decentralized-id.github.io/unsorted/topics/business.md
⧉ infominer 16f4771eac sort
2023-06-20 20:52:13 +05:30

26 KiB
Raw Blame History

published
false

Business

Key findings from the report are:

  • Users sacrifice privacy and security for access to valued services
  • Smartphone users begin to sense improvement in the mobile environment
  • More and more users take protective steps, but remain exposed to harm
  • Protective actions do not necessarily drive confidence
  • Cost, knowledge and perceived complexity are key barriers
  • Transparency and control are key values for users

The decentralized workforce is also fueling demand for self-sovereign identity, Dahl says. "When you physically decentralize your workforce in society, the need for identity becomes more important." She says increasing concerns about protecting privacy are "pushing organizations to consider identity solutions that don't involve correlation and don't involve third-party tracking but also provide the security.”

In the second part Im focusing on the business model and go-to-market aspects.

What are some limitations and opportunities for making profitable business in self-sovereign identity?

Simon: worked with Megan Olsen for 6(?) months as intern. Do not have job offer yet. Think this is the future. Hard to get from corporations taking advantage, bring freedom back as it was back in the day. Advise: do some research on your own, educate yourself, do development as much as you can.

Join some communities on the Internet. Be part of an open source and contribute.I will be contributing to open source Indivcio while whiling for job offer.

Simon (Slava) Nazarenko, 1:50:12 PM

please, connect if you want

Patrick Kenyon. Indicio. Mobile development layer. 2 months. Mobile development itself. Wanted to learn a bit more about identity aspect that Ive been working on. To learn better.

Ian Kulp. Not currently working yet. Finished bachelors degree same time last year. After 2 year SDE intensive. 2nd years ML. passionate about all things decentralized. See as evolution of internet. Heavily invested in cryptos pace. Mining. 24 GPU miners going. First IIW. Soaking in as much knowledge as I can. By time … graduate from this software engineering intensive. Hope to enter the workforce ideally with a company or org triny got move the decentralized revolution for

Patrick Kenyon To Everyone

1:51:27 PM

Megan: biggest advice: go in chat and ask for everyones LinkedIn. I applied for a lot of jobs and … heard back. Got job through networking. Then got Patrick hired. I dont remember if I filled out application or not.

Megan: learning different things, even though dont sound important to what you are doing, can be helpful.

Phil: looking through this advice, notes. Is any of it Identity-specific? Or just, this is our community? The rest is just IT and cybersecurity-oriented guidance?

Megan: still extremely new. Only 6 months next week. Think the advise is about the same. #1 thing to remember about identity: there is always going to be news stuff coming up that surprises you. Never would have thought of it that way because its always been the same way for a long time.

PhilWolff: Im a researcher for digital identity in the Internet of Things.

Ive been coming to IIW for about 10(?) years. Everything Megan tells you, do that. But there is a huge leap between world of identity access management - world of well-known well-understood problems, pretty proven toolkit for managing them; and folks like at IIW trying to imagine whats trh proven ne stuff for 5 years down the road, start designing it now. Bleeding edge of digital identity in some respects. Other pockets of the internet where you can find where the innovators are doing stuff. Most 95% of companies in Identity trying to get some enterprise(s) properly connected, wired up. Industry, IAM. Consider as two separate fields. Identity research, science - vs. Identity Operations. Most work in Identity is Identity Operations and Business practice.

customers want convenience and control: they want to choose which authentication method to use whether its MFA or SSO or biometrics. They want a brand experience that resembles a concierge desk: a 24/7 service where no demand is too big. To top it off, they dont want to see any technical glitches

we advocate “machine-readable governance” as an architectural solution.

  • First, machine-readable governance simplifies how decentralized identity works: The user software handles the rules for information flows and authentication, which are established and published by the entities with authority for governing the use case.
  • Second, this architecture makes these rules transparent.
  • Third, and critically, it enables these rules to function offline through caching, which, when you think about it, is an essential feature in any digital identity verification system; trust cant be dependent on a Wi-Fi signal.

Is there something new that open source development methods and values can bring to the economy? How about something old?

Brands need to prepare for fundamental shifts in peoples attitudes and expectations. The implications of these shifts will be profound, as they will force a change in competition, business models, product offerings, and business practices.

  • A Tour Through the OWASP Top 10 Auth0 Market issues that we should make sure SSI addresses

    A quick look at the refreshed OWASP Top 10 to celebrate Cybersecurity Awareness Month

    • Broken access control
    • Cryptographic Failure
    • Injection
    • Insecure Design
    • Security Misconfiguration
    • Outdated Components
    • ID-Auth Failure
    • Software\Data Integrity Failure
    • Logging\Monitoring Failure
    • Server Side Request Forgery
  • Where the Intention Economy Beats the Attention Economy 2021-10-04

Theres an economic theory here: Free customers are more valuable than captive ones—to themselves, to the companies they deal with, and to the marketplace. If thats true, the intention economy will prove it. If not, well stay stuck in the attention economy, where the belief that captive customers are more valuable than free ones prevails.

Wed get the startup founders to figure out the biggest assumptions they were making across user risk (do people want this?), business risk (can this be the center of a viable business?), and feasibility risk (can we build this in a scalable way with the time, team, and resources potentially at our disposal?). And then wed ask them to go out and figure out how to de-risk those assumptions in the real world, usually by talking to experts and asking smart questions.

An ecosystem is a community of living organisms interacting with each other and their physical environment.  When you hear that definition, you might priture a pristine nature landscape, but that definition can also apply to how businesses, individual or organization interact with one and other.  This talk is about natural ecosystem and how we can adapt nature's lessons to our industry ecosystems.

“What is a scalable, cost-efficient, risk-based solution to measure the effectiveness of digital identity proofing to ensure that individuals who remotely (i.e., not in person) present themselves for financial activities are who they claim to be?”

The KuppingerCole Identity Fabric, an indispensable component in modeling future-proof IAM concepts has just been extended and updated in some details. As a framework and guideline describing a modern, future proof and adaptable IAM, it demands and promotes seamless and secure access for every actor to all required resources.

As Mary Lacity and Erran Carmel explore in their whitepaper, “Implementing Self-Sovereign Identity (SSI) for a digital staff passport at UK NHS,” the lessons learned by the NHS may point towards ways of unlocking new business value.

The global market for identity and access management was $9.53 billion USD in 2018 and is expected to reach $24.76 billion USD by the end of 2026, showing a CAGR of 13.2% during the forecast year.

  • New Indicio Executive Workshop Provides Essential Grounding in Digital Identity: The Business and Investors Guide to Self-Sovereign Identity 2021-12-14 Scott Harris

    Participants will walk away with an essential understanding of how SSI works, the pain points it solves for, the risks it mitigates, the use cases currently in deployment, and the opportunities that are created by being able to build Trusted Data Ecosystems (TDEs).

  • Who Controls Your Digital Identity? SAP 2021-02-18

    SSI will have to be integrated with large existing business processes and therefore enterprise systems such as ERPs, HCMs, or SCMs to name a few. If this integration results in SSI being as easy to use as clicking a button or selecting a menu item, it will lead to rapid uptake and acceptance.

  • What Does Self-Sovereign Identity Mean For My Business? Continuum Loop

    • What will happen if I dont jump on this train?
    • What would it mean if I didnt have to own my customers digital identity but establish a deep digital relationship with them instead?
    • Do I have the capacity to learn about this? If not, who do you trust to figure it out both on the business and technical sides.
    • What changes when digital identity becomes a revenue driver and asset for your business? (hint: top and bottom line)
    • Which of my competitors is probably already doing this?
  • Seven Ways Self-Sovereign Identity Can Enable True Digital Transformation: A CODA

    “Self-Sovereign Identity not only presents an opportunity for businesses to build smarter, more secure, and more scalable relationships with customers; but it will enable them to completely rethink how they build trusted digital relationships from the ground up.”

    We expect Digital Transformation to be a more prevalent talking point around digital identity. FOMO can go a long way, to sell SII, for Goverments and Corporations striving to not be left behind in the digital age.

  • Global Identity Market Signals by Indicio

Decentralized Identity has gone international! In this weeks GIMS, well talk about some of the most exciting projects and some of the lessons learned from around the globe.

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Funding

NGI Assure: Closing 8/22

design and engineer reusable building blocks for the Next Generation Internet as part of a complete, strong chain of assurances for all stakeholders regarding the source and integrity of identities, identifiers, data, cyber-physical systems, service components and processes.

ONTOCHAIN: Closing 7/25

a new software ecosystem for trusted, traceable and transparent ontological knowledge management. The specific objective of the ONTOCHAIN Open Call 3 is to complete the missing blocks of the ONTOCHAIN infrastructure, as well as to exploit the ONTOCHAIN infrastructure

Identiverse follow-up

The common law system countries (AU, CA, NZ, UK & US) left the market to work out identity, and the market “decided” that theres no need for IdPs. Let us respect that decision. The market has been trying to tell us for over a decade: IDENTITY IS NOT FOR SALE!

Lets start with what happened to TV.

For decades, all TV signals were “over the air,” and free to be watched by anyone with a TV and an antenna.

Andre talks about what motivated him to start a company, how his best ideas came about, his thoughts about building teams, questions he asks of new hires, the legacy he hopes will endure, and how he fights entropy. Steve also asks Andre about his favorite music and the next concert he is planning to attend.

Its called decentralized identity orchestration and brings with it uniform security controls and functionality to your applications, services, and clouds. And built using open source and open standards, it establishes vendor neutrality, provides superior agility for continuous digital transformation, and propels digital business forward.

The plastic card paradigm has some powerful features which are instructive for the emerging VCs-as-a-service industry.

  • A competitive market of card personalisation bureaus, providing custom production, magnetic stripe encoding, and card distribution and activation, all in commercial bundles which can be purchased by government agencies, banks, professional associations, universities, driver licence bureaus, and so on. On the rear of many plastic cards, the card manufacturer is indicated in fine print. It may well be that the same manufacturer produced your credit cards and government cards.

Lead with key benefits. The release features two: support for diplex-matched antennas and faster workflow. The original headline mentions only the first, I added the second.

Clarify modifiers. A phrase like “diplex matched antennas” is ambiguous. Does “matched” modify “diplex” or “antennas”? The domain is unfamiliar to me, but I suspected it should be “diplex-matched” and a web search confirmed that hunch.

Omit needless words. The idea of faster workflow appears in the original first paragraph as “new efficiencies aimed at streamlining antenna design workflows and shortening design cycles.” Thats a long, complicated, yet vague way of saying “enables designers to work faster.”

The results of our survey of more than 1,300 business leaders and 3,000 consumers globally suggest that establishing trust in products and experiences that leverage AI, digital technologies, and data not only meets consumer expectations but also could promote growth.

GROWTH

  • New revenue growth
  • New revenue streams
  • Turn regulation in to revenues
  • More customer reach
  • More efficient operations

An Interactive workshop designed to uncover the winning strategies, and pitfalls to avoid, when communicating decentralized identity to customers, internal stakeholders, and the world.

Enterprise

  • Decentralized identity: The key to the digital era? 2020-10-28

    They quote ForresterTodays digital identity frameworks are centralized, suffer from a lack of trust, arent portable, and dont give consumers control.

    They touch on a new acronym saying : enterprise-level thinking around next-generation authentication is focused on initiatives such as SPIFFE, the Secure Production Identity Framework For Everyone

  • Ontology Officially a Technical Provider for Enterprise Solutions through Cointelegraph Consulting

    Cointelegraph has quietly established itself as a legitimate mediator between established enterprises and blockchain technology providers.

Funding

NSF is introducing a new program called "Pathways to Enable Open-Source Ecosystems" (POSE).  The purpose of the program is to harness the power of open-source development for the creation of new technology solutions to problems of national and societal importance. Many NSF-funded research projects result in publicly accessible, modifiable, and distributable open-sourced software, hardware or data platforms that catalyze further innovation.