CFPB.gov goes open source
David Weinberger
APRIL 10, 2012
Plus: Open-source software works because it enables people from around the world to share their contributions with each other.
David Weinberger
APRIL 10, 2012
Plus: Open-source software works because it enables people from around the world to share their contributions with each other.
Mark Oehlert
JULY 3, 2007
e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Shout out to my current favorite Web-based tool: Pixer | Main | "1st Virtual World Shootout.Forterras OLIVE Platform Smokes Second Life" (Ambient Connections) » July 03, 2007 Open Laszlo: Open Source Webtop Platform Anyone else out there have experience with this platform ?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Mark Oehlert
MARCH 26, 2008
e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Top Ten AntiSpyware Apps from CNET | Main | Semi-Daily Quote/Lyric/Words of Others » March 26, 2008 "Using Open Source Social Software as Digital Library Interface" (D-Lib Magazine) ( LINK ) "This article investigates the use of social software applications indigital library environments.
Mark Oehlert
SEPTEMBER 6, 2007
e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Ajax SDK for the iPhone on the way from Backbase | Main | Quote of the Day: Vannevar Bush - "As We May Think" » September 06, 2007 Open Laszlo Gets Its Own Track and Big Customers for the open source webtop platform Way back in July, I posted a brief note about OpenLaszlo. is actually investigating using it and today I see that Open Laszlo has its own track at AjaxWorld West 2007.
Mark Oehlert
MARCH 5, 2008
Main | The World Continues to Get Spikier, not Flatter » March 05, 2008 Big Basket of Stuff #3.the last for today.and short Adobes Kevin Lynch on AIRs Open-Source Road to the Desktop (WIRED):"This week, Adobe released version 1.0 e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Big Basket of Stuff #2.in which even amnesiacs can remember games.students get connected and wikis get adopted.
Mark Oehlert
MARCH 11, 2008
OK.today we have two reasons why having a browser built on open source code with a powerful and passionate development community behind it, will continue to provide a more robust and user-focused experience than something provided by say a large corporation - no knock on large corporations (some of my best friends.). Well now you can just create your own widget that loads up that page from a bookmark that you can have on your desktop w/out having to open the whole browser.
Irving Wladawsky-Berger
JANUARY 12, 2016
Then in the 1990s, the open Internet protocol, - TCP/IP , - was widely embraced by the general IT marketplace, making it possible to interconnect systems and applications from any vendors. At the same time, the Web’s open set of standards, - HTML , HTTP , URLs , - and the easy-to-use, graphical Mosaic web browser , - enabled any PC connected to the Internet to access information on any web server anywhere in the world.
Stephen Downes: Half an Hour
OCTOBER 17, 2017
This is also the place where free and open source software (FOSS) can emerge. But it’s not open source at the moment. Question: security for open source tools. Response: open source more secure than non-open source.
Mark Oehlert
JULY 2, 2007
MSN article) Here is the shocking synopsis of this article : Security needs to be better in Web 2.0 Yes, its true that as more data is stored in the cloud, then the cloud needs to be better secured and we need to look at how our browsers are allowed to interact with our computers (although no using browser code as part of the genetic base for your OS might be a start).
Mark Oehlert
MAY 17, 2007
introNetworks Secures $2.7 e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Fleck.Web page annotation | Main | Great Web Comic and the Guy Gets Fired!? » May 17, 2007 Good for introNetworks!
Irving Wladawsky-Berger
MAY 7, 2018
I said that I look at the value of blockchain through two complementary lenses: enhancing the security of the Internet, and reducing the inefficiencies and overheads in applications, like supply chains, involving multiple institutions. In particular, t he design decisions that shaped the Internet back in the mid-late 1980s didn’t optimize for secure, trustworthy operations. Key here is the all-important role of open standards.
Irving Wladawsky-Berger
MAY 23, 2016
Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Everyone was using the same standards, including open source implementations of key protocols. These collaborations have led to the creation of standards, open source software and governance processes embraced by all participants. But it requires a bold reassessment of the way we approach security in the digital age.
Harold Jarche
NOVEMBER 15, 2017
Each browser has different security and privacy settings, depending on what type of resource I need to access. I ensure online security by using a password manager: 1Password. Blogging Tool : This blog is built on WordPress open source software, designed and hosted by Tantramar Interactive. Jane Hart describes a Modern Professional Learner’s Toolkit as having several components: resources, networks, devices, etc.
Irving Wladawsky-Berger
SEPTEMBER 1, 2015
In my opinion, the most important part of the announcement is LinuxONE’s support of the advanced encryption features that have been built into the latest mainframes models, enabling them to support up to 8,000 highly secure Linux systems in one machine. . Seamless support of open source tools and software, including Apache Spark , Node.js , MongoDB , MariaDB , PostgreSQL , Chef and Docker. Many welcomed IBM’s strong support of Linux and open source in general.
Irving Wladawsky-Berger
MAY 7, 2018
I said that I look at the value of blockchain through two complementary lenses: enhancing the security of the Internet, and reducing the inefficiencies and overheads in applications, like supply chains, involving multiple institutions. In particular, t he design decisions that shaped the Internet back in the mid-late 1980s didn’t optimize for secure, trustworthy operations. Key here is the all-important role of open standards.
Irving Wladawsky-Berger
JUNE 20, 2020
Thomas Friedman ’s The World is Flat became an international best-seller in 2005 by nicely explaining what this new golden age of globalization was all about, including the key forces that contributed to flattening the world, - from the explosive growth of the Internet, open source software and related technologies; to the rise of outsourcing, offshoring and global supply chains.
Harold Jarche
OCTOBER 19, 2017
Effective networks are diverse and open. They are in service to the network, to help keep it resilient through transparency, diversity of ideas, and openness. Canada’s electronic spy agency, the Communications Security Establishment (CSE) has just released some of its malware detection tools as open source software, so any organization or individual can better detect threats.
Irving Wladawsky-Berger
JUNE 19, 2017
The WEF report compared the blockchain to the Internet, noting that “Like the Internet, the blockchain is an open, global infrastructure upon which other technologies and applications can be built. As Don Tapscott and Alex Tapscott wrote in the opening paragraph of their recently published book Blockchain Revolution , “It appears that once again, the technological genie has been unleashed from its bottle. Security . Security standards are necessary, but not sufficient.
Irving Wladawsky-Berger
AUGUST 21, 2010
Both studies strongly recommended that IBM embrace Linux across its product lines, that IBM should work closely with the open Linux community as a partner in its development, and that we should establish an organization to coordinate Linux activities across the company. days, the community concept behind open source was mystifying to many. They were baffled as to why people would work on open source projects while not getting paid for their efforts.
Irving Wladawsky-Berger
MARCH 5, 2018
In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. The other major kind of blockchain killer-apps will likely deal with identity management and data security.
Irving Wladawsky-Berger
AUGUST 2, 2016
The WEF report compared the blockchain to the Internet, noting that “Like the Internet, the blockchain is an open, global infrastructure upon which other technologies and applications can be built. The use of open standards and open source software made it much easier to send an e-mail or share information across disparate systems and institutions.
Stephen Downes: Half an Hour
NOVEMBER 10, 2020
This is an edited transcript of my presentation 'Reimaging Open Educational Resources' presented November 10 2020 to the Open Education 2020 Conferemce. link] So what I want to talk to you today talked about with you today is open education resources. They are private and secure.
Irving Wladawsky-Berger
MARCH 13, 2017
We once more had to carefully explain our reasons for supporting Linux, including the value of collaborating with an open community that included some of the best programmers and computer scientists around the world. Let me know discuss the use of blockchain technologies for enhancing the overall security and efficiency of our transactional systems. Blockchain technologies have the potential to significantly strengthen the security of our 21st century digital economy.
George Siemens
AUGUST 31, 2010
Once an organization has settled into a revenue stream that provides some security, it’s almost impossible for that organization to adopt approaches that harm or cannibalize that revenue stream (Blockbuster and video rentals, Microsoft and Office). Suggestions: it should be free(mium), grassroots, 21st century learning & teaching, use open content, be open source.
Jane Hart
JUNE 14, 2012
Whereas many individuals are happy to use their own social tools to power their own and their team’ activities, most organisations generally prefer them to use some sort of internal enterprise platform to keep the conversations and content private and secure. These might be proprietary systems like Jive , Podio , Yammer , Socialcast , or open source software, like WordPress / Buddypress or Elgg.
Irving Wladawsky-Berger
MARCH 5, 2018
In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. The other major kind of blockchain killer-apps will likely deal with identity management and data security.
Irving Wladawsky-Berger
NOVEMBER 17, 2015
For example, when electric motors were first developed in the late 19th century, they were deployed to replace big steam engines as a source of power. It took several decades for factories to realize that instead of having one central source of power, they could now fit small electric motors in each machine in the plant floor, thus leading to far more productive and flexible manufacturing processes. .
Irving Wladawsky-Berger
JULY 31, 2017
Their responses suggest that they view blockchain as a kind of trust accelerator , helping to build trust in several ways: increased transactional transparency, higher data quality and accuracy, increased trust in transaction reliability, and improved security against fraud and cybercrime. The greater trust, security and efficiencies inherent in blockchain platforms could be competitive differentiators in the formation of such multi-sided ecosystems.
Irving Wladawsky-Berger
JULY 10, 2017
We are now witnessing the rise of the internet of value,” wrote the authors in the report’s Executive Summary. “Like the first generation of the internet, this second generation promises to disrupt business models and transform industries… pulling us into a new era of openness, decentralization and global inclusion.”. At the same time, the Web’s open standards, - HTML , HTTP , URLs enabled any PC connected to the Internet to access information on any web server anywhere in the world.
Doc Searls
JUNE 21, 2017
It was released as open-source software in 2009. “A digital asset designed to work as a medium of exchange using cryptography to secure the transactions and to control the creation of additional units of the currency. “A cryptocurrency system is a network that utilizes cryptography to secure transactions in a verifiable database that cannot be changed without being noticed.” A Securities Law Framework for Blockchain Tokens.).
Jane Hart
OCTOBER 8, 2012
The open source WordPress software is also available to download and install on company servers. Dropbox recognizesthat this file synchronization and file haring is a key functionality for business, but also realises that security is a big issue for many, so offers “bank grade security” for corporate teams. For example, Intelpedia was set up using the open source MediaWiki software that is used to power Wikipedia itself.
Harold Jarche
MARCH 23, 2010
In the unattained summit of social business , Ton Zylstra writes: So we talked about how corporate systems might integrate social media tools into sharepoint and ERP-software, but not about the notion that it is quickly becoming ridiculous that IT departments should be prescribing what tools professionals should use at all, and not just stick to managing and securing the data flowing through those tools. How can you be a knowledge worker if you’re not allowed to pick your own tools?
Harold Jarche
JUNE 19, 2018
FramaDate : It’s an open source alternative to Doodle, to set up a meeting date/time or create a poll. It lets me annotate pictures, resize images, add signatures, and most importantly ensures I do not have to use Adobe Acrobat to open PDF’s, meaning one fewer vector of malware on my system. It synchronizes across all my devices and helps keep my online presence more secure. Once again, Jane Hart is asking what are your top tools for learning ?
Irving Wladawsky-Berger
JUNE 27, 2012
It is safe and secure, but largely stagnant and underutilized.”. To help restore the needed trust, the Rethinking Personal Data report proposes a dialogue among all the stakeholders focused on three key areas: protection and security; rights and responsibilities for using data; and accountability and enforcement. . Protection and Security : How can personal data be protected and secured against intentional and unintentional security breach and misuse? .
Irving Wladawsky-Berger
FEBRUARY 11, 2014
It encompasses the whole money ecosystem, including the global payment infrastructures , the management of personal identities and financial data, the global financial flows among institutions and between institutions and individuals, the government regulatory regimes, security and privacy issues, and so on. Having been implemented in open source software, Bitcoin’s sophisticated protocols are widely available, which has helped bring it increasing usage and prominence.
David Weinberger
JUNE 11, 2010
Many worry about the power this will put in the hands of the Big Cloud Providers, with Robert Ackland arguing that “we need the cloud to be built using free and open source software.. The only thing I’d add to The Experts is that this will have network effects like crazy — effects due to the scale of data and social connections being managed under one roofless roof (with, we hope, lots of openness as well as security
Jane Hart
AUGUST 2, 2011
People often cite Wikipedia as a unreliable source since it is a “collaborative encyclopaedia. We need to ensure the privacy and security of our organisation’s content. Intelpedia is hosted on the open source MediaWiki software. Tweet. This is the 4th in a series of posts about how L&D departments can move forward from their traditional role of creating, delivering and managing formal learning.
Doc Searls
FEBRUARY 20, 2014
These will be our own secure personal spaces in the connected world. Each will have its own open source operating systems (e.g. ” Then look at what Fred Wilson says about online advertising as a source of pollution. (He There are still plenty of centralities working on the open Net, but they also have vulnerabilities, as we’re finding in post-Snowden time. A lot of doors opened up yesterday.
Irving Wladawsky-Berger
JUNE 23, 2015
Having been implemented in open source software, Bitcoin’s sophisticated protocols are widely available, which has helped bring it increasing usage and prominence. . transactions and investments) kept in-house… These ecosystems apply new technologies to take care of most domestic and commercial needs… Customers prefer to remain as passive consumers,… The ecosystem owners manage security and regulation.” . Privacy and security become key competitive advantages.
Stephen Downes: Half an Hour
OCTOBER 18, 2017
First there was the open source movement (Moodle and Sakai). Another trend - maybe not the way it should be, but it’s where the data point: open source peaked in 2013 at about 34% and since then it has begun to drop. It’s funny with all the talk about open education, the licensing model of the LMS is not going in that direction. Comment: some IT people focus on security and privacy.
David Weinberger
NOVEMBER 1, 2016
A: In the Dookhan case, the data was impounded, and I used security measures. I reflected on how I got that opportunity, and the answer was that it was thanks to open source. I’m at a Berkman Klein Center lunch time talk by Paola Villarreal [twitter: paw ], a BKC fellow, on “Public Interest in Data Science.” ” (Paola points to a github page for her project info.). NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information.
Stephen Downes: Half an Hour
MAY 4, 2011
Conservative: security, usability, assessment, accrediting identity management, detailed management, tracking and reports, performance and stability. Mobile apple can now talk to Moodle securely. There are many security layers. It is a back door, and needs to be highly highly secure. The hub software is open source, install the plug, and it becomes a community hub.
Doc Searls
JUNE 30, 2013
Beyond feudal security: what’s happening to online security and freedom. iTunes Radio makes offer to NYC labels: Terms from Apple that went out in the last week to the indies are “on par” with what the major record companies were given, according to sources and a copy of the contract obtained by Crain’s. IRS Puts Open Source Projects Under Microscope, Spawns Nonprofit Black Hole. Surveillance.
Let's personalize your content