Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Commoditization of software: people can go out and buy computers very easily, software too. A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Security is not convenient. It's like security intelligence.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. Lawsuits - a lot of data information, collected from preferred customer cards - there was a lawsuit from someone who slipped on water and fell, so the supermarket chain that he sued checked his record and saw that he was buying beer every week, so they came back and said he was probably drunk at the time. What you say online is not private, it is not secure, it is what you put on the billboard on I-15.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

e-Clippings (Learning As Art): Someone buy me this poster

Mark Oehlert

Buy 41

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. Tool is a piece of code designed to do a particular thing. It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor.

Building a More Resilient, Data-Driven Economy

Irving Wladawsky-Berger

Data captures our behavior as we go about our daily life, - the things we buy, the web sites we access, the people we interact with, the locations our cell phones leave behind as we move around the world.

Data 188

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 238

Thoughts on privacy

Doc Searls

Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Another speaker was Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Some examples: Privacy by Design is a policy and code development movement led by Ann Cavoukian , the Information & Privacy Commissioner of Ontario.

e-Clippings (Learning As Art): Tom and I disagree and then I kinda support his argument?

Mark Oehlert

Recently a fairly rare thing occurred and Tom Crawford an I disagreed about something - and it wasnt whos turn it was to buy the round - it was about my post on the Kindle.

The UX of Money: Why is saving so hard?

Adaptive Path

We’d understand that financial security will ultimately satisfy us more than a $5 mocha on a chilly day. Already Ours (studies show that while people might not buy a $1000 espresso machine, if they won one in a raffle, they’re quite resistant to selling it, even for the same price). In my next post, I’ll explore how design can (and has) helped. Tags: Experience Design Interaction Design Finance Behavior Change

Price 116

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

Data 190

Stockholm syndrome in strategy

Dave Snowden

Stockholm syndrome means that the hostages loose awareness of their position so they don’t fly out of the cage but come to love it for the false security it gives them.

Is Blockchain Now Transitioning to a More Mundane and Useful Era?

Irving Wladawsky-Berger

In August of 2018, Intercontinental Exchange , the parent company of the New York Stock Exchange , announced its plans to create a new company Bakkt , to enable consumers and institutions to safely buy, sell, store and spend digital assets.

Is the Blockchain Now Reaching a Tipping Point?

Irving Wladawsky-Berger

Foremost among the problems to be addressed is the need to bolster security in our increasingly digital economy and society. A few weeks ago, the World Economic Forum (WEF) published its annual list of the Top Ten Emerging Technologies for 2016.

Tips 207

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

You could track the status of your packages, access the latest sports results, check the weather of any city in the world or buy from an online catalog with nothing more than a browser and an Internet connection. While much progress has been made since someone named Satoshi Nakamoto released the original design in 2009, much remains to be done. I really liked how Johnson explained the fundamental problem with the Internet that blockchain is helping us address: identity and security.

Social Media Planning and Evaluation for NGOs | Full Circle Associates

Nancy White

This topic is designed to give you some tools and ideas for including social media appropriately in your overall organizational strategic plan and to measure its effectiveness.

What's the Future of Jobs?

John Hagel

Robots are already designing and building their compatriots. I believe that we all have an insatiable desire and need to achieve more of our potential , even though for many of us that desire and need has been suppressed by an educational system designed to prepare us for jobs that offer very limited opportunity to achieve more of our potential. What better time to reflect on the future of work and jobs than Labor Day?

How Will AI Likely Impact How We Work, Live and Play?

Irving Wladawsky-Berger

Public safety and security. “One of the more successful uses of AI analytics is in detecting white collar crime, such as credit card fraud. Hardware platforms remain challenging to build, and there are few applications that people want enough to buy.

System 257

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

This Big Data comes from location data from your cell phone and transaction data about the things you buy with your credit card. Who you actually are is determined by where you spend time, and which things you buy.

Data 276

On cryptocurrencies, blockchain and all that

Doc Searls

“A digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Though technically they could be redeemed, many tokens are designed never to be redeemed but traded forever.

Enterprise 2.0 the Indian Way

Andy McAfee

So if a well-designed 2.0 based on vague ‘security’ concerns. the more inclined I am to encourage companies to throw caution to the wind : buy (or build) some well-designed lightweight tools that take advantage of emergence and game mechanics, find a few leaders willing to lead by example, and go live. On my recent trip to India (post here , pictures here and here ) I got to sit down with Ashok Krish and his team. Ashok is the head of the Web 2.0

The Leader's Guide to Radical Management: The Chinese Wikileaker.

Steve Denning

Or "making the emotional case for change" (Heath brothers)or by "fostering collaboration" or getting buy-in from the frontline or by communicating in the right way or establishing clear metrics or any of that stuff. "Designing Companies by Roger Martin).

Change 270

Evolve, Dammit!

Martijn Linssen

You think telecommuting would be the dream job – then realize your home is designed for distracted comfort rather than productive work. Thankfully, this was before Facebook – so her secret is safe (until someone decides to buy a scanner).

Google enters its chrysalis

Doc Searls

Google will do this two ways: 1) through Contributor (an “ad removal pass” you buy) and 2) through subscriptions to YouTube TV (a $35/month cable TV replacement) and/or YouTube Red ($9.99/month for “uninterrupted music, ad-free videos, and more”). The Net is any-to-any, by any means, by design of its base protocols. In The Adpocalypse: What it Means , Vlogbrother Hank Green issues a humorous lament on the impending demise of online advertising.

Mainframes and Clouds

Irving Wladawsky-Berger

IBM is now extending the benefits of its mainframe management architecture, including high efficiency, scalability, security and reliability, to other platforms in the data center, starting with Intel-based Linux systems and Power -based Unix systems. Mainframes were designed to support the most critical applications of a business, including banking, inventory management and airline reservations. Mainframes have been designed and optimized for such complex, data intensive workloads.

Data 173

The case for the death of cash by the hand of digital currencies

Ross Dawson

During the 2008-2009 global financial crisis cash issuance went up substantially, driven by fears that banks were not secure places to hold assets. Buying, storing, and transacting Bitcoin can be complex and unwieldy.

What Universities Must Learn About Social Networks

Jay Cross

Others will never do that for reasons of security, lack of the ability to customize, limited feature sets, or the risk of relying on a wildcard like Mark Zuckerberg. Very much like the continuous changes in social network software, network security is a day to day concern.

Carl Jackson on Supporting Online Communities in International Development

Nancy White

On the whole, the one group where it has been harder to get awarness and buy in is with is the scientists in climate science community. Within Eldis communities had a debate between experts on food security and gender, convened by BRIDGE at IDS. Design as if you are in their shoes.

The Real Goal of Open Educational Resources

Stephen Downes: Half an Hour

On the other hand, the public domain title Pride and Prejudice is about $8 per new paperback copy In fact, I can buy Campbell's Biology right now for about $CAD 97 (about $US 70) on Amazon. I can buy the 3rd edition for about $CAD 18. First, citing Linus Torvalds, he says, "Don’t EVER make the mistake that you can design something better than what you get from ruthless massively parallel trial-and-error with a feedback cycle."

Why #VRM is Fools' Gold

Martijn Linssen

If I buy a bread, do I have relationship with the baker? If its any good, Ill go back and buy some more. If its very good, Ill go back, buy some more, and praise them whenever I can - until they mess up There is, in short, my relationship with a vendor: none.

Wiki 173

e-Clippings (Learning As Art): A Flashback to an Angry Bill Gates

Mark Oehlert

I decided to download (Moviemaker) and buy the Digital Plus e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Firefox Can make even GMail Better | Main | SCORM 2.0 and Web 2.0

Time for digital emancipation

Doc Searls

Connecting that world is a network designed to put no restrictions on personal (or any) power, while reducing nearly to zero the functional distance between everybody and everything. Civilization is a draft. Provisional. Scaffolded. Under construction.

Jobs, work and technology

Harold Jarche

However, one can design sophisticated tools to significantly expand what people can accomplish when performing these activities. And, systems like Watson will be extensively used to help experts deal with highly complex problems in areas like medicine, finance and national security. Designing new bottles for deodorants or energy drinks or finding a new loophole in the law isn’t exactly helping design, craft, build, or maintain the Sistine Chapel.

Taking Charge of your own Development

Harold Jarche

– It is not just design etc but will include making valuable things and even growing food – and new sites such as Etsy enable you to find a market.

Price 231

Beyond Free ? Open Learning in a Networked World

Stephen Downes: Half an Hour

They are however designed to be standalone talks as well so hopefully you will not be as unfulfilled after the talk as you might be afraid of being. What I want to examine in this talk, is not the problem MOOCs solve at the moment but the problem MOOCs were designed to solve.

Open, Collaborative Trust Frameworks

Irving Wladawsky-Berger

ID³ , - the Institute for Institutional Innovation by Data Driven Design, - is a new multidisciplinary non-profit institution formed to develop architectural frameworks, open source software and educational content for the protection, sharing and monetization of sensitive data. End users benefit from free, personalised consumer experiences such as Internet search, social networking or buying recommendations.” “And

Earth to Mozilla: Come back home

Doc Searls

One of the main reasons Firefox has succeeded is that it, unlike all the other browsers, was dedicated to users unfettered, secure, and as private as possible use of the Internet. In the fifties, if you wanted to buy a toaster, you only had a few practical choices.

Jive 277

Communication Nation: What do you love?

Dave Gray

Turning tragedy to triumph, family, technologys democratization of quality audio and video, authenticity, humor as a vessel for truth, progress, security, invention. Buy Gamestorming at B&

List 151

Jobs That I've Had

Stephen Downes: Half an Hour

1975 - Greeting Card Sales - yes, I sold greeting cards door-to-door in Metcalfe, and actually sold enough to buy various things, including a set of two very nice hockey nets to use when we played street hockey. 1979-90 - Security Guard - after the job with Northern ended I caught on as a security Guard with National Protective Services in Ottawa.

Class 178

Leveraging Hal

Doc Searls

The wealth generated by this devastation created colossal corporations and financial operations far more powerful than elected governments; long ago the individuals who controlled these giants learned that it was cost-effective to buy up the politicians and turn governments into virtual subsidiaries. Investment banks and hedge funds were designed as perfect engines for multiplying the assets of the affluent.

Survey 176

The Robot Teachers

Stephen Downes: Half an Hour

On the other hand, if our doctors were as hesitant to employ technology as our teachers sometimes are, our lives would be measurably shorter and inestimably less comfortable and less secure. Even while Canadians face a barrage of contrary media (for example, from the Fraser institute) they aren't buying it. But here's where the challenge arises for the education and university system: it was designed to support income inequality and designed to favour the wealthy.

R-Buttons and the Open Marketplace

Doc Searls

In some cases buyers have had room to haggle (such as with buying a horse or a car), but on the whole we customers pay what sellers ask. So is buying something. So, in a less direct way, is not buying. Three things happen in a marketplace.

Price 218

Wikileaks and the Long Haul ? Clay Shirky

Clay Shirky

If Aaron Bady’s analysis is correct, it is the damage and not the oversight that Wikileaks is designed to create. * ). Ex: if Visa found out a stolen credit card was being used to buy stolen goods… wouldn’t they try to block both the seller and the buyer? Clay Shirky. « The Times’ Paywall and Newsletter Economics. Half-formed thought on Wikileaks & Global Action » Wikileaks and the Long Haul.

Interop: The Book

David Weinberger

Interop is a design challenge. Example 3: Credit cards are highly interoperable: whatever your buying opportunity is, you can use a selection of cards that work with just about any bank. Observations: this level of interop comes with costs and risks: identity thefts, security problems, etc. This is a design problem. ” We need to do this by design up front, deciding what the optimal interop is in each case.