Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Companies are finding that cyber-attacks are costly to prevent and recover from. Why wasn’t stronger security designed into the original Internet infrastructure?

online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online.

cooperation, measurement, security and more

Harold Jarche

The test company lobbyists convince politicians that grading teachers and schools is as easy as grading cuts of meat. A huge publishing company from the UK has spent $8 million in the past decade lobbying Congress.

If credit card companies cared about security…

David Weinberger

When there’s a security issue, they wouldn’t robocall people and ask them to provide personal information. They would robocall people and ask them to call the number on the back of their cards. They would put people’s photographs on their credit cards. Citi used to offer that as a free option, but apparently has discontinued the practice

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

The article makes a strong case for flexicurity - shorthand for flexible security, - a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. Entrepreneurship and flexible security.

A Company's Four Seasons

Martijn Linssen

Sometimes, very rarely, one of these is a private company, mammoth-size of course, a multinational enterprise gone wild. The entrepreneur launches his company, hires a few people, and prepares everything to grow, get out there, spread the word. Business or Pleasure? -

Employee Training in Cyber Security: 4 Tips and Techniques


The current landscape of cyber security is frightening and implementing processes to tackle the growing problem seems daunting. 48 percent of data security breaches are caused by acts of malicious intent. Of course, larger companies are also common targets of cyber attacks. After examining the current cybersecurity landscape, organizations have a very clear recourse: train end-user (non-IT) employees in cyber security protocols. Security.

About face

Doc Searls

The FBI’s Next Generation Identification (NGI) , involves (says Wikipedia) eleven companies and the National Center for State Courts (NCSC). If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.”

Should Your Company Get on the Blockchain Learning Curve Now or Wait?

Irving Wladawsky-Berger

Blockchain has the potential to make our digital infrastructures much more secure, efficient and trustworthy, but it will take time. What should your company do? How should your company decide when and how to best embrace a disruptive new technology like blockchain?

An LMS Balances the Needs of Companies and Employees


A company can reach new heights of success by praising the contributions of hard working individuals and leveraging their work as fuel for the business system. can be stored online in a secure location. An LMS Serves Company Needs, Too.

The problem for people isn’t advertising, and the problem for advertising isn’t blocking. The problem for both is tracking.

Doc Searls

In Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking , @JuliaAngwin and @ProPublica unpack what the subhead says well enough: “Google is the latest tech company to drop the longstanding wall between anonymous online ad tracking and user’s names.”

Should Your Company Get on the Blockchain Learning Curve Now or Wait?

Irving Wladawsky-Berger

Blockchain has the potential to make our digital infrastructures much more secure, efficient and trustworthy, but it will take time. What should your company do? How should your company decide when and how to best embrace a disruptive new technology like blockchain? The legacy assets of older companies were like a noose around their neck. Established companies cannot possibly compete with startups on focus and speed.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

Lois Scott- Clinidata The biggest challenge for private sector companies in health care is to convince public sector that we are trustworthy - the prevailing view is that we would do anything for the big buck. The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. They are 24 year-olds that are running companies.

Megaliths to Cathedrals in good company

Dave Snowden

That plus a selection of local cheeses ( Cornish Yarg is one of my favourites and I'd secured some the previous day) along with local strawberries and fresh bread served well. The end of a long day, weather, good company and interest made it pass quickly.

Ask not what your company can do for you,?

Martijn Linssen

why not both Home About Contact Friday, 21 January 2011 Ask not what your company can do for you,? Quora: a gossiper's wet dream Twitter punctuation manners Ask not what your company can do for you,? Business or Pleasure? -

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

I used to advise big companies on the internet. So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. So maybe in your company people are passing around jokes, maybe racist jokes. We had someone from a health care company here in Moncton saying nobody is giving her advice, and the info she was getting was wrong. You are not secure.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.

Harold Jarche » Big Consulting Companies Jumping on Bandwagon 2.0

Harold Jarche

ralphmercer: committees are place to lure great ideas to be killed while absolving everyone of the blame hjarche: innovation is something you create from thinking & doesn’t usually come from existing practices that others are following [link] hjarche: Our Future: Security, Consumption, Participation and/or Green? That means big companies charging big fees for cookie-cutter solutions.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor. The inherent linearity and security of SP may have specific value in the context you noted.

Business or Pleasure? - why not both: Do you Fear the End-Of-Year.

Martijn Linssen

Targets - Selling targets, purchase targets, license targets, billable hours targets, call-close targets: if you work for a large company, you probably have some. Your companys? Yet the combined result is used by the company to indicate your total salary. Business or Pleasure? -

Business or Pleasure? - why not both: On the Return On R&D

Martijn Linssen

why not both Home About Contact Saturday, 23 October 2010 On the Return On R&D After my last post , where I showed Apple to be the least innovative company around, some words were exchanged on that conclusion (.). We can only simply notice that Apple is a very innovative company, for example.

ServiceDeskPhobia: one-idiot-fits-all

Martijn Linssen

why not both Home About Contact Friday, 27 August 2010 ServiceDeskPhobia: one-idiot-fits-all Today I had the unpleasant experience that my companys email server was down - all morning and well into the after lunch dip even. Business or Pleasure? -

Real Profitability Part II: classical System Integrators

Martijn Linssen

One would expect consulting to be the product for these companies, and training / education being the R&D. Quora: a gossiper's wet dream Twitter punctuation manners Ask not what your company can do for you,? Business or Pleasure? -

System 188

Business or Pleasure? - why not both: Core-business versus.

Martijn Linssen

B2B e.g. is hardly any companys core-business, but it always becomes business-critical when over 90% of your order-entry flows fully automated through your company from outside - and then what? Business or Pleasure? -

The Transformative Power of Blockchain

Irving Wladawsky-Berger

It succinctly defines blockchain as “a shared, decentralized, cryptographically secured, and immutable digital ledger,” and then adds a few key attributes that are particularly important to enterprise blockchains: Accountability. Security. “Enterprise blockchains are fault-tolerant.

sCRM, the M:M Customer Crush?

Martijn Linssen

In my last post I dove into Social CRM tools and what they do, or enable companies to do. It didnt strike me until later that there actually is a real danger in executing Social CRM: it destroys relationships we currently are used to - in our company. Business or Pleasure? -

Business or Pleasure? - why not both: Would more Influence fix.

Martijn Linssen

Quora: a gossiper's wet dream Twitter punctuation manners Ask not what your company can do for you,? The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter?

Why I have doubt about @Klout

Martijn Linssen

I figured out that Im 1.5-10 times as "strong" as my current company , that Tweeps are 35 times as active as Facebook users , and other findings - some of which arent that appropriate to publish (yet?) Business or Pleasure? -

e-Clippings (Learning As Art): "Using the Company as the Classroom" (Business Week)

Mark Oehlert

» June 05, 2008 "Using the Company as the Classroom" (Business Week) ( Story Link ) "In 2006 alone, U.S. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Stephen Downes, Storms and the Karl Kapp Instant Session | Main | Liveblogging Sid Meier 2. organizations spent an estimated $129 billion on employee learning, according to the American Society for Training and Development.

Irving Wladawsky-Berger: Hybrid Models of Capitalism

Irving Wladawsky-Berger

It examines the changes taking place in Japanese companies in the past decade as they are developing a new industrial model that combines elements of the old Japanese way of doing things with some carefully chosen bits of American capitalism. The very survival of the company was at stake.

Report 130

Foreign Planes Are Prohibited, but Foreign Trains Are Fine?

Nine Shift

city. -A foreign train company can build and run passenger trains from one U.S. are deemed a risk to our national security since they are not owned by a domestic company. Domestic companies are presumably subject to the laws and regulations of the U.S. Government as well as assumed to be somewhat "patriotic" and wouldn't operate in the best interests of a foreign country in a national security situation. at no presumed risk to national security? .

Irving Wladawsky-Berger: The Complex Chemistry between Brands and Customers - Some Personal Experiences

Irving Wladawsky-Berger

Once established, brand relationships can be extremely helpful to a business - especially if the company runs into serious problems in the marketplace. What do you do when you are upset with a company and there are alternative offerings in the marketplace?

e-Clippings (Learning As Art): "Is Web 2.0 Safe?" (MSN article)

Mark Oehlert

MSN article) Here is the shocking synopsis of this article : Security needs to be better in Web 2.0 More people will of course try to break into that data or exploit browsers but thats now new; the corollary however is that as more companies come to depend on Web 2.0

Doc Searls Weblog · Time to write our own rules

Doc Searls

Dave in particular is looking for action: There are thorny issues here, but we want these companies to give up control of our information, and we don’t want them to be overly scared of public opinion as they do it.

e-Clippings (Learning As Art): How Well Does Your Company Learn? and a Learning Organization Survey - both from Harvard

Mark Oehlert

» July 15, 2008 How Well Does Your Company Learn? July 15, 2008 in Research | Permalink Technorati Tags : assessment , Harvard , learning TrackBack TrackBack URL for this entry: [link] Listed below are links to weblogs that reference How Well Does Your Company Learn? e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « "Organization Effectiveness Simulator" (Booz&Co) | Main | Flash and Silverlight Content becoming Searchable - Kinda.

The Blockchain Value Framework

Irving Wladawsky-Berger

trust - blockchain significantly increases trust by cryptographically securing its information, thus mitigating business risks.

Survey 208

Doc Searls Weblog · UnAmerican Airline

Doc Searls

He came all the way from Dallas to share some of the great work he and his cohorts had done at the Lego Company, inspired in part by The Cluetrain Manifesto.

RFP 141

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

The Digital Economy , written in the mid 1990s, anticipated the unbundling of vertically integrated companies into business webs, giving rise to the open networked enterprise. Why wasn’t stronger security designed into the original Internet protocols?

The Rise of the On-Demand Economy

Irving Wladawsky-Berger

The Industrial Revolution led to the creation of many large and mid-size companies in which people worked together to produce goods and/or deliver services. Having a good job meant working for one such company.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 246

Platforms, Blockchains, and the Evolution of Trust

Irving Wladawsky-Berger

Companies are being disrupted as consumers are now able to deal with each other bypassing traditional hotels and taxi services. Airbnb and similar companies have totally shifted this dynamic. On-demand companies represent a growing segment of the overall platform economy.

Issues 245