Tag: IIoT

  • Identity of Things: verifiable credentials are safer for IoT systems

    Identity of Things: verifiable credentials are safer for IoT systems

    Paper: “Capabilities-based access control for IoT devices using Verifiable Credentials”

  • IDoT Tempos: Cadence, Lifecycles, and the Long Now

    IDoT Tempos: Cadence, Lifecycles, and the Long Now

    So, a few notes on the rising tempo gaps between things, makers, humans, & flocks: 1. Devices can be in service for decades. Buildings. Tractors. Prostheses. Solar panels. Devices are often not supported through their whole lives, as their makers a. retire them as products or b. close as an enterprise, abandoning the devices. 2.…

  • “We need to talk…” UX for Identity of Things conversations

    ▶⏸⏯⏭⏪⏹⏺⏮⏩◀ Play, Pause, Step Back, Jump Ahead. Our iconography for linear navigation was lifted from olde technology, the VCR, which borrowed it from audio cassette players like the Sony Walkman that recycled commands from larger reel to reel audio tape machines. We need a new iconography for identity interaction. Which interactions? What are the identity…

  • Quick and Dirty Maturity Modeling

    Quick and Dirty Maturity Modeling

    Would you like to be better? To be great with your Identity of Things? Wider Team talked with experts and friends about this for the last year. We grouped kinds of competencies and capabilities. And we’ve even seen some “walk before you run” dependencies. So, maturity models, right?   Specifics about our model are another post.…

  • #ResistIoT: IoT as a medium for surveillance

    The internet of things is the most human of digital identity technologies. Unlike cloud technologies, we touch, hear, smell, and see things. They are real like kittens and roads. Damian Glover wrote yesterday about institutional blockers to IoT. Our interviews revealed personal resistance to IoT adoption, too. Cultural blockers of IoT are classic fears in…

  • Dark Things

    Things you own or use that can’t talk using your current identity layer. They are dark to you the way dark matter is massive but invisible. You might notice them, but indirectly. We were talking identity debt. Our interviewees talked-around dark things. Gear that can’t identify themselves or your other systems well enough to be…

  • By 2025, the vendor risk crisis explodes #SocialGraphOfThings

    By 2025, the vendor risk crisis explodes #SocialGraphOfThings

    What if we checked each of our vendors? And their vendors? And their vendors? And their vendors? And their… WiderPoV: Vendor security screening is rare in industry. Only the largest of institutions have the will, clout, and resources to force vendors to vet. So, three responses to this crisis. 1. Join an ecosystem (or make…

  • In 2021, gov defensive infosec spending doubles

    In 2021, gov defensive infosec spending doubles

    2021 will have as many or more disasters as 2020. Even more cyber crime, terror, and war. Defensive cyber spending by government agencies has been a tiny fraction of offensive spending, by headcount. Dramatic events can and will change this. WiderPoV: Massive public sector hiring in prevention, intervention, and recovery will pull talent from an…

  • In 2021, biopharma and medical supply chains up their #IoT identity ecosystems

    In 2021, biopharma and medical supply chains up their #IoT identity ecosystems

    Supply chains always get short shrift. In 2020 they got attacked. The immune response? Newer identity and security models and tools. For example, Trust over IP federates governance. More visibility, live tracking, deeper tracing. WiderPoV: Supply chain identity feels like known territory, with proven tools nicely deployed giving adequate results. But expectations soared in 2020. Do…

  • In 2021, more #edge #AI in pharma, healthcare

    In 2021, more #edge #AI in pharma, healthcare

    Most AI is cloud deployed, like most software. But academia and industry are pulling pattern recognition and other ML behavior into clinical devices, and into the EdgeOps services that care for and authenticate them. Read more about TinyML, machine learning for devices with little memory, power, storage, or connectivity. WiderPoV: “With great power comes great responsibility.” Trusting…

  • In 2021, half of new #medtech devices will ship with #5G

    In 2021, half of new #medtech devices will ship with #5G

    We’re pulling that 50 percent number out of the air. But we won’t be surprised if the number is higher. The chipsets are available and increasingly cheap, the code is more reliable and tested, and the call for making devices more multisensory and multipurpose deepens. P.S. #techmed vs. #medtech? “Medtech” wins on twitter and linkedin.…

  • In 2021, big tech companies slow their #ehealth projects

    In 2021, big tech companies slow their #ehealth projects

    Across Europe and North America, governments are holding big “tech” companies accountable for… well, everything. With more sworn testimony, public interest data analysis, streamed hearings, stronger rules and restrictive laws, expect the rise of defensive thinking among the FAANG behemoths. Healthcare, somewhat regulated, may be thought of as dangerous territory, causing their e-health initiatives to…

Blog at WordPress.com.