Posts

thinking about the implications of Selectout.org

Image
  http://selectout.org/about/ SelectOut is one of many services becoming available to know who is tracking you and manage the opt-out.  What I like about this one is the level of detail about the Cookie owner and therefore you can determine with some insight to whom is tracking you and why. I would love it if this would also allow me to make a judgement (wisdom of crowds),vote and see how others vote, if there is a fair value exchange from the tracking, what level of data (some form of heat map) has been passed back to the cookie owner and what value they have derived from my data. Worth noting that whilst the internet needs you and your data, you need cookies (currently).......

#Innotribe - identity write up

Image
Way back on 20 September I chaired the Digital Identity - Deep Dive @ Sibos The session explored the edges of the digital identity eco-system, looking into personal data stores, trust frameworks, and multi-channel authentication techniques. Azeem Azhar , CEO, Peerindex Craig Burton , Founder and Principal, Burtonian Scott David , Partner, K&L Gates LLP Tony Fish , Founder/CEO, AMF Ventures Mary Hodder , Chair, Personal Data Ecosystem Consortium Michael Ouliel , Founder and CEO, Ripples HLS Group Drummond Reed , Chairman and Chief Trust Officer, Connect.Me; Co-Chair, OASIS XRI and XDI Technical Committees, Connect.Me Doc Searls , Alumnus fellow Berkman Center for Internet and Society, Harvard University Gary Thompson , Co-founder and CEO, CLOUD Inc. Kevin Sharp , SVP Sales EMEA, Daon Here are a few pithy notes Kevin Sharp fear from security holds us back how do we discover identity transactions and authentication using biometrics is here how do you know I am

Reputation, influence & attention are tradable tokens but not currencies

Image
I have been reading Peter Vander Auwera very good blogs on the future of money and alternative currencies  - http://petervan.wordpress.com/ with thinking from BitCoin, Caplinked to reputation, influence, and attention. If money (a currency) is a token that must be ..... Memory of a previous exchange Store of some value Medium of exchange Measure of value Knowing that a currency (token) should be Durable, Transferrable, Exchangeable, Recognised, Divisible, Accessible, Standardised, Difficult to forge/ counterfeit, Valued, Available, cannot be Created by everyone; then reputation, influence, and attention cannot be a currency..... Should your reputation, influence or attention be exchangeable for goods and services - probably, but how should they be valued?

Digital Assassination - your digital reputation is not your own.....

Image
Totally agree with the principal as I write about this all the time -  digital footprints are about what you say about yourself and what others say about you.  Have bought and will read when it comes out original review : http://www.nyjournalofbooks.com/review/digital-assassination-protecting-your-reputation-brand-or-business-against-online-attacks In Digital Assassination, Mr. Torrenzano and Mr. Davis make it quite clear that protecting a digital reputation—your own, your business’s, a brand’s, or that of a long-lost relative—is a little like chasing after spilled water which seeps into every crack and crevice it finds. Mr. Torrenzano, a strategic communications consultant and New York Stock Exchange veteran, and Mr. Davis, a former White House speechwriter, bring their considerable knowledge and experience to bear on this new and very difficult area. What is “digital assassination?” The authors describe it as “a willful act by someone wishing to do harm through the Internet.

Identity Management - who's playing?

Image
original list from Vanessa http://emergentbydesign.com/2011/10/13/mapping-the-identity-management-landscape-29-providers/ She is looking for a list of providers to map - 1.  ActivIdentity / HID Global (of ASSA Abloy),  2.  Avatier 3.  Aveksa 4.  BMC  (SailPoint) 5.  CA Technologies 6.  Cisco 7.  Courion 8.  Cyber-Ark 9.  Entrust 10.  Evidian 11.  Fox Technologies 12.  FuGen Solutions 13.  Hitachi ID 14.  IBM 15.  Imprivata 16.  IronStratus 17.  Microsoft 18.  Novell 19.  Okta 20.  Oracle 21.  OneLogin 22.  Ping Identity 23.  ProtectNetwork 24.  SafeNet 25.  SAP 26.  Siemens 27.  Symantec 28.  Symplified 28.  RSA Security 29.  VMware and others suggested.... The OpenID Foundation http://www.openid.net The Open Identity Exchange http://www.openidentityexchange.org OMADA : federation/cloud idm Centrify : unix/AD identity consolidation Liberman : Privleged id management CionSystem : similar to centrify Beyond Trust : With strong Unix Root access

Innovation Warehouse impact: June 2011 - October 2011. Progress report

Image
So we founded IW late last year, opened in May and here is the update on progress...... IW impact: June 2011 - October 2011 30 early stage companies regularly at IW 50 early stage companies have been through IW 30 internships, part-time work & jobs created in and around IW (estimated) 10 companies received active financial support through GROW IW 3 companies raised > £500k with GROW IW assistance 30 events hosted with > 75 people at each 100 events in total 2000 people/companies impacted via events

How private is Private a speech by Mr Justice Eady

Image
Mr Justice Eady gave a speech entitled “ How private is private?”  to the “ 2011 Young Bar Conference “ on 8th October 2011 – long but worth reading. This is privacy “and public” based on what we have – a shame nothing on where we are going given the issues of data and digital footprints.