Trending Sources

Designing outside your comfort zone

Adaptive Path

That’s what we tell ourselves because as designers we often rely on tried and tested tools, methods and standards to help us arrive at a solution that should work. They may sound like best practices for just being a good designer, and they are. “Trust the process!”.

Design 117

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. “With enough ‘security,’ corporate or national, you can utterly kill freedom, production capacity, and morale.” All experiments must be designed as safe-to-fail.

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

In this paper I would like to address the core design elements in the development of a personal learning architecture being developed in the National Research Council''s Learning and Performance Support Systems program. The NRC-designed MOOC differs significantly from traditional courses. The NRC LPSS program is a 5-year $20 million effort designed to develop these core technologies and bind them with a common platform.

The initial design influences everything else

Harold Jarche

Actually, it’s the Architect, because the initial design influences everything else. Clay Burell had guest blogger Bill Farren discussing the hidden curriculum of school architectural design. How is security portrayed?

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Why models matter

Clark Quinn

If we understand the structure of a cyber system, we can anticipate security threats. Consequently, it’s also one of the things I push as a key improvement to learning design. It’s a good basis for design, for problem-solving, and for learning. design meta-learning strategy In the industrial age, you really didn’t need to understand why you were doing what you were doing, you were just supposed to do it.

From Farm to Phone to Table: Sprig comes to the Service Experience Conference

Adaptive Path

We got his non-designer take on the importance of service experience and where he sees a need for service design in the future. Why should people be interested in service experience and design? Two years ago, you would never have expected me to care about service design.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Foremost among these limitations are privacy, security and inclusion. “Doing business on the Internet requires a leap of faith” because the infrastructure lacks the necessary security. Why wasn’t stronger security designed into the original Internet protocols?

Design a Superhero

Adaptive Path

Experiment #1: You are designing the superhero of _travel. In this experiment, I asked a fellow design researcher who loves to travel to help me design the Superhero of Travel. Super-powered magnet automatically removes all metal before security. Experiment #2: You are designing the superhero of _ baseball fandom _. For this experiment, I asked someone who’s not in the UX field to help design the Superhero of Baseball Fandom.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. You are not secure. Web designers and coders, they're not doing anything about it. Summary of a talk by Parry Aftab at the IFIPTMA Conference in Moncton. It is important that you know why I am so trustworthy. I am the most trustworthy person on the internet.

What happens when the home of the future crashes?

Ross Dawson

This is a point that was addressed in my report for Intel Security on Safeguarding the Future of Digital Australia in 2025. They may be secure, but if there is any system failure, we may not be able to get into our own homes. design Future of cities Technology trends

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.

Designing to encourage “collaborative consumption”

Adaptive Path

The trick to make collaborative consumption work is experience design. Provide comfortable, secure, healthy, and beautiful environments for residents. I’m curious what a slow experience design movement looks like? What might these be like applied to the design of products, softwares, and service experiences? And here’s Allan Chochinov at IIT Design Research Conference 2010 talking about phone versus email, among other things.

Levels of learning experience design

Clark Quinn

This is the realm of learning experience design. Learning experience design can, and should, operate at several levels. You want a minimalist approach that combines effective cognitive design with engaging emotional design. You want the formal resources to be designed to mesh with the task and provide effective information design. Here we are talking deeper instructional design, information mapping, and aligned social media.

All Social is Learning | Organizational Knowledge Design

Martijn Linssen

All Social is Learning | Organizational Knowledge Design [.] Tweets that mention All Social is Learning | Organizational Knowledge Design -- Topsy.com - [.] About John Dr. John Bordeaux brings 28 years’ experience working issues of national security and knowledge management.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Enjoy EUR200 off the course fees if you sign up before 8 August 2014.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

Data 68

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. He was being asked to defend a lazy and thoughtless Web design that he had no role in creating.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. He was being asked to defend a lazy and thoughtless Web design that he had no role in creating.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content. The badges and competency-based learning movement may challenge assessment, but at this point it remains reasonably secure.

What does the Internet of Everything mean to you?

Harold Jarche

“Mr Corman [security specialist] worries that it may take a catastrophic event to get [IoE technology] makers to focus on the need for better security in connected devices.

a workable future

Harold Jarche

To design our technologies, our economies, and our policies to meet the needs of a future workforce, we must first jettison our old models of the workforce.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Having learned from their failures and successes they have worked out a design approach that aims to build an effective sensemaking environment that engage stakeholders on all levels emphasising the different approach SenseMaker® takes. Enjoy EUR200 off the course fees if you sign up before 8 August 2014.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Learning Technologies UK wrap-up

Clark Quinn

There was also a nice session on mobile, with some principles presented and then an interesting case study using iPads under somewhat severe(military) constraints on security. design games meta-learning mobile social technologyI had the pleasure of speaking at the Learning Technologies ’11 conference, talking on the topic of games. I’ve already covered Roger Schank ‘s keynote , but I want to pick up on a couple of other things.

The Growing Importance of Storytelling in the Business World

Irving Wladawsky-Berger

Let me know discuss the use of blockchain technologies for enhancing the overall security and efficiency of our transactional systems. Blockchain technologies have the potential to significantly strengthen the security of our 21st century digital economy.

Sea wall or salt marsh?

Dave Snowden

The sea-wall on the other had when it breaks it breaks; the shift from high utility, predictability and security to catastrophic failure is sudden and calamitous in nature. They provide an aura of security and reliability up to the point where it all gets too much for them.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. Tool is a piece of code designed to do a particular thing. It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor.

Engaged for work

Harold Jarche

Human creative work is not just art, design, and the like, but includes making valuable things for a specific context, need, or market. Avoid getting lulled into a false sense of security. There is a real change in how work is getting done today.

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. It was important to get the maximum efficiency and price-performance out of each machine, so the hardware architecture and operating system were carefully designed to achieve high processor utilizations and fast response times to high volume transactions.

Akilah Institute for Women: Social Media Workshop

Beth Kanter

Training DesignAkilah workshop. View more presentations from Beth Kanter. After the ACE leadership training, I had the opportunity to spend a day in Kigali. I volunteered to do a Social Media and Professional Networking workshop for second year students at the Akilah Institute for Women.

Waking up.

Martijn Linssen

For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems. This is true for classrooms, National Security Council meetings, design studios, auto showrooms, diplomacy, boardrooms, and lovers. I think we are waking up.

Blockchains: the Promise of More Frictionless, Trusted Economies

Irving Wladawsky-Berger

Why wasn’t stronger security designed into the original Internet infrastructure? MIT research scientist and Internet pioneer David Clark addressed this question in a recent article about the early design choices that have led to today’s Internet. Why do firms exist?

Data 31

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

The centrally managed, highly scalable, attractively priced cloud platforms were now being designed to support a variety of mobile devices, - e.g. smartphones, tablets, e-readers and laptops.

Data 116

Coherent Implications

Clark Quinn

You get security concerns here, but you need to find a balance, or you’re cutting off half of the organizational brain! For example for learning design there’s a need to track developments in fields like software engineering (e.g.

New Adaptive Path Event—Designing Experiences: Financial Services in a Connected Age

Adaptive Path

Our first pop-up is Designing Experiences: Financial Services in a Connected Age. Since the mid-90s, banks and investment brokerages realized that they needed to make their customers feel extremely secure about how their money was being handled, and that a solid user experience was crucial in doing this. We're trying something new at Adaptive Path. Internally we call it a "pop-up event". These are: assembled quickly; held in our offices, and registration is set at a low price.

Transforming the Nighttime Experience for Homeless Children, One Tote Bag at a Time

Adaptive Path

As designers looking to help transform the world through experiences, Project Night Night stood out to us in the way they approach their mission by considering the actual needs of the people they’re serving. Homelessness is a condition that affects 1.5

The Future of Work and Learning 2: Chatbots

Jane Hart

A bot, or as it is more commonly known, a chatbot, is a piece of software that’s designed to simulate a conversation with a (human) user in the interest of giving you information that you want or enable you to complete a transaction ( source ).

the network era trinity

Harold Jarche

What I see with my clients is the challenge of connecting social networks, with communities of practice, and with work teams, while also maintaining privacy and security. This reverses the existing practice of corporate training that is designed centrally and distributed through the hierarchy.