Search
Subscribe

Bookmark and Share

About this Blog

As enterprise supply chains and consumer demand chains have beome globalized, they continue to inefficiently share information “one-up/one-down”. Profound "bullwhip effects" in the chains cause managers to scramble with inventory shortages and consumers attempting to understand product recalls, especially food safety recalls. Add to this the increasing usage of personal mobile devices by managers and consumers seeking real-time information about products, materials and ingredient sources. The popularity of mobile devices with consumers is inexorably tugging at enterprise IT departments to shifting to apps and services. But both consumer and enterprise data is a proprietary asset that must be selectively shared to be efficiently shared.

About Steve Holcombe

Unless otherwise noted, all content on this company blog site is authored by Steve Holcombe as President & CEO of Pardalis, Inc. More profile information: View Steve Holcombe's profile on LinkedIn

Follow @WholeChainCom™ at each of its online locations:

Entries in User-centric (4)

Wednesday
Jul112012

The Tipping Point Has Arrived: Market Incentives for Selective Sharing in Web Communications

By Steve Holcombe (@steve_holcombe) and Clive Boulton (@iC)

A Glimmer of Market Validation for Selective Sharing

In late 2005 Pardalis deployed a multi-tenant, enterprise-class SaaS to a Texas livestock market. The web-connected service provided for the selective sharing of data assets in the U.S. beef livestock supply chain.  Promising revenues were generated from a backdrop of industry incentives being provided for sourced livestock. The industry incentives themselves were driven by the specter of mandatory livestock identification promised by the USDA in the wake of the 2003 "mad cow" case.

At the livestock market thousands of calves were processed over several sessions. Small livestock producers brought their calves into the auction for weekly sales where they were RFID tagged. An affordable fee per calf was charged to the producers which included the cost of a RFID tag. The tags identifiers were automatically captured, a seller code was entered, and affidavit information was also entered as to the country of origin (USA) of each calf. Buyers paid premium prices for the tagged calves over and above untagged calves. The buyers made money over and above the affordable fee per calf.  After each sale, and at the speed of commerce, all seller, buyer and sales information was uploaded into an information tenancy in the SaaS that was controlled by the livestock market. For the first time ever in the industry, the livestock auction selectively authorized access to this information to the buyers via their own individual tenancies in the SaaS.

That any calves were processed at all was not possible without directly addressing the fear of information sharing that was held by both the calf sellers and the livestock market. The calf sellers liked that their respective identities were selectively withheld from the calf buyers. And they liked that a commercial entity they trusted – the livestock market – could stand as a kind of trustee between them and governmental regulators in case an auctioned calf later turned out to be the next ‘mad cow’. In turn the livestock market liked the selectiveness in information sharing because it did not have to share its confidential client list in an “all or nothing” manner to potential competitors on down the supply chain. At that moment in time, the immediate future of selective sharing with the SaaS looked very bright. The selective sharing design deployed by Pardalis in its SaaS fixed data elements at a single location with authorizations controlled by the tenants. Unfortunately, the model could not be continued and scaled at that time to other livestock markets. In 2006 the USDA bowed to political realities and terminated its efforts to introduce national mandatory livestock identification.

And so, too, went the regulatory-driven industry incentives. But … hold that thought.

Talking in Circles: Selective Sharing in Google+

Google+ is now 1 year old. In conjunction with Google, researchers Sanjay Kairam, Michael J. Brzozowski, David Huffaker, and Ed H. Chi have published Talking in Circles: Selective Sharing in Google+, the first empirical study of behavior in a network designed to facilitate selective sharing:

"Online social networks have become indispensable tools for information sharing, but existing ‘all-or-nothing’ models for sharing have made it difficult for users to target information to specific parts of their networks. In this paper, we study Google+, which enables users to selectively share content with specific ‘Circles’ of people. Through a combination of log analysis with surveys and interviews, we investigate how active users organize and select audiences for shared content. We find that these users frequently engaged in selective sharing, creating circles to manage content across particular life facets, ties of varying strength, and interest-based groups. Motivations to share spanned personal and informational reasons, and users frequently weighed ‘limiting’ factors (e.g. privacy, relevance, and social norms) against the desire to reach a large audience. Our work identifies implications for the design of selective sharing mechanisms in social networks."

While selective sharing may be characterized as being available on other networks (e.g. ‘Lists’ on Facebook), Google is sending signals that making the design of selective sharing controls central to the sharing model offers a great opportunity to help users manage their self-presentations to multiple audiences in the multi-tenancies we call online social networks. Or, put more simply, selective sharing multiplies opportunities for online engagement.

For the purposes of this blog post, we adopt Google’s definition of "selective sharing" to mean providing information producers with controls for overcoming both over-sharing and fear of sharing. Furthermore, we agree with Google that that the design of tools for such selective sharing controls must allow users to balance sender and receiver needs, and to adapt these controls to different types of content. So defined, we believe that almost seven years since the Texas livestock market project, a tipping point has been reached that militates in favor of selective sharing from within supply chains and on to consumers. Now, there have been a lot of things happen over the last seven years that bring us to this point (e.g., the rise of social media, CRM in the Cloud, the explosion of mobile technologies, etc.). But the tipping point we are referencing "follows the money", as they say. We believe that the tipping point toward selective sharing is to be found in the incentives provided by affiliate networks like Google Affiliate Networks.

Google Affiliate Networks

Google Affiliate networks provide a means for affiliates to monetize websites. Here’s a recent video presentation by Google, Automating the Use of Google Affiliate Links to Monetize Your Web Site:


Presented by Ali Pasha & Shaun Cox | Published 2 July 2012 | 47m 11s

The Google Affiliate Network provides incentives for affiliates to monetize their websites based upon actual sales conversions instead of indirectly based upon the number of ad clicks. These are web sites (e.g., http://www.savings.com/) where ads are the raison d'etre of the web site. High value consumers are increasingly scouring promotional, comparison, and customer loyalty sites like savings.com for deals and generally more information about products. Compare that with websites where ads are peripheral to other content (e.g., http://www.nytimes.com/) and where ad clicks are measured using Web 2.0 identity and privacy sharing models.

In our opinion the incentives of affiliate networks have huge potential for matching up with an unmet need in the Cloud for all participants - large and small - of enterprise supply chains to selectively monetize their data assets. For example, data assets pertaining to product traceability, source, sustainability, identity, authenticity, process verification and even compliance with human rights laws, among others, are there to be monetized.

Want to avoid buying blood diamonds? Go to a website that promotes human rights and click on a diamond product link that has been approved by that site. Want to purchase only “Made in USA” products? There’s not a chamber of commerce in the U.S. that won’t want to provide a link to their members’ websites who are also affiliates of an incentive network. Etc.

Unfortunately, these data assets are commonly not shared because of the complete lack of tools for selective sharing, and the fear of sharing (or understandable apathy) engendered under “all or nothing” sharing models. As published back in 1993 by the MIT Sloan School in Why Not One Big Database? Ownership Principles for Database Design: "When it is impossible to provide an explicit contract that rewards those who create and maintain data, ‘ownership’ will be the best way to provide incentives." Data ownership matters. And selective sharing – appropriately designed for enterprises – will match data ownership up with available incentives.

Remember that thought we asked you to hold?

In our opinion the Google Affiliate Network is already providing incentives that are a sustainable, market-driven substitute for what turned out to be unsustainable, USDA-driven incentives. We presume that Google is well aware of potential synergies between Google+ and the Google Affiliate Network. We also presume that Google is well aware that "[w]hile business-critical information is often already gathered in integrated information systems, such as ERP, CRM and SCM systems, the integration of these systems itself (as well as the integration with the abundance of other information sources) is still a major challenge."

We know this is a "big idea" but in our opinion the dynamic blending of Google+ and the Google Affiliate Network could over time bring within reach a holy grail in web communications – the cracking of the data silos of enterprise class supply chains for increased sharing with consumers of what to-date has been "off limits" proprietary product information.

A glimpse of the future may be found for example in the adoption of Google+ by Cadbury UK, but the design for selective sharing of Google+ is currently far from what it needs to attract broad enterprise usage. Sharing in Circles brings to mind Eve Maler’s blog post, Venn and the Art of Data Sharing.  That’s really cool for personal sharing (or empowering consumers as is the intent of VRM) but for enterprises Google+ will need to evolve its selective sharing functionalities. Sure, data silos of commercial supply chains are holding personal identities close to their chest (e.g., CRM customer lists) but they’re also walling off product identities with every bit as much zeal, if not more. That creates a different dynamic that, again, typical Web 2.0 "all or nothing" sharing (designed, by the way, around personal identities) does not address.

It should be specially noted, however, that Eve Maler and the User-Managed Access (UMA) group at the Kantara Initiative are providing selective sharing web protocols that place "the emphasis on user visibility into and control over access by others".  And Eve in her capacity at Forrester has more recently provided a wonderful update of her earlier blog post, this one entitled A New Venn of Access Control for the API Economy.

But in our opinion before Google+, UMA or any other companies or groups working on selective sharing can have any reasonable chance of addressing "data ownership" in enterprises and their supply chains, they will need to take a careful look at incorporating fixed data elements at a single location with authorizations. It is in regard to this point that we seek to augment the current status of selective sharing. More about that line of thinking (and activities within the WikiData Project) in our earlier “tipping point” blog post, The Tipping Has Arrived: Trust and Provenance in Web Communications.

What do you think? Share your conclusions and opinions by joining us at @WholeChainCom on LinkedIn at http://tinyurl.com/WholeChainCom.

Friday
Aug052011

A New Way of Looking at Information Sharing in Supply & Demand Chains

The Internet is achieved via layered protocols. Transmitted data, flowing through these layers are enriched with metadata necessary for the correct interpretation of the data presented to users of the Web. Tim Berners-Lee, inventor of the Web says, “The Web was originally conceived as a tool for researchers who trusted one another implicitly …. We have been living with the consequences ever since ….” “[We need] to provide Web users with better ways of determining whether material on a site can be trusted ….”

Our lives have nonetheless become better as a result of Web service providers like Google and Facebook. Consumers are now conditioned to believe that they can – or should be able to - search and find information about anything, anytime. But the service providers dictate their quality of service in a one-way conversation that exploits the advantages of the Web as it exists. What may be considered trustworthy content is limited to that which is dictated by the service providers. The result is that consumers cannot find real-time, trustworthy information about much of anything.

Despite all the work in academic research there is still no industry solution that fully supports the sharing of proprietary supply chain product information between “data silos”. Industry remains in the throes of one-up/one down information sharing when what is needed is real-time “whole chain” interoperability. The Web needs to provide two-way, real-time interoperability in the content provided by information producers. Immutable objects have heretofore been traditionally used to provide more efficient data communications between networked machines, but not between information producers. Now researchers are innovatively coming up with new ways of using immutable objects in interoperable, two-way communications between information content providers.

A New Way of Looking at Information Sharing in Supply & Demand chains

Pardalis’ protocols for immutable informational objects make possible a value chain of two-way, interoperable sharing that makes information more available, trustworthy, and traceable. This, in turn, incentivizes increases in the quality and availability of new information leading to new business models.

Monday
Aug022010

Consortium seeks to holistically address food recalls

The Department of Biosystems and Agricultural Engineering at Oklahoma State University (OSU BAE) is leading a multi-institutional, multi-disciplinary consortium in the preparation of funding applications for two significant coordinated agricultural projects. If successful, up to $25M for 5 years will be provided for each project beginning in 2011 under the USDA’s Agriculture & Food Research Initiative for Food Safety (CFDA Number - 10.310 - AFRI). Other institutions currently involved in this growing consortium include researchers and investigators from Michigan State University, North Dakota State University, University of Arkansas, Texas Tech University and the National Center for Food Protection and Defense, a DHS Center of Excellence. For the purposes of these activities, Pardalis Inc. is embedded within OSU BAE. The applications will be filed in September, 2010. More information can be found on this site at USDA AFRI Stakeholder Solicitations.

The vision of our consortium is to

  • advance technologies for the prevention, detection, and control of foodborne microbes and viruses in agricultural and food products,
  • manage coordinated agricultural projects with direct input from a stakeholder advisory workgroups, and
  • improve upon real-time consumer responses to food safety recalls with innovative sensor, mobile and "whole chain" information traceability technologies.

The members of our consortium have been highly influenced in their thinking by the existing data showing that many consumers do not take appropriate protective actions during a foodborne illness outbreak or food recall. The Centers for Disease Control and Prevention estimates that every year at least 2000 Americans are hospitalized, and about 60 die as a direct result of E. coli infections. A recent study estimated the annual cost of E. coli O157:H7 illnesses to be $405M (in ‘03 dollars), which included $370M for premature deaths, $30M for medical care, and $5M for lost productivity. And that doesn’t include the costs of lost sales from consumers fearful of purchasing tainted meat due to the lack of real-time, reliable information.

Furthermore, 41 percent of U.S. consumers say they have never looked for any recalled product in their home. Conversely, some consumers overreact to the announcement of a foodborne illness outbreak or food recall. In response to the 2006 fresh, bagged spinach recall which followed a multistate outbreak of Escherichia coli O157: H7 infections, 18 percent of consumers said they stopped buying other bagged, fresh produce because of the spinach recall.

We envision the model implementation of a "whole chain" product traceability system (call it a "Food Recall Data Bank") to help solve the serious cry wolf problem experienced by consumers. The Food Recall Data Bank model would place a premium on privacy and loyalty. It would provide granular recall notices to pre-retailers, retailers and consumers. Each would centrally populate their accounts in the Food Recall Data Bank with GTIN or UPC product identifiers of relevance to their operations or consumption habits.

For instance, consumers could opt for retailers to automatically populate their accounts from their actual POS retail purchases. Consumers could additionally populate accounts using mobile image capturing applications (e.g., Microsoft Tag Mobile Barcode app). Supplemented by cross-reference to an Industry GTIN/GLN database, the product identifiers would be associated with company names, time stamps, location and similar metadata. Consumers would also be provided with a one-stop shop for confidentially reporting suspicious food to Recalls.gov.

This consortium is only just getting started. Other funding opportunities are being targeted. Let’s talk if you have a commercial or research interest in:

  • the effects of financial damages suffered by enterprises - directly or indirectly - from food safety recalls,
  • mining and analyzing the real-time data of agricultural product supply chains - including the real-time data of consumers purchasing habits, or
  • the applicability of these issues to non-agricultural product supply chains.
Thursday
May202010

Internet Identity Workshop 10 - Favorite Tweets

I unfortunately wasn't able to attend IIW 10 but did some retweeting. Here they are in chronological order -

  • RT @marcedavis learned that #infocards support LOA2 and LOA3 ("Level Of Assurance") and #OpenID does not. #iiw @ http://twb.cc/s/712 2:09 PM May 17th via tweebus
  • RT @nobantu IIW 10 - is 3 days of Open Space in the Techie Community - specifically On Line Identity - been happening for 5 yrs now #openspace #iiw 2:19 PM May 17th via web
  • RT @xmlgrrl One refreshing thing about #IIW vs other conferences: the f'in salty language. 2:57 PM May 17th via Twitter for iPhone
  • RT @mjsoaps I don't know what's more important, Identity or Reputation #IIW 7:03 PM May 17th via web
  • RT @idworkshop Day 2 of #iiw is going to be AMAZING! Here is the twitter list of attendees http://twitter.com/idworkshop/iiw10 9:37 AM May 18th via web
  • RT @xmlgrrl Once again finding myself recommending Chris Palmer's EXCELLENT talk on fixing HTTPS. Trust On First Use (TOFU)! http://is.gd/ceSc8 #iiw 12:26 PM May 18th via Twitter for iPhone
  • RT @IdentityWoman INTRO to Internet Identity Workshop 10 now up online. http://slidesha.re/cGQ3AR #iiw please retweat 5:20 PM May 18th via web
  • RT @gffletch OH "Every distributed system begets a centralized system created to make the distributed system useful" (or something like that) #iiw 7:13 PM May 18th via Twitter for iPhone
  • RT @paulmadsen Put 20 non-techies in a room and its only matter of time before somebody says 'its not a technical problem'. You never hear reverse #iiw [May 19th] via Twee
  • RT @xmlgrrl Rights and obligations of membership are nontechnical but tech may enable them (e.g. can you "unsay" something in a thread?) #iiw [May 19th] via Twitter for iPhone
  • RT @xmlgrrl =JeffH suggests looking at "operational transformation" work to solve the tech problems here. http://is.gd/cgoN5 #iiw [May 10th] via Twitter for iPhone
  • RT @rolfvb Thankyou Kaliya, thankyou #iiw - just fantastic! These seeds will lead to wonderful fruit. /cc @IdentityWoman #identity #data #privacy [May 19th] via Twitter for iPhone

I highlighted, above, the introductory presentation by Kaliya Hamlin to the workshop. Well worth a look.

For my take on IIW9 held last November, take a look at Data Identity & Supply Chains in this blog.

And for even more comments and discussion about the IIW and the "identity movement", check out the Data Ownership in the Cloud networking group on LI.