Tag: IDoT
-
SSI standards can counter electronics counterfeiting
Wider Team’s Damian Glover and Lubna Dajani will join our friend Michael Ford of Aegis Software at the SMTA Europe Counterfeit Electronics and Materials Symposium in Coventry 14-15 March 2023. This Wednesday before lunch will tell how Self-Sovereign Identity’s Decentralized Identifiers and Verifiable Credentials (SSI’s DIDs and VCs) can let electronics manufacturers overcome their standards…
-
Identity of Things: verifiable credentials are safer for IoT systems
Paper: “Capabilities-based access control for IoT devices using Verifiable Credentials”
-
Juicy Telemetry
For good and bad reasons, the makers of wind turbines and cars and ship engines and weather sensors choose to hide data.
-
Pervasive Identity
Adam named all the animal species, according to some readings, about 5782 years ago. And the great David Kearns wrote about pervasive and ubiquitous identity back in 2013. Nine years later the explosive growth of ubicomp continues to spew sensing, thought, controls and talk into our buildings, cars, homes, medical devices, energy grids, and everything…
-
Identity of Things Grand Challenges
Wider Team helps our clients confront IoT grand challenges (our view based on field work). You know you’re challenged when… Grand Challenge Wider Brings: Your own IoT is becoming overwhelming. Your fleet is growing faster than you can know all the parties that make it work, touch your data, or threaten its integrity. Self knowledge…
-
IDoT Tempos: Cadence, Lifecycles, and the Long Now
So, a few notes on the rising tempo gaps between things, makers, humans, & flocks: 1. Devices can be in service for decades. Buildings. Tractors. Prostheses. Solar panels. Devices are often not supported through their whole lives, as their makers a. retire them as products or b. close as an enterprise, abandoning the devices. 2.…
-
Six months goes fast: December’s Predictions
End-of-year predictions are fun. But the last six months were as surprising as the six before. How did we do?
-
“We need to talk…” UX for Identity of Things conversations
▶⏸⏯⏭⏪⏹⏺⏮⏩◀ Play, Pause, Step Back, Jump Ahead. Our iconography for linear navigation was lifted from olde technology, the VCR, which borrowed it from audio cassette players like the Sony Walkman that recycled commands from larger reel to reel audio tape machines. We need a new iconography for identity interaction. Which interactions? What are the identity…
-
Wider’s High Assurance Digital Identity Maturity Model
High Assurance Digital Identity for #IoT (and #IoMT) doesn’t just happen. You have to build distinctive competence within your enterprise and without. This is our first draft.
-
High Assurance Digital Identity in Healthcare
We know we need High Assurance Digital Identity. But we don’t know what this is, exactly. However, to realize the full potential of Internet of Things (IoT) investment we must approach the Identity of Things (IDoT) differently than what we are accustomed to for the identity of persons. We believe the true value of IoT…
-
Quick and Dirty Maturity Modeling
Would you like to be better? To be great with your Identity of Things? Wider Team talked with experts and friends about this for the last year. We grouped kinds of competencies and capabilities. And we’ve even seen some “walk before you run” dependencies. So, maturity models, right? Specifics about our model are another post.…