I’ve been angry and I am still angry!!! Tom Johnson t o j t j o h n s o n. c o m.

Slides:



Advertisements
Similar presentations
From Anywhere and Anytime to Here and Now … Imagining the future of technology in culturally relevant contexts Ashwini Asokan : : Design Researcher : :
Advertisements

The Draft of Lithuanian Information Society Development Strategy for
T HE ROLE OF GOVERNMENTS AND STAKEHOLDERS IN THE ICT PROMOTION DEVELOPMENT.
1 Stakeholder Engagement in Relu Jeremy Phillipson Assistant Director, Relu Programme.
Near East Plant Protection Network for Regional Cooperation & Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview on.
Bic river basin management plan and involvement of local authorities in the implementation of the program of measures Dumitru Drumea, Executive Director,
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Policy development for quality and equity in education – Bosnia and Hercegovina Regional conference “Policy development and monitoring for quality and.
EGM on Free/ Open Source Software in the Arab Region The UNDP Perspective: F/OSS as a Tool for Development and The F/OSS Initiative in the Arab Region.
Mary Lou Roberts SOCIAL MEDIA MARKETING STRATEGY January 2010.
Creating an Educational Infrastructure - Experiences, Challenges and Lessons Learned Tom Nyvang Department of Communication, Aalborg University
EBusiness. What is e-business Electronic business or e-business is the use of ICT to improve business (from the use of to facilitate administrative.
Fusing the ART, SCIENCE, and TECHNOLOGY of Business. Kevin Harder for MS-MBA Association VP Finance.
1 Libraries and information centres: future trends (Part 1) More applications of information and communication technology (ICT) **--
Yusuf İ slam Ş EFLEK 11 TM/A 85.  An acceptable use policy is a set of rules applied by the owner/manager of a network, website or large computer system.
ELearning and Matilda. Alexia Bumbaris Historian and PhD- student at the University of Vienna Focus on Gender History Former study assistant eLearning.
Promoting Disability Equality in Ireland The Role of DESSA – the Disability Equality Specialist Support Agency Presentation to the FRC National Forum.
Educational Networking Kristie Johnson EDLD 5362 April 24, 2011.
Welcome. Who am I? Philip L. Sullivan MCT, MCSE, MCSA Microsoft Certified Trainer for 6 Years Work as a Lead Windows NT\2000\2003 Instructor for Clark.
Local Training of our Middle Managers: Concept and First Experiences.
Safer Internet Forum 2007, TANJA ŠTERK, project coordinator SAFE-SI: SLOVENIAN AWARENESS NODE IDENTIFYING THE ACTORS AND ACTIONS.
1 Computer Support Specialists and Systems Administrator.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Socio-Technological Impacts on Journalism Studies Joel Gershon.
Computing Education in India A Brief Summary For ACM Education Council Meeting September 2009.
11 APR 2014 APAN Overview. What is APAN? How is APAN Used? APAN Tools Case Studie.
Sheldon Teaching in a social networked classroom.
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Bridging the Digital Divide – Policies and Actions Professor Birgit Jæger Dep. of Society and Globalisation Roskilde University Denmark.
Your logo here The contents reflect the author's views. The Managing Authority is not liable for any use that may be made of the information contained.
Ethiopia Protection of Basic Services Social Accountability Program (ESAP2) Grant Agreement [TF099878] Session 1: Social Accountability & Social Inclusion.
Seminar on Gender mainstreaming in E-Government : Bringing Women into the inner circle of the digital arena in Africa ''Cutting-edge ideas on “bringing.
Assessment - as a catalyst for innovation Grainne Conole, University of Southampton University of Edinburgh, 16 th April 2004.
© Strategic Networks Group, Inc By the Numbers: Driving Broadband's Impact to Economic Development By the Numbers: Making the Economic Case Broadband.
UNECE Statistical Division Slide 115 May 2008 Open Discussion Work Session on Statistical Dissemination and Communication May 2008 Facilitator: Gina Pearson.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Commonwealth Certificate for Teacher ICT Integration.
Key themes covered Search engines Locating/ assessing suitable resources Information Skills – knowing where to look Free web-based RDN,NLN, Ferl JISC or.
Internet Internet Private net Partner net Worker/ learner Co-creating knowledge Consuming knowledge Conversation Searching Customers, partners Learnscape.
Huntsville User Administration Training. Huntsville User Administration Training: Other Products – Teacher Administrated.
SLIC Sustainable Learning in the Community Results of the research phase Katharina Resch Research Institute of the Red Cross.
Name of the project and Sub-Objective of the PEOPLE project NUENEN NETWORK / ONS NET NUENEN Social & E-inclusion (SO4)
The 2012 European Cloud Computing Conference Brussels, 21 March 2012 Building the European Cloud Computing Strategy Carl-Christian Buhr (All expressed.
Spacebook: Lessons Learned from NASA Emma Antunes NASA Goddard Space Flight Center
Small Business Security Keith Slagle April 24, 2007.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
UNIVERSITY ROLES IN MEETING ASPIRATIONS FOR ICT AND ECONOMIC DEVELOPMENT By Professor Livingstone S. Luboobi Vice-Chancellor, Makerere University Kampala,
Eye on Earth Network Gordon Sillence Ecotrans-DestiNet March 7 th Berlin ITB.
Technology Gap. Objectives Develop a deeper understanding of technology gaps in relation to IDT Discuss the strengths and weaknesses of e-resources as.
EC Project Idea: connected Work – e-Learning - Networks Political Objectives bring the standards of connected work (mobile work, telework, tele- co-operation.
New instruments for virtual CoP work Human Development Community of Practice Meeting Bratislava, 21 May 2008.
E-Government Services Some Perspectives Randeep Sudan Global ICT Department.
INTEGRATING GENDER ISSUES INTO EVALUATION. First steps The first step is to search for gender issues within the context of your ICT project. This is essential.
The "me"-generation and information overload - are libraries catering to the needs of up and coming information users? Lourens du Plessis SU Library Service.
Inclusive By Design project Policy perspective Presentation of the first results.
Introduction to Network Systems Security Mort Anvari.
E-Governance Vijay Agrawal 02D05008 Raja Agrawal 02D05009.
Public Access: Supporting digital inclusion for all Addis Ababa, September 2015 Emilar Vushe Gandhi.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Department of Business Administration SPRING Management Science by Asst. Prof. Sami Fethi © 2007 Pearson Education.
National Biological Information Infrastructure Tom Lahr USGS Biological Resources Division, Office of Biological Informatics and Outreach Information Technology.
참 잘 오셨소, 어서 오십시오 The National Center for Information and Communications Technologies A National Science Foundation.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Land Administration Åse Christensen Namibia University of Science and Technology Bachelor of Land Administration Bachelor of Property Studies Honours Semester.
Unit 2, Lesson 5 Windows User Accounts
Broadband as a Community Development Tool
Comparison of LAN, MAN, WAN
Data science online training.
Competitive Analysis: Apple Inc.
Presentation transcript:

I’ve been angry and I am still angry!!! Tom Johnson t o j t j o h n s o n. c o m

Wrong end of the telescope People in positions of power operating from a philosophy of fear. Especially fearful of what they don’t know or understand. (Not just George Bush) First instinct is to control by exclusion Internet, cyberspace only works by inclusion. (1 node = 0)

Perverted perspectives ICT directed by paranoid administrators; –Computer Science training network administrators only to protect the applications and data by keeping users out? The results – in ALL regions, nations, organizations, systems – is to restrict access to users Instead, should be focusing on bringing in all users and protecting only the data deemed most private, crucial or sensitive.

Manifesto for Blog community Constantly push for “ The Three 100s ” 100 percent of all people (in a system) have access to… 100 percent of all the data and analytic tools they need… 100 percent of the time.

Three 100s strategy Inefficiency Loss of potential revenue Shame Ridicule

Demand It! The Three 100s