Welcome!

Containers Expo Blog Authors: Zakia Bouachraoui, Elizabeth White, Mehdi Daoudi, Liz McMillan, Pat Romanski

Blog Feed Post

SMAC, Code Halos and the Good, Bad and Ugly of Tracking Data

As a SMAC (social, mobile, analytics and cloud) Analyst, I spend my days researching, writing and presenting ideas to companies and audiences.  One of the most important subjects these days is how to develop and implement the best possible information logistics systems.  That means utilizing and processing collected data in the most advantageous and efficient manner possible to further the ambitions of the business.  That goal is perfectly understandable for a business - collecting business data and transactional data is expected, but when it is your personal data (Code Halos) that is being collected we often feel differently.  For example, I love having my TripIt, Marriott and Delta mobile apps know about me, my preferences and my past, present and future travels, but I don't want that information shared with other vendors (or home burglars) without my permission.

In this article, my colleague Ben Pring, Co-Director of the Center for the Future of Work at Cognizant is kind enough to address the good and bad of having your data (Code Halos) aggregated and tracked online.  I have included two embedded videos - first, a video interview that I filmed with Paul Roehrig and Ben Pring on the concepts of Code Halos, and a second far more professional clip on the role of Code Halos in our everyday life.
***
The response to our articles around Code Halo-thinking is overwhelmingly positive.   I and my co-authors, Malcolm Frank and Paul Roehrig, have spoken at dozens of client and industry events and engaged in numerous post-presentation discussions with a wide array of  senior IT and business leaders who when presented with  the Code Halo idea and follow us through our Crossroads Model tell us of  the opportunities Code Halo-thinking offers (including the risks of “extinction events”) are very real in their industry or market.  For  example, the narrative resonated with a major soft drink manufacturer that saw a new way to think about the social network around its soft drink; with an international airline which is beginning to socialize and internalize the new metaphor of a Code Halo to rethink how it moves customers from point A to point B; and with a leading financial services institution that admitted it was  only too aware of the “ionization” happening all around it as new ideas from start-ups begin to change the competitive dynamics the company faces.

Video Link: http://youtu.be/ctycYs18dyk


The second major reaction though – which may or may not surprise you, if you’ve read any of the previous pieces here, is that many people immediately internalize the Code Halo story and find “the dark side of the Halo.” Rather than focusing on the positive transformational commercial opportunities Code Halos  present, they land on the dystopian, Orwellian world of constant surveillance by Big (and little) Brother that Messer’s Assange, Manning and Snowden have brought to the fore in recent weeks, months and years.

Typically we hear a torrent of worst-case scenarios. “I don’t want to share my information with retailer x”, “I don’t want the government to have even more information on me that they do already”, “this is just going to make hackers’ lives easier”, “I get bombarded by enough advertising already; this is just going to make it even worse”, “I don’t want to live in 1984”, “I am not a number”, “how can I control who knows things about me”, “this is the final nail in the coffin of privacy”, “these ideas will never take off.”

The prism that people have is perfectly understandable.  Their concerns and fears are, of course, entirely valid and understandable. We share many of them. As digital immigrants ourselves we are at times as dazed and confused as any set of middle aged men by the emergent and volatile social mores of the new world and have to fight back the temptation to wallow in nostalgic revelries of how “this wasn’t the way we used to do it back in the day/old country.”

The grand experiment that we are all engaged in – creating a world of unprecedented hyper-connectivity of time, space, and culture - which the Code Halo phenomena is supercharging, is, by its very nature, unknowable and logically contains good things and bad.  Lots of good things are going to happen in a world of Code Halos, as are lots of bad things.

In short, we have no intention to deny that bad things will happen as a result of code meeting code. We fully expect they will. There is a very real dark side of the halo. All of the worst-case scenarios with which we are presented will happen, and are happening now.  People will get hacked. Government intrusion will grow. Advertisers will create new ways to embed advertising into every nook and cranny of our lives through every IP addressable form factor we use. Privacy will recede. The nefarious will have new opportunities to hurt us. Many innovations enabled by Code Halos will have unexpected consequences which will compound over time to produce unanticipated negative outcomes.  And yet we firmly believe these fears, concerns and objections are overblown, irrelevant or moot. Every objection is entirely the same objection that people raised as Al Gore’s Information Superhighway was entering the public consciousness in the middle of the 1990s; “I’ll never put my credit details onto the web,” Average Joe said in 1996; now Joe is routinely spending thousands of dollars online.

The Internet has been a crime scene in the last 20 years -- repeatedly. And it still is. And it always will be. But, today the Internet has 634 million websites and 2.4 billion users, according to uptime monitoring company, Royal Pingdom, and is here to stay. Nobody is going to un-invent it.
In 2013 so much of our lives are already online – shared, visible, transparent, open, all proffered voluntarily through Facebook, Twitter, Instagram, Tumblr, et al, or less voluntarily via our credit score, phone records, movements, and key strokes that the government can impound without warrant -- that privacy is already an illusion, hackers already hack, advertisers can already advertise within our email, pharmacies already send our 16-year-old daughters coupons for diapers when neither they nor we knew they were pregnant; we are numbers, we are code.

The world that we are describing is already here. The Code Halo era is not imminent. It is now.
Just as the upside of the Internet has won over the downside we believe the upside of a Code Halo world will win over its downsides. The “give to get” ratio of the Code Halo world will be so positive that, in the same way that the cost and convenience of Internet era 1.0 triumphed over its doubters, the new Internet era of Code Halos will similarly see it detractor’s voices diminish and disappear.  

And one last thought; the ultimate value of Code Halos will originate out of the openness of data that is shared and this, of course, will mandate good behavior and accountability.  Just as lousy service that once went unpunished is now broadcast on social media with sometimes devastating impact, individuals or corporations that misuse or exploit information exchanged via Code Halos will struggle to enrich and inflate their Code Halo and to generate commercially material sparks. Bad Code Halo behavior will exist in a world of instant high visibility and will push some towards their extinction event. 

Thoughts?  



For more information on these concepts please visit www.unevenlydistributed.com.

*************************************************************
Kevin Benedict, Head Analyst for Social, Mobile, Analytics and Cloud (SMAC) Cognizant
View Linkedin Profile
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and SMAC analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict serves as the Senior Vice President, Solutions Strategy, at Regalix, a Silicon Valley based company, focused on bringing the best strategies, digital technologies, processes and people together to deliver improved customer experiences, journeys and success through the combination of intelligent solutions, analytics, automation and services. He is a popular writer, speaker and futurist, and in the past 8 years he has taught workshops for large enterprises and government agencies in 18 different countries. He has over 32 years of experience working with strategic enterprise IT solutions and business processes, and he is also a veteran executive working with both solution and services companies. He has written dozens of technology and strategy reports, over a thousand articles, interviewed hundreds of technology experts, and produced videos on the future of digital technologies and their impact on industries.

IoT & Smart Cities Stories
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...