"It is the enabling node technology. This is true of not only our little venture but of so many others where the answer to the question, "who" takes precedence.
"What irony that this is so common as to dilute a unique awareness in any given mind of its pivotal contribution to a given application.
"Of what do we speak? A ubiquitous mobile device that truly knows who its user is. Not just something she/he remembers and/or caries with her/him. In fact, neither are necessarily required to make a concrete link to the unique person authorized to perform an action.
While the id capability is necessary to the uses we describe, without substantial access control functionality at the node and through the network connected to it, full utility/reliability cannot be realized. One could argue, until the advent of cost-effective technology assisted social networks, the was not sufficient incentive to develop it.
© 2013 Buzz Hill
"What irony that this is so common as to dilute a unique awareness in any given mind of its pivotal contribution to a given application.
"Of what do we speak? A ubiquitous mobile device that truly knows who its user is. Not just something she/he remembers and/or caries with her/him. In fact, neither are necessarily required to make a concrete link to the unique person authorized to perform an action.
While the id capability is necessary to the uses we describe, without substantial access control functionality at the node and through the network connected to it, full utility/reliability cannot be realized. One could argue, until the advent of cost-effective technology assisted social networks, the was not sufficient incentive to develop it.
© 2013 Buzz Hill
No comments:
Post a Comment