Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

Earlier this year, the World Economic Forum (WEF) published an excellent report, A Blueprint for Digital Identity. The report lays out a framework for the creation of digital identity systems, and discusses the benefits that such systems would bring to their various stakeholders.

Data 251

Is Blockchain the Major Next Step in the Evolution of the Internet

Irving Wladawsky-Berger

The WEF report compared the blockchain to the Internet, noting that “Like the Internet, the blockchain is an open, global infrastructure upon which other technologies and applications can be built.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Blockchain Killer-Apps

Irving Wladawsky-Berger

Spreadsheets and word processing were major factors in the 1980s adoption of personal computers, for example. In August of 2016, the WEF published a very good report on how blockchain can help reshape the financial services industry.

Data 164

My New Cheese – Lead Social Business Enabler for IBM’s w3 and www Connections

Luis Suarez

And serendipity, as you all know, works in various mysterious and magic ways, so after having looked both inside and outside of the firewall, I am now pleased to announce I have got a new job. This is it! The moment of truth! The wait is over.

Micro-blogging can help build your organisational culture

Dan Pontefract

In late 2010, the Corporate Leadership Council released its quarterly engagement trends report. When micro-blogging is brought to fruition inside the organization, safely tucked within the corporate firewalls, the connection can be extremely powerful.

Lessons from a Very Mobile Industry

Andy McAfee

The large majority of the world’s smartphones now run on an operating system originating from an American company, and I bet that most of the most popular apps in the world are of American origin (especially if we exclude the very large walled garden behind the Great Firewall of China).

Dear C-Suite: We Don’t Do Training Anymore

Dan Pontefract

Jane reports that 68 per cent of those working in HR or L&D consider formal training and eLearning “to be of little or no value for them in the workplace.” In 2012, Peter Aceto, the President and CEO of ING DIRECT – a Canadian bank with 1.78

Blockchain Killer-Apps

Irving Wladawsky-Berger

Spreadsheets and word processing were major factors in the 1980s adoption of personal computers, for example. In August of 2016, the WEF published a very good report on how blockchain can help reshape the financial services industry. The report concluded that blockchain technologies have great potential to drive simplicity and efficiency through the establishment of new financial services infrastructure, processes and business models.

Business or Pleasure? - why not both: Enterprise 2.0: a simple.

Martijn Linssen

We've spent much time through the years developing systems of roles, rights and security within the enterprise to control flow of information inside the firewall, but I'm astonished by how rarely this is spoken or written of in regards to Enterprise going social, be it vendor or customer.

Learning With and From Others: Restructuring Budgets for Social Learning

Dan Pontefract

In a 2009 IDC report, training budgets decreased on average by 19.5 ASTD reports staffing in learning-related roles dropped 8 percent in 2009. The trend may have started with Facebook and Twitter being used inside company firewalls as a toe in the water, but it quickly shifted to specific social media tools being developed for specific corporate uses. Originally posted to T+D Magazine, January 2011 Edition. Reprinted here with permission. original link here ).

How to Replace Top-Down Training with Collaborative Learning (3)

Jay Cross

Conventions like ASCII, programming languages, Internet protocol, and encryption were developed for corporate mainframe computers and only later adopted for personal computers. You probably can’t afford, and definitely don’t need, to create your own Facebook or Google behind your firewall.

Reflections from 2011 – A World Without Email – The Documentary

Luis Suarez

I mean, the progress report, because the initiative itself has been working wonderfully all right all along. Ok, before I get started with that progress report, a word of caution though, I am actually going to do something different this time around.

The Soft Skills of Collaboration and The Social Enterprise

Luis Suarez

IBM has got a presence in over 170 countries, with 400k employees, distributed in over 2000 offices, with 50% of its population with less than 5 years at IBM, with 73% of managers with remote employees reporting to them, and with over 40% of the entire workforce working mobile.

Skills 228

Web 2.0 Applications in Learning

Tony Karrer

As such, I'm trying to: Report and discuss the results of an introductory survey that I conduct (thanks to the suggestion via Conference Breakout Sessions ). Existing Adoption At the very start I asked the audience for examples of where they were currently using these tools as part of learning solutions. I discussed the fact that there was a common Adoption Pattern that went from personal adoption to work groups to organization.

Why Corporate Training is Broken And How to Fix It

Jay Cross

Many of the corporations that adopted eLearning fell under the same mistaken spell that beguiled investors. The American Society for Training and Development (ASTD) reports that companies spend $1,067 per employee (2.7% Why Corporate Training is Broken And How to Fix It.

How To 194

Is it too late to save the Net from the carriers?

Doc Searls

But today, that freedom won’t survive much longer if a federal court — the second most powerful court in the nation behind the Supreme Court, the DC Circuit — is set to strike down the nation’s net neutrality law, a rule adopted by the Federal Communications Commission in 2010.

Informal Learning – the other 80%

Jay Cross

Workers reported that informal learning was three times more important in becoming proficient on the job than company-provided training. Most workers report that they often need to work around formal procedures and processes to get their jobs done.

Communities and Networks Connection Hotlists

Nancy White

45 provocative propositions about using social technology - Social Reporter , April 6, 2009. Helping councils learn to share with social media - Social Reporter , April 5, 2009. Sources for social technology propositions - please mix your own - Social Reporter , April 10, 2009.

[ugc3] The Evolution of UGC

David Weinberger

Robert Cohen talks about business adoption of virtual worlds. Q: The press is reporting that SecondLife has stumbled in growth and development. But IBM has shown a way to connect virtual worlds through a firewall. Dan Hunter of NY Law School begins with an informal talk called “UGC: From Threat He disagrees with Eli Noam that the end game will be commercialization. [ Ah, the exceptionalist battle is joined! ]

Increasing “Jointness” and Reducing Duplication in DoD Intelligence

Martijn Linssen

While modest gains have been made in breaking down “stovepipes,” the initial energy of these “collaborative” efforts has waned and increased spending has largely cemented bad habits: siloed analytic reporting that fuels massive duplication of effort.

Wrong on Education

Stephen Downes: Half an Hour

Rural communities tend to do less well than the cities, and regions slow to adopt newer educational methodologies - notably the Maritime provinces - also fare more poorly. While the data depict a continuously improving situation, Cunningham reports"fad after fad, failure after failure."

From workplace courses to global conversations

Nancy White

They report their experiences and give their ideas as to how organizations could give space to this new way of learning. From behind the firewall to beyond the firewall The dramatic drop of costs of ICT (server space, memory, user hardware, bandwidth etc), combined with improved access and usability have transformed information scarcity to information overload.

Course 100

From courses to community: Josien Kapma and Nancy White | Full Circle Associates

Nancy White

They report their experiences and give their ideas as to how organizations could give space to this new way of learning. From behind the firewall to beyond the firewall The dramatic drop of costs of ICT (server space, memory, user hardware, bandwidth etc), combined with improved access and usability have transformed information scarcity to information overload.

Course 100

Content Delivery Networks

Stephen Downes: Half an Hour

For software, an engineering methodology is adopted, Everything is coded in C, complied with gcc. Perceived failures – a lot of people see Akamai in their firewalls and think it’s attacking them, because they never requested anything from Akamai.