Reflections on Linux and Mainframes

Irving Wladawsky-Berger

Later that decade, Linux was also widely used in a variety of Internet applications, including web servers and firewall systems. . In my opinion, the most important part of the announcement is LinuxONE’s support of the advanced encryption features that have been built into the latest mainframes models, enabling them to support up to 8,000 highly secure Linux systems in one machine. . Many welcomed IBM’s strong support of Linux and open source in general.

Is Blockchain the Major Next Step in the Evolution of the Internet

Irving Wladawsky-Berger

The WEF report compared the blockchain to the Internet, noting that “Like the Internet, the blockchain is an open, global infrastructure upon which other technologies and applications can be built. As Don Tapscott and Alex Tapscott wrote in the opening paragraph of their recently published book Blockchain Revolution , “It appears that once again, the technological genie has been unleashed from its bottle. Security . Security standards are necessary, but not sufficient.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Blockchain Killer-Apps

Irving Wladawsky-Berger

In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. The other major kind of blockchain killer-apps will likely deal with identity management and data security.

Open Innovation Re-visited

Irving Wladawsky-Berger

At the time, a number of research institutions and leading edge companies were already using clusters of Intel processors running Linux as a way of building relatively inexpensive, and increasingly powerful supercomputers, as well as highly scalable web servers, distributed file and print servers, network firewalls , and other Internet infrastructure applications. days, the community concept behind open source was mystifying to many.

Blockchain Killer-Apps

Irving Wladawsky-Berger

In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. The other major kind of blockchain killer-apps will likely deal with identity management and data security.

The Smart Worker : shares what s/he learns

Jane Hart

People often cite Wikipedia as a unreliable source since it is a “collaborative&# encyclopaedia. We need to ensure the privacy and security of our organisation’s content. But if you want to keep the materials as close to the workflow as possible, then other tools are available for in-house, behind-the-firewall, enterprise use. Intelpedia is hosted on the open source MediaWiki software. Tweet.

TTI Vanguard Conference Notes - 7

Stephen Downes: Half an Hour

Firefox, another really successful open source project. Open sources is a success, we all know that, it's nothing new. But how does open source software development work? Almost every open source project uses peer review. What github does is allow your entire open source development is open? What we're interested in at github is where we take all these ideas, and put them inside a firewall, with permissions, etc.,

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

lessons scripted around 1:1 laptop); IT issues - we were a Windows network, with everything on our own domain - we needed to open eg printing etc O - consumer technology far more accessible in 2012 esp.

Harold Jarche » Need for collaboration continues to grow

Harold Jarche

ralphmercer: committees are place to lure great ideas to be killed while absolving everyone of the blame hjarche: innovation is something you create from thinking & doesn’t usually come from existing practices that others are following [link] hjarche: Our Future: Security, Consumption, Participation and/or Green? We set up a collaborative space outside the firewall and work with clients in their particular business context.

Content Delivery Networks

Stephen Downes: Half an Hour

Static Content The simplest service example occurs when xyz.com decides to outsource its image sourcing. Then it is assigned to the first open server in the circle. Streaming media has, in the last few years, become the major source of bits that are delivered. At the OS level, Akamai started with Red Hat Linux and, over time, have built in Linux performance optimizations and eventually created a ‘secure OS’ derived from 2003 Linux that is ‘battle hardened’.

Why do we care about some things and not others? | Daniel Pink

Dan Pink

That takes a coach with a secure ego, and there are probably limits to student self-direction in a school setting due to liability issues, but definitely movement toward self-direction is needed. I think coaches and parents and peers can help to form a “firewall” around a team, to create an environment where some of the pressure to perform and negative effects of failure to perform lifted off players, so that it OK to fail sometimes. Dan Pink. Contact.