Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. economic competitiveness and national security.”.

Building a More Resilient, Data-Driven Economy

Irving Wladawsky-Berger

Today we face two simultaneous disruptions: one is the COVID-19 pandemic and resulting economic shock, and the second is the rise of pervasive digital data, crypto systems, and artificial intelligence (AI).” T he two disruptions are highly interrelated. Data and AI: A new ecology.

Data 201
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. This transition has significantly accelerated over the past decade with the advent of billions of smartphones, tens of billions of IoT devices and huge amounts of data, all now connected via Internet-based broadband networks. Large-scale fraud, data breaches, and identity thefts are becoming more common. According to a recent security workforce study , 1.5

online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online. Companies that control a large part of the web traffic — Google, Facebook, Amazon — can pretty much do whatever they want with our data.

The Emerging Data Economy

Irving Wladawsky-Berger

The Economist’ s May 6 issue referred to data in its cover as the world’s most valuable resource. Similarly, data centers “power all kinds of online services and, increasingly, the real world as devices become more and more connected.”. Data has been closely intertwined with our digital technology revolution since the early days of the IT industry. But, data science should not only be framed in terms of the digital revolution of the past few decades.

Data 153

cooperation, measurement, security and more

Harold Jarche

Constant, short, safe-to-fail experiments that give us empirical data on what works. Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.” ” #crapdetection. nielspflaeging : “Any tool involving points and badges is superfluous, even systematically destructive in an organizational context.”

Noam Chomsky, security, and equivocal information

David Weinberger

Noam Chomsky and Barton Gellman were interviewed at the Engaging Big Data conference put on by MIT’s Senseable City Lab on Nov. That’s why you should be extremely cautious when you hear an appeal to security. I don’t doubt that the US security folks believe it, but it is without meaning. security folks say they are spying on us for our own security, are they saying literally nothing? Thus, the security claim isn’t made on its own.

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. Data breaches, identity theft and large-scale fraud are becoming more common. the primer starts out by asking. “In an increasingly borderless and digital world, privacy and security cannot be ensured through the construction of walls around sensitive information.

Data, Data Everywhere

George Siemens

This article has been an open tab on my browser for a few months (tabs are just another way to store massive amounts of information that I’ll likely never get to): Data, Data Everywhere : All these examples tell the same story: that the world contains an unimaginably vast amount of digital information which is getting ever vaster ever more rapidly.

Data 136

A Framework for the Safe Management of Digital Identities and Data

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Data breaches, large-scale fraud, and identity theft are becoming more common. Data attributes are generally siloed within different private and public sector institutions, each using its data for its own purposes. Decentralized data architecture. Data Federation.

Data 121

Owning our data

Harold Jarche

With the internet of everything (IoE), once everything is connected, where will our data reside? If things do not work, will we know what has happened to our data? Individual control over data may be a more robust way to to ensure some level of privacy. The Respect Network is an early example of this move, providing a secure network to share private data. Meanwhile, the IoE is seen by some active players in the field as a way to trade data for information.

Data 189

Rethinking Personal Data

Irving Wladawsky-Berger

In 2010, the World Economic Forum (WEF), launched a project on Rethinking Personal Data. The project brought together experts from business, government, academia and end user privacy and rights groups to examine the challenges and opportunities involved in properly managing the explosive growth of personal data in the digital world. In January of 2011 they published their first report, - Personal Data: the Emergence of a New Asset Class. .

Data 138

Business and Technology Predictions for 2021 and Beyond

Irving Wladawsky-Berger

30% of firms will increase spend on cloud, security and risk, networks, and mobility. Sales tools that capture and automatically upload buyer and seller activity data to CRM systems will finally take sellers out of the data entry game. …

A Framework for the Safe Management of Digital Identities and Data

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Data breaches, large-scale fraud, and identity theft are becoming more common. Data attributes are generally siloed within different private and public sector institutions, each using its data for its own purposes. Decentralized data architecture. Data Federation.

Data 100

Employee Training in Cyber Security: 4 Tips and Techniques

TOPYX LMS

The current landscape of cyber security is frightening and implementing processes to tackle the growing problem seems daunting. 48 percent of data security breaches are caused by acts of malicious intent. In the past several years, corporations including Anthem, Sony, Ebay, and Target experienced serious data breaches that resulted in a loss of millions of dollars. Preventing many attacks is as simple as a few hours of security training. Security.

[liveblog] Data & Technology in Government

David Weinberger

DJ Patil, the first US Chief Data Science, five days into his tenure. Lynn Overmann – Deputy Chief Data Officer, US Dept. ” The velocity is the support of the President who deeply believes in open data and technology. Data scientists are force multipliers. has huge amounts of data and needs help unlocking it. [ In a previous session, Lynn explained that Commerce offers almost no public-facing servies except gathering and releasing data.

Data 135

Leveraging Cloud Computing to Enhance the Nation’s Cybersecurity

Irving Wladawsky-Berger

There’s clearly an urgent need to significantly improve the security and resilience of IT systems and applications in light of the growing threat of cyberattacks, which FBI director Christopher Wray recently compared to addressing the challenge of global terrorism following the 9/11 attack.

In Defense of Data Centrism

Martijn Linssen

Home About Complexity Reading List Knowledge Management Reading List In Defense of Data Centrism John 0 comments Education System Dec 23 In the never ending search to know “what works,” we have a few choices. We can look to theories, i.e., this ‘should’ work; or we can look to data. Data autopsies are conducted with the results analyzed and presented as a ‘case study.’ The answer, I believe, comes from data. But not just any data. Or we can turn to data.

Data 160

The Increasing Influence of Recommendation Systems in Our Everyday Lives

Irving Wladawsky-Berger

Viewed through this lens, the data and AI revolution can be viewed as reducing the cost of predictions. T he larger the network, the more data is available for recommending highly personalized offerings.

System 211

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

For several years now, big data has been one of the hottest topics in the IT industry. But, what do we mean by big data ? A number of recent articles have been sounding the alarm that big data may be at the peak of inflated expectations in Gartner’s hype cycle. She writes that a number of her most advanced big data clients are starting to get disillusioned: . What is this data-driven world all about? .

Data 210

New Tools Beget Revolutions: Big Data and the 21st Century Information-based Society

Irving Wladawsky-Berger

While a number of transformative technologies were discussed, big data was the most prominent. . MIT professor Erik Brynjolfsson led an all-MIT academic panel of experts on The Reality of Big Data. Continuing with his talk, Brynjolfsson added that beyond being a technology and scientific revolution, big data should be viewed as a management revolution. We need to change from opinions and hunches and go with facts and data,” he said.

Data 139

[liveblog][bkc] Paola Villarreal on Public Interest in Data Science

David Weinberger

I’m at a Berkman Klein Center lunch time talk by Paola Villarreal [twitter: paw ], a BKC fellow, on “Public Interest in Data Science.” Data science extracts knowledge and insight from data in various forms, using math, statistics, research, info science and computer science. She is going to talk about the Data for Justice project, which is supported by the Ford Foundation , the ACLU , and the Mozilla Foundation.

Data 126

[liveblog] Noam Chomsky and Bart Gellman at Engaging Data

David Weinberger

I’m at the Engaging Data 2013 conference where Noam Chomsky and Pulitzer Prize winner (twice!) Barton Gellman are going to talk about Big Data in the Snowden Age, moderated by Ludwig Siegele of the Economist. The conference aims at having us rethink how we use Big Data and how it’s used. I’ve been writing articles that are pretty skeptical about Big Data. LS: You’ve said that Big Data is for people who want to do the easy stuff.

Data 184

The Current State of Cloud Computing

Irving Wladawsky-Berger

Many company leaders have encountered major roadblocks along their path toward cloud or have gotten cold feet once they questioned its impact on costs, security, latency, and more. Security of in-house data centers is superior to the security on cloud.

Data 167

Blockchain and Public Health Solutions

Irving Wladawsky-Berger

Given the broad scope of the report, I will focus my attention on one area in particular: identity, health records and shared data. Countries with good access to data, - e.g., China, Singapore, South Korea, - were able to take effective steps to control the spread of the pandemic.

Building Better Jobs in an Age of Intelligent Machines

Irving Wladawsky-Berger

For example, a December, 2017 report by McKinsey examined which jobs will likely be displaced by automation through 2030, as well as which jobs are likely to be created over the same period, based on data from 46 countries.

Data 208

Cloud's Trillion Dollars 2030 Potential

Irving Wladawsky-Berger

CSPs can improve the integrity of their cloud platforms through security processes and controls that can automatically identify, detect, and investigate advanced threats, compromised identities, and malicious actions.

Data 159

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Data breaches: we are concerned not just about the breaches, but also data quality. We need to make sure data is accurate. An organization has clients, which give them data. As more clients are added, and through marketing and other activities, the organization has a great deal of data. Even finding the data can be a challenge, knowing who touched the data, when, why. A system is only as secure as its weakest point.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

The 2019 Artificial Intelligence Index

Irving Wladawsky-Berger

The AI Index aims to “provide unbiased, rigorous, and comprehensive data for policymakers, researchers, journalists, executives, and the general public to develop a deeper understanding of the complex field of AI.”.

Data 201

The State of Financial Health Around the World

Irving Wladawsky-Berger

Conducted by Gallup in partnership with the MetLife Foundation and the Rockefeller Philanthropy Advisors , the study aimed to develop two key financial measures: how secure do people feel around the world, and how much control and influence they believe they have over their financial situations.

An Increasingly Digital “New Normal”

Irving Wladawsky-Berger

To do so, they need to frequently collect and quickly evaluate real-time data about customers and markets to help determine what’s working, what isn’t, why, and how to correct or change course. “It’s

Data 199

Could AI Reshape the Global Balance of Power?

Irving Wladawsky-Berger

AI has the potential to significantly advance national security. The report recommends that national security agencies adopt AI-enabled systems in key areas where AI can help them better understand and execute their missions. Apply AI to National Security Missions.

The problem for people isn’t advertising, and the problem for advertising isn’t blocking. The problem for both is tracking.

Doc Searls

At the very least, regulations will force companies harvesting personal data to obey those they harvest it from, by fining them for not obeying. ” Companies harvesting personal data also shouldn’t be surprised to find themselves re-classified as fiduciaries , no less responsible than accountants, brokers and doctors for the confidentiality of the people they collect data from.

Reality mining, pervasive data capture, and how Big Data can create value

Trends in the Living Networks

CIO magazine did a nice article titled IIIS: Big Data driving new trends which reviews my keynote and the one immediately after from Steve Duplessie , one of the world’s top analysts on data and storage. If you look at an office environment there is an extraordinary amount of data to look at. You can literally get terabytes of data out of just a few hours of this. This requires all that data within the organisation to be captured and used effectively.”.

Data 120

The Data Center in the Cambrian Age

Irving Wladawsky-Berger

And, at the other end of the spectrum, we are seeing the data center itself, whose roots go back to the earliest days of computers, being completely reinvented as well. The question then arises whether WSCs and Cloud data centers in general are only applicable for born-to-the-Cloud , relatively young companies like Google, Amazon and Yahoo who run a small number of huge workloads each of which exhibits a very high degree of parallelism.

Data 131

The Internet of Things is Changing the World

Irving Wladawsky-Berger

In addition to mechanical and electrical components, these new products use digital components like microprocessors, sensors, data storage, software, and connectivity in a wide variety of ways.

Change 157

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

[bigdata] Panel: A Thousand Points of Data

David Weinberger

Paul Ohm (law prof at U of Colorado Law School — here’s a paper of his) moderates a panel among those with lots of data. Dan Levin asks what Big Data could look like in the context of law. What will we be able to do with big data? Maybe even tailor privacy and security settings. Further, as data gets bigger, the granularity and accuracy of predictions gets better. We need the raw data for lots of other things. Data comes in one side.

Data 109

Using Agile Processes to Develop AI-Based Solutions

Irving Wladawsky-Berger

It’s also quite applicable for mission critical software and infrastructure projects where security, availability, scalability and other ilities are paramount. These AI-based systems are generally software-intensive, user-centric, and data-driven. The AI-based prototype works with and is trained by each user’s own production data, so each user may well have a different experience.

The Economic Value of Digital Identity

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Data breaches, large-scale fraud, and identity theft have become more common. Established with individual consent: “individuals knowingly register for and use the digital ID with knowledge of what personal data will be captured and how they will be used;” and. Identity plays a major role in our everyday life.

Data 148

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. Lawsuits - a lot of data information, collected from preferred customer cards - there was a lawsuit from someone who slipped on water and fell, so the supermarket chain that he sued checked his record and saw that he was buying beer every week, so they came back and said he was probably drunk at the time. What you say online is not private, it is not secure, it is what you put on the billboard on I-15.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.