Welcome!

Agile Computing Authors: Elizabeth White, Liz McMillan, Pat Romanski, Roger Strukhoff, Darren Anstee

Blog Feed Post

SMAC, Code Halos and the Good, Bad and Ugly of Tracking Data

As a SMAC (social, mobile, analytics and cloud) Analyst, I spend my days researching, writing and presenting ideas to companies and audiences.  One of the most important subjects these days is how to develop and implement the best possible information logistics systems.  That means utilizing and processing collected data in the most advantageous and efficient manner possible to further the ambitions of the business.  That goal is perfectly understandable for a business - collecting business data and transactional data is expected, but when it is your personal data (Code Halos) that is being collected we often feel differently.  For example, I love having my TripIt, Marriott and Delta mobile apps know about me, my preferences and my past, present and future travels, but I don't want that information shared with other vendors (or home burglars) without my permission.

In this article, my colleague Ben Pring, Co-Director of the Center for the Future of Work at Cognizant is kind enough to address the good and bad of having your data (Code Halos) aggregated and tracked online.  I have included two embedded videos - first, a video interview that I filmed with Paul Roehrig and Ben Pring on the concepts of Code Halos, and a second far more professional clip on the role of Code Halos in our everyday life.
***
The response to our articles around Code Halo-thinking is overwhelmingly positive.   I and my co-authors, Malcolm Frank and Paul Roehrig, have spoken at dozens of client and industry events and engaged in numerous post-presentation discussions with a wide array of  senior IT and business leaders who when presented with  the Code Halo idea and follow us through our Crossroads Model tell us of  the opportunities Code Halo-thinking offers (including the risks of “extinction events”) are very real in their industry or market.  For  example, the narrative resonated with a major soft drink manufacturer that saw a new way to think about the social network around its soft drink; with an international airline which is beginning to socialize and internalize the new metaphor of a Code Halo to rethink how it moves customers from point A to point B; and with a leading financial services institution that admitted it was  only too aware of the “ionization” happening all around it as new ideas from start-ups begin to change the competitive dynamics the company faces.

Video Link: http://youtu.be/ctycYs18dyk


The second major reaction though – which may or may not surprise you, if you’ve read any of the previous pieces here, is that many people immediately internalize the Code Halo story and find “the dark side of the Halo.” Rather than focusing on the positive transformational commercial opportunities Code Halos  present, they land on the dystopian, Orwellian world of constant surveillance by Big (and little) Brother that Messer’s Assange, Manning and Snowden have brought to the fore in recent weeks, months and years.

Typically we hear a torrent of worst-case scenarios. “I don’t want to share my information with retailer x”, “I don’t want the government to have even more information on me that they do already”, “this is just going to make hackers’ lives easier”, “I get bombarded by enough advertising already; this is just going to make it even worse”, “I don’t want to live in 1984”, “I am not a number”, “how can I control who knows things about me”, “this is the final nail in the coffin of privacy”, “these ideas will never take off.”

The prism that people have is perfectly understandable.  Their concerns and fears are, of course, entirely valid and understandable. We share many of them. As digital immigrants ourselves we are at times as dazed and confused as any set of middle aged men by the emergent and volatile social mores of the new world and have to fight back the temptation to wallow in nostalgic revelries of how “this wasn’t the way we used to do it back in the day/old country.”

The grand experiment that we are all engaged in – creating a world of unprecedented hyper-connectivity of time, space, and culture - which the Code Halo phenomena is supercharging, is, by its very nature, unknowable and logically contains good things and bad.  Lots of good things are going to happen in a world of Code Halos, as are lots of bad things.

In short, we have no intention to deny that bad things will happen as a result of code meeting code. We fully expect they will. There is a very real dark side of the halo. All of the worst-case scenarios with which we are presented will happen, and are happening now.  People will get hacked. Government intrusion will grow. Advertisers will create new ways to embed advertising into every nook and cranny of our lives through every IP addressable form factor we use. Privacy will recede. The nefarious will have new opportunities to hurt us. Many innovations enabled by Code Halos will have unexpected consequences which will compound over time to produce unanticipated negative outcomes.  And yet we firmly believe these fears, concerns and objections are overblown, irrelevant or moot. Every objection is entirely the same objection that people raised as Al Gore’s Information Superhighway was entering the public consciousness in the middle of the 1990s; “I’ll never put my credit details onto the web,” Average Joe said in 1996; now Joe is routinely spending thousands of dollars online.

The Internet has been a crime scene in the last 20 years -- repeatedly. And it still is. And it always will be. But, today the Internet has 634 million websites and 2.4 billion users, according to uptime monitoring company, Royal Pingdom, and is here to stay. Nobody is going to un-invent it.
In 2013 so much of our lives are already online – shared, visible, transparent, open, all proffered voluntarily through Facebook, Twitter, Instagram, Tumblr, et al, or less voluntarily via our credit score, phone records, movements, and key strokes that the government can impound without warrant -- that privacy is already an illusion, hackers already hack, advertisers can already advertise within our email, pharmacies already send our 16-year-old daughters coupons for diapers when neither they nor we knew they were pregnant; we are numbers, we are code.

The world that we are describing is already here. The Code Halo era is not imminent. It is now.
Just as the upside of the Internet has won over the downside we believe the upside of a Code Halo world will win over its downsides. The “give to get” ratio of the Code Halo world will be so positive that, in the same way that the cost and convenience of Internet era 1.0 triumphed over its doubters, the new Internet era of Code Halos will similarly see it detractor’s voices diminish and disappear.  

And one last thought; the ultimate value of Code Halos will originate out of the openness of data that is shared and this, of course, will mandate good behavior and accountability.  Just as lousy service that once went unpunished is now broadcast on social media with sometimes devastating impact, individuals or corporations that misuse or exploit information exchanged via Code Halos will struggle to enrich and inflate their Code Halo and to generate commercially material sparks. Bad Code Halo behavior will exist in a world of instant high visibility and will push some towards their extinction event. 

Thoughts?  



For more information on these concepts please visit www.unevenlydistributed.com.

*************************************************************
Kevin Benedict, Head Analyst for Social, Mobile, Analytics and Cloud (SMAC) Cognizant
View Linkedin Profile
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and SMAC analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict is an opinionated Senior Analyst at Cognizant's Center for the Future of Work, SAP Mentor Alumnus, speaker, writer, and mobile and digital strategies expert. He is a popular keynote speaker, and in the past three years he has shared his insights into mobile and digital strategies with companies in 17 different countries. He has over 30 years of experience working with enterprise applications, and he is a veteran mobile industry executive. He wrote the Forward to SAP Press' bestselling book on enterprise mobility titled Mobilizing Your Enterprise with SAP, and he has written over 3,000 articles.

@ThingsExpo Stories
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.