online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online. For search engines, I avoid the ubiquitous Google and its tracking of my activity.

Security vs. Utility

Doc Searls

Searching the Mozilla site was useless. icon icons location bar Mozilla security tool bar Starting a few upgrades back, Firefox started showing this… … when you clicked on that little icon at the left end of the location bar. What’s the name for that?) Now, with version 3.5.3 (and and perhaps earlier versions — the last one I used before this was 3.0.9), it still shows that same pop-down thing, but no longer selects the location text to the right.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Your Twitter security is an egg, not an onion

Martijn Linssen

why not both Home About Contact Thursday, 13 January 2011 Your Twitter security is an egg, not an onion Hard to come up with a more fuzzy title really. In security models, an egg, with its very hard shell, represents a single barrier between the inside and the outside, that is very hard and tough - but once youre in, youre in. Business or Pleasure? -

The search for a genetic killer

Mind Hacks

However, it shows an interesting shift away from the courtroom genetics of past incidents to a ‘public health’ approach, where, as sociologist Nikolas Rose has noted , the justification is given… …not in the language of law and rights, but in terms of the priority of protecting “normal people” against risks that threaten their security and contentment. The medical examiner for the Sandy Hook shooting has requested a genetic analysis of killer Adam Lanza.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

For example, Google's code search. A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto.

e-Clippings (Learning As Art): Alternative and Activist Search Engines

Mark Oehlert

wisdom » June 22, 2007 Alternative and Activist Search Engines So a post here lays out what it would be like to live for a day without using Google for searching. The value is that it lists 100+ alternative search engines that you may not even be aware of. This post lays out a number of search sites that will donate a portion of their ad revenues to charity.

Help: why don’t images load in https?

Doc Searls

But when I come to the blog by way of an external link, such as a search engine or Twitter, it’s https, so the graphics don’t load if I haven’t fixed them manually in a manner described above. Berkman Blogging Harvard Internet problems publishing securityFor some reason, many or most of the images in this blog don’t load in some browsers. Same goes for the ProjectVRM blog as well. This is new, and I don’t know exactly why it’s happening.

ReTweet relativity

Martijn Linssen

why not both Home About Contact Thursday, 8 July 2010 ReTweet relativity One of the tools I made recently is my own Search tool that I use to make hashtag Tweet Collections. The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter? Business or Pleasure? -

About face

Doc Searls

Examples from that link: “Face Detection & Landmarks…Facial Analysis & Attributes…Facial Expressions & Emotion… Verification, Similarity & Search.” If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.” the largest variety of existing and imaginable ways that security can be breached. We can know more than we can tell.

Doc Searls Weblog · Maybe they should call it ButtBook

Doc Searls

Doc Searls Weblog Home About Subscribe to feed ‹ Running the numbers • Besides come cheap › Maybe they should call it ButtBook September 6, 2007 in Future , Ideas , News , Places , problems | 8 comments We’re expanding search so that people can see which of their friends are on Facebook more easily , Phillip Fung says on the company blog. Please note that you will only appear in searches outside Facebook when your search settings are set to “Everyone&#.

Search 109

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

It is my understanding from my daughter’s ITS officer that SP is the ITS’s dream, especially if security is a factor. The inherent linearity and security of SP may have specific value in the context you noted.

e-Clippings (Learning As Art): "MIT Researchers Advance Lecture Capture with Search Capabilities" (Campus Technology)

Mark Oehlert

» February 11, 2008 "MIT Researchers Advance Lecture Capture with Search Capabilities" (Campus Technology) ( story link ) Now this is what I call an *LMS (lecture management system). e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Picnik: My new favorite online photo editor | Main | GDC Update 1: Geez My Hotel Room is Small!

e-Clippings (Learning As Art): Zone Alarm Listen UP!! This is NOT Customer Service!

Mark Oehlert

Normally I run Zone Alarms security suite of products and I generally think they are the best out there - they are certainly better than Norton in terms of being Norton being such a resource hog. RIGHT-click on Uninstall ZoneAlarm Security, then select Properties 04.) Click on Start -> Programs -> ZoneAlarm -> Uninstall ZoneAlarm Security 07.) Click Uninstall to run the uninstaller, and choose OK or yes to any security alerts that pop up.

e-Clippings (Learning As Art): "Is Web 2.0 Safe?" (MSN article)

Mark Oehlert

MSN article) Here is the shocking synopsis of this article : Security needs to be better in Web 2.0 Yes, its true that as more data is stored in the cloud, then the cloud needs to be better secured and we need to look at how our browsers are allowed to interact with our computers (although no using browser code as part of the genetic base for your OS might be a start).

e-Clippings (Learning As Art): Good for introNetworks!

Mark Oehlert

introNetworks Secures $2.7 e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Fleck.Web page annotation | Main | Great Web Comic and the Guy Gets Fired!? » May 17, 2007 Good for introNetworks!

The Increasing Influence of Recommendation Systems in Our Everyday Lives

Irving Wladawsky-Berger

With this innovation trajectory, security and confidentiality become even more important… As with health care, ‘informed consent’ becomes more important as recommenders grow more powerful, pervasive, and predictive.”.

System 230

Making useful photographs

Doc Searls

Lithium mining innovators secure investment from Bill Gates-led fund in Mining Technology. And those are just the first six among 23,200 results in a search for my name + lithium.

What will universities monetize in the future?

George Siemens

If I was tasked with designing a course from scratch, I would start by searching repositories, rather than creating any new content. The badges and competency-based learning movement may challenge assessment, but at this point it remains reasonably secure. Universities do more than teach. Research is one of the most important activities of higher education. From the lens of students and society, however, the teaching and learning process and what it costs, is the primary focus.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

It has been great for reducing the costs of searching, collaborating, and exchanging information… Overall, the Internet has enabled many positive changes - for those with access to it - but it has serious limitations for business and economic activity.”. Foremost among these limitations are privacy, security and inclusion. “Doing business on the Internet requires a leap of faith” because the infrastructure lacks the necessary security.

e-Clippings (Learning As Art): Semi-Daily Quote/Lyric/Words of Others

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Map of the Blogosphere | Main | Semi-Daily Quote/Lyric/Words of Others » March 27, 2008 Semi-Daily Quote/Lyric/Words of Others “Common to most anthropologists is a contrarian readiness to search out diverse, improbable kinds of patterning, to be skeptical of commonly accepted categories or boundaries, and to employ varying temporal and geographic scales as tools of inquiry.”

e-Clippings (Learning As Art): Your integrity for a.t-shirt?

Mark Oehlert

A little while back, I looked at a new search product named PowerSet. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « EduPunk? Please tell me this is the start and not the end | Main | Massive Catch-Up Issue #1413 (Games, Virtual Worlds, banking concepts and more) » June 11, 2008 Your integrity for a.t-shirt? shirt? I thought it was interesting and kind of added it to my list of things to keep an eye on. Then I get this email (below).

e-Clippings (Learning As Art): Anybody Else Notice How Much Context Amazon is Now Wrapping Around A Book?

Mark Oehlert

I mean check out the photo here.and if you cant see this well enough.just go search for a book. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Potential Quote of the Day. Main | Croquet Virtual World Demo » September 23, 2007 Anybody Else Notice How Much Context Amazon is Now Wrapping Around A Book?

e-Clippings (Learning As Art): New Web 2.0 Visualization/Explanation from Ross Dawson

Mark Oehlert

we continue to search for explanations that resonate some sense of capturing what is really going on here. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Blogger/Blogspot Will Not Resolve To *.mil mil domains | Main | Quote of the Day » August 17, 2007 New Web 2.0 Visualization/Explanation from Ross Dawson I find it interesting that even as we stand hip deep in the curved corner and pastel colored waters of Web 2.0,

Homo Narrans: of infinite-resource- and-sagacity,

Dave Snowden

That capture also allows us the create a serendipitous mechanism of search. This type of search increases the chance of serendipitous discovery of the unexpected and creating increases resilience.

Blockchain - the Networked Ecosystem is the Business

Irving Wladawsky-Berger

Based on the analysis of over 25 blockchain networks in various stages of production across multiple industries and geographies, the report recommends that a company’s blockchain journey should evolve along three distinct stages: in search of value, - establishing a minimum value ecosystem; getting to scale - creating value for an overall industry; and designing for new markets, - creating entirely new markets and business models.

Blockchains: the Promise of More Frictionless, Trusted Economies

Irving Wladawsky-Berger

Transaction costs are a kind of friction incurred in obtaining goods and services outside the firm, such as searching for the right supply chain partners, establishing a trusted relationship, negotiating a contract, coordinating the work, managing intellectual property and so on. Why wasn’t stronger security designed into the original Internet infrastructure? Foremost among them is security. Consequently, there’s no one overall owner responsible for security.

Data 182

professional learner’s toolkit

Harold Jarche

Browser & Search Engine: I use three browsers (Firefox, Safari, Chrome) and two search engines ( StartPage & DuckDuckGo ). Each browser has different security and privacy settings, depending on what type of resource I need to access. I ensure online security by using a password manager: 1Password. Jane Hart describes a Modern Professional Learner’s Toolkit as having several components: resources, networks, devices, etc.

What Does it Mean to Enrol in a Course?

Stephen Downes: Half an Hour

This means, for example, if you're searching for something, you are searching all your content from all your sources to find the thing you need.

Course 209

The Emergence of a Blockchain-Based Token Economy

Irving Wladawsky-Berger

Its central argument is that for nearly four decades, the Internet has been great for reducing the costs of searching, collaborating, and exchanging information. The Internet was designed to move information, but it’s lacked the necessary trust, security and privacy safeguards to move assets of value. Security tokens. Cryptocurrency: the idea that networks can securely transfer value without central points of control. “Bitcoin showed that something valuable?

Social Physics and Cybercrime Detection

Irving Wladawsky-Berger

Entities similar to the defined EOIs are searched within the data, based mainly on temporal correlations , which can be done much more quickly and accurately than machine learning algorithms. Social physics searches for patterns, not content, thus it can analyze fully encrypted data sets, enabling financial companies, health care providers or blockchains to maintain data privacy.

top tools 2019

Harold Jarche

I have thousands I regularly search but I find I am using it less every year, especially as my blog grows and I have more references here, such as my Friday’s Finds. It synchronizes across all my devices and helps keep my online presence more secure. Since 2007 Jane Hart has asked working professionals for their top tools for learning — TopTools4Learning — and creates three lists from thousands of responses. Top 100 Tools for Personal & Professional Learning.

Tools 200

Shaping the Future of the Internet

Irving Wladawsky-Berger

As a result, there’s no one overall owner responsible for security , - arguably the biggest challenge facing the Internet. The responsibility for security is divided among several actors, making it significantly harder to achieve. As Clark points out, “the design decisions that shaped the Internet as we know it likely did not optimize secure and trustworthy operation.”.

Data 159

The Rise of the On-Demand Economy

Irving Wladawsky-Berger

These workers, many of them unionized, enjoyed relatively secure, stable jobs and a number of company benefits, including health care insurance, vacations and retirement pensions. . In the more recent past, these relatively slow moving organizations were not able to keep up with fast changing technologies and markets, nor could individuals assume that being loyal to a company would translate into a secure job with good benefits. .

Site Learnings

Clark Quinn

See, one of the other recommendations was to be more closely tied to Google’s tools for tracking sites, specifically Search Console. I’d put it in, and then my ISP changed the settings on my blog so I couldn’t use the built-in editor to edit the header and footer of the site pages (for security). Now, I’d try to do this once I’d gotten all my sites tied into Google Analytics, including searching the WP file folders, and browsing a number, to no avail.

The Emergence of a Blockchain-Based Token Economy

Irving Wladawsky-Berger

Its central argument is that for nearly four decades, the Internet has been great for reducing the costs of searching, collaborating, and exchanging information. The Internet was designed to move information, but it’s lacked the necessary trust, security and privacy safeguards to move assets of value. Security tokens. Cryptocurrency: the idea that networks can securely transfer value without central points of control. “Bitcoin showed that something valuable?

Our reputation, personal opportunities, and identity will be shaped by social media

Ross Dawson

This morning was the launch of the Safeguarding the Future of Digital Australia 2025 that I wrote and compiled for McAfee, part of Intel Security. Shared online reservation systems like Dimmi’s ResDiary, as well as social media sites liked LinkedIn and good old Google searches, can be a double-edged sword.

The Future of Work and Learning 2: Chatbots

Jane Hart

But even these simple bots can provide some useful functionality, in as much as they can offer a level of automation or personalisation to content and services that was not so easily achievable before – for example they can make it easier to find something without having to do a Web search, or open up multiple apps. search for relevant or customised content (or courses) on say YouTube, Wikipedia or Coursera.

The Expertise Strikes Back

Martijn Linssen

How expertise matters less when everyone has a voice and believes their opinion is as informed as an expert’s How some mooks believe expertise itself represents a sellout – e.g., if you spent 30 years at the National Security Agency, that amounts to an indictment, not a history of expertise that deserves attention.). Even when searching for novel answers, understanding first who and what has gone before remains of highest value.

What's the Future of Jobs?

John Hagel

Until then, the best advice we can give our children is to search wherever they can (and certainly beyond the four walls of the classroom) for a sustaining passion that excites and engages them and to not stop until they have found it. What better time to reflect on the future of work and jobs than Labor Day? I’ve written about this extensively with my latest foray on a recent blog post. Is STEM our future? Today, I want to be a contrarian.

The Economic Value of Artificial Intelligence

Irving Wladawsky-Berger

Highest potential use cases: Autonomous trucking and delivery; Traffic control and reduced congestion; Enhanced security. Highest potential use cases: Media archiving and search – bringing together diffuse content for recommendation; Customized content creation (marketing, film, music, etc.); PwC recently released a report on the potential economic value of AI to different regions and industry sectors around the world.

Data 195

Internet of things

George Siemens

We’re connecting more objects to the internet: cars, phones, home security systems. Regardless of the long term impact, the internet of things is growing rapidly and, as tighter integration between the physical and the virtual world develops, new modes of interacting with objects will certainly emerge (such as searching for your car keys online, launching a Google map of your house pin pointing the exact location).

Waking up.

Martijn Linssen

“Fixing search” or “refreshing the taxonomy” fails to address the core problem. For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems. This is true for classrooms, National Security Council meetings, design studios, auto showrooms, diplomacy, boardrooms, and lovers. I think we are waking up. From my limited perch, it appears sudden clarity is emerging in businesses.

top tools 2017

Harold Jarche

It synchronizes across all my devices and helps keep my online presence more secure. I have thousands I regularly search. Jane Hart compiles a list every year of the Top 100 Tools for learning. This is the 11th year! Voting closes on 22 September 2017. Here are my top tools this year, with the past five years shown below. It’s interesting to note that my preferred tools have not changed that much over the years. Please add yours!

Tools 166