Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. The US has successfully responded to technological competition in the past.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online. Technology

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

A few years ago I participated in an MIT roundtable that explored where future jobs will likely come from, given our increasingly powerful, inexpensive and smart technologies. Entrepreneurship and flexible security.

Security vs. Utility

Doc Searls

icon icons location bar Mozilla security tool bar Tags: Technology problems chrome Firefox Firefox 3.5.3 Starting a few upgrades back, Firefox started showing this… … when you clicked on that little icon at the left end of the location bar. What’s the name for that?)

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. Digital technologies are increasingly intertwined with the evolution of blockchain infrastructures.

Noam Chomsky, security, and equivocal information

David Weinberger

He reiterated his earlier call for us to understand the NSA surveillance scandal within an historical context that shows that governments always use technology for their own worst purposes. Chomskey said: Governments have been doing this for a century, using the best technology they had. That’s why you should be extremely cautious when you hear an appeal to security. I don’t doubt that the US security folks believe it, but it is without meaning.

Disruptive technologies 2015-2016

Jane Hart

In the embedded presentation below, Brian Solis explores some of the biggest technology trends and possible twists on the horizon for 2015 and 2016. Topics include cyber security, mobile payments, drones, bitcoin, social media, digital, omnichannel, attribution, cx, music, movies, Hollywood 25 Disruptive Technology Trends 2015 – 2016 from Brian Solis.

From “learning technologies” to “social technologies”

Jane Hart

Social technologies now play a big part in everything we do, and it is quite clear that many knowledge workers use a variety of social tools and networks not only to help them get work done, but also to learn efficiently while on the job.

The Top Ten Emerging Technologies of 2016

Irving Wladawsky-Berger

For the past several years, the World Economic Forum (WEF) has published an annual list of the Top Ten Emerging Technologies that would likely have the greatest impact on the world in the years to come. The technologies on the list are not new.

Blockchain - Once Again, the Technological Genie Has Been Unleashed from its Bottle

Irving Wladawsky-Berger

Foremost among these limitations are privacy, security and inclusion. “Doing business on the Internet requires a leap of faith” because the infrastructure lacks the necessary security. Why wasn’t stronger security designed into the original Internet protocols?

The Top Ten Emerging Technologies of 2017

Irving Wladawsky-Berger

Earlier this year, Scientific American , in collaboration with the World Economic Forum , published a special report on The Top Ten Emerging Technologies of 2017. These technologies, - selected by a global panel of experts , - “are expected to become increasingly commonplace in the next few years,” and are “attracting increased funding or showing other signs of being ready to move to the next level.”. The full report includes a one-page description of each of these technologies.

About face

Doc Searls

” It’s opt-in: “ The technology relies on a method of “self-exclusion,” whereby compulsive gamblers volunteer in advance to have their photos banked in the system’s database, in case they ever get the urge to try their luck at a casino again.

We know we’ve traded away privacy. But for exactly what security?

Doc Searls

Moreover, as technology and society evolve, the equilibrium points may shift. It has been said that “security” is not found in apprehending a guilty party but in preventing the harm from occurring. While this notion can surely be overextended, it can also be understood to justify a certain degree of intelligence gathering in the service of safety and security.

[liveblog] Data & Technology in Government

David Weinberger

Part of the importance of this is that students at the Kennedy School are agitating for a much strong technology component to their education on the grounds that these days policy makers need to be deeply cognizant of the possibilities technology offers, and of the culture of our new technology development environment. Tomorrow there is an afternoon of discussions sponsored by the student-led Technology for Change group. Todd Park, White House Technology Advisory.

Data 135

Learning Technologies UK wrap-up

Clark Quinn

I had the pleasure of speaking at the Learning Technologies ’11 conference, talking on the topic of games. The conference was held on the 3rd floor of the conference hall, while floors 1 and ground hosted the exposition: the ground floor hosted the learning and skills (think: training) exhibits while the 1st floor held learning technology (read: elearning) vendors. design games meta-learning mobile social technology

Better Education Through Technology

Stephen Downes: Half an Hour

There is no person needed to take our money, and nobody needed to watch over the car while we're gone (if security is required it is centralized using surveillance cameras). me) on seeing a sight like this is to suggest that everybody would be better off with a little more investment in technology. But they could instead higher fewer people, pay them more, and use technology to make up the difference. Technology won't make things happen where they weren't happening before.

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

lessons scripted around 1:1 laptop); IT issues - we were a Windows network, with everything on our own domain - we needed to open eg printing etc O - consumer technology far more accessible in 2012 esp. dates to classical Greece How does technology change this? - Most classrooms still dominated by teachers teaching answers and students remembering them We can change the technology but if we haven''t changed the goal we really haven''t accomplished anything.

Education Technology Strategies - Day Two

Stephen Downes: Half an Hour

So the Achieving Excellents has four major objectives: - achieving excellence - ensuring equity - promoting well-being - competence We''ve also been partnering with the Council of Directors of Educations (CODE - ''superintendants'') - this boosts what we know about technology and enabling innovations. We also find these technologies are giving students with special needs a new voice, and to connect with their teachers and classmates. So, we see this huge growth in technology.

Jobs, work and technology

Harold Jarche

And, systems like Watson will be extensively used to help experts deal with highly complex problems in areas like medicine, finance and national security. Social technology is creating the effect of “social heads in the sand” by believing popular and influential ” are more important than the meaningful and significant. Tweet Here are some of the observations and insights that were shared on Twitter this past week.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

I got somewhat alarmed when seeing that MS Sharepoint is not mentioned at all in “Digital Habitat&# (book by Etienne Wenger et al on Technology Stewardship for communities). This is where examination of technology at all three levels: platform, tool and feature — can really matter.

Sunrise: The technologies that will change our lives

Ross Dawson

Yesterday morning I appeared on the Sunrise national breakfast program together with science broadcaster Dr Karl Kruszelnicki , being interviewed about the big ideas and new technologies that will change our lives. Facial recognition – advances in recognition mean that both in online worlds and a real world filled with security cameras we will be recognized wherever we go. Future of retail Technology trends

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

How Luxembourg is playing to become a technology hub

Ross Dawson

As such the government and business sectors are seeking to build Luxembourg into a technology hub, with ICT named by the government as the third of five pillars for national development. In particular, there is an opportunity to parlay Luxembourg’s traditional strength as a financial haven into the data space, becoming a secure, confidential data haven protected by a stable government.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Are Your Social Media and Other Accounts Secure?

Beth Kanter

A few days ago, I noticed that my long-time nonprofit technology colleague, Ruby Sinreich, had her digital life hacked and stolen from her. So, how can you make your social media and other account more secure?

Exploring the Potential: Innovating Uses of Technology in Teaching and Learning

Stephen Downes: Half an Hour

Don McIntosh An Old Curmudgeon’s View of Technology in Education I put together a director of vendors of online learning products and services - more than 2000 products there, including hundreds of LMSs. OK, to the technologies: Video: we have things like YouTube, Khan, TED Talks, etc. Question: security for open source tools. Response: open source more secure than non-open source.

Putting It All Together. Privacy, Security, Cybercrime and Safety

Stephen Downes: Half an Hour

So I forwarded it to the security team saying 'login in and fix what is wrong'. What you say online is not private, it is not secure, it is what you put on the billboard on I-15. When we talk topeople about things they are doing and choices they are making, we have to tell people that, because technology can make it possible to do things - I saw a 1 terabyte hard drive at Costco, I could save everything, what if someone steals it - we should think twice. You are not secure.

Enterprise Social Technology – Review

Harold Jarche

Scott Klososky sent me a copy of Enterprise Social Technology with this handwritten note, “ If nothing else, it shows what can be done using crowd sourcing. &# The story of how this book was written provides an interesting subtext to its main subject.

Review 205

Airport psych security: snake oil on a plane?

Mind Hacks

Nature has an extensive article on the 'deception detection training' that's been widely rolled out for airport security staff and anti-terrorism police despite that fact that is has barely been publicly tested. The Nature piece also discusses another technology Future Attribute Screening Technology or FAST, which essentially just looks to see if someone is stressed, with the idea that it can pick out potential terrorists, again with no public data available on its effectiveness.

How To Use Microsoft Technology To Supercharge Your Fundraising

Beth Kanter

SOS Children’s Villages International uses cloud technology to help fundraise for children in need. How To Use Microsoft Technology To Supercharge Your Fundraising guest post by Justin Spelhaug, General Manager, Microsoft Philanthropies.

CoP Series #10: Stewarding Technology for Community

Nancy White

Elearning is growing and evolving hand in glove with a constellation of technologies that have their roots in a number of places. ″ tools, there is a constant thread of the dynamic interplay between technology and the groups using it. We are not simply deploying technology.

The Transformative Power of Blockchain

Irving Wladawsky-Berger

This is not unusual for potentially transformative technologies in their early stages, as was the case with the Internet in the early-mid 1990s. The key question is whether blockchain has the potential to become a truly transformative technology over time.

The Blockchain Value Framework

Irving Wladawsky-Berger

In July, 2019, the World Economic Forum and Accenture released Building Value with Blockchain Technology , a white paper aimed at helping organizations evaluate blockchain’s benefits and build an effective business case.

Survey 212

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

I got somewhat alarmed when seeing that MS Sharepoint is not mentioned at all in “Digital Habitat&# (book by Etienne Wenger et al on Technology Stewardship for communities). This is where examination of technology at all three levels: platform, tool and feature — can really matter.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

I got somewhat alarmed when seeing that MS Sharepoint is not mentioned at all in “Digital Habitat&# (book by Etienne Wenger et al on Technology Stewardship for communities). This is where examination of technology at all three levels: platform, tool and feature — can really matter.

More Reflections on SharePoint and Picking Technology | Full Circle Associates

Nancy White

I got somewhat alarmed when seeing that MS Sharepoint is not mentioned at all in “Digital Habitat&# (book by Etienne Wenger et al on Technology Stewardship for communities). This is where examination of technology at all three levels: platform, tool and feature — can really matter.

CoP Series #10: Stewarding Technology for Community | Full Circle Associates

Nancy White

Elearning is growing and evolving hand in glove with a constellation of technologies that have their roots in a number of places. ″ tools, there is a constant thread of the dynamic interplay between technology and the groups using it. We are not simply deploying technology.

The Internet of Things is Changing the World

Irving Wladawsky-Berger

Like many technological advances, IoT has been long in coming. As the world’s digital and physical infrastructures converge, digital technologies are being designed right into all kinds of consumer and industrial products.

Change 163

International Women’s Day: Using Technology to Empower Women and Girls

Beth Kanter

Here’s two programs that use technology to support women and girls and are an inspiration. Early last year my colleague Noel Dickover and his co-workers at PeaceTech Lab organized a workshop in Mumbai, India to help activists use technology and media to prevent gender based violence.

Using Agile Processes to Develop AI-Based Solutions

Irving Wladawsky-Berger

It’s also quite applicable for mission critical software and infrastructure projects where security, availability, scalability and other ilities are paramount. In June, Adobe announced Technology Previews, an agile development approach for building AI-powered solutions.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 247

The MIT Work of the Future Report

Irving Wladawsky-Berger

With this in mind, the work of the future can be shaped beneficially by new policies, renewed support for labor, and reformed institutions, not just new technologies. Automation anxieties continued to resurface in the 20th century, right along with advances in technology.

Report 178