SYS-CON Media
 Register Now!
Save $200
Register before October 17th to SAVE! ... and also receive a FREE copy of the Best-Selling AJAX Book, a $119 Value!
Untitled Document
2008 East
Platinum Sponsor
Untitled Document
2008 East Gold Sponsors
Untitled Document
2008 East Exhibitors
Untitled Document
2008 East Media Sponsors
Untitled Document
2008 Association Sponsor
SYS-CON Media
2007 West Sponsors
Goingtomeet.com Conference Directory
SYS-CON Media
2007 East Sponsors
Untitled Document
2008 SYS-CON Events

Can't Miss RSS Feed
Subscribe to the AJAXWorld.com RSS Feed & Get All The Conference News As It Happens!

2008: Decision Year for RIAs - October 20-22, 2008 San Jose


IoT and #BigData – Who Owns All the Data? | @ThingsExpo #IoT #M2M #API
How many websites have you created accounts on?

Internet of Things and Big Data - Who Owns All the Data?

We've been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that's just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we're not even aware of the information we are providing. It could be very personal information (think of the security questions you provide answers to for protecting your information on these systems), to information about your behavior, your interests (websites visited, internet search topics). While possibly concerning from a privacy perspective, you had some level of control. For the backend systems involved, the volume and variety of the data was a manageable situation. The tradeoff between privacy and convenience is something we, for the most part, found acceptable.

Not just about personal data
This is not a situation unique to consumers and personal data - businesses do the same thing. In order to conduct business with each other, businesses must share key information about themselves and their operations with their partners, such as key contacts within the organization, purchasing trends, locations, and shipping patterns of products. All the information that is needed by the business partners, yet is also an asset subject to privacy concerns within the business. As with our personal data, it is always a delicate balancing act of tradeoffs in order to be able to conduct business.

Then came mobile and Internet of Things
The game changed when the mobile revolution started, and continued with the explosion of the Internet of Things. Your mobile apps, along with all your ‘smart' devices that you wear (e.g., fitbit), are in your home (e.g., smart TVs, nest, smart appliances), or even your car, are sending massive amounts of disparate information out into the cloud. While the data packets for most devices tend to be small, there are a lot of devices. Gartner estimates that there will be over 20 billion ‘things' by 2020. To the sheer volume of devices, now add in the velocity of the data. These devices can be streaming a large variety information constantly. Your GPS location, house temperature, car speed, even your blood pressure. Sometimes we are aware, many times not.

The business-to-business side is not without impacts as well. RFID chips in inventory that is shipping between and through partner, smart manufacturing facilities, like smart homes, are providing huge volumes of information about their operation without even potentially realizing it.

Privacy & ownership vs the world
This is not a ‘the sky is falling' or the ‘world has my data' rant. I raise it to point out the impact of our data usage and consumption is in today's world of the ‘Internet of Everything.' I am reminded of a presentation I attended at a Gartner Symposium entitled ‘Privacy vs the World' presented by Heidi Wachs, a research director at Gartner. She raised the point that "the lines between social culture, corporate culture and regulation are blurred when it comes to privacy'." She asked the attendees, "How can organizations truly define privacy so that it is appropriately preserved?" The discussion revolved around the constant struggle and balancing of the business needs, convenience, and addressing privacy and security concerns of the users (or business partners) of the system. As many of you know, one of my favorite sayings is ‘Everything is a tradeoff.' The phrase was never truer than in our new world of Big Data and the Internet of Things. New uses and the data that is being collected appear at breakneck speeds, sometimes before we even understand the implications and tradeoffs involved.

Information is an asset
An added twist to this conundrum was raised in a recent article in The Atlantic. In the piece, the author raises the additional question, what happens to that data if the company storing it goes bust? Your personal information could be considered an asset of value that can be sold off, as what happened with Radio Shack.

While not discussed in the article, it raised another thought for me from a business-to-business perspective. What if my business partner is acquired by one of my competitors? Would it provide them insights into my operations, and help them possibly derive a competitive advantage with that information?

If data passes through your system, you have a responsibility
As technologists, we have a responsibility to help the business understand the tradeoffs and risks involved in this rapidly changing environment. We as humans, by nature, love to hoard things, and data is no different. We are accumulating large amounts of data as it passes through our systems. If it is in or passes through your system, you have a responsibility for ensuring the rules are followed. What level of privacy is needed/required/desired is fully dependent on the data itself. Not all data is created equal; some requires more privacy than others. Privacy and the security mechanisms needed to implement that privacy is not a once and done kind of thing; it's constantly evolving and changing. In the Gartner presentation I mentioned, Heidi asked a challenging question: "When a law enforcement agency comes asking for all that data you have been hoarding, what will you do?" It is better to be proactive and plan ahead than reactive when the situation occurs.

In this fast-paced, rapidly changing technology environment we live in today, we are providing and collecting huge amounts of data from an ever-increasing number of potential sources, whether they be mobiles, wearables, our vehicles, or any other of a myriad of sources we haven't even thought about. This data is traveling through the nebulous cloud environment we all love to talk about, and traveling through the ether to its final destination. Our challenge as technologists is to understand the implications, challenges, and tradeoffs involved in that world, and be able to articulate those to the business so that the proper balance between business needs, data ownership and privacy, convenience, et al, can be achieved.

It's a difficult and delicate balance. There is no one right answer, no one size fits all as to which tradeoffs are acceptable. Ultimately, that is a business decision, based on the goals and needs of the organization, and could change over time. It's walking a tightrope over a shark infested tank of water. Our job as technologists is to try and help the business understand the risks and tradeoffs so they can traverse that tightrope and get to the other side safely.

This post is sponsored by SAS and Big Data Forum.

About Ed Featherston
Ed Featherston is VP, Principal Architect at Cloud Technology Partners. He brings 35 years of technology experience in designing, building, and implementing large complex solutions. He has significant expertise in systems integration, Internet/intranet, and cloud technologies. He has delivered projects in various industries, including financial services, pharmacy, government and retail.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

Latest AJAXWorld RIA Stories
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicat...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even cod...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Busin...
DX World EXPO, LLC, a Lighthouse Point, Florida-based startup trade show producer and the creator of "DXWorldEXPO® - Digital Transformation Conference & Expo" has announced its executive management team. The team is headed by Levent Selamoglu, who has been named CEO. "Now is the ...
Untitled Document

Call 201 802-3020 or Click Here to Save $200!

Register Today and
Save $200

Your registrations includes: Golden Pass Delegates will receive full conference access on October 20-22, 2008 including: Lunch and Coffee Breaks, Collectible Bag and Archives of all sessions on DVD. Includes access to all Conference Sessions including the Technical Sessions, Exhibits, Keynotes, Vendor Technology Presentations, and Power Panels.


Sponsorship Opportunities

AJAXWorld offers the undisputed best platform to position your company as a leading vendor in the fast-emerging marketplace for AJAX and Enterprise Web 2.0.


Please call
(201)802-3020


Who Should Attend?

 CTOs & VPs of Engineering
 Directors of Technology
 Sr. User Interface Architects
 Front-End Engineers
 VCs & Industry Analysts
 Directors of Business Development
 Software Engineers
 Senior Architects
 Application Programmers & Software Developers
 Project Managers
 Web Programmers & Designers
 Companies & Organizations that need to stay in
  front of the latest Web technology

AJAXWorld Security Bootcamp

Introducing at AJAXWorld RIA Conference 2008 West the world's first-ever full, one-day immersive "AJAX Security Bootcamp" - led by one of the world's foremost AJAX security experts and teachers, HP's Billy Hoffman.

View the full one-day schedule



AJAXWorld 2008 West - Tracks

Track 01: Enterprise RIAs
Track 02: Frameworks & Toolkits
Track 03: Web 2.0 & Mashups
Track 04: Hot Topics
Track 05: The Future of the Web
Track 06: iPhone Developer Summit



Brought To You By:

AJAXWorld Magazine is the pre-eminent independent vendor-neutral resource for the fastest growing new segment of the software business: entirely Web-based applications and experiences.

Download the Latest Issue!

AJAXWorld Webcasts



SYS-CON EVENTS


AJAXWorld Keynotes & Power Panels

2008 SYS-CON TV Keynotes: Can We Fix the Web? By Douglas Crockford - by Douglas Crockford
2008 SYS-CON TV Keynotes: 2008: The Year of the RIA - by Anthony Franco
2008 SYS-CON TV Power Panel: The Business Value of RIAs
2008 SYS-CON TV Power Panel: What Lies Beyond AJAX
2007 SYS-CON TV Keynotes: Why Web 2.0 for the Enterprise Is Far More Than Just a Facelift - by Ted Farrell
2007 SYS-CON TV Keynotes: Fueling the Next Generation Web: A Peek Behind the Green Curtain - by Bob Brewin
2007 SYS-CON TV Keynotes: AJAX in the Balance - by Joe Stagner

AJAXWorld Sessions on SYS-CON.TV

· Bill Scott - Yahoo! UI Library
· David Heinemeier Hansson - AJAX on Rails
· Jesse James Garrett - Elements of User Experience
· Dion Hinchcliffe - Real World AJAX
· Eric Miraglia - Open Source AJAX Development
· Paul Rademacher - Mashing Up Your Web Application
· Adam Sah - Google Gadgets
· Doug Crockford - An Introduction to JavaScript
· David Linthicum - Enterprise Web 2.0
· Patrick Grady - The Imagination & Experience Web

AJAXWorld...All The AJAX Rock Stars in One Spot!


Past Events Archive

SOAWorld Conference & Expo 2008 East
soa2008east.sys-con.com
Virtualization Conference & Expo 2008 East
virt2008east.sys-con.com
AJAXWorld 2008 Conference & Expo East
ajaxmar08.sys-con.com
SOAWorld Conference & Expo 2007 West
www.soaworld2007.com
Virtualization Conference & Expo 2007 West
virt2007west.sys-con.com
AJAXWorld 2007 Conference & Expo West
ajaxoct07.sys-con.com
SOAWorld Conference & Expo 2007 East
soa2007east.sys-con.com
Virtualization Conference & Expo 2007 East
virt2007east.sys-con.com
AJAXWorld 2007 Conference & Expo East
ajaxmarch07.sys-con.com
Other SYS-CON Events
events.sys-con.com

Join Over 10,000 Early AJAX Adopters
Who Have Attended AJAXWorld
• A&R Edelman
• Academic Enterprise
• Accoona Corp [2 delegates]
• Acxiom
• Adams Capital Management
• Adaptive Edge
• Adaptive Path
• Adobe Systems Incorporated [21 delegates]
• Adobe Systems Romania
• Ajax13
• All Risks, Ltd.
• alliance
• Alliance For Community Care
• AlphaDetail Inc
• Altera Corporation
• Amazon.com [6 delegates]
• Appeon Corporation [2 delegates]
• Apple Computer [5 delegates]
• Apress [3 delegates]
• Arkivio
• ASA
• Astute Solutions
• Avaya Inc [2 delegates]
• Avenda Systems
• Avenue A | Razorfish [3 delegates]
• Axcella, LLC [2 delegates]
• Aximsoft
• Azimyth
• Backbase USA Inc. [4 delegates]
• BAE Systems [2 delegates]
• Bank of America [2 delegates]
• Barkley Evergreen & Partners Interactive
• Bayview Financial [2 delegates]
• BEA Systems [3 delegates]
• Billeo
• BMC Software, Inc. [2 delegates]
• Borland Software Corporation
• Bradford Technologies, Inc [2 delegates]
• Brilliance
• Brocade Communications Systems, Inc. [2 delegates]
• Brookside Capital LLC
• Brulant
• Bungee Labs, Inc [6 delegates]
• Bureau of Labor Statistics
• BUZ Interactive
• Cadena Software
• Calix Networks
• Callidus Software [2 delegates]
• Cambia Security
• Carnegie Mellon West
• Cautella, Inc.
• CBSA
• Celequest [3 delegates]
• Change Vision, Inc.
• Charles E. Kenney, CPA
• Charles Schwab & Co., Inc. [8 delegates]

   read more...


ADVERTISE   |   MAGAZINE SUBSCRIPTIONS   |   FREE BREAKING-NEWSLETTERS!   |   SYS-CON.TV   |   BLOG-N-PLAY!   |   WEBCAST   |   EDUCATION   |   RESEARCH

.NET Developer's Journal - .NETDJ   |   ColdFusion Developer's Journal - CFDJ   |   Eclipse Developer's Journal - EDJ   |   Enterprise Open Source Magazine - EOS
Open Web Developer's Journal - OPEN WEB   |   iPhone Developer's Journal - iPHONE   |   Virtualization - Virtualization   |   Java Developer's Journal - JDJ   |   Linux.SYS-CON.com
PowerBuilder Developer's Journal - PBDJ   |   SEO / SEM Journal - SJ   |   SOAWorld Magazine - SOAWM   |   IT Solutions Guide - ITSG   |   Symbian Developer's Journal - SDJ
WebLogic Developer's Journal - WLDJ   |   WebSphere Journal - WJ   |   Wireless Business & Technology - WBT   |   XML-Journal - XMLJ   |   Internet Video - iTV
Flex Developer's Journal - Flex   |   AJAXWorld Magazine - AWM   |   Silverlight Developer's Journal - SLDJ   |   PHP.SYS-CON.com   |   Web 2.0 Journal - WEB2

SYS-CON MEDIA:   ABOUT US   |   CONTACT US   |   COMPANY NEWS   |   CAREERS   |   SITE MAP
SYS-CON EVENTS  |  AJAXWorld Conference & Expo  |  iPhone Developer Summit  |  OpenWeb Developer Summit  |  SOA World Conference & Expo  |  Virtualization Conference & Expo
INTERNATIONAL SITES:   India  |  U.K.  |  Canada  |  Germany  |  France  |  Australia  |  Italy  |  Spain  |  Netherlands  |  Brazil  |  Belgium
 Terms of Use & Our Privacy Statement     About Newsfeeds / Video Feeds
Copyright ©1994-2008 SYS-CON Publications, Inc. All Rights Reserved. All marks are trademarks of SYS-CON Media.
Reproduction in whole or in part in any form or medium without express written permission of SYS-CON Publications, Inc. is prohibited.