Adventure & security

Dave Snowden

Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. By utility I really mean the ability to gain adoption of the idea in a early-majority/early adopter market so there is an element of marketability judgement involved in that.

Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. economic competitiveness and national security.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Generations, Social and Enterprise: adopt vs adapt

Martijn Linssen

and Social are about humans, people, change management, radical organisation change, and, in the end, about tools And, on the field of Integration, the theme of adopt versus adapt has always played the most significant role in my working life. Do we adopt the industry standards? If their environment doesnt adapt, they adopt their environment: slash and burn them into a subsidiary, a third, fourth or fifth leg. Employees arent used to adopting. Business or Pleasure? -

Your Twitter security is an egg, not an onion

Martijn Linssen

why not both Home About Contact Thursday, 13 January 2011 Your Twitter security is an egg, not an onion Hard to come up with a more fuzzy title really. In security models, an egg, with its very hard shell, represents a single barrier between the inside and the outside, that is very hard and tough - but once youre in, youre in. Subscribe Top Posts Generations, Social and Enterprise: adopt vs adapt Enterprise 2.0: Business or Pleasure? -

The False Promise of "Adopt now, and all will adapt"

Martijn Linssen

why not both Home About Contact Tuesday, 28 December 2010 The False Promise of "Adopt now, and all will adapt" Its the most widespread lie across IT. They seek fellow business partners and suppliers to do business with, or adapt themselves to new business opportunities so they can adopt the benefits of it They adopted their own business model once , and will tune and tweak it in a continuous fashion, with small steps at a time. Business or Pleasure? -

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Business or Pleasure? - why not both: Integration: your place or.

Martijn Linssen

Adopt vs adapt Adopt versus adapt is the central theme in Integration. For the last 15 years, its been the central question in my working life: who will adopt, and who will have to adapt? Trouble always is, whoever is leading in business, expects to be leading in IT too - which leads to painfully ugly IT solutions every now and then In order to be able to adopt or adapt, there must be something in place. Business or Pleasure? -

The Current State of Cloud Computing

Irving Wladawsky-Berger

What’s the current state of cloud computing? “The need for superior speed and agility continues to push companies toward cloud adoption,” said a recent McKinsey article, Debunking seven common myths about cloud. Security of in-house data centers is superior to the security on cloud.

Data 170

Could AI Reshape the Global Balance of Power?

Irving Wladawsky-Berger

serious mistakes and unintended consequences if public and private sector institutions adopt powerful AI technologies before they’re ready. AI has the potential to significantly advance national security. Apply AI to National Security Missions.

e-Clippings (Learning As Art): Wikipatterns: A How-To Site on Driving the Adoption of Wikis Within Your Organization

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « "The Name of the Game Is Work" (Business Week) | Main | Someone buy me this poster » August 28, 2007 Wikipatterns: A How-To Site on Driving the Adoption of Wikis Within Your Organization What a great resource.

Wiki 32

e-Clippings (Learning As Art): Big Basket of Stuff #2.in which even amnesiacs can remember games.students get connected and wikis get adopted.

Mark Oehlert

which even amnesiacs can remember games.students get connected and wikis get adopted. " The Top 10 Free Educational Video Games (John Rice) Game programming tools (Tony Forster ) 21 days of Wiki Adoption (Stewart Mader) Wikis at Work: Benefits and Practices by Jeanne C. which even amnesiacs can remember games.students get connected and wikis get adopted.

The Urgent Need for Wide-Scale Upskilling

Irving Wladawsky-Berger

Beyond GDP, it highlights the importance to society of providing workers with well-paying, reasonably secure, motivating jobs. Any definition presupposes a set of values about what matters – sustainability for some, productivity or security for others.

Skills 232

Cloud's Trillion Dollars 2030 Potential

Irving Wladawsky-Berger

Over the past year, a number of articles have pointed out that, in response to the pandemic, digital adoption by business and consumers has already reached levels that weren’t expected for many years. Adoption of emerging technologies. Adopt agile, cloud-native ways of working.

Data 158

Business and Technology Predictions for 2021 and Beyond

Irving Wladawsky-Berger

The adoption of new technological behaviours in response to the pandemic, from video-conferencing to online shopping, means usage has already reached levels that were not expected for many more years,” noted The Economist several months later.

Appearances

Dave Snowden

Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure.

Wiki 130

Ten IT Predictions for the Post-Pandemic New Normal

Irving Wladawsky-Berger

Remediate and adapt : “Identify shortcomings in existing IT environments such as decision support systems, remote work, and business/IT resiliency as well as addressing shortcomings in areas such as connectivity/security introduced during initial emergency responses.”.

Trends That Will Likely Shape a Highly Uncertain Year

Irving Wladawsky-Berger

A month later , McKinsey added that “we have vaulted five years forward in consumer and business digital adoption in a matter of around eight weeks.”.

Trends 175

The Economic Value of Artificial Intelligence

Irving Wladawsky-Berger

Companies that are slow to adopt these AI-based productivity improvements will find themselves at a serious competitive disadvantage. Developing economies will experience more modest GDP growth due to their lower AI adoption rates. Adoption time frames were another important factor, based on the percentage of use cases in each sector that can be implement in the near term (0-3 years), mid term (3-7 years) and long term (7+ years).

An Increasingly Digital “New Normal”

Irving Wladawsky-Berger

Adoption of new technologies and working models. This has caused many providers to rapidly test and adopt telehealth protocols that were often nonexistent in many medical offices before, and to navigate privacy compliance as well as patient receptivity to engaging in these new channels.”.

Data 204

The Transformative Power of Blockchain

Irving Wladawsky-Berger

It succinctly defines blockchain as “a shared, decentralized, cryptographically secured, and immutable digital ledger,” and then adds a few key attributes that are particularly important to enterprise blockchains: Accountability. Security. “Enterprise blockchains are fault-tolerant. But, to keep InternetOne as simple and flexible as possible, just about everything else, - including identity and security management, - became the responsibility of the applications in InternetTwo.

New Directions for Government in the Digital Age

Irving Wladawsky-Berger

A month later, McKinsey & Company added , “We have vaulted five years forward in consumer and business digital adoption in a matter of around eight weeks.”. Ensure security, privacy, autonomy, and citizen-owned identities.

The Urgent Need to Strengthen the Nation’s Resilience

Irving Wladawsky-Berger

These included a significant expansion of government support for scientific research in universities and R&D labs, leading to product innovations from the private sector and better weapons from the defense industry, - and making the US the most prosperous and secure nation in the world.

Issues 219

The Real Business of Blockchain

Irving Wladawsky-Berger

Blockchains support the secure exchange of value in the form of tokens. “Tokens might function as digital representations of physical assets, as a reward mechanism to incentivize network participants, or to enable the creation and exchange of new forms of value.”.

Recommendations for Good Practice Using AI in Learning

Stephen Downes: Half an Hour

Design for Bad Actors We’ve already seen cases where well-intentioned AI assistants have adopted patterns of objectionable behaviour, for example, Microsoft’s Tay bot. Secure AI Technology Managers should ensure AI applications for learning and development are secure.

Data 238

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Earlier this year, IBM conducted the largest study to date on the state of adoption of blockchain. With such technologies, you typically have a relatively small number of early adopters. A larger number of followers are waiting to learn from the early adopters’ experiences, while the laggards are not yet sure what the technology is about or if it applies to them. The Internet’s early adopters arrived in two phases.

How Can Blockchain Become a Truly Transformative Technology?

Irving Wladawsky-Berger

However, the eventual answer may lie somewhere in between, where the utility of select legacy systems is upgraded by DLT integration wherever appropriate, and DLT solutions witness a growth in enterprise adoption.”.

Can We Look Forward to a New Decade of Innovation?

Irving Wladawsky-Berger

Another reason for optimism is the rapid adoption of new technologies. “We’ve According to a 2019 task force on national security, US investment in R&D as a percentage of GDP peaked at 1.86% in 1964 but has declined from a little over 1% percent in 1990 to 0.66% in 2016.

e-Clippings (Learning As Art): Someone buy me this poster

Mark Oehlert

Buy 32

A sheep in wolves clothing

Dave Snowden

Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. That has been a depressingly common characteristics of most adoptions of new methods so its not suprise that the SAFe founders played to that weakness in purchasing executives.

The Economic Potential of The Internet of Things

Irving Wladawsky-Berger

Home - Energy management, security, safety, and automation of home chores. Offices - Organizational and personal productivity, training, energy monitoring, building security. The estimate is based on the likely evolution of technology over the next 10 years, the rates of IoT adoption, economic and demographic trends, and several other factors. Adoption depends on having certain technologies, organizational capabilities, and policies in place.

Data 194

Blockchain - the Networked Ecosystem is the Business

Irving Wladawsky-Berger

The essence of blockchain, notes the report , is that the unit of competition is the networked ecosystem , no longer a single enterprise. “As blockchain adoption continues to gather momentum, organizations must approach their blockchain strategies with the same rigor and commitment as any other new and transformative strategies. For example, e-mail and the Web played a crucial role in the mainstream adoption of the Internet in the early-to-mid 1990s.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate. These include social security ID, passport number, driver’s license number, e-mail address, telephone numbers, and login IDs and passwords. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

Data 176

The Identity Challenge: On the Internet, Nobody Knows You're a Dog

Irving Wladawsky-Berger

I recently read Better Identity in America , a report by the Better Identity Coalition , an organization launched earlier this year to focus on promoting the development and adoption of solutions for identity verification and authentication. The report outlines a policy agenda for improving the privacy and security of digital systems and help combat identity fraud. Change the way America uses the Social Security Number.

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

There’s generally a considerable time-lag between the time we start reading articles about their exciting potential and their adoption by companies and industries across the marketplace. This is evident by looking at the standards and governance the Internet had already adopted, as well as by the rapidly growing number of applications. I really liked how Johnson explained the fundamental problem with the Internet that blockchain is helping us address: identity and security.

Platforms, Blockchains, and the Evolution of Trust

Irving Wladawsky-Berger

The on-demand economy wouldn’t be possible without the mobile devices and platforms that enable peer-to-peer transactions among individuals any time and place; the digital payment systems that reliably and securely broker the transactions between buyers and sellers; and the social reputation systems , where people rank buyers and sellers, - a critical requirement for the smooth functioning of collaborative markets like Airbnb.

The Economic Value of Digital Identity

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Protects user privacy and ensures control over personal data: includes strong privacy and security safeguards, while giving users access to, and control over who can access their data. Identity plays a major role in our everyday life.

Data 151

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Earlier this year, IBM conducted the largest study to date on the state of adoption of blockchain. With such technologies, you typically have a relatively small number of early adopters. A larger number of followers are waiting to learn from the early adopters’ experiences, while the laggards are not yet sure what the technology is about or if it applies to them. The Internet’s early adopters arrived in two phases.

The Digitalization of the American Workforce

Irving Wladawsky-Berger

The digitalization of everything has both increased the potential of individuals and societies while contributing to widespread anxiety about its impact on jobs and economic inequalities. “And yet, for all of the evidence that big changes are underway, surprisingly little data exists to track the spread of digital adoption.”. Low digital occupations have a score below 33, and include security guards - 31; restaurant cooks, - 18; construction laborers - 17; and personal care aides - 14.

Skills 133

Impact of AI on Government - Opportunities and Challenges

Irving Wladawsky-Berger

More than 80 different federal occupations, employing over 130,000 workers, are likely be significantly transformed, including 30,000 in the Treasury Department, 16,000 in Defense, and 5,000 in Transportation, as well as a variety of occupations in independent agencies like the Securities and Exchange Commission and the Government Publishing Office. Top AI challenges include bias, security, transparency, employee knowledge, and federal budget and procurement processes.

The Slow, Steady March Towards Digital Money

Irving Wladawsky-Berger

As in previous years, the Symposium convened a group of leaders in their field to explore the state of adoption of digital money and its economic and societal impacts around the world. . Last year’s symposium introduced the Digital Money Readiness Index , a set of global metrics to help quantify digital money adoption based on various measures of socio-economic development. Digital money adoption is a slow changing, long haul commitment. .

Is Blockchain the Major Next Step in the Evolution of the Internet

Irving Wladawsky-Berger

The adoption process of foundational technologies like the Internet and blockchain is gradual, incremental and steady, because they must overcome many different kinds of barriers, - technological, organizational, governance, political. To take its major next step, the Internet must overcome three such serious limitations: security, complexity, and trust. Security . Security standards are necessary, but not sufficient.

Blockchain Beyond the Hype

Irving Wladawsky-Berger

Blockchain is still in its early phases of experimentation and adoption. Every piece of information in the ledger is secure because it’s encrypted using public-key cryptography , which can only be decrypted with the appropriate private key. Blockchain enables the members of an ecosystem to securely share data even if all the members are not fully trusted. Blockchain is 100% secure and tamper-proof.

Mobile Payments - a Long, Relentless War of Attrition

Irving Wladawsky-Berger

It was positioned as a relatively easy, secure way to pay for purchases in physical stores as well as online using a variety of supported Apple devices including iPhones, iPads, Macs and Apple Watch. Apple Pay embraced a number of industry standards, including NFC (near-field communications) for contact-less payments; secure element , a dedicated device chip; and network-based tokenization to protect sensitive financial data. It’s not concerns over security or ease-of-use.