Final post in a series by Ben Pring who co-leads Cognizant’s Center for the Future of Work.
In laying out how “Code Halos” – aka our digital fingerprints –are changing the competitive rules in fast digitizing markets worldwide, we have provided the backstory, defined the various attributes and types of Code Halos, and revealed a model that we have seen play out time and again among Code Halo pioneers
In this final installment, we offer few concluding thoughts based on the feedback we have received from- Cognizant clients and prospects, Cognizant staff, industry analysts and other interested parties. Firstly, the response to our ideas around Code Halo-thinking is overwhelmingly positive. I and my co-authors, Malcolm Frank and Paul Roehrig, have spoken at dozens of client and industry events and engaged in numerous post-presentation discussions with a wide array of senior IT and business leaders who when presented with the Code Halo idea and follow us through our Crossroads Model tell us of the opportunities Code Halo-thinking offers (including the risks of “extinction events”) are very real in their industry or market. For example, the narrative resonated with a major soft drink manufacturer that saw a new way to think about the social network around its soft drink; with an international airline which is beginning to socialize and internalize the new metaphor of a Code Halo- to rethink how it moves customers from point A to point B; and with a leading financial services institution that admitted it was only too aware of the “ionization” happening all around it as new ideas from start-ups begin to change the competitive dynamics the company faces.
The second major reaction though – which may or may not surprise you, if you’ve read any of the previous pieces here, or on New Florence, is that many people immediately internalize the Code Halo story and find “the dark side of the Halo.” Rather than focusing on the positive transformational commercial opportunities Code Halos present, they land on the dystopian, Orwellian world of constant surveillance by Big (and little) Brother that Messrs Assange, Manning and Snowden (which sounds like a perfectly respectable firm of solicitors in the Herefordshire countryside, doesn’t it?) have brought to the fore in recent weeks, months and years.
Typically we hear a torrent of worst-case scenarios. “I don’t want to share my information with retailer x”, “I don’t want the government to have even more information on me that they do already”, “this is just going to make hackers’ lives easier”, “I get bombarded by enough advertising already; this is just going to make it even worse”, “I don’t want to live in 1984”, “I am not a number”, “how can I control who knows things about me”, “this is the final nail in the coffin of privacy”, “these ideas will never take off.”
The prism (excuse the pun) that people have is perfectly understandable. Their concerns and fears are, of course, entirely valid and understandable. We share many of them. As digital immigrants ourselves we are at times as dazed and confused as any set of middle aged men by the emergent and volatile social mores of the new world and have to fight back the temptation to wallow in nostalgic revelries of how “this wasn’t the way we used to do it back in the day/old country.”
The grand experiment that we are all engaged in – creating a world of unprecedented hyper-connectivity of time, space, and culture - which the Code Halo phenomena is supercharging, is, by its very nature, unknowable and logically contains good things and bad. Lots of good things are going to happen in a world of Code Halos, as are lots of bad things.
In short, we have no intention to deny that bad things will happen as a result of code meeting code. We fully expect they will. There is a very real dark side of the halo. All of the worst-case scenarios with which we are presented will happen., and are happening now. People will get hacked. Government intrusion will grow. Advertisers will create new ways to embed advertizing into every nook and cranny of our lives through every IP addressable form factor we use. Privacy will recede. The nefarious will have new opportunities to hurt us. Many innovations enabled by Code Halos will have unexpected consequences which will compound over time to produce unanticipated negative outcomes.
And yet we firmly believe these fears, concerns and objections are overblown, irrelevant or moot. Every objection is entirely the same objection that people raised as Al Gore’s Information Superhighway was entering the public consciousness in the middle of the 1990s; “I’ll never put my credit details onto the web,” Average Joe said in 1996; now Joe is routinely spending thousands of dollars online.
The Internet has been a crime scene in the last 20 years -- repeatedly. And it still is. And it always will be. But, today the Internet has 634 million websites and 2.4 billion users, according to uptime monitoring company, Royal Pingdom, and is here to stay. Nobody is going to un-invent it.
In 2013 so much of our lives are already online – shared, visible, transparent, open, all proffered voluntarily through Facebook, Twitter, Instagram, Tumblr, et al, or less voluntarily via our credit score, phone records, movements, and key strokes that the government can impound without warrant -- that privacy is already an illusion, hackers already hack, advertisers can already advertise within our email, pharmacies already send our 16-year-old daughters coupons for diapers when neither they nor we knew they were pregnant; we are numbers, we are code.
The world that we are describing is already here. The Code Halo era is not imminent. It is now.
Just as the upside of the Internet has won over the downside we believe the upside of a Code Halo world will win over its downsides. The “give to get” ratio of the Code Halo world will be so positive that, in the same way that the cost and convenience of Internet era 1.0 triumphed over its doubters, the new Internet era of Code Halos will similarly see it detractor’s voices diminish and disappear.
And one last thought; the ultimate value of Code Halos will originate out of the openness of data that is shared and this, of course, will mandate good behavior and accountability. Just as lousy service that once went unpunished is now broadcast on social media with sometimes devastating impact, individuals or corporations that misuse or exploit information exchanged via Code Halos will struggle to enrich and inflate their Code Halo and to generate commercially material sparks. Bad Code Halo behavior will exist in a world of instant high visibility and will push some towards their extinction event.
If you’ve enjoyed these blogs over the last few weeks please look out for our upcoming app and book “Code Halo” where we’ll be exploring these ideas in more depth. In the meantime please check out below the trailer video for our app and please share your thoughts about the world of Code Halos and the Crossroads Model at www.unevenlydistributed.com
And these are our most paranoid...
InformationWeek has a sobering assessment of the state of mobile security - over 25% of those surveyed say at least 10% of the mobile devices at their entities have had a "security incident".
But what's scarier later in the article is how unprotected so many of the attendees at the recent Black Hat conference were. These are security wizards, born paranoid and paid to continue to be so. If they are oblivious to mobile security risks, think about the majority of us.
One really scary scenario for most of us who travel is the tempation to use charging stations at airports, cafes etc - need to watch out for juice jacking ...
August 30, 2013 in Industry Commentary | Permalink | Comments (0) | TrackBack (0)