Security?

Dave Snowden

At that level the concept of intractable problems for which there is no obvious solution is common place so many of the complexity messages fall onto fertile ground. The post Security? I had three presentations today and my voice held up, just. I’ve had a bad cold for weeks and jumping time zones is not the best way to shake that off. But I fell back on a trusted recipe of lemsip, whisky, throat sweets and a degree of self-delusion as to my condition.

Adventure & security

Dave Snowden

In the presentation I used a quote from T S Eliot which I found the other day and which is apposite to the current state of affairs in complexity theory. Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. We see a lot of work here on complexity modelling and the like.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. economic competitiveness and national security.”.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The interconnectedness and openness made possible by the Internet and broader digital ecosystem create unparalleled value for society,” notes the report in its Executive Summary. “But these same qualities make securing today’s cyber landscape difficult. Why wasn’t stronger security designed into the original Internet infrastructure?

cooperation, measurement, security and more

Harold Jarche

Teachers and many parents understand that children’s development is far too complex to capture with an hour or two taking a standardized test. The proper way to conduct ourselves in the complex domain is through experiments. Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.” ” #crapdetection.

Fidelity in complex systems consultancy

Dave Snowden

Returning yesterday from my first TedX in Cyprus I was chatting with Sonja Blignaut about some upcoming activities and differences between approaches to sense-making and complexity. Now it is an understandable issue; if you work for yourself then securing revenue is as vital and shooting, or failing to rehire the messenger is all to frequent. In a complex system we: start journeys with a general sense of direction but without precise targets.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

The article makes a strong case for flexicurity - shorthand for flexible security, - a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. Like me, many workers enjoyed relatively secure, stable jobs and a number of company benefits, including health care insurance, vacations and retirement pensions. Entrepreneurship and flexible security.

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. But, it’s a highly complex and interesting subject. the primer starts out by asking. “In an increasingly borderless and digital world, privacy and security cannot be ensured through the construction of walls around sensitive information.

“Complicated” vs. “Complex”

Martijn Linssen

The background: A gentleman who makes a living “reducing complexity” for IT systems keeps running into some of us on Twitter who study complexity. The ask: There is a group of complexity aficionados that criticize my use of the word “complexity.” ” In general, these are folks who are influenced by the Cynefin framework that considers complexity and complicated to be different attributes of a system. The Emergence of Complexity.

the complexity of capitalism

Harold Jarche

“I suspect that the clean, uncomplicated notions put forward in the book [Organizing for Complexity, by Frédéric Laloux] will be undone by context, the actual details of implementation and to a large extent power-dynamics (for example, autocratic ‘Teal’ leaders making ‘non-Teal’ people do things they don’t want to do). And like all instruments it appeals to a certain instrumental logic, one that craves a simpler world and shies away from complexity.

The Firm as a Large, Complex, Extended Family

Irving Wladawsky-Berger

A firms is best viewed as a kind-of rather large and highly complex family. We also form companies and other such organizations to get things done in our work, especially more complex objectives that require the collective skills of multiple people. We depend on colleagues to do well in our jobs, and to achieve whatever professional recognition and financial security we are after.

Complexity and Design in Warfare

Irving Wladawsky-Berger

The workshop explored how design-oriented approaches can help us better understand and deal with the very complex problems we are increasingly encountering in all aspects of business, economies, government, public policy, military operations and society in general. Some of the areas explored by the Forum are emerging technologies, organizational development, economic competition, and the changing concept of security.

On the Complex Evolution toward Mobile Digital Payments

Irving Wladawsky-Berger

On September 9, Apple announced Apple Pay , an easy, secure way to make mobile payments using their latest devices , - the iPhone 6’s and Apple Watch. Apple Pay is embracing a number of industry standards , including NFC (near-field communications) for contact-less payments; Secure Element , a dedicated device chip; and network-based tokenization to protect sensitive financial data.

How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?

Irving Wladawsky-Berger

Things are even tougher with people-centric sociotechnical systems, which not only have to deal with potential software problems, but with the even more complex issues involved in human behaviors and interactions. And, at the bleeding-edges of complexity are data-driven AI systems , which are generally based on statistical analysis and machine learning methods. . What is it that makes these systems so intrinsically complex? What purpose does this complexity serve?

System 128

The Complex Transition to the Age of the Cloud

Irving Wladawsky-Berger

While the skeptics’ concerns, - security, reliability, privacy, costs and others, - are quite real, the hardest part of implementing cloud strategies has little to do with technology. Cloud computing is a highly complex initiative - at the technical, business and organizational levels. And, one of the key lessons we all hopefully learned from the dot-com era is that complex, global initiatives take time. In June of 2008 I participated in a conference on cloud computing.

Complex Sociotechnical Systems: the Case for a New Field of Study

Irving Wladawsky-Berger

They generally exhibit a level of complexity that is often beyond our ability to understand and control. Not only do they have to deal with the complexities associated with large scale hardware and software infrastructures, but with the even more complex issues involved in human and organizational behaviors. . A few weeks ago, MIT professor Joseph Sussman addressed these issues in a lecture - Complex Sociotechnical Systems: The Case for a New Field of Study.

System 149

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Contributing factors include expanding networks, growing e-commerce, complex software, greater pressure to reduce time to market, and the ubiquity of computers. A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The key question is whether government and industry can collaborate successfully in a complex regulatory environment. The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. They need help on security, compliance, risk management,etc.

Knowledge sharing: for doing complex work in a complex world

Nancy White

Here’s what I’m up to this week - today prepping for the FAO/CGIAR/BIOVERSITY/WFP/IFAD joint 3 day knowledge Share Fair, with a close focus on KS in global development as it relates to agriculture and food security. One of the activities is a 90 second challenge to talk about what IS Knowledge Sharing… “Knowledge sharing is necessary to do complex work in a complex world&#.

Understanding the Impact of Cybersecurity on International Trade

Irving Wladawsky-Berger

Cybersecurity is now invoked by governments as a major aspect of national security, as they focus on protecting their critical infrastructures and the overall wellbeing of their nations.

The New Joint Cyber Defense Collaborative

Irving Wladawsky-Berger

Just about everything else, including security, is the responsibility of the applications running on the Internet. The design decisions that shaped the Internet didn’t optimize for secure, trustworthy operations.

Would a Distributed Model of Government be More Suitable for a Complex, Diverse 21st Century Democracy?

Irving Wladawsky-Berger

While business and government have clearly different objectives, many of the challenges involved in managing a complex, fast changing organization are similar. If large global companies have had to embrace a more distributed management style, why not large, complex governments? He believes that a number of key responsibilities must remain with the federal government, including Social Security and Medicare benefits. “. Your social security number is good anywhere.”.

Leveraging Cloud Computing to Enhance the Nation’s Cybersecurity

Irving Wladawsky-Berger

There’s clearly an urgent need to significantly improve the security and resilience of IT systems and applications in light of the growing threat of cyberattacks, which FBI director Christopher Wray recently compared to addressing the challenge of global terrorism following the 9/11 attack.

Why Do We Work So Damn Much?

Irving Wladawsky-Berger

To their surprise, they learned that the Ju/’hoansi and similar hunger-gathering people spent only 15 hours a week securing their basic nutritional requirements. Complex Systems Diversity Economic Issues Future of Work Political Issues Society and Culture Technology and Strategy

Issues 195

Oxytocin is a complex character

Mind Hacks

Those who were more secure in their relationships reacted in the opposite way – they remembered mum as being closer and more caring when they took the oxytocin. Not Exactly Rocket Science elegantly covers a new study that counters the tired ‘love drug’ stereotype associated with the hormone oxytocin.

The Current State of Cloud Computing

Irving Wladawsky-Berger

Many company leaders have encountered major roadblocks along their path toward cloud or have gotten cold feet once they questioned its impact on costs, security, latency, and more. Security of in-house data centers is superior to the security on cloud.

Data 217

The Evolving Role of the CIO

Irving Wladawsky-Berger

They are the least focused on migrating data centers to the cloud, building a development, security, operations, and governance infrastructure in the cloud, and building data lakes and analytics systems of insight in the cloud.”.

Data 219

The Urgent Need for Wide-Scale Upskilling

Irving Wladawsky-Berger

Beyond GDP, it highlights the importance to society of providing workers with well-paying, reasonably secure, motivating jobs. Any definition presupposes a set of values about what matters – sustainability for some, productivity or security for others.

Skills 224

Business and Technology Predictions for 2021 and Beyond

Irving Wladawsky-Berger

30% of firms will increase spend on cloud, security and risk, networks, and mobility. People have complex, emotional relationship with brands and their associated products and services.

Revitalizing US Manufacturing

Irving Wladawsky-Berger

“The COVID-19 pandemic has underscored manufacturing’s role in providing products that are critical to health, safety, national security, and the continuity of multiple industries,” said McKinsey in a recent discussion paper, Building a More Competitive US Manufacturing Sector. “It

The Emergence of Central Bank Digital Currencies

Irving Wladawsky-Berger

Security is poor. e-currencies would enable direct payments to every citizen receiving government funds, such as social security, unemployment benefits, financial aid for low-income families, or economic relief during a crisis like Covid-19.

The Collapse of Complex Business Models ? Clay Shirky

Clay Shirky

The Times’ Paywall and Newsletter Economics » The Collapse of Complex Business Models. In 1988, Joseph Tainter wrote a chilling book called The Collapse of Complex Societies. Every one of those groups had rich traditions, complex social structures, advanced technology, but despite their sophistication, they collapsed, impoverishing and scattering their citizens and leaving little but future archeological sites as evidence of previous greatness. Clay Shirky.

Building Better Jobs in an Age of Intelligent Machines

Irving Wladawsky-Berger

must innovate to rebalance the desire of employers for low-cost, minimal commitment, and maximal flexibility, with the necessity that workers receive fair treatment, reasonable compensation, and a measure of economic security.

Data 216

The Increasing Influence of Recommendation Systems in Our Everyday Lives

Irving Wladawsky-Berger

With this innovation trajectory, security and confidentiality become even more important… As with health care, ‘informed consent’ becomes more important as recommenders grow more powerful, pervasive, and predictive.”.

System 220

New Directions for Government in the Digital Age

Irving Wladawsky-Berger

Ensure security, privacy, autonomy, and citizen-owned identities. In a world increasingly driven by digital transactions and data, our existing methods for managing security, privacy , and digital identities are far from adequate.

Irving Wladawsky-Berger: The Complex Chemistry between Brands and Customers - Some Personal Experiences

Irving Wladawsky-Berger

Home Archives Subscribe « Welcome to Adam Smiths World | Main | Social networks and Organizational Governance » October 08, 2007 The Complex Chemistry between Brands and Customers - Some Personal Experiences People have very complex relationships with companies and the products and services they offer. " The relationship between a brand and its customers is a complex one indeed, full of emotional connections and chemistry.

The State of Financial Health Around the World

Irving Wladawsky-Berger

Conducted by Gallup in partnership with the MetLife Foundation and the Rockefeller Philanthropy Advisors , the study aimed to develop two key financial measures: how secure do people feel around the world, and how much control and influence they believe they have over their financial situations.

Could AI Reshape the Global Balance of Power?

Irving Wladawsky-Berger

AI has the potential to significantly advance national security. The report recommends that national security agencies adopt AI-enabled systems in key areas where AI can help them better understand and execute their missions. Apply AI to National Security Missions.

What Might the World Be Like in 2040?

Irving Wladawsky-Berger

The impact will disproportionately fall on the developing world and poorer regions and intersect with environmental degradation to create new vulnerabilities and exacerbate existing risks to economic prosperity, food, water, health, and energy security.”.

Trends 146

Ten IT Predictions for the Post-Pandemic New Normal

Irving Wladawsky-Berger

Remediate and adapt : “Identify shortcomings in existing IT environments such as decision support systems, remote work, and business/IT resiliency as well as addressing shortcomings in areas such as connectivity/security introduced during initial emergency responses.”.

Looking back at the Acorn Study; Part 9: Seedlings

Dave Snowden

Still, it is relevant to the group and context it came from and valuable in its connection with a complex of personal experiences. This may be particularly strong for younger people, although fewer of those participated in this collection, so a secure trend cannot be established.

Study 186

Cloud's Trillion Dollars 2030 Potential

Irving Wladawsky-Berger

CSPs can improve the integrity of their cloud platforms through security processes and controls that can automatically identify, detect, and investigate advanced threats, compromised identities, and malicious actions.

Data 162

The Real Business of Blockchain

Irving Wladawsky-Berger

Blockchains support the secure exchange of value in the form of tokens. “Tokens might function as digital representations of physical assets, as a reward mechanism to incentivize network participants, or to enable the creation and exchange of new forms of value.”.