Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Commoditization of software: people can go out and buy computers very easily, software too. A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Security is not convenient. It's like security intelligence.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. Lawsuits - a lot of data information, collected from preferred customer cards - there was a lawsuit from someone who slipped on water and fell, so the supermarket chain that he sued checked his record and saw that he was buying beer every week, so they came back and said he was probably drunk at the time. What you say online is not private, it is not secure, it is what you put on the billboard on I-15.

e-Clippings (Learning As Art): Someone buy me this poster

Mark Oehlert

Buy 41

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. Tool is a piece of code designed to do a particular thing. It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 248

Thoughts on privacy

Doc Searls

Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Another speaker was Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Some examples: Privacy by Design is a policy and code development movement led by Ann Cavoukian , the Information & Privacy Commissioner of Ontario.

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

You could track the status of your packages, access the latest sports results, check the weather of any city in the world or buy from an online catalog with nothing more than a browser and an Internet connection.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

Data 195

The UX of Money: Why is saving so hard?

Adaptive Path

We’d understand that financial security will ultimately satisfy us more than a $5 mocha on a chilly day. Already Ours (studies show that while people might not buy a $1000 espresso machine, if they won one in a raffle, they’re quite resistant to selling it, even for the same price). In my next post, I’ll explore how design can (and has) helped. Tags: Experience Design Interaction Design Finance Behavior Change

Price 116

Is Blockchain Now Transitioning to a More Mundane and Useful Era?

Irving Wladawsky-Berger

In August of 2018, Intercontinental Exchange , the parent company of the New York Stock Exchange , announced its plans to create a new company Bakkt , to enable consumers and institutions to safely buy, sell, store and spend digital assets.

Issues 188

Stockholm syndrome in strategy

Dave Snowden

Stockholm syndrome means that the hostages loose awareness of their position so they don’t fly out of the cage but come to love it for the false security it gives them.

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society. A few weeks ago, the World Economic Forum (WEF) published its annual list of the Top Ten Emerging Technologies for 2016.

Tips 207

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

You could track the status of your packages, access the latest sports results, check the weather of any city in the world or buy from an online catalog with nothing more than a browser and an Internet connection. While much progress has been made since someone named Satoshi Nakamoto released the original design in 2009, much remains to be done. I really liked how Johnson explained the fundamental problem with the Internet that blockchain is helping us address: identity and security.

How Will AI Likely Impact How We Work, Live and Play?

Irving Wladawsky-Berger

Public safety and security. “One of the more successful uses of AI analytics is in detecting white collar crime, such as credit card fraud. Hardware platforms remain challenging to build, and there are few applications that people want enough to buy.

System 262

Social Media Planning and Evaluation for NGOs | Full Circle Associates

Nancy White

This topic is designed to give you some tools and ideas for including social media appropriately in your overall organizational strategic plan and to measure its effectiveness.

What's the Future of Jobs?

John Hagel

Robots are already designing and building their compatriots. I believe that we all have an insatiable desire and need to achieve more of our potential , even though for many of us that desire and need has been suppressed by an educational system designed to prepare us for jobs that offer very limited opportunity to achieve more of our potential. What better time to reflect on the future of work and jobs than Labor Day?

Bigger is Not Necessarily Better in Our Information-Rich Digital Economy

Irving Wladawsky-Berger

By buying specialized services, in customized form and at modest cost, companies can create unique products, find buyers from across the world, and secure profits. How we train our students for this world will be critical to securing their future employment.” .

Issues 260

On cryptocurrencies, blockchain and all that

Doc Searls

“A digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Though technically they could be redeemed, many tokens are designed never to be redeemed but traded forever.

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

This Big Data comes from location data from your cell phone and transaction data about the things you buy with your credit card. Who you actually are is determined by where you spend time, and which things you buy.

Data 279

Enterprise 2.0 the Indian Way

Andy McAfee

So if a well-designed 2.0 based on vague ‘security’ concerns. the more inclined I am to encourage companies to throw caution to the wind : buy (or build) some well-designed lightweight tools that take advantage of emergence and game mechanics, find a few leaders willing to lead by example, and go live. On my recent trip to India (post here , pictures here and here ) I got to sit down with Ashok Krish and his team. Ashok is the head of the Web 2.0

Google enters its chrysalis

Doc Searls

Google will do this two ways: 1) through Contributor (an “ad removal pass” you buy) and 2) through subscriptions to YouTube TV (a $35/month cable TV replacement) and/or YouTube Red ($9.99/month for “uninterrupted music, ad-free videos, and more”). The Net is any-to-any, by any means, by design of its base protocols. In The Adpocalypse: What it Means , Vlogbrother Hank Green issues a humorous lament on the impending demise of online advertising.

The Leader's Guide to Radical Management: The Chinese Wikileaker.

Steve Denning

Or "making the emotional case for change" (Heath brothers)or by "fostering collaboration" or getting buy-in from the frontline or by communicating in the right way or establishing clear metrics or any of that stuff. "Designing Companies by Roger Martin).

Change 270

Evolve, Dammit!

Martijn Linssen

You think telecommuting would be the dream job – then realize your home is designed for distracted comfort rather than productive work. Thankfully, this was before Facebook – so her secret is safe (until someone decides to buy a scanner).

Mainframes and Clouds

Irving Wladawsky-Berger

IBM is now extending the benefits of its mainframe management architecture, including high efficiency, scalability, security and reliability, to other platforms in the data center, starting with Intel-based Linux systems and Power -based Unix systems. Mainframes were designed to support the most critical applications of a business, including banking, inventory management and airline reservations. Mainframes have been designed and optimized for such complex, data intensive workloads.

Data 181

The case for the death of cash by the hand of digital currencies

Ross Dawson

During the 2008-2009 global financial crisis cash issuance went up substantially, driven by fears that banks were not secure places to hold assets. Buying, storing, and transacting Bitcoin can be complex and unwieldy.

What Universities Must Learn About Social Networks

Jay Cross

Others will never do that for reasons of security, lack of the ability to customize, limited feature sets, or the risk of relying on a wildcard like Mark Zuckerberg. Very much like the continuous changes in social network software, network security is a day to day concern.

The Real Goal of Open Educational Resources

Stephen Downes: Half an Hour

On the other hand, the public domain title Pride and Prejudice is about $8 per new paperback copy In fact, I can buy Campbell's Biology right now for about $CAD 97 (about $US 70) on Amazon. I can buy the 3rd edition for about $CAD 18. First, citing Linus Torvalds, he says, "Don’t EVER make the mistake that you can design something better than what you get from ruthless massively parallel trial-and-error with a feedback cycle."

Time for digital emancipation

Doc Searls

Connecting that world is a network designed to put no restrictions on personal (or any) power, while reducing nearly to zero the functional distance between everybody and everything. Civilization is a draft. Provisional. Scaffolded. Under construction.

Carl Jackson on Supporting Online Communities in International Development

Nancy White

On the whole, the one group where it has been harder to get awarness and buy in is with is the scientists in climate science community. Within Eldis communities had a debate between experts on food security and gender, convened by BRIDGE at IDS. Design as if you are in their shoes.

e-Clippings (Learning As Art): A Flashback to an Angry Bill Gates

Mark Oehlert

I decided to download (Moviemaker) and buy the Digital Plus pack.so e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Firefox Can make even GMail Better | Main | SCORM 2.0 and Web 2.0

Why #VRM is Fools' Gold

Martijn Linssen

If I buy a bread, do I have relationship with the baker? If its any good, Ill go back and buy some more. If its very good, Ill go back, buy some more, and praise them whenever I can - until they mess up There is, in short, my relationship with a vendor: none.

Wiki 173

Taking Charge of your own Development

Harold Jarche

– It is not just design etc but will include making valuable things and even growing food – and new sites such as Etsy enable you to find a market.

Price 246

Jobs, work and technology

Harold Jarche

However, one can design sophisticated tools to significantly expand what people can accomplish when performing these activities. And, systems like Watson will be extensively used to help experts deal with highly complex problems in areas like medicine, finance and national security. Designing new bottles for deodorants or energy drinks or finding a new loophole in the law isn’t exactly helping design, craft, build, or maintain the Sistine Chapel.

Open, Collaborative Trust Frameworks

Irving Wladawsky-Berger

ID³ , - the Institute for Institutional Innovation by Data Driven Design, - is a new multidisciplinary non-profit institution formed to develop architectural frameworks, open source software and educational content for the protection, sharing and monetization of sensitive data. End users benefit from free, personalised consumer experiences such as Internet search, social networking or buying recommendations.” “And

Beyond Free ? Open Learning in a Networked World

Stephen Downes: Half an Hour

They are however designed to be standalone talks as well so hopefully you will not be as unfulfilled after the talk as you might be afraid of being. What I want to examine in this talk, is not the problem MOOCs solve at the moment but the problem MOOCs were designed to solve.

Best of Working Smarter Daily this year

Jay Cross

He rationalized it as a security precaution. Do pupils buy them? A Conversation with Gina Trapani: On Designing Meaningful Notifications ADAPTIVE PATH | WEDNESDAY, JUNE 26, 2013.

PKM 117

Earth to Mozilla: Come back home

Doc Searls

One of the main reasons Firefox has succeeded is that it, unlike all the other browsers, was dedicated to users unfettered, secure, and as private as possible use of the Internet. In the fifties, if you wanted to buy a toaster, you only had a few practical choices.

Jive 282

Leveraging Hal

Doc Searls

The wealth generated by this devastation created colossal corporations and financial operations far more powerful than elected governments; long ago the individuals who controlled these giants learned that it was cost-effective to buy up the politicians and turn governments into virtual subsidiaries. Investment banks and hedge funds were designed as perfect engines for multiplying the assets of the affluent.

Survey 188

Communication Nation: What do you love?

Dave Gray

Turning tragedy to triumph, family, technologys democratization of quality audio and video, authenticity, humor as a vessel for truth, progress, security, invention. Buy Gamestorming at B&N.com

List 151

Jobs That I've Had

Stephen Downes: Half an Hour

1975 - Greeting Card Sales - yes, I sold greeting cards door-to-door in Metcalfe, and actually sold enough to buy various things, including a set of two very nice hockey nets to use when we played street hockey. 1979-90 - Security Guard - after the job with Northern ended I caught on as a security Guard with National Protective Services in Ottawa.

Class 178

The Robot Teachers

Stephen Downes: Half an Hour

On the other hand, if our doctors were as hesitant to employ technology as our teachers sometimes are, our lives would be measurably shorter and inestimably less comfortable and less secure. Even while Canadians face a barrage of contrary media (for example, from the Fraser institute) they aren't buying it. But here's where the challenge arises for the education and university system: it was designed to support income inequality and designed to favour the wealthy.

R-Buttons and the Open Marketplace

Doc Searls

In some cases buyers have had room to haggle (such as with buying a horse or a car), but on the whole we customers pay what sellers ask. So is buying something. So, in a less direct way, is not buying. Three things happen in a marketplace.

Price 228

Wikileaks and the Long Haul ? Clay Shirky

Clay Shirky

If Aaron Bady’s analysis is correct, it is the damage and not the oversight that Wikileaks is designed to create. * ). Ex: if Visa found out a stolen credit card was being used to buy stolen goods… wouldn’t they try to block both the seller and the buyer? Clay Shirky. « The Times’ Paywall and Newsletter Economics. Half-formed thought on Wikileaks & Global Action » Wikileaks and the Long Haul.