Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

A few years ago I participated in an MIT roundtable that explored where future jobs will likely come from, given our increasingly powerful, inexpensive and smart technologies. Entrepreneurship and flexible security. The authors have a very clear answer to this question.

Trending Sources

The Top Ten Emerging Technologies of 2016

Irving Wladawsky-Berger

For the past several years, the World Economic Forum (WEF) has published an annual list of the Top Ten Emerging Technologies that would likely have the greatest impact on the world in the years to come. The technologies on the list are not new.

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

lessons scripted around 1:1 laptop); IT issues - we were a Windows network, with everything on our own domain - we needed to open eg printing etc O - consumer technology far more accessible in 2012 esp. dates to classical Greece How does technology change this? - Most classrooms still dominated by teachers teaching answers and students remembering them We can change the technology but if we haven''t changed the goal we really haven''t accomplished anything.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Foremost among these limitations are privacy, security and inclusion. “Doing business on the Internet requires a leap of faith” because the infrastructure lacks the necessary security. Why wasn’t stronger security designed into the original Internet protocols?

[liveblog] Data & Technology in Government

David Weinberger

Part of the importance of this is that students at the Kennedy School are agitating for a much strong technology component to their education on the grounds that these days policy makers need to be deeply cognizant of the possibilities technology offers, and of the culture of our new technology development environment. Tomorrow there is an afternoon of discussions sponsored by the student-led Technology for Change group. Todd Park, White House Technology Advisory.

soft skills are permanent skills

Harold Jarche

I asked this question six years ago. They come and go according to the economy and the state of technology. Network Security Expertise. Labour is a temporary skill for market and technological conditions. Learning Technology WorkAre soft skills the new hard skills?

Skills 121

The Long Term Impact of AI on Jobs - Some Lessons from History

Irving Wladawsky-Berger

People have long worried about the impact of technology on society, be it railroads, electricity, and cars in the Industrial Age, or the Internet , mobile devices and smart connected products now permeating just about all aspect of our lives.

Issues 136

On the Governance of Blockchain: Lessons from the Internet

Irving Wladawsky-Berger

However, this extraordinary technology may be stalled, sidetracked, captured or otherwise suboptimized depending on how all the stakeholders behave in stewarding this set of resources - i.e. how it is governed,” they add in a strong note of caution. “How

The Emerging Data Economy

Irving Wladawsky-Berger

Data has been closely intertwined with our digital technology revolution since the early days of the IT industry. Ever since, digital technologies have been permeating just about every nook and cranny of the economy, society and our personal lives.

Data 102

Blockchain Can Reshape Financial Services… But it Will Take Significant Time and Investment

Irving Wladawsky-Berger

Not only are there major technology and standards issues to be worked out, but the industry will have to collaborate with governments around the world to develop the appropriate legal frameworks and regulatory environments.

The President’s Commission on Enhancing National Cybersecurity

Irving Wladawsky-Berger

The Commission is composed of twelve individuals from the world of business, technology and academia. Former national security advisor Tom Donilon and former IBM CEO Sam Palmisano serve as chair and vice-chair respectively.

Data 68

The Growing Importance of Storytelling in the Business World

Irving Wladawsky-Berger

Since retiring from IBM in 2007, I’ve continued my involvement with technology-based initiatives, - AI and blockchain most recently, - through my consulting and academic activities as well as the weekly blogs that I’ve now been writing for the past dozen years.

AI and Public Policy

Irving Wladawsky-Berger

Throughout history, humans have both shaped and adapted to new technologies. AI technologies will significantly improve the abilities of those with access to them, but if unfairly distributed across society, AI can widen inequalities of opportunity.

Blockchains: the Promise of More Frictionless, Trusted Economies

Irving Wladawsky-Berger

Ronald Coase , - the eminent British economist and University of Chicago professor, - addressed this question in The Nature of the Firm , - a seminal paper published in 1937 which along with other major achievements earned him the 1991 Nobel Prize in economics. Why do firms exist?

Data 31

The Collapse of Complex Business Models ? Clay Shirky

Clay Shirky

From the Q&A after, it was clear that for them, the question wasn’t whether the internet was going to alter their business, but about the mode and tempo of that alteration. That kind of question comes up a lot. It’s a tough one to answer, not just because the answer is unlikely to make anybody happy, but because the premise is more important than the question itself. This is, as Tainter notes in his book, an open question. Clay Shirky.

Network Era Fluency

Harold Jarche

While my personal data may not be that important in the great scheme of things, networked data drive advertising, brands, and security systems. For individuals, the core skill is critical thinking, or questioning all assumptions, including one’s own.

Anticipating the Future of the IT Industry

Irving Wladawsky-Berger

Which hot technology innovations, - e.g., artificial intelligence, the blockchain, cloud computing, - will end up having a big impact and which are destined to fizzle? But regardless of what we call it, the industry is finally doing justice to its name: the Information Technology industry.

Data 63

In Honour of Ada Lovelace

Dan Pontefract

Today, October 14, 2014, is Ada Lovelace Day – an international celebration of the achievements of women in science, technology, engineering and maths (STEM). She not only learns from the writing process, she may get a comment or question or two that helps to reinforce the learning.

Jobs in the Age of Watson

Irving Wladawsky-Berger

On October 31, I participated in a symposium sponsored by MIT’s Center for Digital Business on The Race Against the Machine: The Future of Technology and Employment. match between Watson , IBM’s question-answering system, three students from the Harvard Business School and three students from MIT’s Sloan School of Management. At the MIT symposium, I was part of a panel on How will technology affect productivity and employment?

Issues 101

The Future of Financial Services

Irving Wladawsky-Berger

Given its intangible character, it’s not surprising that advances in information and communication technologies (ICT) have in turn led to advances in the way we deal with money and payments, as well as with identity, trust and other key attributes of a well-functioning financial system.

Data 64

After Facebook fails

Doc Searls

Making the rounds is The Facebook Fallacy , a killer essay by Michael Wolff in MIT Technology Review. The only question is how much it will damage a business that is vulnerable in the first place. advertise (or “intentcast” your own needs in an anonymous and secure way.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

Some of the questions turning in my mind are: * What was MS Sharepoint initially conceived to be? I got somewhat alarmed when seeing that MS Sharepoint is not mentioned at all in “Digital Habitat&# (book by Etienne Wenger et al on Technology Stewardship for communities).

Reflections on Bitcoin

Irving Wladawsky-Berger

Its impact might well be up there with that of other major technology-based societal transformations, including electricity, radio and TV, and the Internet and World Wide Web. A few weeks ago, technology journalist Glenn Fleishman wrote an article refuting a number of Andreessen’s arguments.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The key question is whether government and industry can collaborate successfully in a complex regulatory environment. We see the 'why do you need that information' question coming from young people - older people are more trusting. The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything.

The New Era of Smart, Connected Products

Irving Wladawsky-Berger

For the past few years, some have justifiably questioned whether innovation has been going through a period of stagnation , especially when compared to major 19th and 20th century innovations like electricity, cars and airplanes.

Data 61

The Untethered, Hyperconnected Enterprise

Irving Wladawsky-Berger

But lots of questions remain as to what those implications might be. Top down strategy plans take too long to formulate and generally don’t work so well because technologies and markets are changing so fast. Unlike the academic panel, the CIOs emphasized the need for ROI analysis and careful planning, especially when considering big technology bets. Senior executives want to use the latest technologies in their work.

Reflections on Linux and Mainframes

Irving Wladawsky-Berger

In my opinion, the most important part of the announcement is LinuxONE’s support of the advanced encryption features that have been built into the latest mainframes models, enabling them to support up to 8,000 highly secure Linux systems in one machine. .

Earth to Mozilla: Come back home

Doc Searls

One of the main reasons Firefox has succeeded is that it, unlike all the other browsers, was dedicated to users unfettered, secure, and as private as possible use of the Internet. Google is nearly worthless when shopping for items that don’t involve technology.

News 103

Models for Learning Questions

Tony Karrer

Questions There were some great questions during the session. 1) Two issues that come up, at least in the world of training in a government environment, is that of a) security of information, and b) control of the information given to the learner to make sure it is accurate. Security of the information is something that hopefully your IT organization is already dealing with. I recommend adopting their tools and their security mechanisms. Great question.

A Kind of Digital “Perfect Storm”

Irving Wladawsky-Berger

Every day brings new stories about the impact of digital technologies on every aspect of the world around us, including their transformative impact on companies in just about every industry. Chief technology officers loved its emphasis on security.

Data 61

It’s 2013. Why are we still in login hell?

Doc Searls

What we get from that are: Awful gauntlets such as the one I just went through — and kluges such as “ social login “, by which we trade security for convenience. infrastructure problems Technology

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

Several days ago, a financial industry client told me that framing a right question to express a game-changing idea is extremely challenging: first, selecting a question from multiple candidates; second, breaking it down to many sub-questions; and, third, answering even one of them reliably.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Peering into a Confusing, Paradoxical Future

Irving Wladawsky-Berger

Technology is accelerating progress but causing discontinuities. While creating new opportunities, technology advances will continue to aggravate divisions between winners and losers.

Issues 106

What happens when the home of the future crashes?

Ross Dawson

In today’s program there was plenty to talk about on the predictions of new technologies in the bathroom, bedroom, kitchen, and living room. However at the end of the interview the question came up of what happens when the technology doesn’t work?

How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?

Irving Wladawsky-Berger

Several years ago, I came across a reasonable answer to these seemingly Socratic questions in a very interesting paper - Complexity and Robustness - by professors Jean Carlson and John Doyle from UC Santa Barbara and Cal Tech , respectively.

Data 47

Computing Beyond Moore’s Law

Irving Wladawsky-Berger

The semi-log graphs associated with Moore’s Law have since become a visual metaphor for the technology revolution unleashed by the exponential improvements of just about all digital components, from processing speeds and storage capacity to networking bandwidth and pixels.

The Digital Evolution Index

Irving Wladawsky-Berger

Measurements include available bandwidth, access to digital content, security of transactions, business use of IT, consumer financial services, and quality of roads.

Data 43

Social Business in the Age of the Customer

Irving Wladawsky-Berger

Starting about a decade ago with the rise of Web 2.0 , we have seen the explosive growth of social media technologies, - e.g., blogs, wikis and podcasts, - as well as platforms like Twitter, Facebook and YouTube with hundreds of millions of users. This is a problem, particularly for younger employees who are extensively using social media technologies in their personal lives, but cannot properly do so at work.