[Log In] []

Exploring the science and magic of Identity and Access Management
Wednesday, April 24, 2024

Life Management Platform: APIs for Push and Pull?

Identity
Author: Mark Dixon
Tuesday, July 24, 2012
2:34 pm

In my recent article about Life Management Platforms, I stated in the closing paragraph:

What the Life Management Platform concept really needs to move forward is definition and demonstration of a set of open, secure APIs to implement “informed pull” and “controlled push” information sharing capabilities for real.

Acting on advice from Dave Kearns, I pinged Martin Kuppinger and Craig Burton to find out if anyone was working to specify such API’s.  Craig suggested that I take a look at the Evented-API specification written by Sam Curren and Phil Windley, which calls for event generators and consumers to interoperate in a loosely-coupled fashion.

So, in response to Craig’s suggestion, I prepared the following diagram to illustrate my high level take on how the Evented API concept might work with a Life Management Platform to deliver some real value.

In this use case:

  1. Multiple financial institutions with which I do business (e.g. banks, credit card companies, mortgage companies) could publish financial transactions (either singly or in sets) via event generators.  My employer could publish pay slip information in a similar fashion.
  2. The Life Management Platform could receive this information via appropriately-authorized and secure event consumers.  These would be “Informed Pull” transactions.
  3. The Life Management Platform could in turn publish all or parts of the financial data collected in this manner as “Controlled Push” events which could be consumed by my personal financial management system.
  4. I could then manipulate the data as necessary.  Summary data might be published as an event and consumed by the Life Management system in an “Informed Pull” fashion.
  5. The summarized information or parts thereof could be made available via a “Controlled Push” event to a computer system used by my CPA to prepare my taxes.

What do you think?  Is this a reasonable use case for a Life Management Platform?  Is this the way Evented APIs are suppose to work?  Any ideas or critiques would be most appreciated.

 

Comments Off on Life Management Platform: APIs for Push and Pull? . Permalink . Trackback URL
 

Cloud’s Biggest Risks?

Identity
Author: Mark Dixon
Friday, July 20, 2012
9:14 am

The following excellent infographic produced by AMD Cloud Computing Research shows some interesting statistics about the adoption of cloud computing, based on AMD’s Global Cloud Computing Study.  I was interested to see that while 60% of respondents say they are currently using some form of cloud computing, 63% of respondents specified Security as the biggest risk.

Enjoy!

Cloud Computing

Comments Off on Cloud’s Biggest Risks? . Permalink . Trackback URL
WordPress Tags: ,
 

Experiencing the Best Social Network Ever

Social Media
Author: Mark Dixon
Thursday, July 19, 2012
10:12 pm

Thanks to Bonkers World for capturing in a nutshell the social dynamics I experienced with my colleagues in a week-long training event in Santa Clara, CA:

Thanks to infosecurity.us for passing this along!

Comments Off on Experiencing the Best Social Network Ever . Permalink . Trackback URL
 

The Irony of Old vs. New (relatively speaking)

General
Author: Mark Dixon
Thursday, July 19, 2012
9:46 pm

I couldn’t help but see the irony of the two leading topics in the “Evening Wrap” email I received from the Wall Street Journal this afternoon:

Microsoft Swings to Loss

 

 

Google’s Profit Rises on Growth in Search

 

 

 

 

It hasn’t been too many years ago that Microsoft was the darling.  Now newer companies have emerged to dominate.  What will the next 20 years bring?

Comments Off on The Irony of Old vs. New (relatively speaking) . Permalink . Trackback URL
WordPress Tags: ,
 

Oracle Identity Management 11g R2: Securing the New Digital Experience

Identity
Author: Mark Dixon
Thursday, July 19, 2012
9:15 pm

Today, the 11g R2 version of the Oracle Identity and Access Management platform was formally announced, with the tagline, “Optimized to Secure the New Digital Experience.”

We in the information security organizations of Oracle have been waiting anxiously for this announcement.  This week, the North American Sales and Sales Consulting organizations gathered in Santa Clara, CA, to be training in this exciting new set of products.

There are three major reasons why I believe this announcement is a big step forward for our customers.

First, this release delivers advanced functionality that gives really compelling business reasons for existing Sun Identity Manager customers to migrate to the Oracle Platform. It is no longer an issue of “moving from point A to point A in functionality,” just to get on the Oracle platform before premium support expires for the Sun product.  It means moving to the Oracle platform to leverage really innovative capabilities that will accelerate business value..

Second, this platform brings to reality a dream we were promoting at Sun as part of Project Destination way back before the Oracle acquisition: integrating Identity and SOA technologies to deliver “highly personalized, identity-enabled, blended applications on mobile devices.”  The new Mobile and Social capabilities and Secure API functionality added to the Oracle Access Management platform, provide a fully-integrated platform to deliver such functionality more easily and more securely than ever before.  Back at Sun, many of our customers adopted the vision we espoused, but making it happen was pretty hard work.  Now, the Oracle Access Management platform does all the heavy lifting for us.

Third, this release shows continued, significant progress towards Oracle’s vision of a truly integrated, service-oriented architecture for Identity and Access Management.  No longer is the Oracle suite just a nice collection of acquired products.  From my perspective as an Enterprise Architect, it is great to see the convergence of data models, functionality, administration services and architectural components.  It is the simplification and streamlining of architecture that will ultimately solve the complexity our customers face.

So, it will be great to work with our customers to show how they can leverage this great platform to meet their business needs. Saddle up for a great ride!

Comments Off on Oracle Identity Management 11g R2: Securing the New Digital Experience . Permalink . Trackback URL
WordPress Tags:
 

Life Management Platforms: Informed Pull and Controlled Push

Identity, Privacy
Author: Mark Dixon
Wednesday, July 11, 2012
11:24 am

I have been intrigued by the potential emergence of “Life Management Platforms” as described in the Kuppinger-Cole advisory note, “Life Management Platforms: Control and Privacy for Personal Data.”  The concept that particularly interests me is integration between systems that would allow controlled sharing of information, using principles Martin Kuppinger describes as “informed pull” and “controlled push.”

Life Management Platforms are far more than Personal Data Stores. They not only support a secure store for sensitive personal information. They allow making a better use of that information. The real value lies in the sharing of that information supported by Life Management Platforms. …

These concepts are like two sides of the same coin. Furthermore they are the essence of why Life Management Platforms are far more than just a store of personal data. Storing personal data is just a little piece of the value proposition of Life Management Platforms. And just sharing this information by allowing some parties to access it without further control and without keeping a grip on that data is also not what really makes a Life Management Platform. That would be nothing more than a social network with some better access control capabilities.

The key capability of Life Management Platforms is the ability for exactly the two concepts mentioned. This is about using new types of privacy-aware apps which allow making use of sensitive information in a way that provides value to the owner of that sensitive information.

I can think of dozens of ways this could immediately help me in my life, in addition to the many that Martin included in his report.  For example:

  1. Twice each month, I download an electronic copy of my payslip and manually transcribe key bits of information from that unstructured report into the money management program on my personal computer.  Wouldn’t it be great if I could do an “informed pull” of that information in a way that would automatically transfer selected data from my employer to my money management program, just like I do from my bank and credit card vendors?
  2. Each year, I assemble a bunch of information to give to my accountant to prepare my tax return.  Wouldn’t it be great I could use a “controlled push” of such information from my computer to his?
  3. I recently visited a new dentist.  Wouldn’t it be great if I could have used use a “controlled push” of my profile and medical history to their system, rather than fill out yet another set of paper forms?
  4. We recently had a great time with all of our six children and their families at a family reunion in the White Mountains of Arizona.  Wouldn’t it have been great to post addresses and lodging details once and let each member of the family do an “informed pull” that automatically populated their mobile phone calendars, address books and GPS units?

And the list of possibilities could go on and on.  Many industries could benefit from this concept – healthcare, financial services, travel, hospitality and many more.

I like some of the emerging systems from vendors Martin mentions, but each has its challenges.

As its name suggestions, Personal.com is a useful application for storing personal information.  In its current state, it is kind of like Evernote for structured data – an ability to put personal data into secure “gems” that can have any number of attributes, and have those gems available either on a website or on my mobile phone.  It has the ability to share gems with other personal.com members or with non-members via email (if you dare use that insecure medium).  However, personal.com lacks the structured data exchange between applications that is essential for the use cases I mentioned above.  It even suffers from a disturbing lack of data exchange internally.  For example, if I fill in a business card “gem” with my name and contract information, that data isn’t available to help me fill in somewhat related gems, such as passport, drivers license or social security card gems.

I like the concepts behind connect.me.  Reputation is indeed an important attribute of my identity.  However, I haven’t found a practical use in my life for the service or something like it.  Having a way to use “controlled push” of my reputation to consuming applications may make it more useful.  But I am definitely monitoring their progress, and patiently awaiting their new product launch.

I have enjoyed reading through the QIY website – particularly about their efforts to forge relationships with companies that are interested in working with personal data in an integrated way.  Unfortunately for me, a life-long mono-linquist, I don’t know the enough Dutch words to sign up for the QIY consumer website.

So, it is great to see progress in this area.  What the Life Management Platform concept really needs to move forward is definition and demonstration of a set of open, secure APIs to implement “informed pull” and “controlled push” information sharing capabilities for real.  Then, personal data platforms and related applications that produce and consume structured data while protecting both privacy and personal control could flourish.

Comments Off on Life Management Platforms: Informed Pull and Controlled Push . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.