Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

Designing outside your comfort zone

Adaptive Path

That’s what we tell ourselves because as designers we often rely on tried and tested tools, methods and standards to help us arrive at a solution that should work. They may sound like best practices for just being a good designer, and they are. “Trust the process!”.

Design 117

Trending Sources

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. “With enough ‘security,’ corporate or national, you can utterly kill freedom, production capacity, and morale.” All experiments must be designed as safe-to-fail.

Different Ways Nonprofits Are Using Design Thinking to Solve Problems and Achieve Impact

Beth Kanter

Note from Beth: Several years ago, I was got trained in design thinking facilitation methods using Luma and have incorporated these techniques into my consulting and training practice. Different Ways Nonprofits Are Using Design Thinking to Solve Problems and Achieve Impact.

Design Elements in a Personal Learning Environment

Stephen Downes: Half an Hour

In this paper I would like to address the core design elements in the development of a personal learning architecture being developed in the National Research Council''s Learning and Performance Support Systems program. The NRC-designed MOOC differs significantly from traditional courses. The NRC LPSS program is a 5-year $20 million effort designed to develop these core technologies and bind them with a common platform.

Mission Bicycle and Adaptive Path: Experience Design in Retail

Adaptive Path

Zack had plans for the shop’s interior design, but the experience of the retail environment was still missing. The goal was to design a simple retail experience that would help customers assemble their perfect, custom bike. Prototyping the experience design concepts in our studio.

Thoughts on privacy

Doc Searls

Another speaker was Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Some examples: Privacy by Design is a policy and code development movement led by Ann Cavoukian , the Information & Privacy Commissioner of Ontario. In Here Is New York , E.B.

Why models matter

Clark Quinn

If we understand the structure of a cyber system, we can anticipate security threats. Consequently, it’s also one of the things I push as a key improvement to learning design. It’s a good basis for design, for problem-solving, and for learning. design meta-learning strategy In the industrial age, you really didn’t need to understand why you were doing what you were doing, you were just supposed to do it.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Foremost among these limitations are privacy, security and inclusion. “Doing business on the Internet requires a leap of faith” because the infrastructure lacks the necessary security. Why wasn’t stronger security designed into the original Internet protocols?

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.

What happens when the home of the future crashes?

Ross Dawson

This is a point that was addressed in my report for Intel Security on Safeguarding the Future of Digital Australia in 2025. They may be secure, but if there is any system failure, we may not be able to get into our own homes. design Future of cities Technology trends

From Farm to Phone to Table: Sprig comes to the Service Experience Conference

Adaptive Path

We got his non-designer take on the importance of service experience and where he sees a need for service design in the future. Why should people be interested in service experience and design? Two years ago, you would never have expected me to care about service design.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. You are not secure. Web designers and coders, they're not doing anything about it. Summary of a talk by Parry Aftab at the IFIPTMA Conference in Moncton. It is important that you know why I am so trustworthy. I am the most trustworthy person on the internet.

Design a Superhero

Adaptive Path

Experiment #1: You are designing the superhero of _travel. In this experiment, I asked a fellow design researcher who loves to travel to help me design the Superhero of Travel. Super-powered magnet automatically removes all metal before security. Experiment #2: You are designing the superhero of _ baseball fandom _. For this experiment, I asked someone who’s not in the UX field to help design the Superhero of Baseball Fandom.

Levels of learning experience design

Clark Quinn

This is the realm of learning experience design. Learning experience design can, and should, operate at several levels. You want a minimalist approach that combines effective cognitive design with engaging emotional design. You want the formal resources to be designed to mesh with the task and provide effective information design. Here we are talking deeper instructional design, information mapping, and aligned social media.

All Social is Learning | Organizational Knowledge Design

Martijn Linssen

All Social is Learning | Organizational Knowledge Design [.] Tweets that mention All Social is Learning | Organizational Knowledge Design -- Topsy.com - [.] About John Dr. John Bordeaux brings 28 years’ experience working issues of national security and knowledge management.

RFP 2

Designing to encourage “collaborative consumption”

Adaptive Path

The trick to make collaborative consumption work is experience design. Provide comfortable, secure, healthy, and beautiful environments for residents. I’m curious what a slow experience design movement looks like? What might these be like applied to the design of products, softwares, and service experiences? And here’s Allan Chochinov at IIT Design Research Conference 2010 talking about phone versus email, among other things.

soft skills are permanent skills

Harold Jarche

User Interface Design. Network Security Expertise. Are soft skills the new hard skills? I asked this question six years ago. I would suggest that hard skills are really temporary skills. They come and go according to the economy and the state of technology.

Skills 121

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. He was being asked to defend a lazy and thoughtless Web design that he had no role in creating.

Why Is Customer Service Still So Lousy (Financial Services Web Design Edition)?

Andy McAfee

It was that old standby, security: That didn’t make a lot of sense to me. He was being asked to defend a lazy and thoughtless Web design that he had no role in creating.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content. The badges and competency-based learning movement may challenge assessment, but at this point it remains reasonably secure.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

leadership is helping make the network smarter

Harold Jarche

Canada’s electronic spy agency, the Communications Security Establishment (CSE) has just released some of its malware detection tools as open source software, so any organization or individual can better detect threats.

The Evolution Toward Digital Supply Chains

Irving Wladawsky-Berger

T hese data and tools will enable companies to make better decisions across the overall supply chain, including product design, manufacturing, distribution and sales.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Enjoy EUR200 off the course fees if you sign up before 8 August 2014.

Learning Technologies UK wrap-up

Clark Quinn

There was also a nice session on mobile, with some principles presented and then an interesting case study using iPads under somewhat severe(military) constraints on security. design games meta-learning mobile social technologyI had the pleasure of speaking at the Learning Technologies ’11 conference, talking on the topic of games. I’ve already covered Roger Schank ‘s keynote , but I want to pick up on a couple of other things.

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Their responses suggest that they view blockchain as a kind of trust accelerator , helping to build trust in several ways: increased transactional transparency, higher data quality and accuracy, increased trust in transaction reliability, and improved security against fraud and cybercrime.

professional learner’s toolkit

Harold Jarche

Each browser has different security and privacy settings, depending on what type of resource I need to access. I ensure online security by using a password manager: 1Password.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 42

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Each community “ready to go with a click&# but siloed in the very design of the software. Tool is a piece of code designed to do a particular thing. It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor.

What does the Internet of Everything mean to you?

Harold Jarche

“Mr Corman [security specialist] worries that it may take a catastrophic event to get [IoE technology] makers to focus on the need for better security in connected devices.

Amsterdam Two-Day SenseMaker® Design: Only a week left to take advantage of Early Bird Discount!

Dave Snowden

There are still seats available at the Two Day SenseMaker® Design course in Amsterdam held over 16-17 September 2014. Having learned from their failures and successes they have worked out a design approach that aims to build an effective sensemaking environment that engage stakeholders on all levels emphasising the different approach SenseMaker® takes. Enjoy EUR200 off the course fees if you sign up before 8 August 2014.

Reflections on the Longevity of Mainframes

Irving Wladawsky-Berger

As pointed out in the announcement, the new system is a result of more than $1B in R&D investments over the past four years, resulting in major improvements in performance, security, availability and other key enterprise features. It was important to get the maximum efficiency and price-performance out of each machine, so the hardware architecture and operating system were carefully designed to achieve high processor utilizations and fast response times to high volume transactions.

The Growing Importance of Storytelling in the Business World

Irving Wladawsky-Berger

Let me know discuss the use of blockchain technologies for enhancing the overall security and efficiency of our transactional systems. Blockchain technologies have the potential to significantly strengthen the security of our 21st century digital economy.

Waking up.

Martijn Linssen

For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems. This is true for classrooms, National Security Council meetings, design studios, auto showrooms, diplomacy, boardrooms, and lovers. I think we are waking up.

a workable future

Harold Jarche

To design our technologies, our economies, and our policies to meet the needs of a future workforce, we must first jettison our old models of the workforce.

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

The centrally managed, highly scalable, attractively priced cloud platforms were now being designed to support a variety of mobile devices, - e.g. smartphones, tablets, e-readers and laptops.

Data 116

Akilah Institute for Women: Social Media Workshop

Beth Kanter

Training DesignAkilah workshop. View more presentations from Beth Kanter. After the ACE leadership training, I had the opportunity to spend a day in Kigali. I volunteered to do a Social Media and Professional Networking workshop for second year students at the Akilah Institute for Women.

The MIT 2017 Inclusive Innovation Challenge

Irving Wladawsky-Berger

The platform vets the tutors to ensure high quality teaching and enables secure payments.”. The company designed an artificial intelligence-driven virtual assistant for these students to receive round-the-clock personalized support.”.