Designing outside your comfort zone

Adaptive Path

That’s what we tell ourselves because as designers we often rely on tried and tested tools, methods and standards to help us arrive at a solution that should work. They may sound like best practices for just being a good designer, and they are. “Trust the process!”.

Design 117

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

Trending Sources

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. “With enough ‘security,’ corporate or national, you can utterly kill freedom, production capacity, and morale.” All experiments must be designed as safe-to-fail.

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

In this paper I would like to address the core design elements in the development of a personal learning architecture being developed in the National Research Council''s Learning and Performance Support Systems program. The NRC-designed MOOC differs significantly from traditional courses. The NRC LPSS program is a 5-year $20 million effort designed to develop these core technologies and bind them with a common platform.

Different Ways Nonprofits Are Using Design Thinking to Solve Problems and Achieve Impact

Beth Kanter

Note from Beth: Several years ago, I was got trained in design thinking facilitation methods using Luma and have incorporated these techniques into my consulting and training practice. Different Ways Nonprofits Are Using Design Thinking to Solve Problems and Achieve Impact.

Thoughts on privacy

Doc Searls

Another speaker was Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Some examples: Privacy by Design is a policy and code development movement led by Ann Cavoukian , the Information & Privacy Commissioner of Ontario. In Here Is New York , E.B.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Why models matter

Clark Quinn

If we understand the structure of a cyber system, we can anticipate security threats. Consequently, it’s also one of the things I push as a key improvement to learning design. It’s a good basis for design, for problem-solving, and for learning. design meta-learning strategy In the industrial age, you really didn’t need to understand why you were doing what you were doing, you were just supposed to do it.

From Farm to Phone to Table: Sprig comes to the Service Experience Conference

Adaptive Path

We got his non-designer take on the importance of service experience and where he sees a need for service design in the future. Why should people be interested in service experience and design? Two years ago, you would never have expected me to care about service design.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Foremost among these limitations are privacy, security and inclusion. “Doing business on the Internet requires a leap of faith” because the infrastructure lacks the necessary security. Why wasn’t stronger security designed into the original Internet protocols?

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. You are not secure. Web designers and coders, they're not doing anything about it. Summary of a talk by Parry Aftab at the IFIPTMA Conference in Moncton. It is important that you know why I am so trustworthy. I am the most trustworthy person on the internet.

Design a Superhero

Adaptive Path

Experiment #1: You are designing the superhero of _travel. In this experiment, I asked a fellow design researcher who loves to travel to help me design the Superhero of Travel. Super-powered magnet automatically removes all metal before security. Experiment #2: You are designing the superhero of _ baseball fandom _. For this experiment, I asked someone who’s not in the UX field to help design the Superhero of Baseball Fandom.

What happens when the home of the future crashes?

Ross Dawson

This is a point that was addressed in my report for Intel Security on Safeguarding the Future of Digital Australia in 2025. They may be secure, but if there is any system failure, we may not be able to get into our own homes. design Future of cities Technology trends

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.

Designing to encourage “collaborative consumption”

Adaptive Path

The trick to make collaborative consumption work is experience design. Provide comfortable, secure, healthy, and beautiful environments for residents. I’m curious what a slow experience design movement looks like? What might these be like applied to the design of products, softwares, and service experiences? And here’s Allan Chochinov at IIT Design Research Conference 2010 talking about phone versus email, among other things.

soft skills are permanent skills

Harold Jarche

User Interface Design. Network Security Expertise. Are soft skills the new hard skills? I asked this question six years ago. I would suggest that hard skills are really temporary skills. They come and go according to the economy and the state of technology.

Skills 121

Levels of learning experience design

Clark Quinn

This is the realm of learning experience design. Learning experience design can, and should, operate at several levels. You want a minimalist approach that combines effective cognitive design with engaging emotional design. You want the formal resources to be designed to mesh with the task and provide effective information design. Here we are talking deeper instructional design, information mapping, and aligned social media.

All Social is Learning | Organizational Knowledge Design

Martijn Linssen

All Social is Learning | Organizational Knowledge Design [.] Tweets that mention All Social is Learning | Organizational Knowledge Design -- Topsy.com - [.] About John Dr. John Bordeaux brings 28 years’ experience working issues of national security and knowledge management.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Enjoy EUR200 off the course fees if you sign up before 8 August 2014.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. He was being asked to defend a lazy and thoughtless Web design that he had no role in creating.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. He was being asked to defend a lazy and thoughtless Web design that he had no role in creating.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content. The badges and competency-based learning movement may challenge assessment, but at this point it remains reasonably secure.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Having learned from their failures and successes they have worked out a design approach that aims to build an effective sensemaking environment that engage stakeholders on all levels emphasising the different approach SenseMaker® takes. Enjoy EUR200 off the course fees if you sign up before 8 August 2014.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 42

Learning Technologies UK wrap-up

Clark Quinn

There was also a nice session on mobile, with some principles presented and then an interesting case study using iPads under somewhat severe(military) constraints on security. design games meta-learning mobile social technologyI had the pleasure of speaking at the Learning Technologies ’11 conference, talking on the topic of games. I’ve already covered Roger Schank ‘s keynote , but I want to pick up on a couple of other things.

On the Governance of Blockchain: Lessons from the Internet

Irving Wladawsky-Berger

All are generally based on the original design released in 2009 by Satoshi Nakamoto , but with wide variations and limited interoperability. payments, smart contracts, securities clearance, insurance, etc.).

What does the Internet of Everything mean to you?

Harold Jarche

“Mr Corman [security specialist] worries that it may take a catastrophic event to get [IoE technology] makers to focus on the need for better security in connected devices.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. Tool is a piece of code designed to do a particular thing. It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor.

On cryptocurrencies, blockchain and all that

Doc Searls

“A digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. Though technically they could be redeemed, many tokens are designed never to be redeemed but traded forever.

The Growing Importance of Storytelling in the Business World

Irving Wladawsky-Berger

Let me know discuss the use of blockchain technologies for enhancing the overall security and efficiency of our transactional systems. Blockchain technologies have the potential to significantly strengthen the security of our 21st century digital economy.

Sea wall or salt marsh?

Dave Snowden

The sea-wall on the other had when it breaks it breaks; the shift from high utility, predictability and security to catastrophic failure is sudden and calamitous in nature. They provide an aura of security and reliability up to the point where it all gets too much for them.

a workable future

Harold Jarche

To design our technologies, our economies, and our policies to meet the needs of a future workforce, we must first jettison our old models of the workforce.

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. It was important to get the maximum efficiency and price-performance out of each machine, so the hardware architecture and operating system were carefully designed to achieve high processor utilizations and fast response times to high volume transactions.

Waking up.

Martijn Linssen

For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems. This is true for classrooms, National Security Council meetings, design studios, auto showrooms, diplomacy, boardrooms, and lovers. I think we are waking up.

Akilah Institute for Women: Social Media Workshop

Beth Kanter

Training DesignAkilah workshop. View more presentations from Beth Kanter. After the ACE leadership training, I had the opportunity to spend a day in Kigali. I volunteered to do a Social Media and Professional Networking workshop for second year students at the Akilah Institute for Women.

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

The centrally managed, highly scalable, attractively priced cloud platforms were now being designed to support a variety of mobile devices, - e.g. smartphones, tablets, e-readers and laptops.

Data 116

New Adaptive Path Event—Designing Experiences: Financial Services in a Connected Age

Adaptive Path

Our first pop-up is Designing Experiences: Financial Services in a Connected Age. Since the mid-90s, banks and investment brokerages realized that they needed to make their customers feel extremely secure about how their money was being handled, and that a solid user experience was crucial in doing this. We're trying something new at Adaptive Path. Internally we call it a "pop-up event". These are: assembled quickly; held in our offices, and registration is set at a low price.

Coherent Implications

Clark Quinn

You get security concerns here, but you need to find a balance, or you’re cutting off half of the organizational brain! For example for learning design there’s a need to track developments in fields like software engineering (e.g.

Blockchains: the Promise of More Frictionless, Trusted Economies

Irving Wladawsky-Berger

Why wasn’t stronger security designed into the original Internet infrastructure? MIT research scientist and Internet pioneer David Clark addressed this question in a recent article about the early design choices that have led to today’s Internet. Why do firms exist?