation is driven by the continuing advances of technology. The total number of users rose to 100s of millions. .
Anticipating the Future of the IT Industry
MARCH 22, 2016
Computing has constantly changed shape and location - mainly as a result of new technology, but often also because of shifts in demand.”.
Tear the walls down: Jericho and the future of enterprise tech
NOVEMBER 16, 2011
Yesterday I gave the keynote on The Future of Information Technology at the Local Government IT2011 conference in Coffs Harbour, which this year had the theme of mobility. Given the ambitious scope of my keynote title, I covered a lot of territory including fundamental technology shifts and the evolving shape of organizational technology.
Is the Blockchain Now Reaching a Tipping Point?
AUGUST 2, 2016
Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society.
ESN as knowledge bridges
JUNE 16, 2014
PKM Technology It takes a networked organization, staffed by people with networked mindsets, to thrive in a networked economy.
The Future of Financial Services
JUNE 23, 2015
Beyond technology, the evolution of FS will be influenced by a variety of economic, social and political factors. Rapid Change/Many Suppliers.
More Reflections on SharePoint and Picking Technology | Full Circle Associates
JANUARY 5, 2010
This is where examination of technology at all three levels: platform, tool and feature — can really matter. This proved to be very true.
In Honour of Ada Lovelace
OCTOBER 14, 2014
blogging STEM Ada Lovelace Women in Technology Ada was the world’s first female computer programmer – a true icon and pioneer.
Security Issues and and Business Opportunities - Panel
Stephen Downes: Half an Hour
JULY 30, 2007
The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. In the U.S. Patriot Act - impact on B.C. not abroad.
Launch of the Transformation of Government framework
JULY 19, 2011
Security. TECHNOLOGY DRIVERS. Crowdsourcing Government Social trends Technology trends UncategorizedCONTEXT. Constraints.