Wider Team

  • Recap: User Experience in SSI (IIW UX) July 2021

    I participated in the Internet Identity Workshop‘s first-time UX unconference. About 50 people attended. Folks wanted to work on everything from detailed decentralized identity interaction design, improving adoption, and overcoming expeience barriers. Before the workshop… The event’s prompt: What are the critical questions about UX and SSI you are hoping to discuss with peers at…

  • Smarter IoT and Healthcare

    Smarter IoT and Healthcare

    In our Identiverse 2021 talk, we said AI is making healthcare’s Identity of Things more complex. “Ever smarter devices create gaps between identity capabilities of the latest devices and older ones.” Let’s expand a little. Artificial Intelligence will be a lot more pervasive by 2030. There’s been a lot of work at bringing smarts into…

  • IDoT Tempos: Cadence, Lifecycles, and the Long Now

    IDoT Tempos: Cadence, Lifecycles, and the Long Now

    So, a few notes on the rising tempo gaps between things, makers, humans, & flocks: 1. Devices can be in service for decades. Buildings. Tractors. Prostheses. Solar panels. Devices are often not supported through their whole lives, as their makers a. retire them as products or b. close as an enterprise, abandoning the devices. 2.…

  • Six months goes fast: December’s Predictions

    End-of-year predictions are fun. But the last six months were as surprising as the six before. How did we do?

  • “We need to talk…” UX for Identity of Things conversations

    ▶⏸⏯⏭⏪⏹⏺⏮⏩◀ Play, Pause, Step Back, Jump Ahead. Our iconography for linear navigation was lifted from olde technology, the VCR, which borrowed it from audio cassette players like the Sony Walkman that recycled commands from larger reel to reel audio tape machines. We need a new iconography for identity interaction. Which interactions? What are the identity…

  • Wider’s High Assurance Digital Identity Maturity Model

    Wider’s High Assurance Digital Identity Maturity Model

    High Assurance Digital Identity for #IoT (and #IoMT) doesn’t just happen. You have to build distinctive competence within your enterprise and without. This is our first draft.

  • High Assurance Digital Identity in Healthcare

    High Assurance Digital Identity in Healthcare

    We know we need High Assurance Digital Identity. But we don’t know what this is, exactly. However, to realize the full potential of Internet of Things (IoT) investment we must approach the Identity of Things (IDoT) differently than what we are accustomed to for the identity of persons. We believe the true value of IoT…

  • Quick and Dirty Maturity Modeling

    Quick and Dirty Maturity Modeling

    Would you like to be better? To be great with your Identity of Things? Wider Team talked with experts and friends about this for the last year. We grouped kinds of competencies and capabilities. And we’ve even seen some “walk before you run” dependencies. So, maturity models, right?   Specifics about our model are another post.…

  • 5 explosive takeaways from Wider Team’s first Identiverse talk

    5 explosive takeaways from Wider Team’s first Identiverse talk

    I’m horrible at linkbait blog post titles. Sorry. We’re introducing five big ideas in 20 minutes or so at Identiverse this month. Our talk is called “Identity and the Healthcare IoT Complexity Bomb.” We’re introducing corporate identity pros to the intersection of two other worlds: IoT and Healthcare. You’ll be able to explain: “Maturity in…

  • Wasting your IoT Data?

    HADI (High Assurance Digital Identity) impair the ability of healthcare and pharmaceutical research to: establish provenance of data, secure data handoffs across systems and organizations, tie data to a patient, and orchestrate data from multiple devices in an encounter into a common view.

  • call for comment on NIST draft: Establishing Confidence in IoT Device Security: How do we get there?

    call for comment on NIST draft: Establishing Confidence in IoT Device Security: How do we get there?

    Last week’s NIST cybersecurity white paper came across our desk and we’re reading up. Establishing Confidence in IoT Device Security: How do we get there? The abstract model from Figure 1 is useful for organizing work from the vantage of stakeholders. Aspects: functional, business, human, timing, data, boundaries, composition, lifecycles, and communication. Concerns: safety, privacy,…

  • #ResistIoT: IoT as a medium for surveillance

    The internet of things is the most human of digital identity technologies. Unlike cloud technologies, we touch, hear, smell, and see things. They are real like kittens and roads. Damian Glover wrote yesterday about institutional blockers to IoT. Our interviews revealed personal resistance to IoT adoption, too. Cultural blockers of IoT are classic fears in…

Got any book recommendations?


Blog at WordPress.com.