These are the Sense making diagrams on two pages that are 11x17 for the My Data My Value 6 Sense Making Diagrams from the Personal Data Ecosystem Consortium presented at the 2016 Cloud Identity Summit. It was in the Rise of the Identity-enabled Personal Information Economy Track. It puts forward 6 Diagrams to make Sense of the overall Personal Data Ecosystem including What is Personal Data? What Happens to Personal Data? What are Market Models and how is it regulated?
This talk was presented at the 2016 Cloud Identity Summit. It was in the Rise of the Identity-enabled Personal Information Economy Track. It puts forward 6 Diagrams to make Sense of the overall Personal Data Ecosystem including What is Personal Data? What Happens to Personal Data? What are Market Models and how is it regulated?
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
Noggin - World's first marketplace for Personal DataNoggin Asia
Direct marketing is expensive; and customer details are usually unknown. Customer on other hand is worried about personal data. Noggin is a marketplace to connect these two. Discover us at www.nogginasia.com. Consumers can earn by sharing personal data
I presented to SDForum Tech Women's group about Identity and Personal Data. I presented and also got input from the women attending about how they understood their own identities and what they want to have happen with their personal data.
This talk was presented at the 2016 Cloud Identity Summit. It was in the Rise of the Identity-enabled Personal Information Economy Track. It puts forward 6 Diagrams to make Sense of the overall Personal Data Ecosystem including What is Personal Data? What Happens to Personal Data? What are Market Models and how is it regulated?
This presentation was presented as the pre-opening talk at Identity North 2016 in Toronto. It covers the big question - What is Identity? Key Concepts and Terms. Contextualizing Identity for Enterprise, Government and in the Commons.
Noggin - World's first marketplace for Personal DataNoggin Asia
Direct marketing is expensive; and customer details are usually unknown. Customer on other hand is worried about personal data. Noggin is a marketplace to connect these two. Discover us at www.nogginasia.com. Consumers can earn by sharing personal data
I presented to SDForum Tech Women's group about Identity and Personal Data. I presented and also got input from the women attending about how they understood their own identities and what they want to have happen with their personal data.
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
This is the presentation I gave at the Grace Hopper Celebration for Women in Computing October 2015. It covers three main ethical market models that could support the emergence of a Personal Data Ecosystem centered on individuals and their personal clouds. The three models are Vendor Relationship Management, Infomediaries, and Data Aggregators. It highlights the need for Accountability Frameworks (also called Trust Frameworks) combinations of code and law/policy. This is contextualized in an overall Landscape picture where two other modes of governance also co-exist - Peer Governance and Identifier Governance.
Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
This is a presentation from the MyData Online 2020 Conference that covers the history and evolution of digital identity from the first computers in World War 2 to Enterprise Identity and Access Management and emerging new Self-Sovereign Identity Technology.
Thinking ahead GDPR and CCPA are coming and people are freaking out about how their data is being used. What are the new tools for a Personal Data Ecosystem.
This is the keynote presentation that I gave at MyData 2018. It explains the connection between identity and personal data. Some of my story of how I began working on identity 15 years ago. The Domains of Identity, My master's report is explained and then core components of Self-Sovereign Identity is explained. I conclude sharing some thoughts on how we work together to build alignment.
The Domains of Identity presentation covers the 16 domains of Identity outlined in Kaliya's Masters Report written for the Master of Science in Identity Management and Security program. It is available https://www.identitywoman.net/domains-of-identity
This is a deck that highlights the origins of my Identity Ecosystem Mapping efforts. It shares snapshots of the prototype map in Kumu and outlines the functionality possible for Version 2.0 using the Knowledge Ecology Interface system developed by SOSACorp.
This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.
This talk articulates 1) what is a blockchain 2) why it is interesting 3) talks through use-cases grounded in real world projects. 4) Highlights questions government leaders should ask before deciding to use a blockchain.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Identity can seem deceptively simple. We know who we are. Sometimes we have to convince others of that fact and confirm other characteristics: our age, our qualifications, or our right to access some services or tools. This happens every day over the Internet, but in ways that are disorganized, redundant, and risky. The lack of reliable, universal standards puts our private information at risk of public dissemination, fraud or worse.
The pioneers developing the internet didn’t define nuanced standards for identity -- most everything was just username and passwords. Over the past 20 years we have seen a range of standards that solve some identity challenges, including SAML, LDAP, OpenID Connect, OAuth, SCIM, Information Cards, and FIDO. None of them have comprehensively addressed the challenge of identity at internet scale.
A new set of standards is emerging that creates an infrastructure for self-sovereign identity that can scale. This talk looks forward to help you think ahead and prepare for this new infrastructure. We will walk through standards that together create a new identity infrastructure that leverages the blockchain. This isn’t about what you can implement tomorrow to solve your employee identity challenges or manage customer accounts. It will instead prepare you for the coming changes and help you play a role in shaping them.
This is a talk I was asked to give at the What is Universe? at the University of Oregon, (on their Portland Campus). I cover this history of the Internet Identity Workshop and talk about its core nature as a torus / bowl a feminine form and how this has resulted in the innovation of Self-Sovereign Identity
This is the presentation I gave at the Grace Hopper Celebration for Women in Computing October 2015. It covers three main ethical market models that could support the emergence of a Personal Data Ecosystem centered on individuals and their personal clouds. The three models are Vendor Relationship Management, Infomediaries, and Data Aggregators. It highlights the need for Accountability Frameworks (also called Trust Frameworks) combinations of code and law/policy. This is contextualized in an overall Landscape picture where two other modes of governance also co-exist - Peer Governance and Identifier Governance.
Kaliya and Bob gave this talk as the closing keynote for the Cloud Identity Summit on July 19th, 2012 in Vail Colorado. It discusses a range of issues and options for identity in society. It postulates that social justice or fairness must be an underlying design feature of any system. It encourages people to get involved with the NSTIC process and the current steering committee being formed.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Diagrams for My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem
1. The Value Network Map below shows the value flows (in a simplified form) in the current ecosystem around targeted advertising and data aggregation*. The Individual is at the center and a next ring of parties has direct
engagement with the individual (Publisher, Attribute Verifier, Data Collector, Network Address Provider, Payment Processors) while a wider ring does not (Marketers, Data Analytics Providers, Data Set Brokers).
Read the narrative and see the matching colored section of the map. There is numbered value flow for each color that that goes with the narrative.
The individual puts their attention towards a
publisher’s website by clicking to view content, in
doing so data about the view and information about
the ad inventory available in that viewing act is
available to a marketer who places a message (ad) on
the page which is viewed by the individual.
Persuaded by the ad the individual goes to a retail
store advertised, in doing so they become subject to
the terms of use put forward by the site and the data
from the click is sent off to an aggregate data set
broker. Using the data they data broker shares with
the retailer a profile of the user and it uses this
information to adapt the offer it makes to the user.
The individual likes the offer and places an order. It is
an item that requires a proof of an attribute - say a
student in a school or being over the age of 19.
The individual must go to an attribute verifier to get
proof the attribute (and they are also given explicit or
implicit use rights). They then share this proof of
attribute to the retailer.
Alternatively the user might choose to ask the
Attribute verifier tell the Retailer directly about their
status. Alternatively without the users involvement the
retailer could ask for attribute from the provider
without the individual’s consent or awareness.
The retailer also requires a valid network end-point a
phone number or e-mail address that works to
contact the individual. So they request this from the
Individual and send a message to the address and
ask for confirmation.
Now the retailer is ready to charge the individual using
a payment processor and once the transaction goes
through the individual gets the good they ordered.
The data trails from the transaction continue....the
retailer has a data set of transactions and it sells it to
a data broker. The payment processor also has data
and it too sells it to the data broker.
Note that the Data Broker has no direct relationship
to the Individual who’s specific data is contained
within the data set and shared with the broker.
The Retailer wants an analysis of his data and goes
to a company that can provide that specific service.
The data analytics company uses data from the data
broker to help in its analysis.
The Marketer who is trying to find more information
about who to target taps the services of the data
broker and aggregator.
The whole map goes full circle when this data is used
to shape the ads the individual sees when he goes to
the publishers' website.
DATA USES:
Personal Data Ecosystem
Public
examples:
UTILITY
COMPANIES
MEDIA GOVERNMENT
AGENCIES
examples:
Medical
PHARMACIESHOSPITALS DOCTORS
& NURSES
examples:
Retail
RETAIL
STORES
AIRLINES CREDIT CARD
COMPANIES
examples:
SOCIAL
NETWORKING
SERVICES
RETAIL &
CONTENT
WEBSITES
BUY ONE,
GET ONE!
SPECIAL
OFFER!
Internet
examples:
Financial & Insurace
STOCK
COMPANIES
INSURANCE BANKS
Information Brokers
Websites
Catalog Co-ops
Media Archives
List Brokers
Affiliates
DATA
COLLECTORS
(sources)
Media
Marketers
Employers
Banks
Product & Service
Delivery
Government
Lawyers/
Private Investigators
Individuals
Law Enforcement
DATA
BROKERS
DATA
USERS
Credit Bureaus
Healthcare Analytics
Ad Networks &
Analytics Companies
Examples of uses of consumer information in personally identifiable or aggregated form:
Financial services, such as for
banking or investment accounts
Credit granting, such as for credit or
debit cards; mortgage, automobile
or specialty loans; automobile rentals;
or telephone services
Insurance granting, such as for health,
automobile or life
Retail coupons and special offers
Catalog and magazine solicitations
Web and mobile services, including
content, e-mail, search, and social
networking
Product and service delivery, such as
streaming video, package delivery, or
a cable signal
Attorneys, such as for case
investigations
Individual
examples:
Telecommunications
& Mobile
CARRIERSMOBILE
PROVIDERS
CABLE
COMPANIES
Journalism, such as for fact checking
Marketing, whether electronically,
through direct mail, or by telephone
Data brokers for aggregation and resale
to companies and/or consumers
Background investigations by employers
or landlords
Locating missing or lost persons,
beneficiaries, or witnesses
Law enforcement
Research (e.g., health, financial, and
online search data) by academic
institutions, government agencies, and
commercial companies
Fraud detection and prevention
Government benefits and services,
such as licensing
Public
examples:
UTILITY
COMPANIES
MEDIA GOVERNMENT
AGENCIES
examples:
Medical
PHARMACIESHOSPITALS DOCTORS
& NURSES
examples:
Retail
RETAIL
STORES
AIRLINES CREDIT CARD
COMPANIES
examples:
SOCIAL
NETWORKING
SERVICES
SEARCH
ENGINES
RETAIL &
CONTENT
WEBSITES
BUY ONE,
GET ONE!
SPECIAL
OFFER!
Internet
examples:
Financial & Insurace
STOCK
COMPANIES
INSURANCE BANKS
Information Brokers
Websites
Catalog Co-ops
Media Archives
List Brokers
Affiliates
Media
Marketers
Employers
Banks
Product & Service
Delivery
Government
Lawyers/
Private Investigators
Individuals
Law Enforcement
Credit Bureaus
Healthcare Analytics
Ad Networks &
Analytics Companies
examples:
Telecommunications
& Mobile
ISPsMOBILE
PROVIDERS
CABLE
COMPANIES
examples:
https://www.ftc.gov/sites/default/files/documents/public_events/exploring-privacy-roundtable-series/personaldataecosystem.pdf
2. Individual: A person
Devices: Mobile phones, computers, self tracking
devices, medical monitoring devices, e-readers.
Context: Where a person is (home, school, work). The
Role they are playing (parent, coach, spouse,
employee, supervisor, athletic team member). Persona
they are presenting (video game player, professional,
goofy hobby identity).
Data: The bits generated explicitly such as photos,
tweets, status updates.
Frameworks: Contractual mutli-party frameworks
connect legal/policy agreements to technical
interoperability to protect the individual and enable
markets. The Personal Cloud service provider is at the
heart of these frameworks, chosen by the end user,
and works on their behalf managing their data and its
participation in the framework.
Personal Data Analytics: Services that help people
gain insight into their own personal data. An example
being one’s daily health status or a personal annual
report.
[Trusted Organizations]
Product Producer: This is an example of a Vendor
Relationship Management connection where a
consumer who bought a product from a producer
manages an open channel with the maker of the
product they bought and willingly share information
under favorable terms they the user set.
Infomediary: A service trusted to have insight into a
person’s data and working on their behalf. They have
an individual’s personally identifiable information (PII)
and protect that data and put it to use.
Data Aggregation Services: Services create
aggregate data sets from personal data, like music
listening habits. Aggregators may compensate people
for their data, people may share altruistically, or people
may unknowingly share.
Public Services: Governments delivering services to
their constituents can enable use of personal data
stores for better access and data quality.
[The Market]
Market Place: This is where an Individual’s business
agents with PII meet Vendor agents without PII.
Retailers: Companies that sell goods to customers.
Service Providers: Companies that provide services
to people.
Vendor Agents: Companies that help retailers and
service providers find good potential leads. They do not
have personally identifiable information.
[Governance]
How systems are regulated take many forms.
Governance starts with laws and regulation but also
includes cultural practices, business norms, and, in
digital systems, how identifiers are allocated and the
code that connects them.
LEGAL:
Government: plays many roles in the systems:
Regulator: Governments set baseline rules for how
markets work. They provide the court system where
contract law is adjudicated.
Public Records: Governments record births,
marriages, divorces, deaths along with licensing,
and property title registries.
Public Safety: Policing and law enforcement.
Ombudsman: Many states have a data protection
commissioner who protects constituents.
International Treaty Organizations: They support the
coordination of international treaties and provide a
meta-international law that hold governments
accountable to each other.
CODE: Computer code and how it runs determines
what is possible in computer systems. The phrase
“Code is Law” was popularized by Lawrence Lessig.
Standards Development Organizations: Bruce
Sterling said “If code is law then standards are like
the Senate.” Standards bodies agree on how code
works regardless of the particular language it is
written in or system it is running on. For example,
the W3C standardizes the HTML specification for
presenting web pages.
IDENTIFIER: Networks run on identifiers for each
endpoint. How these are allocated, and the terms and
conditions of use in a network, govern the network.
Global Identifier Registries: Examples include the
phone system, Domain Names, ISBN numbers,
RFID.
Private Name Spaces: examples include Twitter,
Skype, Google, Facebook etc.
PEER: This kind of governance is the most powerful in
many ways and helps social systems operate.
Peer-to-Peer: People have opinions about each
other and also about businesses and services they
interact with - like Yelp for small businesses.
Professional: Doctors, lawyers, engineers,
geologists, and architects are professions that peer
regulate.
Institutional: Institutions figure out what other peer
institutions are - such as banks worldwide in SWIFT.
Framework Creators: Organizations that create
contractual legal-policy/technology frameworks that
govern complex multi-party networks.
My Data, My Value, 6 Sense Making Diagrams presented by Kaliya Young, Founder of
PDEC at the Cloud Identity Summit. We invite you to become a member of PDEC to
participate in shaping and influencing the emerging personal data ecosystem. To learn
more about the range of PDEC memberships please visit: http://www.pde.cc/membership
Feel free to arrange a call with Dean Landsman, PDEC Executive Director. dean@pde.cc