Security?

Dave Snowden

At that level the concept of intractable problems for which there is no obvious solution is common place so many of the complexity messages fall onto fertile ground. The post Security? I had three presentations today and my voice held up, just. I’ve had a bad cold for weeks and jumping time zones is not the best way to shake that off. But I fell back on a trusted recipe of lemsip, whisky, throat sweets and a degree of self-delusion as to my condition.

Adventure & security

Dave Snowden

In the presentation I used a quote from T S Eliot which I found the other day and which is apposite to the current state of affairs in complexity theory. Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. We see a lot of work here on complexity modelling and the like.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. economic competitiveness and national security.”.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The interconnectedness and openness made possible by the Internet and broader digital ecosystem create unparalleled value for society,” notes the report in its Executive Summary. “But these same qualities make securing today’s cyber landscape difficult. Why wasn’t stronger security designed into the original Internet infrastructure?

cooperation, measurement, security and more

Harold Jarche

Teachers and many parents understand that children’s development is far too complex to capture with an hour or two taking a standardized test. The proper way to conduct ourselves in the complex domain is through experiments. Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.” ” #crapdetection.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

The article makes a strong case for flexicurity - shorthand for flexible security, - a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. Like me, many workers enjoyed relatively secure, stable jobs and a number of company benefits, including health care insurance, vacations and retirement pensions. Entrepreneurship and flexible security.

Fidelity in complex systems consultancy

Dave Snowden

Returning yesterday from my first TedX in Cyprus I was chatting with Sonja Blignaut about some upcoming activities and differences between approaches to sense-making and complexity. Now it is an understandable issue; if you work for yourself then securing revenue is as vital and shooting, or failing to rehire the messenger is all to frequent. In a complex system we: start journeys with a general sense of direction but without precise targets.

[shorenstein][liveblog] Juliette Kayyem on communicating about security

David Weinberger

Juliette Kayyem , a former Boston Globe columnist, a commentator, Homeland Security advisor to Gov. Deval Patrick, and a former candidate for governor of Massachusetts, is giving a Shorenstein Center talk about how to talk with the public about security issues. Juliette oversaw the local Homeland Security response to the Marathon Bombing and had participated in the security planning. She learned that last lesson from her security experience.

the complexity of capitalism

Harold Jarche

“I suspect that the clean, uncomplicated notions put forward in the book [Organizing for Complexity, by Frédéric Laloux] will be undone by context, the actual details of implementation and to a large extent power-dynamics (for example, autocratic ‘Teal’ leaders making ‘non-Teal’ people do things they don’t want to do). And like all instruments it appeals to a certain instrumental logic, one that craves a simpler world and shies away from complexity.

“Complicated” vs. “Complex”

Martijn Linssen

The background: A gentleman who makes a living “reducing complexity” for IT systems keeps running into some of us on Twitter who study complexity. The ask: There is a group of complexity aficionados that criticize my use of the word “complexity.” ” In general, these are folks who are influenced by the Cynefin framework that considers complexity and complicated to be different attributes of a system. The Emergence of Complexity.

The Firm as a Large, Complex, Extended Family

Irving Wladawsky-Berger

A firms is best viewed as a kind-of rather large and highly complex family. We also form companies and other such organizations to get things done in our work, especially more complex objectives that require the collective skills of multiple people. We depend on colleagues to do well in our jobs, and to achieve whatever professional recognition and financial security we are after.

How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?

Irving Wladawsky-Berger

Things are even tougher with people-centric sociotechnical systems, which not only have to deal with potential software problems, but with the even more complex issues involved in human behaviors and interactions. And, at the bleeding-edges of complexity are data-driven AI systems , which are generally based on statistical analysis and machine learning methods. . What is it that makes these systems so intrinsically complex? What purpose does this complexity serve?

System 171

Complexity and Design in Warfare

Irving Wladawsky-Berger

The workshop explored how design-oriented approaches can help us better understand and deal with the very complex problems we are increasingly encountering in all aspects of business, economies, government, public policy, military operations and society in general. Some of the areas explored by the Forum are emerging technologies, organizational development, economic competition, and the changing concept of security.

On the Complex Evolution toward Mobile Digital Payments

Irving Wladawsky-Berger

On September 9, Apple announced Apple Pay , an easy, secure way to make mobile payments using their latest devices , - the iPhone 6’s and Apple Watch. Apple Pay is embracing a number of industry standards , including NFC (near-field communications) for contact-less payments; Secure Element , a dedicated device chip; and network-based tokenization to protect sensitive financial data.

The Complex Transition to the Age of the Cloud

Irving Wladawsky-Berger

While the skeptics’ concerns, - security, reliability, privacy, costs and others, - are quite real, the hardest part of implementing cloud strategies has little to do with technology. Cloud computing is a highly complex initiative - at the technical, business and organizational levels. And, one of the key lessons we all hopefully learned from the dot-com era is that complex, global initiatives take time. In June of 2008 I participated in a conference on cloud computing.

Complex Sociotechnical Systems: the Case for a New Field of Study

Irving Wladawsky-Berger

They generally exhibit a level of complexity that is often beyond our ability to understand and control. Not only do they have to deal with the complexities associated with large scale hardware and software infrastructures, but with the even more complex issues involved in human and organizational behaviors. . A few weeks ago, MIT professor Joseph Sussman addressed these issues in a lecture - Complex Sociotechnical Systems: The Case for a New Field of Study.

System 168

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Contributing factors include expanding networks, growing e-commerce, complex software, greater pressure to reduce time to market, and the ubiquity of computers. A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The key question is whether government and industry can collaborate successfully in a complex regulatory environment. The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. They need help on security, compliance, risk management,etc.

Knowledge sharing: for doing complex work in a complex world

Nancy White

Here’s what I’m up to this week - today prepping for the FAO/CGIAR/BIOVERSITY/WFP/IFAD joint 3 day knowledge Share Fair, with a close focus on KS in global development as it relates to agriculture and food security. One of the activities is a 90 second challenge to talk about what IS Knowledge Sharing… “Knowledge sharing is necessary to do complex work in a complex world&#.

The Urgent Need for Wide-Scale Upskilling

Irving Wladawsky-Berger

Beyond GDP, it highlights the importance to society of providing workers with well-paying, reasonably secure, motivating jobs. Any definition presupposes a set of values about what matters – sustainability for some, productivity or security for others.

Skills 205

Would a Distributed Model of Government be More Suitable for a Complex, Diverse 21st Century Democracy?

Irving Wladawsky-Berger

While business and government have clearly different objectives, many of the challenges involved in managing a complex, fast changing organization are similar. If large global companies have had to embrace a more distributed management style, why not large, complex governments? He believes that a number of key responsibilities must remain with the federal government, including Social Security and Medicare benefits. “. Your social security number is good anywhere.”.

The Current State of Cloud Computing

Irving Wladawsky-Berger

Many company leaders have encountered major roadblocks along their path toward cloud or have gotten cold feet once they questioned its impact on costs, security, latency, and more. Security of in-house data centers is superior to the security on cloud.

Data 176

Oxytocin is a complex character

Mind Hacks

Those who were more secure in their relationships reacted in the opposite way – they remembered mum as being closer and more caring when they took the oxytocin. Not Exactly Rocket Science elegantly covers a new study that counters the tired ‘love drug’ stereotype associated with the hormone oxytocin.

The Increasing Influence of Recommendation Systems in Our Everyday Lives

Irving Wladawsky-Berger

With this innovation trajectory, security and confidentiality become even more important… As with health care, ‘informed consent’ becomes more important as recommenders grow more powerful, pervasive, and predictive.”.

System 224

The Intriguing Nature of Non-Fungible Tokens

Irving Wladawsky-Berger

First, blockchain technologies can help us enhance the security of Internet transactions and data, by developing a layer with the required standard services and their open source implementations for secure communication, storage and data access.

Buy 168

Building Better Jobs in an Age of Intelligent Machines

Irving Wladawsky-Berger

must innovate to rebalance the desire of employers for low-cost, minimal commitment, and maximal flexibility, with the necessity that workers receive fair treatment, reasonable compensation, and a measure of economic security.

Data 217

The Collapse of Complex Business Models ? Clay Shirky

Clay Shirky

The Times’ Paywall and Newsletter Economics » The Collapse of Complex Business Models. In 1988, Joseph Tainter wrote a chilling book called The Collapse of Complex Societies. Every one of those groups had rich traditions, complex social structures, advanced technology, but despite their sophistication, they collapsed, impoverishing and scattering their citizens and leaving little but future archeological sites as evidence of previous greatness. Clay Shirky.

Ten IT Predictions for the Post-Pandemic New Normal

Irving Wladawsky-Berger

Remediate and adapt : “Identify shortcomings in existing IT environments such as decision support systems, remote work, and business/IT resiliency as well as addressing shortcomings in areas such as connectivity/security introduced during initial emergency responses.”.

The State of Financial Health Around the World

Irving Wladawsky-Berger

Conducted by Gallup in partnership with the MetLife Foundation and the Rockefeller Philanthropy Advisors , the study aimed to develop two key financial measures: how secure do people feel around the world, and how much control and influence they believe they have over their financial situations.

A New Contract with the Middle Class

Irving Wladawsky-Berger

Mental health conditions now account for 35 percent of claims for Supplemental Security Income or Disability I nsurance.”. Complex Systems Diversity Economic Issues Education and Talent Healthcare Systems Management and Leadership Media and Communications Political Issues Society and Culture

Class 148

Could AI Reshape the Global Balance of Power?

Irving Wladawsky-Berger

AI has the potential to significantly advance national security. The report recommends that national security agencies adopt AI-enabled systems in key areas where AI can help them better understand and execute their missions. Apply AI to National Security Missions.

Building a More Resilient, Data-Driven Economy

Irving Wladawsky-Berger

Rather than keeping the data siloed within the institution that collected it, a variety of institutions share and exchange the critical data required to validate identities in a secure, decentralized manner without the need for large central platforms.

Data 212

New Directions for Government in the Digital Age

Irving Wladawsky-Berger

Ensure security, privacy, autonomy, and citizen-owned identities. In a world increasingly driven by digital transactions and data, our existing methods for managing security, privacy , and digital identities are far from adequate.

Irving Wladawsky-Berger: The Complex Chemistry between Brands and Customers - Some Personal Experiences

Irving Wladawsky-Berger

Home Archives Subscribe « Welcome to Adam Smiths World | Main | Social networks and Organizational Governance » October 08, 2007 The Complex Chemistry between Brands and Customers - Some Personal Experiences People have very complex relationships with companies and the products and services they offer. " The relationship between a brand and its customers is a complex one indeed, full of emotional connections and chemistry.

The Real Business of Blockchain

Irving Wladawsky-Berger

Blockchains support the secure exchange of value in the form of tokens. “Tokens might function as digital representations of physical assets, as a reward mechanism to incentivize network participants, or to enable the creation and exchange of new forms of value.”.

How Can Blockchain Become a Truly Transformative Technology?

Irving Wladawsky-Berger

As firms increasingly rely on supply chain partners for many of the functions once done in-house, managing their increasingly complex operations across a network of interconnected institutions has become major challenge.

The Urgent Need to Strengthen the Nation’s Resilience

Irving Wladawsky-Berger

These included a significant expansion of government support for scientific research in universities and R&D labs, leading to product innovations from the private sector and better weapons from the defense industry, - and making the US the most prosperous and secure nation in the world.

Issues 224

An Increasingly Digital “New Normal”

Irving Wladawsky-Berger

Good design aims to make our interactions with complex products and institutions, - e.g., a business, a healthcare provider, a classroom, a government function, - as appealing and intuitive as possible.

Data 211

Blockchain and Public Health Solutions

Irving Wladawsky-Berger

To reach a higher level of privacy and security, we need to establish a trusted data ecosystem for each kind of identity, which requires the exchange and sharing of data across a variety of institutions.

Looking back at the Acorn Study; Part 9: Seedlings

Dave Snowden

Still, it is relevant to the group and context it came from and valuable in its connection with a complex of personal experiences. This may be particularly strong for younger people, although fewer of those participated in this collection, so a secure trend cannot be established.

Study 130

leave standard methods to the machines

Harold Jarche

Complex, new problems need tacit and implicit knowledge to solve them. So if you are in a complex situation, like a pandemic, you need to have exceptions front-of-mind. The easy route is to just comply, as we have been doing with ‘security theatre’ at airports for years.

The Transformative Power of Blockchain

Irving Wladawsky-Berger

It succinctly defines blockchain as “a shared, decentralized, cryptographically secured, and immutable digital ledger,” and then adds a few key attributes that are particularly important to enterprise blockchains: Accountability. Security. “Enterprise blockchains are fault-tolerant. But, to keep InternetOne as simple and flexible as possible, just about everything else, - including identity and security management, - became the responsibility of the applications in InternetTwo.

The Long-Term Future of Work and Education: Three Potential Scenarios

Irving Wladawsky-Berger

The framework includes five categories of skills: communicating, collaborating and sharing online; handling information and content securely; buying, selling and managing transactions; finding solutions to problems using digital tools; and being safe and legal online.