Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. However, “Chinese theft of intellectual property (IP) and its market-manipulating industrial policies threaten U.S.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hillary Clinton’s Internet policy speech

David Weinberger

Communications networks have played a crucial role in our relief efforts, she says. The same networks that organize people for freedom also enable Al Qaeda to spew hatred, she says. “Information networks have become a great leveler.&# We need our networks to be secure, especially from evil organizations. “Information freedom&# is not just good policy, but it’s a universal value and good for business.

Talking about the Network Era

Harold Jarche

Spying on entire populations is another network era phenomenon. Networked, distributed businesses, like AirBNB, are disrupting existing models, with the inevitable push-back as they become successful. Networks will transform education, business, the economy, and society even further.

The network is the solution

Harold Jarche

The key to a flourishing civilization in the network era is sense-making. ” Self-instruction, the basis of personal knowledge management , is a necessity in effective peer-to-peer networks, as networks are how we will govern ourselves more and more. Policy drives decisions.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

Beyond Free ? Open Learning in a Networked World

Stephen Downes: Half an Hour

I want to talk to you about the concept of free, the concept of open learning, the concept of networked learning in a networked world and the concept of the institution. Watters, 2014) This is a patent for setting up a regional network in the south western United States.

International Organizations and Social Media: News, Engagement, and Social Data for Policy Change

Beth Kanter

I’m teaching a graduate class at the Monterey Institute of International Studies based on my books, The Networked Nonprofit and Measuring the Networked Nonprofit. The course is about how to leverage networks and social media for learning and impact.

The Networked Professional: Principles of Effective Online Networking

Beth Kanter

For example, this week they will attend a workshop at LinkedIn where LinkedIn employees will coach them on online networking tips and taking advantage of the platform for online networking. Connect Thoughtfully: Friending policy for each online social network you use.

A Nonprofit’s Legal Counsel Is The Social Media Manager’s Best Friend!

Beth Kanter

” This can have a chilling effect on an organization’s social media strategy to say the least. It runs counter to the “ networked mindset ” that is so important to being a networked nonprofit and building networks and movements.

The Third Wave of the Digital Economy - Promises and Challenges

Irving Wladawsky-Berger

Atkinson is founder and president of the Information Technology and Innovation Foundation (ITIF), a think tank focused on science and technology policy. They need to make the next-wave digital evolution a central policy goal. Support policies where the benefits are largely unequivocal.

Data 237

The Canadian Government and Cryptocurrency

Stephen Downes: Half an Hour

This is a policy-neutal document; that is, I don't advocate one way or another for any of the items described below. Canada Revenue Agency Policy Their information page is here: [link] In a nutshell: cryptocurrency is not legal tender in Canada, which means you are not required to accept it.

Carl Jackson on Supporting Online Communities in International Development

Nancy White

Here are some of the nuggets I extracted: People are seeing online communities and networks as core instruments of how we work.We can now cheaply create broad based activist networks. They have different networks and ways of sharing knowledge.

The 2019 Artificial Intelligence Index

Irving Wladawsky-Berger

This is largely due to the development of a variety of AI accelerators , - such as GPUs and TPUs , - specifically designed to boost the performance of the algorithms used in machine learning, convolutional neural networks , machine vision and other AI applications.

Data 200

Making social media happen in government: case study of NSW Department of Education

Ross Dawson

Barriers to engagement include loss of control, staff performance, ROI, brand reputation, security, and poor understanding. They created it by drawing on and adapting existing social media policies. Once the policy was in place and staff were being educated on the issues, the executives started feeling far more comfortable providing more access to social media, including Facebook. Social media Social networks Web 2.0

The Identity Challenge: On the Internet, Nobody Knows You're a Dog

Irving Wladawsky-Berger

The report outlines a policy agenda for improving the privacy and security of digital systems and help combat identity fraud. Change the way America uses the Social Security Number.

Data 198

The Economic Potential of The Internet of Things

Irving Wladawsky-Berger

Ubiquitous or Pervasive Computing dates back to the 1990s, when neither the necessary low-cost devices nor ubiquitous wireless networking were anywhere near ready. Home - Energy management, security, safety, and automation of home chores. Privacy, Security, Confidentiality and IP.

Data 266

Five Myths of Social Learning


Home > Social Learning > Five Myths of Social Learning Five Myths of Social Learning December 3rd, 2009 Goto comments Leave a comment There is no question that the rise of social networks is creating a profound shift in the way training departments are delivering knowledge to their employees, partners, and customers. revolution has brought learning networks front and center with “ Connect and Communicate ” becoming the new mantra for training organizations.

The many and varied risk factors in Facebook’s IPO

Ross Dawson

Our competitors may develop products, features, or services that are similar to ours or that achieve greater market acceptance, may undertake more far-reaching and successful product development efforts or marketing campaigns, or may adopt more aggressive pricing policies. It is possible that a regulatory inquiry might result in changes to our policies or practices. Social media Social networks Uncategorized Web 2.0

The Promise and Current State of Blockchain

Irving Wladawsky-Berger

I said that I look at the value of blockchain through two complementary lenses: enhancing the security of the Internet, and reducing the inefficiencies and overheads in applications, like supply chains, involving multiple institutions. The Internet was just another network.

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

Their deployment time-lags are longer because attaining their full benefits requires a number of complementary co-inventions and investments, including additional technologies, applications, processes, business models, and regulatory policies.

On the Governance of Blockchain: Lessons from the Internet

Irving Wladawsky-Berger

How we govern the internet of information as a global resource serves as a model for how to govern this new resource: through a multi-stakeholder approach using what we call global governance networks.”. payments, smart contracts, securities clearance, insurance, etc.).

Issues 206

a workable future

Harold Jarche

The triple operating system model for network era organizations aligns with these recommendations, particularly the need to operate as temporary, negotiated hierarchies and the requirement for safe places to work on alternatives (communities of practice).

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Their responses suggest that they view blockchain as a kind of trust accelerator , helping to build trust in several ways: increased transactional transparency, higher data quality and accuracy, increased trust in transaction reliability, and improved security against fraud and cybercrime.

Peering into a Confusing, Paradoxical Future

Irving Wladawsky-Berger

This unclassified strategic report is intended to provide the incoming administration and other senior leaders with a framework for long-range policy assessment.

Trends 206

Municipal nets, municipal electric power, and learning from history

David Weinberger

Jim Baller, who has been writing about the laws, policies, and economics of network deployment for decades, has found an eerie resonance of this contemporary debate. The debate over whether municipalities should be allowed to provide Internet access has been heating up.

Do you really need all this personal information, @RollingStone?

Doc Searls

Here’s the popover that greets visitors on arrival at Rolling Stone ‘s website: Our Privacy Policy has been revised as of January 1, 2020. This policy outlines how we use your information. By using our site and products, you are agreeing to the policy.

Is Blockchain Now Transitioning to a More Mundane and Useful Era?

Irving Wladawsky-Berger

This problem is now being addressed by companies like Chainlink , a startup that’s developed a tamper-proof system that securely feeds the necessary data to smart contracts on a blockchain.

Issues 200

Coherent Implications

Clark Quinn

There are three layers: work teams composed of members from different communities of practice, that are connected outward to broader social networks. You get security concerns here, but you need to find a balance, or you’re cutting off half of the organizational brain!

The Link Between BYOD and Increased Productivity


IBM MobileFirst gives an excellent definition of BYOD: “ Bring your own device (BYOD) is an IT policy where employees are allowed or encouraged to use their personal mobile devices—and, increasingly, notebook PCs—to access enterprise data and systems. Can an LMS Remedy BYOD Security Issues?

Innovation at the State Dept.

David Weinberger

I just read Revolution@State , a pretty amazing report by the Lowy Institute , an independent policy think tank, about the extent and depth of e-diplomacy initiatives at the State Department. I came away with several impressions: The Internet and social networking are central to how State does its business. The Net and social networking are transforming how State does its business. The State Department has been hypersensitive about security.

The Promise and Current State of Blockchain

Irving Wladawsky-Berger

I said that I look at the value of blockchain through two complementary lenses: enhancing the security of the Internet, and reducing the inefficiencies and overheads in applications, like supply chains, involving multiple institutions. The Internet is fundamentally a general purpose network platform supporting a remarkable variety of applications. There’s no one overall owner responsible for security , - arguably the biggest challenge facing the Internet today.

Cynefin St David’s Day (4 of 5)

Dave Snowden

The fact that the UK is currently privileging the latter over the former with its herd-immunity policy is deeply worrying, although we are now told this has been adandoned.

Tear the walls down: Jericho and the future of enterprise tech

Ross Dawson

As Jericho Forum puts it: The huge explosion in business collaboration and commerce on the Web means that today’s traditional approaches to securing a network boundary are at best flawed, and at worst ineffective. To respond to current and future business needs, the breakdown of the traditional distinctions between “your” network and “ours” is inevitable. The forum believes responding to the challenges of de-perimeterization must be central to all IT security strategies.

The Future of Financial Services

Irving Wladawsky-Berger

Smart mobile devices, broadband wireless networks, cloud-based services and big data are now ushering the next major phase in the evolution of FS. Privacy and security become key competitive advantages.

Data 239

Fidelity in complex systems consultancy

Dave Snowden

It’s a wider issue, if we look at policy making in Government there is a general tendency for policy advisors to focus on being invited back to the table rather than to tell a hard truth, or provide all the facts.

Evaluation of CL/4291 “Draft text of the Recommendation concerning Open Educational Resources”, UNESCO

Stephen Downes: Half an Hour

Overall this proposed policy represents well the state of the art in open educational resources (OER) and would serve to further the aims and objectives of open online education. ii) Developing supportive policy 12. I think there’s an important policy point here.

The Top Ten Emerging Technologies of 2017

Irving Wladawsky-Berger

Deep-Learning Networks Rival Human Vision - “AI now matches or exceeds the ability of experts in medicine and other fields to interpret what they see”. Deep learning is based on multilayered neural networks.

Don’t Ask and Don’t Tell Facebook

David Weinberger

The military is trying to devise policies to govern how our service people use social networking sites, according to a story by Julian Barnes in the LA Times. The article implies the Pentagon accepts that military folks are going to use these sites, and there may even be some good that will come from it, but the military is concerned about security. Which may be exactly what the military policy is heading toward.

The Digital Evolution Index

Irving Wladawsky-Berger

Measurements include available bandwidth, access to digital content, security of transactions, business use of IT, consumer financial services, and quality of roads. Institutional Environment : Are government policies and regulations facilitating the creation of digital ecosystems?

Data 236

The Jobs Outlook for 2022

Irving Wladawsky-Berger

These include data analysts and scientists, AI and machine learning specialists, software and application developers, big data specialists, IT services, process automation, information security analysts, robotics engineers, and e-commerce and social media specialists.

Data 194

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

Their deployment time-lags are longer because attaining their full benefits requires a number of complementary co-inventions and investments, including additional technologies, applications, processes, business models, and regulatory policies. People knew that it was a kind of network originally developed by DARPA , an agency of the US Department of Defense, that was now widely used in universities and research labs.

The Continuing Evolution of Cloud Computing

Irving Wladawsky-Berger

Skeptics are still not convinced that cloud can provide the necessary security, reliability, privacy and governance. So now when we ask about cloud, most companies say that their cloud environment is as secure, if not more secure, than their traditional infrastructure.” .