Search
Subscribe

Bookmark and Share

About this Blog

As enterprise supply chains and consumer demand chains have beome globalized, they continue to inefficiently share information “one-up/one-down”. Profound "bullwhip effects" in the chains cause managers to scramble with inventory shortages and consumers attempting to understand product recalls, especially food safety recalls. Add to this the increasing usage of personal mobile devices by managers and consumers seeking real-time information about products, materials and ingredient sources. The popularity of mobile devices with consumers is inexorably tugging at enterprise IT departments to shifting to apps and services. But both consumer and enterprise data is a proprietary asset that must be selectively shared to be efficiently shared.

About Steve Holcombe

Unless otherwise noted, all content on this company blog site is authored by Steve Holcombe as President & CEO of Pardalis, Inc. More profile information: View Steve Holcombe's profile on LinkedIn

Follow @WholeChainCom™ at each of its online locations:

Entries in Social Networking (21)

Thursday
May202010

Internet Identity Workshop 10 - Favorite Tweets

I unfortunately wasn't able to attend IIW 10 but did some retweeting. Here they are in chronological order -

  • RT @marcedavis learned that #infocards support LOA2 and LOA3 ("Level Of Assurance") and #OpenID does not. #iiw @ http://twb.cc/s/712 2:09 PM May 17th via tweebus
  • RT @nobantu IIW 10 - is 3 days of Open Space in the Techie Community - specifically On Line Identity - been happening for 5 yrs now #openspace #iiw 2:19 PM May 17th via web
  • RT @xmlgrrl One refreshing thing about #IIW vs other conferences: the f'in salty language. 2:57 PM May 17th via Twitter for iPhone
  • RT @mjsoaps I don't know what's more important, Identity or Reputation #IIW 7:03 PM May 17th via web
  • RT @idworkshop Day 2 of #iiw is going to be AMAZING! Here is the twitter list of attendees http://twitter.com/idworkshop/iiw10 9:37 AM May 18th via web
  • RT @xmlgrrl Once again finding myself recommending Chris Palmer's EXCELLENT talk on fixing HTTPS. Trust On First Use (TOFU)! http://is.gd/ceSc8 #iiw 12:26 PM May 18th via Twitter for iPhone
  • RT @IdentityWoman INTRO to Internet Identity Workshop 10 now up online. http://slidesha.re/cGQ3AR #iiw please retweat 5:20 PM May 18th via web
  • RT @gffletch OH "Every distributed system begets a centralized system created to make the distributed system useful" (or something like that) #iiw 7:13 PM May 18th via Twitter for iPhone
  • RT @paulmadsen Put 20 non-techies in a room and its only matter of time before somebody says 'its not a technical problem'. You never hear reverse #iiw [May 19th] via Twee
  • RT @xmlgrrl Rights and obligations of membership are nontechnical but tech may enable them (e.g. can you "unsay" something in a thread?) #iiw [May 19th] via Twitter for iPhone
  • RT @xmlgrrl =JeffH suggests looking at "operational transformation" work to solve the tech problems here. http://is.gd/cgoN5 #iiw [May 10th] via Twitter for iPhone
  • RT @rolfvb Thankyou Kaliya, thankyou #iiw - just fantastic! These seeds will lead to wonderful fruit. /cc @IdentityWoman #identity #data #privacy [May 19th] via Twitter for iPhone

I highlighted, above, the introductory presentation by Kaliya Hamlin to the workshop. Well worth a look.

For my take on IIW9 held last November, take a look at Data Identity & Supply Chains in this blog.

And for even more comments and discussion about the IIW and the "identity movement", check out the Data Ownership in the Cloud networking group on LI.

Wednesday
Apr282010

Top 12 Discussions - Data Ownership in the Cloud

Over the first 12 months of the Data Ownership in the Cloud group on LinkedIn, the following are the top 12 discussions as rated in descending order by the number of comments:

“Give Me My Data Back!” or “I want to SEE My SELF, so give me my data back, please.”
Posted by John Brian Hennessy, Entrepreneur, Start-up & Early Stage Management Consultant
54 comments

Why does data ownership matter to you?
Posted by Steve Holcombe, CEO at Pardalis Inc.
20 comments

Project VRM
Posted by Steve Holcombe, CEO at Pardalis Inc.
16 comments

The about tag is immutable
Posted by Steve Holcombe, CEO at Pardalis Inc.
13 comments

What are the security issues regarding cloud computing?
Posted by John Mooney, Information Technology and Security Solution Sales Specialist
12 comments

9th Internet Identity Workshop - Nov 3-5 - Mountain View, CA
Posted by Steve Holcombe, CEO at Pardalis Inc.
11 comments 

Firebombs & sacred cows...
Posted by Joe Andrieu, President, SwitchBook
11 comments 

Google in China - What is Going On?
Posted by Al Macintyre, Volunteer Consultant at Haiti Earthquake Disaster Relief & News
11 comments

Why Not One Big Database?
Posted by Steve Holcombe, CEO at Pardalis Inc.
10 comments

Will the next 'Google' be a traceability portal?
Posted by Steve Holcombe, CEO at Pardalis Inc.
9 comments

Is it the methods or the targets that make a hacker unethical?
From Anthony M. Freed, Director of Business Development, Managing Editor at Infosec Island Network
8 comments

Who owns supply chain visibility data?
Posted by Dirk Rodgers, Sr. Consultant, Serialization & Pedigree at Cardinal Health
7 comments

Thank you Brian, John, Joe, Al, Anthony and Dirk for posting very relevant and interesting discussions, indeed!

Sunday
Dec072008

Jon Udell: Wiring the web (redux)

The following is a very interesting blog from Jon Udell on December 4th:

Effective social information management is quite severely constrained by the fact that regular folks are not (yet) taught the basics of computational thinking ....

For example, when I explain my community calendar project to prospective contributors, they invariably assume that I’m asking them to enter their data into my database. It’s quite hard to convey: that the site isn’t a database of events, only a coordinator of event feeds; that I’m only asking them to create feeds and give me pointers to their feeds; that this arrangement empowers them to control their information and materialize it in contexts other than the one I’m creating.

That said, I’m finding that once I can get people to walk through one of these experiences, and see the connection — OK, I do this over here, and that happens over there, and it can also happen somewhere else, and I’m in control — the light bulb does go on ....

For the complete blogged entry, go to Wiring the web (redux).

Saturday
Dec062008

Economist: Socialising all over the web?

The following excerpt was published on December 4, 2008 in The Economist:

A new button is appearing on some websites. It says “Facebook Connect” and saves visitors from having to fill out yet another tedious registration form, upload another profile picture and memorise another username and password. Instead, visitors can now sign into other sites using their existing identity on Facebook, the world’s biggest online social network. After a soft launch this summer, Facebook Connect was due to make its formal debut on December 4th ....

The big new idea, says Dave Morin, a Facebook Connect manager, is “dynamic privacy”. It means that, as the social network reaches out across the wider web, users will in theory take their privacy settings with them. Wherever on the web they are, they will be able to choose who among their friends will and won’t see what they are up to. As soon as a user demotes a “friend” from intimate to arm’s-length in his Facebook settings, this will also take effect on other sites.

For the full article, go to Socialising all over the Web?

Thursday
Sep112008

.Tel: Telnic's DNS Virtual Calling Card System

I came across Telnic courtesy of a posting on September 8, 2008 by Jon Udell entitled Annotating DNS with personal information. Thanks, Jon.

Telnic, a UK-based company, is a sponsored top-level domain (sTLD) that, ipso facto, has been authorized by the Internet Corporation for Assigned Names and Numbers (ICANN), which operates the Internet Assigned Numbers Authority (IANA) and is in charge of maintaining the DNS root zone.

Overall, IANA currently distinguishes the following groups of top-level domains:

The term sponsored top-level domain is derived from the fact that these domains are based on theme concepts proposed by private agencies or organizations that establish and enforce rules restricting the eligibility of registrants to use the TLD.

As quoted from the New sTLD RFP Application filed by Telnic in 2004 with ICANN:

The .Tel is a text-based naming and navigation sTLD that addresses the unique needs of the fixed-line and wireless Internet-Communications namespace. This namespace covers any form of intercommunications activity (voice, combined voice/data, or messaging) between individuals and/or businesses, which is dependent, in part or whole, on the Internet as the means of transport .... Digits are to be restricted to maintain the integrity of a letters/words based top-level domain and to avoid interference with established or future national and international telephone numbering plans .... This new sTLD will be ... a vehicle that will allow and encourage individuals and corporations to manage a universal identity in this namespace.
Telnic's raison d'etre is to provide a universal communication identifier. From application filed with ICANN:

End users are finding it increasingly difficult to remember and manage their own and other people's communication identifiers, including:
  • home telephone numbers
  • mobile telephone numbers
  • home fax numbers
  • personal email addresses
  • pager numbers
  • work telephone numbers
  • work telephone extension numbers
  • work email addresses
  • work fax numbers
  • instant messaging addresses
  • and other contact information
Hence, there is a need for a universal text based communication identifier under which the end user can store all their contact information.
How would .Tel be used by individuals? The following excerpt is also from the ICANN application, or you can just watch the nifty promotional movie clip, .Tel for Individuals (3m 23s).

Individuals could use their name as a personal "brand" or a universal identity accessible from any Internet-enabled communications device to publish their contact information or other personal data. For example, Adam Smith could develop a personal mini-website that provides general information about himself including his contact information, such as phone numbers, and email addresses. Adam would be able to update and manage this data at will, and Adam's friends, when trying to reach him, could simply check adamsmith.tel to find his most current contact information and connect the call or send a text message.
How would .Tel be used by businesses? Again, the following excerpt is also from the ICANN application, or you can just watch the equally jazzy promotional movie clip, .Tel for Businesses (4m 10s).

The business market has different needs than the individual market. Businesses are primarily concerned with customer acquisition and retention, ease of client communication, and efficiency of customer management. The .Tel domain has been conceived to meet each of these needs fully. Hertz, for example, could purchase hertz.tel and design a simple and clear navigational system for customers accessing the company via Internet-enabled communications devices. Hertz could segment the customer by geographic location and department and then route the customer to the appropriate call center, which enhances the customer experience and provides the most efficient and cost effective solution for Hertz.
There's another promotional movie clip posted by Telnic entitled How Do I protect My Data (1m 42s) that I found worth viewing, too. Actually, all of the several promotional movie clips at Telnic are entertaining, jazzy and informative.

The intellectual property behind .Tel is found in Communication System (US Pending Patent 20080133471) which was filed under PCT procedures by inventors John Burgess et al. in Great Britain on 1 April 2003, and in the U.S. on 1 April 2004. It is represented as being assigned to Telnic Limited. The following is a key drawing and a related excerpt from the pending patent.

[Original image modified for size and/or readability]FIG. 1 shows a schematic depiction of a system 100 according to the present invention. The system 100 comprises a user 10, a registered user 20, a registrar 30, a registry 40, a search engine 50, a name service provider (NSP) 60, a name navigation service provider (NNSP) 70, an NSP database 80 and an NNSP database 90. It will be readily appreciated that the system will operate with a plurality of both users 10 and registered users 20 but for the sake of simplicity the following discussion will be limited to a single user and registered user. The system enables a user 10, which comprises a mobile communications device (such as a mobile telephone, or wireless-enabled PDA or similar device) to obtain details regarding a registered user that has been registered with the system. Such details may comprise contact data (telephone number(s), fax number, email and/or instant messaging address, etc.) data related to content (internet address(es) for accessing or downloading multimedia resources, e-commerce or m-commerce sites, etc.). It will be understood that many different types of data may be provided. The system has a number of similarities with the existing domain name server (DNS) system. A DNS will receive a request containing an alphanumeric address and will return the IP address associated with that alphanumeric address to a client application so that a communication session may be initiated, using, for example, the ftp or http protocols. In the present invention, a database query will be run in response to a request from a client application (this is similar to a DNS look-up) and an address is returned to the client application which can be used to access the desired data. This similarity enables DNS infrastructure to be used in the implementation of the present invention.
What Telnic is doing is highly innovative from a marketing standpoint. Especially when you consider the hoops they have no doubt had to jump through in getting approval from the bureaucratic body of personalities, standards and procedures that is ICANN. I applaud them for hanging in there and bringing this service to the marketplace.

But it's little difficult to understand how Telnic's patent is innovative from the standpoint of its intellectual property (IP). The strength of what Telnic is doing is strongly tied to mimicking the DNS system, which, again, no doubt served Telnic well in receiving approval from ICANN. Moreover, in the excerpt above the inventors admit that "[t]he system has a number of similarities with the existing domain name server (DNS) system." Further evidence of this lack of IP innovativeness may be surmised from the status of Telnic's EU patent application which was withdrawn in 2007 because "[the] reply to [an] examination report [was] not received in time". That commonly means that the applicant didn't think it was worth pursuing - for whatever reason - and so abandoned the application. See the history to Communication System (Publication No. EP1609292).

To place all of the above in a broader perspective, while Telnic has taken the text-based, DNS approach to a virtual calling card system, Microsoft has taken a perhaps more object-oriented approach outside of ICANN's DNS jurisdiction for achieving a similar end with its "server-based card exchange". You can see this in comparing Telnic's IP with the summary of Microsoft's IP that I previously blogged in US Patent 7,149,977: Virtual calling card system and method. Wouldn't a mashup between the two (i.e., a web application hybrid) be interesting to see?