24 KiB
published |
---|
false |
Business
-
Choice, decision making and judgment; is your relationship constructive or destructive? MyDigitalFootprint
My proposal to help support better governance is that we request companies publish the questions asked in a board meeting. Not the answers, but definitely the questions.
-
The Document Culture of Amazon Justin Garrison
The interesting part to me isn’t in the format of the document, but how it is used. Meetings start with reading. Depending on the length of the document, we’ll read anywhere from ten minutes to half an hour. If the meeting has a long document (six-pagers are the longest) and many attendees, the meeting will be scheduled for enough time to read and discuss.
-
Decentralized Business Model Stepan Gershuni
How reduction in transaction costs influence evolution in digital business models
Key findings from the report are:
- Users sacrifice privacy and security for access to valued services
- Smartphone users begin to sense improvement in the mobile environment
- More and more users take protective steps, but remain exposed to harm
- Protective actions do not necessarily drive confidence
- Cost, knowledge and perceived complexity are key barriers
- Transparency and control are key values for users
- Decentralized ID Management Business Value of SSI Heather Dahl and Ken Ebert of Indicio
The decentralized workforce is also fueling demand for self-sovereign identity, Dahl says. "When you physically decentralize your workforce in society, the need for identity becomes more important." She says increasing concerns about protecting privacy are "pushing organizations to consider identity solutions that don't involve correlation and don't involve third-party tracking but also provide the security.”
- Making Money with SSI.Trinsic hosted a webinar where four different folks articulated how you make money with SSI. You can see each of the presentations separately if you like.
- SSI Business Models and Go-to-Market
In the second part I’m focusing on the business model and go-to-market aspects.
What are some limitations and opportunities for making profitable business in self-sovereign identity?
- Economics of Self-Sovereign Identity and the Future of Cryptoeconomics with Stepan Gershuni Podcast • SSIOrbit
- Biz models of web1, web2, web3
- SSI Adoption Strategy
- Verifiability = Economic Efficiencies
- Cryptoeconomics x SSI (h/t @mathieu_glaude
- On Self-Sovereign Identity: What's the Business Value of SSI? Hackernoon
To businesses, immediate value comes from removal of the costly and challenging GDPR compliance. Forbes reports that in 2018 in the UK alone $1,1 billion was spent by companies on GDPR preparation, while US companies allocated over $7.8 billion on protecting customers’ personal information.
- Career Advice for New Professionals in Identity by Megan Olsen
Simon: worked with Megan Olsen for 6(?) months as intern. Do not have job offer yet. Think this is the future. Hard to get from corporations taking advantage, bring freedom back as it was back in the day. Advise: do some research on your own, educate yourself, do development as much as you can.
Join some communities on the Internet. Be part of an open source and contribute.I will be contributing to open source Indivcio while whiling for job offer.
Simon (Slava) Nazarenko, 1:50:12 PM
please, connect if you want
Patrick Kenyon. Indicio. Mobile development layer. 2 months. Mobile development itself. Wanted to learn a bit more about identity aspect that I’ve been working on. To learn better.
Ian Kulp. Not currently working yet. Finished bachelors degree same time last year. After 2 year SDE intensive. 2nd years ML. passionate about all things decentralized. See as evolution of internet. Heavily invested in cryptos pace. Mining. 24 GPU miners going. First IIW. Soaking in as much knowledge as I can. By time … graduate from this software engineering intensive. Hope to enter the workforce ideally with a company or org triny got move the decentralized revolution for
Patrick Kenyon To Everyone
1:51:27 PM
Megan: biggest advice: go in chat and ask for everyone’s LinkedIn. I applied for a lot of jobs and … heard back. Got job through networking. Then got Patrick hired. I don’t remember if I filled out application or not.
Megan: learning different things, even though don’t sound important to what you are doing, can be helpful.
Phil: looking through this advice, notes. Is any of it Identity-specific? Or just, this is our community? The rest is just IT and cybersecurity-oriented guidance?
Megan: still extremely new. Only 6 months next week. Think the advise is about the same. #1 thing to remember about identity: there is always going to be news stuff coming up that surprises you. Never would have thought of it that way because it’s always been the same way for a long time.
PhilWolff: I’m a researcher for digital identity in the Internet of Things.
I’ve been coming to IIW for about 10(?) years. Everything Megan tells you, do that. But there is a huge leap between world of identity access management - world of well-known well-understood problems, pretty proven toolkit for managing them; and folks like at IIW trying to imagine what’s trh proven ne stuff for 5 years down the road, start designing it now. Bleeding edge of digital identity in some respects. Other pockets of the internet where you can find where the innovators are doing stuff. Most 95% of companies in Identity trying to get some enterprise(s) properly connected, wired up. Industry, IAM. Consider as two separate fields. Identity research, science - vs. Identity Operations. Most work in Identity is Identity Operations and Business practice.
customers want convenience and control: they want to choose which authentication method to use – whether it’s MFA or SSO or biometrics. They want a brand experience that resembles a concierge desk: a 24/7 service where no demand is too big. To top it off, they don’t want to see any technical glitches
-
How SSI Can Make Any Platform a 'Super App'
Companies that support a Verifiable Credential Issuance standard can provide audited and truthful information to any third party on behalf of and with specific permission from their customers. For example, a bank could provide proof-of-funds in the form of a digitally verified credential document, that can then be used as a source of truth to instantly initiate a mortgage application, or a real estate purchase offer.
-
When it Comes to Decentralized Identity, Sell Solutions Not Rules
we advocate “machine-readable governance” as an architectural solution.
- First, machine-readable governance simplifies how decentralized identity works: The user software handles the rules for information flows and authentication, which are established and published by the entities with authority for governing the use case.
- Second, this architecture makes these rules transparent.
- Third, and critically, it enables these rules to function offline through caching, which, when you think about it, is an essential feature in any digital identity verification system; trust can’t be dependent on a Wi-Fi signal.
- Building a Relationship Economy Doc Searls
Is there something new that open source development methods and values can bring to the economy? How about something old?
-
4 Keys to Self-sovereign Identity Adoption, Riley Hughes
I decided to interview close to 50 business leaders who are seeking to deploy SSI in production to glean their learnings. The interviewees included our “competitors” (at this stage we’re more collaborative than competitive), a few of Trinsic’s customers, and industry leaders. I have summarized and consolidated their insights and my own thoughts into 4 keys for SSI adoption.
-
The Identity Imperative: Risk Management, Value Creation, and Balance of Power Shifts IdentityPraxis Michael Becker
Brands need to prepare for fundamental shifts in people’s attitudes and expectations. The implications of these shifts will be profound, as they will force a change in competition, business models, product offerings, and business practices.
-
A Tour Through the OWASP Top 10 Auth0 Market issues that we should make sure SSI addresses
A quick look at the refreshed OWASP Top 10 to celebrate Cybersecurity Awareness Month
- Broken access control
- Cryptographic Failure
- Injection
- Insecure Design
- Security Misconfiguration
- Outdated Components
- ID-Auth Failure
- Software\Data Integrity Failure
- Logging\Monitoring Failure
- Server Side Request Forgery
There’s an economic theory here: Free customers are more valuable than captive ones—to themselves, to the companies they deal with, and to the marketplace. If that’s true, the intention economy will prove it. If not, we’ll stay stuck in the attention economy, where the belief that captive customers are more valuable than free ones prevails.
- Just ask Werd
We’d get the startup founders to figure out the biggest assumptions they were making across user risk (do people want this?), business risk (can this be the center of a viable business?), and feasibility risk (can we build this in a scalable way with the time, team, and resources potentially at our disposal?). And then we’d ask them to go out and figure out how to de-risk those assumptions in the real world, usually by talking to experts and asking smart questions.
- Working Spaces Are Ecosystems Too! Autumn Watkinson - Trust over IP Foundation
An ecosystem is a community of living organisms interacting with each other and their physical environment. When you hear that definition, you might priture a pristine nature landscape, but that definition can also apply to how businesses, individual or organization interact with one and other. This talk is about natural ecosystem and how we can adapt nature's lessons to our industry ecosystems.
- How my team won FinCEN/FDIC’s Digital Identity Tech Sprint Vadim Slavin GlobalID
“What is a scalable, cost-efficient, risk-based solution to measure the effectiveness of digital identity proofing to ensure that individuals who remotely (i.e., not in person) present themselves for financial activities are who they claim to be?”
One of the clearest areas of digital identity where we see the impact of not doing enough to include vulnerable people is authentication – the point where a user must verify their identity in order to gain access to a service.
- Catalyzing your Digital Transformation Journey Kuppinger Cole
The KuppingerCole Identity Fabric, an indispensable component in modeling future-proof IAM concepts has just been extended and updated in some details. As a framework and guideline describing a modern, future proof and adaptable IAM, it demands and promotes seamless and secure access for every actor to all required resources.
- Can Self-Sovereign Identity Deliver Business Value? Walton College
As Mary Lacity and Erran Carmel explore in their whitepaper, “Implementing Self-Sovereign Identity (SSI) for a digital staff passport at UK NHS,” the lessons learned by the NHS may point towards ways of unlocking new business value.
The global market for identity and access management was $9.53 billion USD in 2018 and is expected to reach $24.76 billion USD by the end of 2026, showing a CAGR of 13.2% during the forecast year.
- Global Identity Market Signals by Indicio
Decentralized Identity has gone international! In this week’s GIMS, we’ll talk about some of the most exciting projects and some of the lessons learned from around the globe.
- Decentralized Identity Market See Huge Growth for New Normal | Microsoft, Accenture, Persistent Digital Journal
Chapter 2 Global Economic Impact on Industry
Chapter 3 Global Market Competition by Manufacturers
Chapter 4 Global Production, Revenue (Value) by Region
Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions
Chapter 6 Global Production, Revenue (Value), Price Trend by Type
Chapter 7 Global Market Analysis by Application
Chapter 8 Manufacturing Cost Analysis
Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers
Chapter 10 Marketing Strategy Analysis, Distributors/Traders
Funding
NGI Assure: Closing 8/22
design and engineer reusable building blocks for the Next Generation Internet as part of a complete, strong chain of assurances for all stakeholders regarding the source and integrity of identities, identifiers, data, cyber-physical systems, service components and processes.
ONTOCHAIN: Closing 7/25
a new software ecosystem for trusted, traceable and transparent ontological knowledge management. The specific objective of the ONTOCHAIN Open Call 3 is to complete the missing blocks of the ONTOCHAIN infrastructure, as well as to exploit the ONTOCHAIN infrastructure
Identiverse follow-up
The common law system countries (AU, CA, NZ, UK & US) left the market to work out identity, and the market “decided” that there’s no need for IdPs. Let us respect that decision. The market has been trying to tell us for over a decade: IDENTITY IS NOT FOR SALE!
- Subscriptification Doc Searls
Let’s start with what happened to TV.
For decades, all TV signals were “over the air,” and free to be watched by anyone with a TV and an antenna.
- Entrepreneurship, Innovation & Leadership with Andre Durand Nonconformist Innovation
Andre talks about what motivated him to start a company, how his best ideas came about, his thoughts about building teams, questions he asks of new hires, the legacy he hopes will endure, and how he fights entropy. Steve also asks Andre about his favorite music and the next concert he is planning to attend.
The Decentralized ID Model is a strategic template used by Tykn to effectively develop and document an organization’s Decentralized ID ecosystem.
It’s called decentralized identity orchestration and brings with it uniform security controls and functionality to your applications, services, and clouds. And built using open source and open standards, it establishes vendor neutrality, provides superior agility for continuous digital transformation, and propels digital business forward.
-
Top 8 Identity Challenges After an Merger and Acquisition RadiantLogic
-
Think the martech landscape is big? Here’s the size of the software industry overall
- Digital ID bill sees action in the House and Senate
- Will EU digital identity drop the unique identifier?
- Why digital identity will make or break the Metaverse
- Young people at greater risk of falling victim to identity fraud
The plastic card paradigm has some powerful features which are instructive for the emerging VCs-as-a-service industry.
- A competitive market of card personalisation bureaus, providing custom production, magnetic stripe encoding, and card distribution and activation, all in commercial bundles which can be purchased by government agencies, banks, professional associations, universities, driver licence bureaus, and so on. On the rear of many plastic cards, the card manufacturer is indicated in fine print. It may well be that the same manufacturer produced your credit cards and government cards.
Lead with key benefits. The release features two: support for diplex-matched antennas and faster workflow. The original headline mentions only the first, I added the second.
Clarify modifiers. A phrase like “diplex matched antennas” is ambiguous. Does “matched” modify “diplex” or “antennas”? The domain is unfamiliar to me, but I suspected it should be “diplex-matched” and a web search confirmed that hunch.
Omit needless words. The idea of faster workflow appears in the original first paragraph as “new efficiencies aimed at streamlining antenna design workflows and shortening design cycles.” That’s a long, complicated, yet vague way of saying “enables designers to work faster.”
- McK Insights: Why digital trust truly matters, and what it means for your bottom line Dr. Carsten Stöcker
The results of our survey of more than 1,300 business leaders and 3,000 consumers globally suggest that establishing trust in products and experiences that leverage AI, digital technologies, and data not only meets consumer expectations but also could promote growth.
- Instagram “slide show” about SSI Market Potential mehdicherifm
GROWTH
- New revenue growth
- New revenue streams
- Turn regulation in to revenues
- More customer reach
- More efficient operations
An Interactive workshop designed to uncover the winning strategies, and pitfalls to avoid, when communicating decentralized identity to customers, internal stakeholders, and the world.
Enterprise
-
Decentralized identity: The key to the digital era?
They quote Forrester “Today’s digital identity frameworks are centralized, suffer from a lack of trust, aren’t portable, and don’t give consumers control.”
They touch on a new acronym saying : enterprise-level thinking around next-generation authentication is focused on initiatives such as SPIFFE, the Secure Production Identity Framework For Everyone
-
Ontology Officially a Technical Provider for Enterprise Solutions through Cointelegraph Consulting
Cointelegraph has quietly established itself as a legitimate mediator between established enterprises and blockchain technology providers.
Funding
NSF is introducing a new program called "Pathways to Enable Open-Source Ecosystems" (POSE). The purpose of the program is to harness the power of open-source development for the creation of new technology solutions to problems of national and societal importance. Many NSF-funded research projects result in publicly accessible, modifiable, and distributable open-sourced software, hardware or data platforms that catalyze further innovation.