Posts

Unintended consequences - New Privacy Laws in India and China Could Make IT Outsourcing Ugly

Image
An good article has been posted on BNET  titled "New Privacy Laws in India and China Could Make IT Outsourcing Ugly"  worth reading in full. Essentially the article by Eric Sherman points forward the issues that new privacy laws being proposed by India and China could make the task of outsourcing very mush more difficult. Specially there is a call from the US government for the following: Those that hold personal data must receive explicit consent to divulge that data to third parties. There are specific restrictions “during the collection, processing, use, transfer and maintenance of personal information.” Personal data cannot be exported unless specifically allowed by law or government authorities.    The implication is that we must be prepared for the real cost of protecting data  however are we in danger of paying to guard some data that is already public and some that has close to no other value. Whatever the case there are always unintended consequences o

What do you call a collection/ cluster of data?

Image
What name do you use to describe a generic collection of data? examples of specific Travel data = (name, address, passport, frequent flyer number, insurance, hotel, dates, destination, class, preferences) Shipping data = (name, shipping address, date, price, weight, priority, preferences) Billing data = (Unique ID, name, address, Bank, bank details, service/product, price, settlement) What is the link from the collection to your ontology?

How broad is the right to mine data? How much protection the First Amendment provides for "data-mining....

Image
Argument preview: How broad is the right to mine data? by Lyle Denniston The US Supreme Court held a one hour of oral argument on 26th April on the scope of constitutional protection for the modern phenomenon of “data-mining,” the creation of usable information out of masses of stored computer entries.  The case is  Sorrell, et al., v. IMS Health, et al.  (10-779 ).   Arguing for the state of Vermont, defending a law that limits the commercial use of such data, will be an assistant state attorney general, Bridget C. Asay of Montpelier.  Supporting such regulatory efforts, for the federal government, will be Deputy U.S. Solicitor General Edwin S. Kneedler, with ten minutes of time.  Speaking for data-mining companies and pharmaceutical manufacturers will be Thomas C. Goldstein of Goldstein, Howe & Russell in Washington, D.C.   Whilst it is an interesting question, the question should not be about the right to mine but the right to accept/ opt out of the offer of a barter (da

'Improving user protection and security in cyberspace" - my response to the EU proposal

Image
A Council of Europe members propose resolution on 'Improving user protection and security in cyberspace" "The Parliamentary Assembly is concerned that technological and commercial innovations in Internet and other digital information and communication media are taking place without an adequate analysis of the interests of the weakest part in this process: the user or consumer. For nearly a century, consumer protection principles have been established for traditional commerce of goods and services. However, they are more or less absent in modern cyberspace. Voluntary self-regulation by Internet stakeholders falls short of the legitimate expectations of protection. In their use of the Internet, people come into contact with a multitude of intermediaries and software applications of third parties without knowing. Users of mobile communication devices change their intermediaries while moving. The Internet of things, cloud computing, social networks, peer-to-peer network

#iiw "I want to know you are not a dog"

Image
Last week I was at The Internet Identity Workshop (IIW) in San Jose organised by Doc Searls , Phil Windley and Kaliya Hamlin - it was very good with a diversity of representation based on geography and discipline; with start-up, government and a number of the big corporates represented all at very senior levels. Identity (whatever identity is) is a critical part of the overall trust framework of the Internet.  "I want to know you are not a dog" and featuring heavily in discussion and debate was..... 1. The U.S. government announcement of a new initiative called The National Strategy for Trusted Identities in Cyberspace (NSTIC) . The new program brings together government, industry and advocacy groups in order to build out what they’re calling an ” Identity Ecosystem ” in the private sector. 2. Standards and interoperability especially OpenID & OAUTH implementations and improvements 3. Personal lockers, data stores, users in control and VRM 4. Digital Death

A better deal for operators - How Nokia/ Microsoft could go for changing the economics?

Image
(The meeting of the waters at the source of the Amazon!) This started life as a private letter to Nokia and Microsoft about what they could do to revolutionise the mobile industry as competing on UI, apps and shinny things are unlikely to bring about a massive share price hike.  With a few hours to spare on a flight to SFO I started but concluded that an open letter would be more fun as I modelled how Nokia & Microsoft could look to offer the operators a better deal by changing the economics and it looked to attractive to hide. Working assumption - All you can eat is a broken model..... When the mobile market was about voice and SMS there was a finite limit to how much you can talk and SMS and all you could eat worked based on some well presented statistical calculations.  But unlimited data, even with fair use is a problem when social media feeds and video create a perfect storm.   There are a few really limiting factors in the mobile world: battery life, network capacity,

See what you are sharing when you log in via Facebook Connect

Image
http://isharedwhat.com/simulator.html See what you are sharing when you log in via Facebook Connect  - simulator