Security?

Dave Snowden

The post Security? I had three presentations today and my voice held up, just. I’ve had a bad cold for weeks and jumping time zones is not the best way to shake that off. But I fell back on a trusted recipe of lemsip, whisky, throat sweets and a degree of self-delusion as to my condition. The latter quality links with the small rituals that put you into role as you go on stage.

perpetual beta 2017

Harold Jarche

What follows is a summary of some of my thoughts during 2017. Our professional connections, especially those outside our current workplaces, are our security. This is how I made sense of the world in 2017. Blogging is one way I make sense of the world. This past year I wrote about 120 posts on various topics. My ways of seeing the world have changed over the years and blogging has helped to keep my thoughts in a state of perpetual beta: strong ideas, loosely held.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

top tools 2017

Harold Jarche

Voting closes on 22 September 2017. It synchronizes across all my devices and helps keep my online presence more secure. Jane Hart compiles a list every year of the Top 100 Tools for learning. This is the 11th year! Here are my top tools this year, with the past five years shown below. It’s interesting to note that my preferred tools have not changed that much over the years. Please add yours!

Tools 150

online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online. Companies that control a large part of the web traffic — Google, Facebook, Amazon — can pretty much do whatever they want with our data. And now American internet service provides can sell customer information to the highest bidder.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The interconnectedness and openness made possible by the Internet and broader digital ecosystem create unparalleled value for society,” notes the report in its Executive Summary. “But these same qualities make securing today’s cyber landscape difficult. Why wasn’t stronger security designed into the original Internet infrastructure?

The Top Ten Emerging Technologies of 2017

Irving Wladawsky-Berger

Earlier this year, Scientific American , in collaboration with the World Economic Forum , published a special report on The Top Ten Emerging Technologies of 2017. Here are the 10 technologies comprising the 2017 list , along with the reasons cited in the report for their selection: Blood Tests Allow for Scalpel-Free Biopsies - “Ultrasensitive blood tests known as liquid biopsies promise to improve cancer diagnosis and care”.

The MIT 2017 Inclusive Innovation Challenge

Irving Wladawsky-Berger

Now in its second year, the IIC introduced the winners of its 2017 competition at an event held on October 12 as part of Boston’s annual HUBweek. The 2017 IIC received around 300 applications from all over the world. The platform vets the tutors to ensure high quality teaching and enables secure payments.”. Aid:Tech aims to end that, by providing a platform for undocumented people to create a digital ID using blockchain so that every transaction is secure and traceable.

The MIT 2017 Inclusive Innovation Challenge

Irving Wladawsky-Berger

Now in its second year, the IIC introduced the winners of its 2017 competition at an event held on October 12 as part of Boston’s annual HUBweek. The 2017 IIC received around 300 applications from all over the world. The platform vets the tutors to ensure high quality teaching and enables secure payments.”. Aid:Tech aims to end that, by providing a platform for undocumented people to create a digital ID using blockchain so that every transaction is secure and traceable.

Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. economic competitiveness and national security.”.

Employee Training in Cyber Security: 4 Tips and Techniques

TOPYX LMS

The current landscape of cyber security is frightening and implementing processes to tackle the growing problem seems daunting. 48 percent of data security breaches are caused by acts of malicious intent. After examining the current cybersecurity landscape, organizations have a very clear recourse: train end-user (non-IT) employees in cyber security protocols. Preventing many attacks is as simple as a few hours of security training. Security.

A sheep in wolves clothing

Dave Snowden

Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. I finished off my last keynote of the year with the above quote from T S Elliot. Its one of my favourite ones and its all too true, all too often, in all too many contexts.

Fidelity in complex systems consultancy

Dave Snowden

Now it is an understandable issue; if you work for yourself then securing revenue is as vital and shooting, or failing to rehire the messenger is all to frequent. It been a week since my tirade against the abrogation of leadership by falling back to the crutch of a mega-consultancy report. Since then a mixture of bad flu, trans-pacific, trans-americas & transatlantic flights have all conspired against my blogging.

soft skills are permanent skills

Harold Jarche

Network Security Expertise. Are soft skills the new hard skills? I asked this question six years ago. I would suggest that hard skills are really temporary skills. They come and go according to the economy and the state of technology. Today, we need very few people who know how to shoe a horse. Soft skills are permanent ones. In a recent New York Times article the company LinkedIn had identified a number of currently in-demand skills. HARD SKILLS. Cloud Computing Expertise.

Skills 207

risk?

Dave Snowden

What even fewer people know about is a key moment that happened in Japan when Steve Jobs approved a $10 million dollar expenditure that secured a key piece to their disruptive innovation at that time… the iPod 1. This 2013 article from Time relays the story about a key moment when I believe Apple secured its dominance in the MP3 market.

Senses of direction

Dave Snowden

Heuristics or rules to thumb – follow the ridge line until you have a secure exit and so on. I’ve spent a fair amount of my time in the mountains working within a general sense of direction but adjusting goal to fit the context. Sometimes that has been by necessity; the sudden descent of fog or strong winds that render a ridge walk unsafe. Sometimes it is by choice; sensing a possible path, an interesting diversion, a possible photograph.

Module 125

Platforms, Blockchains, and the Evolution of Trust

Irving Wladawsky-Berger

The on-demand economy wouldn’t be possible without the mobile devices and platforms that enable peer-to-peer transactions among individuals any time and place; the digital payment systems that reliably and securely broker the transactions between buyers and sellers; and the social reputation systems , where people rank buyers and sellers, - a critical requirement for the smooth functioning of collaborative markets like Airbnb.

leadership is helping make the network smarter

Harold Jarche

Canada’s electronic spy agency, the Communications Security Establishment (CSE) has just released some of its malware detection tools as open source software, so any organization or individual can better detect threats. Organizations face more complexity in the type of work they do, the problems they face, and the markets they interact with. This is due to increasing connections between everyone and everything.

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Their responses suggest that they view blockchain as a kind of trust accelerator , helping to build trust in several ways: increased transactional transparency, higher data quality and accuracy, increased trust in transaction reliability, and improved security against fraud and cybercrime. The greater trust, security and efficiencies inherent in blockchain platforms could be competitive differentiators in the formation of such multi-sided ecosystems.

Sea wall or salt marsh?

Dave Snowden

The sea-wall on the other had when it breaks it breaks; the shift from high utility, predictability and security to catastrophic failure is sudden and calamitous in nature. They provide an aura of security and reliability up to the point where it all gets too much for them. When we lived in St Albans, way back in the days before children, we occasionally made a winter day trip to the Essex Coast (pictured). The cost is flat as is the land and bleak.

Module 125

Common meaning?

Dave Snowden

I have previously referenced a Canadian friend, working in security, who said that it used to be the case that each village had an idiot, but everyone knew who the idiots were so it was not an issue. Yesterday I started to talk about meaning, coupled with a minor rant about the growing body of people who talk about some collective view of narrative as something that can engineered. I’ll be talking more about meaning in posts over the coming months.

The Real Goal of Open Educational Resources

Stephen Downes: Half an Hour

He has some good reasons for this: "Those credentials continue to be one of the best paths to achieving economic security for oneself and family," and "These students are not roaming autodidacts who, left to their own (digital) devices, will thrive and succeed as 'free range learners'." The Goal of Open Access David Wiley says , "The question we must each ask ourselves is – what is the real goal of our OER advocacy?" In this he's right.

The Emergence of Industry 4.0

Irving Wladawsky-Berger

The WEF has taken the broad-scope view , having chosen The Fourth Industrial Revolution as the central theme of its January, 2016 annual meeting in Davos, Switzerland. “We are at the beginning of a revolution that is fundamentally changing the way we live, work, and relate to one another,” wrote Dr. Schwab in his 2017 book. They also expressed a wide range of concerns around data security, with operational disruptions due to cybersecurity breaches at the top of their list (50%).

The Emerging Data Economy

Irving Wladawsky-Berger

Their profits are surging: they collectively racked up over $25bn in net profit in the first quarter of 2017. But while it’s very difficult to compete with the Internet giants in B-to-C applications involving consumer data, the situation might be quite different when it comes to the data needed for B-to-B transactions among companies, and/or for mission critical applications where security and privacy are paramount.

Data 107

The Emergence of Industry 4.0

Irving Wladawsky-Berger

The WEF has taken the broad-scope view , having chosen The Fourth Industrial Revolution as the central theme of its January, 2016 annual meeting in Davos, Switzerland. “We are at the beginning of a revolution that is fundamentally changing the way we live, work, and relate to one another,” wrote Dr. Schwab in his 2017 book. They also expressed a wide range of concerns around data security, with operational disruptions due to cybersecurity breaches at the top of their list (50%).

a convenience truth

Harold Jarche

As a result we are so over-prescribed that: “Antibiotic resistance is one of the biggest threats to global health, food security, and development today” , according to the World Health Organization. Probably one the greatest barriers to positive change is convenience. For example, we know that automobiles contribute significantly to pollution, obesity, and greenhouse gases. However, most of us own at least one car and many of us own more than one. Cars are extremely convenient.

Minds and Machines

Irving Wladawsky-Berger

In addition, the electromechanical components used in robotic devices are also advancing rapidly, making it possible to imagine a future when robots will be ubiquitous in manufacturing, health care, security, transportation, our homes and many other areas.

Data 109

The Evolution Toward Digital Supply Chains

Irving Wladawsky-Berger

So are drones, which are already being deployed in infrastructure maintenance, security, assets monitoring and other tasks across a number of industries. Blockchain technologies hold great promise for digital supply chains over time, increasing the speed, security and accuracy of financial and commercial settlements; tracking the supply chain lifecycle of any component or product; and securely protecting all the transactions and data moving through the supply chain.

What’s the Core Priority of Corporate Managers?

Irving Wladawsky-Berger

With few exceptions, shareholders are entitled to act entirely in their own interest within the bounds of the securities laws. In a recent Harvard Business Review article, - The Error at the Heart of Corporate Leadership , - Harvard Business School professors Joseph Bower and Lynn Paine raised a number of important questions. What’s the core priority of corporate’s management, the near-term gains of shareholders or the long-term health of the company?

Should Your Company Get on the Blockchain Learning Curve Now or Wait?

Irving Wladawsky-Berger

Blockchain has the potential to make our digital infrastructures much more secure, efficient and trustworthy, but it will take time. On the other hand, the business environment in 2017 is quite different from the one back then. A few weeks ago I wrote about the current state of blockchain.

Is Blockchain the Major Next Step in the Evolution of the Internet

Irving Wladawsky-Berger

To take its major next step, the Internet must overcome three such serious limitations: security, complexity, and trust. Security . Consequently, there’s no one overall owner responsible for security , let alone identity management, over the Internet. Security standards are necessary, but not sufficient. In the Fall of 1995, IBM made the decision to embrace the Internet and make it the centerpiece of its strategic directions.

Blockchain and the Future of the Firm

Irving Wladawsky-Berger

The on-demand economy would not be possible without the mobile devices and platforms that enable peer-to-peer transactions among individuals any time and place; the digital payment systems that reliably and securely broker the transactions between buyers and sellers; and the online reputation systems , where people rank buyers and sellers, - a critical requirement for the smooth functioning of collaborative markets.

Should the US Slowly Phase Out the $100 Bill?

Irving Wladawsky-Berger

At a panel on Ending Corruption at the World Economic Forum 2017 annual meeting in Davos, Joseph Stiglitz , - Columbia University professor and Nobel Prize-winning economist, - said that phasing out currency and moving towards a digital money economy would, over the long term, have “benefits that outweigh the cost.”. There are important issues of privacy, cyber-security, but it would certainly have big advantages.”.

A Novel Approach for Measuring the True Impact of the Digital Economy

Irving Wladawsky-Berger

Advances in the performance, costs, reliability and security of a cloud infrastructure benefit not only the cloud company making the investments but all its users regardless of industry.

Report 102

Mobile Payments - a Long, Relentless War of Attrition

Irving Wladawsky-Berger

It was positioned as a relatively easy, secure way to pay for purchases in physical stores as well as online using a variety of supported Apple devices including iPhones, iPads, Macs and Apple Watch. Apple Pay embraced a number of industry standards, including NFC (near-field communications) for contact-less payments; secure element , a dedicated device chip; and network-based tokenization to protect sensitive financial data. It’s not concerns over security or ease-of-use.

On the Governance of Blockchain: Lessons from the Internet

Irving Wladawsky-Berger

payments, smart contracts, securities clearance, insurance, etc.). T he Internet continues to have serious limitations for business and economic activity, - including security, complexity and trust.

AI and Public Policy

Irving Wladawsky-Berger

Remove the perceived and actual impediments to research on the fairness, security, privacy, and social impacts of AI systems. “Some interpretations of federal laws… are ambiguous regarding whether and how proprietary AI systems may be reverse engineered and evaluated by academics, journalists, and other researchers.

Jobs, Skills and Education

Irving Wladawsky-Berger

One of its key conclusions was that “Educational attainment is a clear and consistent marker when it comes to feelings about job security and future prospects.” . Most Americans are happy and secure in their jobs. They were more likely to believe that their current skills are insufficient to advance in their careers, while also feeling less secure about their current jobs.

Skills 100

The Future of Learning Management Systems: Development, Innovation and Change

Stephen Downes: Half an Hour

Comment: some IT people focus on security and privacy. Phil Hill Summary notes from the presentation at from at the World Conference on Online Learning , Toronto. Slides: [link] We forget about the perspective of time. Let’s look at 2011-2017. Thrun was saying (2012) 50 years from now there will only be ten institutions delivering higher education. This was the perfect example of hype not helping the industry.

System 148

The Evolution Toward Digital Supply Chains

Irving Wladawsky-Berger

So are drones, which are already being deployed in infrastructure maintenance, security, assets monitoring and other tasks across a number of industries. Blockchain technologies hold great promise for digital supply chains over time, increasing the speed, security and accuracy of financial and commercial settlements; tracking the supply chain lifecycle of any component or product; and securely protecting all the transactions and data moving through the supply chain.

Should Your Company Get on the Blockchain Learning Curve Now or Wait?

Irving Wladawsky-Berger

Blockchain has the potential to make our digital infrastructures much more secure, efficient and trustworthy, but it will take time. On the other hand, the business environment in 2017 is quite different from the one back then. A few weeks ago I wrote about the current state of blockchain.

Global Arbitrage and the Productivity Puzzle

Irving Wladawsky-Berger

For example, flexicurity - shorthand for flexible security, - is a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. A couple of weeks ago I wrote about The Productivity Puzzle , - namely that despite our continuing technology advances, the US and other developed economies have experienced a sharp decline in productivity growth over the past 10 to 15 years.

Jobs, Skills and Education

Irving Wladawsky-Berger

One of its key conclusions was that “Educational attainment is a clear and consistent marker when it comes to feelings about job security and future prospects.” . Most Americans are happy and secure in their jobs. They were more likely to believe that their current skills are insufficient to advance in their careers, while also feeling less secure about their current jobs.

Skills 100

Peering into a Confusing, Paradoxical Future

Irving Wladawsky-Berger

Governments will find it harder to satisfy the growing demands of their citizens, especially greater security and a higher standard of living. Every four years since 1997, the US National Intelligence Council has been publishing a Global Trends report on the key trends that will shape the world over the following twenty years. This unclassified strategic report is intended to provide the incoming administration and other senior leaders with a framework for long-range policy assessment.

Trends 106