[Log In] []

Exploring the science and magic of Identity and Access Management
Wednesday, March 4, 2026

Sensor-triggered Personalized Services

Identity
Author: Mark Dixon
Tuesday, September 9, 2008
8:50 pm

Sun Microsystems SunSpot sensor that was demoed sending message via Sun Identity-enabled service delivery architecture.My colleague Louie Pfortmiller showed me a great demo today. The Sun Spot wireless sensor shown on the left of this photo is equipped with an accelerometer and wireless transceiver. In Louie’s demo, shaking the device triggered an event management workflow process in Sun’s Identity-enabled service orchestration architecture to send a personalized SMS message to a cell phone.

A simple demo (and terrible photo), but the concept is rife with possible applications. Suppose the sensor was really a bracelet on your elderly grandmother’s arm. If she fell, you and your chosen medical provider could be automatically notified.

A pedometer/exercise meter could measure and transmit your personal workout detail to your fitness database and allow you to view results on your mobile phone or television screen.

Detected intrusion in your home could alert you and allow you to monitor your house via web cam to your phone.

And these are just a few use cases. Project Destination, an initiative I lead for Sun, is all about providing the infrastructure to deliver highly personalized, context-aware, blended services to online users across the “screens of your life.” When you couple sensor technologies with Identity, personalization and service orchestration techniques, you can get some powerful results.

Technorati Tags: , , , , , , ,

Comments Off on Sensor-triggered Personalized Services . Permalink . Trackback URL
 

Linux and Macintosh Mashup

Family
Author: Mark Dixon
Tuesday, September 9, 2008
8:50 pm

When my colleague Brad Diggs gave an excellent presentation today about server and desktop virtualization, I got a kick out of his Macbook background, honoring the fact that he was running Linux on his Mac. This photo is an excerpt from the background he downloaded from the Tux’n’Tosh website, which itself is an entertaining little piece of work. Tux’n’Tosh was created “as a small gift to all Linux and Mac users.”

Technorati Tags: ,

 

It’s a long ways from the ’57 Chevy

General
Author: Mark Dixon
Monday, September 8, 2008
8:41 pm

According to a Fox News article today, the soon to be announced Chevy Volt sounds pretty exciting: “GM says it will be able to travel 40 miles on electric power alone, but carries a small gasoline engine on board to recharge the batteries on longer trips. The combination of the two power sources gives it an effective efficiency of over 100 miles per gallon.”

It’s a far cry from the ‘57 Chevy with a 4-barrel carb my wife drove in high school!

Technorati Tags: , ,

 

Personalized Differentiation, Depending on You

Identity
Author: Mark Dixon
Sunday, September 7, 2008
8:39 pm

Eve Maler’s latest Venn diagram highlights a crucial characteristic common to the disciplines of Digital Identity Management, Social Networking and VRM – that “differentiated app behavior” depends on “special aspects of you.”

Although Eve mentions personalization only with regards to Digital Identity Management, I propose that the Venn intersection indeed represents personalization for all three disciplines – making the functionality and performance of network applications highly personalized – responsive to and adapted to individual attributes, context, preference and permission.

Technorati Tags: , , , , ,

Comments Off on Personalized Differentiation, Depending on You . Permalink . Trackback URL
 

Hope Amidst Tragedy – via the Blogosphere

Blogging
Author: Mark Dixon
Saturday, September 6, 2008
2:53 pm

Three weeks ago, the crash of a light plane in eastern Arizona instantly changed the lives of a young couple and their four young children, who until recently lived just down the street from us. Still in critical condition in a Phoenix, AZ, hospital burn unit, Christian and Stephanie Nielson have a long road of recovery ahead of them. During that process of recovery, we are connected in an active virtual network of mutual hope and support with their family and friends – through the blogosphere.

An article in the New York Times today explores how Stephanie’s blog, the NieNie Dialogues, had inspired readers around the world before the accident and how cyberspace is uniting many people across the globe in acts of kindness and hope for this young family. Stephanie’s sister’s blog provides a focal point for updates about the condition of Christian and Stephanie, announces of special benefit events, and invites people to contribute to their recovery fund.

It was via the blogosphere we learned of last week’s coordinated effort to launch balloons in a gesture of hope for this young couple.

We invite all of you to join with us in prayers of hope for Stephanie and Christian.

Technorati Tags: ,

 

Back in the day …

General
Author: Mark Dixon
Friday, September 5, 2008
7:18 am

While searching for the photo of our “Murphy’s Law Sofa” I blogged about yesterday, I stumbled across this photo of the first computer I ever built. Back in 1976, while we were sophomores in engineering school at Brigham Young University, Larry Langdon (pictured) and I built a 16 bit computer completely out of TTL logic gates and flip-flops. It wasn’t very elegant, but it ran the specified instruction set just fine and got us “A” grades in the digital electronics lab class.

BYU computer

This was so long ago that bell bottoms and aviator glasses were still in style!

Technorati Tags: ,

 

Accommodating Murphy’s Law

Family
Author: Mark Dixon
Thursday, September 4, 2008
11:02 pm

A recent blog comment exchange with Sun colleague Melanie Gao on The Value of Integration Testing reminded me that not all encounters with Murphy’s Law must turn out badly in the long run. Sometimes, a worst-case scenario can become the best case …

Many years ago when we lived in American Fork, Utah, we ordered a custom sectional sofa for our basement family room. Only when it arrived did we find that it was too big to fit down the stairs and turn the corner into the room!

So, we tore out the offending wall … and liked the look so much we retained the open area we had created to get the couch into the room!

American Fork Couch

This photo of the couch was taken from the place where we removed the wall. I couldn’t find a photo of the cut-out wall itself.

A lot of water has gone under the bridge since this old photo. Three of the kids whose Christmas stockings are shown now celebrate Christmas with little kids of their own!

Technorati Tags:

 

Mediocre Best Practices?

Identity
Author: Mark Dixon
Wednesday, September 3, 2008
2:41 pm

As the Identity Management market matures, the wealth of experience gained from successful implementation and operation of Identity Management systems should progressively yield sets of Best Practices, which outline how to successfully implement and operate these complex systems.

However, our friend Dilbert expresses a different point of view:

You can have Dilbert’s daily wisdom drop into your email box by subscribing at dilbert.com.

Technorati Tags: , , ,

 

Identity Paramount for Mobility

Identity
Author: Mark Dixon
Tuesday, September 2, 2008
11:19 am

As the mobile Internet arrives, Identity becomes paramount, points out Andrew Jaquity, Security Program Manager, Yankee Group, in a compelling article in last Friday’s RCR Wireless News. A few of his statements impressed me:

“As the mobile Internet becomes a reality, it will pull identity issues along with it. Users will take their identities (user names and passwords, personal attributes, location) with them on their phones. Vendors can significantly ease user pain by working together.”

“Mobile operators should add identity management features to give users more control. “

“Security-software vendors should ally themselves with trusted parties, rather than compete with them.”

Technorati Tags: , , ,

Comments Off on Identity Paramount for Mobility . Permalink . Trackback URL
 

Colbert on AT&T

Identity
Author: Mark Dixon
Monday, September 1, 2008
3:01 pm

When I was growing up, AT&T was affectionately (or disparagingly, depending on your point of view) called “Ma Bell.” Over the past several years, it has been interesting to see the court-supervised breakup of Ma Bell into the “Baby Bells”, followed progressively by recombination of several of these entitites, along with some new business units, into the “new” AT&T. Perhaps Stephen Colbert explains it best in this video from http://schomer.vox.com/:

Note 1: Sorry, but this video seems to have disappeared from cyberspace. I’m still looking. Perhaps AT&T didn’t like the publicity! 🙂

Note 2: I found a YouTube link that seems to work. However embedding has been disabled “by request.”

Technorati Tags: , , ,

 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.