Category: Glossary

  • Gall’s Law

    “A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system.” — wikipedia. WiderPoV: Gall’s Law is guidance for starting something new.…

  • Juicy Telemetry

    Juicy Telemetry

    For good and bad reasons, the makers of wind turbines and cars and ship engines and weather sensors choose to hide data.

  • Pervasive Identity

    Adam named all the animal species, according to some readings, about 5782 years ago. And the great David Kearns wrote about pervasive and ubiquitous identity back in 2013. Nine years later the explosive growth of ubicomp continues to spew sensing, thought, controls and talk into our buildings, cars, homes, medical devices, energy grids, and everything…

  • Dark Things

    Things you own or use that can’t talk using your current identity layer. They are dark to you the way dark matter is massive but invisible. You might notice them, but indirectly. We were talking identity debt. Our interviewees talked-around dark things. Gear that can’t identify themselves or your other systems well enough to be…

  • composability


    “A highly composable system provides components that can be selected and assembled in various combinations to satisfy specific user requirements.” Wikipedia Imagination is unleashed by Lego’s standardization. Intermodal shipping containers simplified a host of architectural decisions and gave birth to the world of logistics as we know it. Digital identity? Wider’s PoV: Building blocks. High…

  • IDoT Debt

    IDoT Debt

    A subset of Identity Debt, (which is a subset of Technical Debt). Identity of Things (IDoT) Debt is the legacy of IDoT decisions and work you deferred, that linger, haunting you, endangering your ecosystem, your customers, your network, your agility, and your peace of mind. Like any other technical debt, IDoT debt is a sister…

  • High Assurance Digital Identity (HADI)

    High Assurance Digital Identity (HADI)

    First described by Wider’s Michael Shea in 2020, HADI is the ambitious target of a digital Identity of Everything that is trustworthy, resilient, extensible, and long lived. You might debate the design of HADI architectures, services, or governance. But HADI is a call to make digital identity composable, pervasive, powerful, and transformational.

  • Internet of Things (IoT)

    Internet of Things (IoT)

    The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.Wikipedia WiderPoV: Connected stuff, that might include things you wear, carry, or have in your body. Those connections? Where the devices…

Blog at