Remove Adoption Remove Buy Remove Complexity Remove Security

Impact of AI on Government - Opportunities and Challenges

Irving Wladawsky-Berger

More than 80 different federal occupations, employing over 130,000 workers, are likely be significantly transformed, including 30,000 in the Treasury Department, 16,000 in Defense, and 5,000 in Transportation, as well as a variety of occupations in independent agencies like the Securities and Exchange Commission and the Government Publishing Office. Top AI challenges include bias, security, transparency, employee knowledge, and federal budget and procurement processes.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate. These include social security ID, passport number, driver’s license number, e-mail address, telephone numbers, and login IDs and passwords. For example, to buy alcohol, all you need is proof that the individual is over the legal drinking age.

Data 191

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

These are not only complex but esoteric subjects, as nicely illustrated in this funny video. There’s generally a considerable time-lag between the time we start reading articles about their exciting potential and their adoption by companies and industries across the marketplace. This is evident by looking at the standards and governance the Internet had already adopted, as well as by the rapidly growing number of applications.

Mobile Payments - a Long, Relentless War of Attrition

Irving Wladawsky-Berger

It was positioned as a relatively easy, secure way to pay for purchases in physical stores as well as online using a variety of supported Apple devices including iPhones, iPads, Macs and Apple Watch. Apple Pay embraced a number of industry standards, including NFC (near-field communications) for contact-less payments; secure element , a dedicated device chip; and network-based tokenization to protect sensitive financial data. It’s not concerns over security or ease-of-use.

Blockchain and Business Process Transformation

Irving Wladawsky-Berger

You could track the status of your packages, access the latest sports results, check the weather of any city in the world or buy a book or CD. The companies with the highest returns on their technology investments did more than just buy technology; they invested in organizational capital to become digital organizations.

How Will AI Likely Impact How We Work, Live and Play?

Irving Wladawsky-Berger

Public safety and security. “One of the more successful uses of AI analytics is in detecting white collar crime, such as credit card fraud. Hardware platforms remain challenging to build, and there are few applications that people want enough to buy. Artificial Intelligence Complex Systems Economic Issues Innovation Management and Leadership Political Issues Smart Systems Society and Culture Technology and Strategy

System 198

The Continuing Evolution of Cloud Computing

Irving Wladawsky-Berger

Early adopters viewed cloud as computing-on-demand. Instead of having to buy and operate their own hardware and software products, users could now obtain the computing resources they needed over the Internet on demand. . I nstead of having to buy computing resources up front, users now had the flexibility of only paying for whatever cloud resources they actually used. .

Blockchain and Business Process Transformation

Irving Wladawsky-Berger

You could track the status of your packages, access the latest sports results, check the weather of any city in the world or buy a book or CD. The companies with the highest returns on their technology investments did more than just buy technology; they invested in organizational capital to become digital organizations.

En Route to the Cashless Society

Irving Wladawsky-Berger

He writes about his experiences buying a cappuccino at a coffee house in New York City. And your smartphones will serve as beacons that will alert a retailer when you walk into its store so that it can recommend products, show you reviews, or direct you to aisle five, where that beanbag chair you didn't buy last week still beckons - and you can now have it for 10% off.” .

Information, Money and Related Subjects

Irving Wladawsky-Berger

Then in the 1990s, the wide adoption of the Internet and World Wide Web led not only to online banking, but paved the way for online shopping and e-commerce in general. The government offers them all kinds of welfare, but because they lack an identity, they struggle to lay hands on what they have been promised.” “For the poor, having a secure online identity alters their relationship with the modern world. Ordinary Indians will find it easier to buy and sell things online,”.

Data 172

Open, Collaborative Trust Frameworks

Irving Wladawsky-Berger

For example, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was launched by the White House earlier this year to enable “Individuals and organizations [to] utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.” End users benefit from free, personalised consumer experiences such as Internet search, social networking or buying recommendations.” “And

The Management of Disruptive Innovations

Irving Wladawsky-Berger

The management of disruptive innovations is very different when looking at relatively simple or self-contained technologies, products or services versus highly complex platforms and infrastructures. A lot of the hype you often hear when new innovations come about is the result of people not properly understanding the different dynamics that apply to simple versus highly complex innovations. The dynamics of innovation with complex platforms and infrastructures is quite different.

Bigger is Not Necessarily Better in Our Information-Rich Digital Economy

Irving Wladawsky-Berger

The report is focused on the growing gap in technology adoption between individuals and institutions. By buying specialized services, in customized form and at modest cost, companies can create unique products, find buyers from across the world, and secure profits. How we train our students for this world will be critical to securing their future employment.” .

Evolve, Dammit!

Martijn Linssen

Home About Complexity Reading List Knowledge Management Reading List Evolve, Dammit! military adopted ancient models when it structured decision making as a distributed function, within established rules and roles.

Individual Value Required

Tony Karrer

When you make this information fabric easy to edit between groups of individuals in a dynamic, secure, governed and real-time manner, it creates a Collaborative Network. Adoption starts based on individual value. Adoption in the Enterprise - It's Personal. I'm sure some people will buy into that, but I believe it's a much easier sell if you first focus on individual value.

Business or Pleasure? - why not both: Semantic Web - a tech fix.

Martijn Linssen

In between is a gray area of complexity where machines can assist humans Quoting Peter : objective semantics are an unreachable goal. If the technology was so useful then we would have seen significant adoption in this time. It is its size and dynamics that makes it so complex.

Interop: The Book

David Weinberger

Interop also can help diffuse adoption. Example 3: Credit cards are highly interoperable: whatever your buying opportunity is, you can use a selection of cards that work with just about any bank. Observations: this level of interop comes with costs and risks: identity thefts, security problems, etc. Observations: It can take a long time, because of the many actors, legacy problems, and complexity.

The 2016 Look at the Future of Online Learning

Stephen Downes: Half an Hour

Listen to this, from the 'Context' section: "it it is not technology that drives adoption; it is the institutional strategy, the changing nature of the student population and the decisions of individual instructors and faculty members." Serious games will move through various phases, from simple memorization games (such as versions of Jeopardy ) to simply branching storyline games to more complex gaming environments intended to stimulate deep knowledge and causal reasoning.

Social Media Planning and Evaluation for NGOs | Full Circle Associates

Nancy White

Whenever considering adopting a solution consider asking the following three questions. (1) 3) What new problems are likely to arise by adopting it? I think the larger and more bureaucratic the organization, the slower it is able to adapt, adopt and change.

I Know It When I See It

Andy McAfee

An integrated and seamless ability to have some sense of security in the audience can increase the level of disclosure which in turn can foster a higher level of collaboration that can benefit the community writ large. I do not interprete the post to drop security. That said, the challenge in reality is to balance real world concerns of liability and complex org structures within a single environment.

Reflections on Cloud Computing

Irving Wladawsky-Berger

It's wildly popular with startups, exactly fits the way small businesses like to buy things, and has the potential to completely upend IT as we know it. Cloud applications are very different from classic IT applications, whose intrinsic complexities are barely hidden from their users. Not at all, any more than the Web proved important only to its early adopters. Quality, security and availability will suffer.

Data 100

Propensities

Dave Snowden

His work is to generalise Darwinian principles of variation, selection and replication which (he says) apply to all complex population systems although its not quite universal. complexity (dense recursive interactions). Now creating a security invariant.

ROI 130

MOOC - The Resurgence of Community in Online Learning

Stephen Downes: Half an Hour

Taylor and eventually adopted by OERu which preserved the openness of resources and courses, but kept closed access to assessments and credentials. Dictionary meanings and verb conjugations are, at the very best, an abstraction of the much more complex set of practices, attitudes and beliefs common among physicists. This may be as simple as translating a block of text into a picture, or as difficult as representing a complex idea in another language.

Course 203

The Future of Online Learning: Ten Years On

Stephen Downes: Half an Hour

Simple devices – from the One Laptop Per Child computer to the Asus Eee to the Nokia internet tablet to Apple’s iPhone now allow people to run complex software with very simple devices. Oehlert, 2006) Ands we can see learning management systems such as Desire2Learn adopt the same approach to design, creating personalized course home pages out of a set of associated widgets. And as I noted ten years ago, this model of education was adopted because it was the most efficient.

e-Clippings (Learning As Art): Big Basket of Stuff #1: Wikis, IMs, and 3D

Mark Oehlert

which even amnesiacs can remember games.students get connected and wikis get adopted. Meebo has said that this API will " further accelerate the widespread adoption of Meebo rooms." Make3D turns your vacation photos into 3D worlds: "Ever wish you could recreate the effect of those neat multilens 3D cameras without having to buy the hardware? If a word or phrase is more complex, SpeakLike will go to a human translator and make sure its accurate.

Wiki 32

The OER Debate, In Full

Stephen Downes: Half an Hour

It is a complex topic which incorporates multiple perspectives and questions in relation to commercial use of OER, for example: Should OER protect the future freedoms of users and creators or the resources themselves? After a few months, however, I became concerned because adoption of the license wasn’t great. Early in 1999 I reached out to Eric Raymond, Tim O’Reilly, and others for help thinking through how to solve the adoption problem.

Ethical Codes and Learning Analytics

Stephen Downes: Half an Hour

To become a nurse is, for example, to adopt as a personal code the ethical norms and values that define that particular profession. Security applications are common. To support physical security, facial and object recognition technology is being used in schools and institutions. For digital security, analytics applications that help filter unwanted messages (whether sent by humans or bots) are generally available and widely used.