Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The interconnectedness and openness made possible by the Internet and broader digital ecosystem create unparalleled value for society,” notes the report in its Executive Summary. “But these same qualities make securing today’s cyber landscape difficult. Why wasn’t stronger security designed into the original Internet infrastructure?

Mistakes & Security

Harold Jarche

— “Security is mostly a superstition. “With enough ‘security,’ corporate or national, you can utterly kill freedom, production capacity, and morale.” Tweet Here are some of the insights and observations that were shared via Twitter this past week. “1 tip for managing creative people: don’t.” ” @flowchainsensei.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

cooperation, measurement, security and more

Harold Jarche

Ultimately, Tomasello’s research on human nature arrives at a paradox: our minds are the product of competitive intelligence and cooperative wisdom, our behavior a blend of brotherly love and hostility toward out-groups. Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.” ” #crapdetection.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

The article makes a strong case for flexicurity - shorthand for flexible security, - a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. Like me, many workers enjoyed relatively secure, stable jobs and a number of company benefits, including health care insurance, vacations and retirement pensions. Entrepreneurship and flexible security.

Global Arbitrage and the Productivity Puzzle

Irving Wladawsky-Berger

A couple of weeks ago I wrote about The Productivity Puzzle , - namely that despite our continuing technology advances, the US and other developed economies have experienced a sharp decline in productivity growth over the past 10 to 15 years. So far, though, economists have failed to reach consensus on the causes of the productivity growth slowdown or indeed the relative significance of the various arguments,” wrote McKinsey.

The New Era of Smart, Connected Products

Irving Wladawsky-Berger

An equally optimistic view was expressed in another excellent article, - How Smart Connected Products are Transforming Competition , - published in the November issue of the Harvard Business Review by Michael Porter and James Heppelmann. . We generally think of products as physical entities, - e.g., clothes, light bulbs, appliances, cars, - some quite simple and some much more complex, built using sophisticated mechanical and/or electrical components.

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. the primer starts out by asking. “In an increasingly borderless and digital world, privacy and security cannot be ensured through the construction of walls around sensitive information. From time immemorial, our identity systems have been based on face-to-face interactions and on physical documents and processes.

From Mass Production to Mass Individualism

Irving Wladawsky-Berger

All kinds of new products and services, like Airbnb, are now coming to market. It would not be possible without the social networks that enable peer-to-peer transactions matching supply with demand; the mobile devices and platforms that enable individuals to conduct such transactions any time and place; and the digital payment systems that reliably and securely broker the transactions between buyers and sellers.

The Link Between BYOD and Increased Productivity


A BYOD policy also makes it easy for employees to access corporate data and online training materials, which can increase productivity. Of all the benefits listed here, increased productivity usually pleases company leaders most. Some organizations choose to implement BYOD solely for the purpose of augmenting productivity. Dell Study Shows Link Between BYOD and Increased Productivity. 50% of companies have experienced a data breach due to inadequate device security.

Angry Birds and productivity at work: why distractions can help

Trends in the Living Networks

billion of worker productivity is lost to playing Angry Birds. today that workers already do a number of things that are not considered productive – like going to the bathroom or talking to colleagues without any actual loss in productivity. The fact someone is spending time playing a game or browsing doesn’t mean a productivity loss,” Mr Dawson said. “It’s The fallacy that humans can be consistently productive at knowledge work for 8 hours is not helpful.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Business or Pleasure? - why not both: The product-to-service.

Martijn Linssen

why not both Home About Contact Saturday, 21 August 2010 The product-to-service financial ratio Yesterday I saw a tweet by Frank Scavo : Chatting with a vendor about implementation cost to software license cost ratios. Back to the topic : there is a clear, direct and fairly linear relation between the initial cost of a product, and the additional cost(s) involved servicing it. In big IT companies, there isnt much enthusiasm to be found for selling Open Source products.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

There is also a distinction for all products that is important to consider. It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor. The inherent linearity and security of SP may have specific value in the context you noted.

e-Clippings (Learning As Art): Zone Alarm Listen UP!! This is NOT Customer Service!

Mark Oehlert

Normally I run Zone Alarms security suite of products and I generally think they are the best out there - they are certainly better than Norton in terms of being Norton being such a resource hog. My problem, beyond the obvious, is that the response from Zone Alarm acts as if this is just something that happens all the time (probably does) but worse than that - that it is somehow acceptable to create a product that routinely kills multiple hours of customers time fixing the problem!

Business or Pleasure? - why not both: From profitability to.

Martijn Linssen

why not both Home About Contact Monday, 13 September 2010 From profitability to extortion: IT comparison In August I wrote the Product to service financial ratio , that dealt with the fact that there is a certain ratio between what you pay for a product, and the service provided on it A twitter conversation on (vendor) implementation cost to software license cost ratios was the source for that. Business or Pleasure? -

Building Better Jobs in an Age of Intelligent Machines

Irving Wladawsky-Berger

Rising labor productivity has not translated into broad increases in incomes because labor market institutions and policies have fallen into disrepair. Between 1978 and 2016, productivity rose by 66%, an annual growth rate of 1.3%, while median compensation increased by only 9%.

Data 216

State of the Net 2012 – People Tweet Tacit Knowledge – Part One

Luis Suarez

How we may have sold our souls in the name of security, of safety, of our own jobs, essentially, even though that’s no longer anything else than a myth. Job security, that is, specially, in today’s current financial econoclypse. IBM Innovation Knowledge Management Learning Personal KM Productivity Tools Social Enterprise

e-Clippings (Learning As Art): Good for introNetworks!

Mark Oehlert

introNetworks Secures $2.7 Million in Series A Funding I know the folks at introNetworks, Mark Sylvester and Guy Nadivi in particular, Ive used their product a couple of times now (for a conference and as a skills database) and Ive always been impressed with the product and important their willingness to work with folks on customizing it to your needs.

How Mobility Empowers Work as a State of Mind in the Era of Social Business

Luis Suarez

Organisations should work on putting together that mobility strategy and us, the knowledge (Web) workers , will get down to business and make use of the mobility tools at our disposal in order to keep being effective and productive while on the move. IBM Innovation Knowledge Management Knowledge Tools Open Business Personal KM Productivity Tools

Connectivity – The Achilles Heel of Remote Knowledge Web Work

Luis Suarez

As more and more of us progress further away from firewalls and internal protected networks into the Open Social Web, I guess we would be saying good-bye to VPNs, but then again, if you have been watching the news over the course of the last few months, and, lately, in the last week or so, you would know how some conversations would still need to take place in a secure, private, protected space, although still open and accessible to everyone concerned (i.e.

Reflections from 2011 – A World Without Email – The Documentary

Luis Suarez

And what’s even more exciting is that it’s starting to happen at the right time , for once, because over the course of the last few months we have been exposed to a good number of different relevant reads as to why plenty of knowledge workers keep considering corporate email a time waster , a hindrance of one’s own productivity , or rather costly to the business , not to mention the potential security issues incurred or a rather growing issue of email overload altogether.

Addressing Social Networking Gripes with Shared Value

Luis Suarez

If you have been reading this blog for a little while now, you can see how I still think we are at the infancy of defining truly inspiring, engaging, rewarding social technologies experiences and, when we do we seem to nail it, we mess up with other things like privacy, security, copyright infringements, and whatever else. Innovation Knowledge Management Knowledge Tools Learning Personal KM Productivity Tools Social Enterprise

Enterprise microblogging should be pay-per-use

Martijn Linssen

why not both Home About Contact Friday, 7 January 2011 Enterprise microblogging should be pay-per-use An article by Dennis Howlett about Socialtext and Yammer yesterday caught my attention In essence SocialText announces that theyll sell their product at 80% of Yammers price (being very brief here) but I think theyre both wrong Social has its own Pareto rule : 90-9-1 versus the old-fashioned 80-20. Business or Pleasure? -

New Directions for Government in the Digital Age

Irving Wladawsky-Berger

Companies - especially large, global corporations - have leveraged digital innovations to improve their productivity and competitiveness and adapt better to these powerful technology and market changes. Ensure security, privacy, autonomy, and citizen-owned identities.

Ten IT Predictions for the Post-Pandemic New Normal

Irving Wladawsky-Berger

Hence applications that enable real-time collaboration across all environments are critical to its effectiveness and success… The result will be a more collaborative, informed, and productive workforce.”.

I Know It When I See It

Andy McAfee

product?&# – are just windowdressing on products that are still essentially geared for Collaboration 1.0. Whose products at present come closest to enabling Web 2.0-style collaboration and interaction in enterprise environments? An integrated and seamless ability to have some sense of security in the audience can increase the level of disclosure which in turn can foster a higher level of collaboration that can benefit the community writ large.

Using Agile Processes to Develop AI-Based Solutions

Irving Wladawsky-Berger

It’s also quite applicable for mission critical software and infrastructure projects where security, availability, scalability and other ilities are paramount. Key to the agile approach is the involvement of the product’s target end-users early in the process to make sure that the product under development is responsive to their requirements. . and, would you like this feature incorporate in a future version of the product?

The Blockchain Value Framework

Irving Wladawsky-Berger

Across all industries, the top three priorities were “full traceability of information on the blockchain”; “ability to ensure data has not been tampered with”; and “increased security”. “New business products or services” ranked last among the options for investing in blockchain, suggesting that at this early stage, improving existing products and services is a higher priority than considering new business opportunities. Improved productivity and quality.

Survey 151

The Internet of Things is Changing the World

Irving Wladawsky-Berger

IoT promises to bring many benefits, including a whole new generation of innovative products. We’ve long thought of products as physical entities built with a combination of mechanical and electrical components, - e.g., appliances, cars, agricultural machines, industrial equipment, - some quite simple and some highly complex. IoT has been ushering a whole new class of smart connected products.

Change 128

More Open

Stephen Downes: Half an Hour

I work for the government and have a security clearance and even though we are committed to the principle of open government, we still have secrets to keep. [ source ] "We should pause and ask the question," says David Wiley, "is more open always better?"

e-Clippings (Learning As Art): "Learning objectives are best achieved when tied to real-world (not inworld) factors of production" (TerraNova)

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Great List of Presentation Resources | Main | iQuiz Maker - Make Custom Quizzes for the iPod - oh yeah, its free » June 23, 2007 "Learning objectives are best achieved when tied to real-world (not inworld) factors of production" (TerraNova) ( link to post on Terra Nova by Robert Bloomfield ) Here is a little excerpt (thats redundant and repetitive isnt it?).and

Why Employee Engagement is at an All-Time High (and How to Keep it Up)


Adequate employee engagement promotes staff retention and productivity, as well as fewer safety incidents. research by Towers Watson shows that employees are more stressed about health and financial security than ever,” said Bersin.

Building a More Resilient, Data-Driven Economy

Irving Wladawsky-Berger

In the US, for example, “almost 100 million people are members of credit unions, not-for-profit institutions owned by their members, and already chartered to securely manage their members’ digital data and to represent them in a wide variety of financial transactions, including insurance, investments, and benefits. We must thus ensure that these highly complex digital legal systems are safe, secure and achieve the desired societal objectives.

Data 162

Blockchain - the Networked Ecosystem is the Business

Irving Wladawsky-Berger

Based on the analysis of over 25 blockchain networks in various stages of production across multiple industries and geographies, the report recommends that a company’s blockchain journey should evolve along three distinct stages: in search of value, - establishing a minimum value ecosystem; getting to scale - creating value for an overall industry; and designing for new markets, - creating entirely new markets and business models.

Irving Wladawsky-Berger: The Complex Chemistry between Brands and Customers - Some Personal Experiences

Irving Wladawsky-Berger

Home Archives Subscribe « Welcome to Adam Smiths World | Main | Social networks and Organizational Governance » October 08, 2007 The Complex Chemistry between Brands and Customers - Some Personal Experiences People have very complex relationships with companies and the products and services they offer. Irving Wladawsky-Berger A collection of observations, news and resources on the changing nature of innovation, technology, leadership, and other subjects.

OER and User Pay

Stephen Downes: Half an Hour

Companies often hire private security guards. Thanks to Jeff Rubenstein for a thoughtful comment.

Cost 137

The Economic Potential of The Internet of Things

Irving Wladawsky-Berger

It applied a bottom-up modeling methodology to estimate the potential economic value of these various applications, including productivity improvements, time savings, better asset utilization and reduced accidents. . Human - Monitor and promote improved health, wellness, fitness, and productivity using personal wearable devices and appliances. Home - Energy management, security, safety, and automation of home chores. Privacy, Security, Confidentiality and IP.

Data 197

An Increasingly Digital “New Normal”

Irving Wladawsky-Berger

Physical products and services have evolved and been perfected over many, many years. Good design aims to make our interactions with complex products and institutions, - e.g., a business, a healthcare provider, a classroom, a government function, - as appealing and intuitive as possible. About a dozen years ago, I attended a conference where I was interviewed on stage by then WSJ technology columnist Walter Mossberg.

Data 161

The Economic Value of Digital Identity

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Protects user privacy and ensures control over personal data: includes strong privacy and security safeguards, while giving users access to, and control over who can access their data. Identity plays a major role in our everyday life.

Data 154

Blockchain and Business Process Transformation

Irving Wladawsky-Berger

One can look at the transformational impact of IT on companies and industries through a variety of lenses, - e.g., products and services, revenue and profit, sales and support, market strategy. It started in the 1960s and 1970s with the automation of standardized, repetitive back-office processes in manufacturing, production and data processing operations like inventory management, financial transactions and airlines reservations. US labor productivity grew at only 1.5%

The MIT Work of the Future Report

Irving Wladawsky-Berger

“The world now stands on the cusp of a technological revolution in artificial intelligence and robotics that may prove as transformative for economic growth and human potential as were electrification, mass production, and electronic telecommunications in their eras,” said the MIT Task Force on the Work of the Future in its recently released interim report.

Report 145

The Urgent Need to Strengthen the Nation’s Resilience

Irving Wladawsky-Berger

These included a significant expansion of government support for scientific research in universities and R&D labs, leading to product innovations from the private sector and better weapons from the defense industry, - and making the US the most prosperous and secure nation in the world. A recent task force on Innovation and National Security noted that “Washington has failed to maintain adequate levels of public support and funding for basic science.

Price 169

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively. Jerry Cuomo , - IBM VP of Blockchain Technologies, - reminded us that 80 years ago, “IBM helped the United States government create the Social Security system, which, at the time, was the most complex financial system ever developed. But it requires a bold reassessment of the way we approach security in the digital age.