how the internet of things will impact you and the law

Transcription

how the internet of things will impact you and the law
N S T I T U T E
I
C L E
H OW THE I NTERNET OF
T HINGS W ILL I MPACT
Y OU AND THE L AW
Prepared in connection with a Continuing Legal Education course presented
at New York County Lawyers’ Association, 14 Vesey Street, New York, NY
scheduled for April 12, 2016
Program Chair & Moderator: Christy Burke, Burke & Co.
N Y C L A
Program Co-sponsor: NYCLA's Law and Technology Committee and Evolve Law
Faculty: V. Mary Abraham, Co-founder at Broadli; Chris Colvin, Eaton & Van Winkle; Lance
Koonce, Davis Wright Tremaine LLC, Co-Chair NYCLA's Law and Technology Committee;
Charlie Kwalwasser, Chief Administrative Officer and General Counsel, Quirky, Inc.; Frank
Torres, Sr. Director of Consumer Affairs, Microsoft Corp.
This course has been approved in accordance with the requirements of the New York State Continuing Legal Education
Board for a maximum of 2 Transitional and Non-Transitional credit hours: 1 Professional Practice; 1 Ethics.
This program has been approved by the Board of Continuing Legal education of the Supreme Court of New Jersey for 2
hours of total CLE credits. Of these, 1 qualifies as an hour of credit for ethics/professionalism, and 0 qualify as hours of
credit toward certification in civil trial law, criminal law, workers compensation law and/or matrimonial law.
ACCREDITED PROVIDER STATUS: NYCLA’s CLE Institute is currently certified as an Accredited Provider of
continuing legal education in the States of New York and New Jersey.
Information Regarding CLE Credits and Certification
How the Internet of Things Will Impact You and the Law
April 12, 2016; 6:00 PM to 8:00 PM
The New York State CLE Board Regulations require all accredited CLE
providers to provide documentation that CLE course attendees are, in fact,
present during the course. Please review the following NYCLA rules for
MCLE credit allocation and certificate distribution.
i.
You must sign-in and note the time of arrival to receive your
course materials and receive MCLE credit. The time will be
verified by the Program Assistant.
ii.
You will receive your MCLE certificate as you exit the room at
the end of the course. The certificates will bear your name and
will be arranged in alphabetical order on the tables directly outside
the auditorium.
iii.
If you arrive after the course has begun, you must sign-in and note
the time of your arrival. The time will be verified by the Program
Assistant. If it has been determined that you will still receive
educational value by attending a portion of the program, you will
receive a pro-rated CLE certificate.
iv.
Please note: We can only certify MCLE credit for the actual time
you are in attendance. If you leave before the end of the course,
you must sign-out and enter the time you are leaving. The time will
be verified by the Program Assistant. Again, if it has been
determined that you received educational value from attending a
portion of the program, your CLE credits will be pro-rated and the
certificate will be mailed to you within one week.
v.
If you leave early and do not sign out, we will assume that you left
at the midpoint of the course. If it has been determined that you
received educational value from the portion of the program you
attended, we will pro-rate the credits accordingly, unless you can
provide verification of course completion. Your certificate will
be mailed to you within one week.
Thank you for choosing NYCLA as your CLE provider!
New York County Lawyers’ Association
Continuing Legal Education Institute
14 Vesey Street, New York, N.Y. 10007 • (212) 267-6646
How the Internet of Things Will Impact You and the Law
April 12, 2016
6:00 PM to 8:00 PM
Program Chair & Moderator: Christy Burke, Burke & Co.
Program Co-sponsor: NYCLA's Law and Technology Committee and Evolve Law
Faculty: V. Mary Abraham, Co-founder at Broadli; Chris Colvin, Eaton & Van Winkle;
Lance Koonce, Davis Wright Tremaine LLC, Co-Chair NYCLA's Law and Technology
Committee; Charlie Kwalwasser, Chief Administrative Officer and General Counsel,
Quirky, Inc.; Frank Torres, Sr. Director of Consumer Affairs, Microsoft Corp.
AGENDA
5:30 PM – 6:00 PM
Registration
6:00 PM – 6:10 PM
Introduction and Announcements
6:10 PM – 8:00 PM
Discussion
How the Internet of Things will Impact You and the Law
Tues, April 12 from 6-8pm at NYCLA Headquarters (14 Vesey St)
PANEL SPEAKERS:
•
V. Mary Abraham - Co-Founder, Broadli
•
Christy Burke - President, Burke & Company (moderator)
•
Chris Colvin - Partner, Eaton & Van Winkle and Founder, In the House
•
Lance Koonce – Partner, Davis Wright Tremaine
•
Charles Kwalwasser – Chief Administrative Officer and GC, Quirky Inc.
•
Frank Torres – Senior Director of Consumer Affairs, Microsoft
PROGRAM:
Introduction and Session Overview
Christy Burke
Sponsor Welcome from Evolve Law
Jules Miller, Co-Founder
Sponsor Welcome from NYCLA Law and Technology Committee
Lance Koonce, Co-Chair
IoT and Me - Painting the IoT Landscape
V. Mary Abraham
Legal and Regulatory Issues Concerning Personal Use IoT Products
Charles Kwalwasser
IoT Meets IP - Practical Implications of IoT Development and IP Protection,
Litigation and Cybersecurity
Chris Colvin
Big Data and the Internet of Things
Frank Torres
Darwin Talk – Links in the Chain, What Role Can Blockchain Technology Play in
Facilitating the Internet of Things Revolution
Lance Koonce
Final Remarks, Q&A and Conclusion
Christy Burke
IoT and Me
V. Mary Abraham
Broadli Inc. / Columbia University
12 April 2016
Competence
“To maintain the requisite knowledge and skill, a
lawyer should keep abreast of changes in the
law and its practice, including the benefits and
risks associated with relevant technology,
engage in continuing study and education and
comply with all continuing legal education
requirements to which the lawyer is subject.”
- Comment 8, Rule 1.1,
Model Rules of Professional Conduct
http://www.businessinsider.com/jetsons-technology-2013-11
Parallel Universes
•
3.3 billion people are connected to the internet
•
6.4 billion devices are connected to the internet
•
According to Gartner
•
this is a 30% increase since 2015
•
5.5 million new devices will connect every day
•
by 2020 there will be 20.8 billion devices
What’s Going On?
•
Devices communicating with
each other over the internet.
•
Devices making decisions
together over the internet.
•
Devices organizing your home
and work environment.
What happened?
•
Organizations have been using sensors for nearly
a decade BUT
•
now the devices can communicate with each
other (high level of interoperability)
•
now device data can travel across multiple
platforms
•
now we have the tools to collect and analyze
device data
This is NOT a Fad
“Gartner estimates that the Internet of Things (IoT)
will support total services spending of $235 billion
in 2016, up 22 percent from 2015. Services are
dominated by the professional category (in which
businesses contract with external providers in
order to design, install and operate IoT systems),
however connectivity services (through
communications service providers) and consumer
services will grow at a faster pace.”
Millions of Devices
Category
2014
2015
2016
2020
Consumer
2,277
3,023
4,024
13,509
CrossIndustry
632
815
1,092
4,408
VerticalSpecific
898
1,065
1,276
2,880
Total
3,807
4,902
6,392
20,797
Billions of Dollars
Category
2014
2015
2016
2020
Consumer
257
416
546
1,534
CrossIndustry
115
155
201
566
VerticalSpecific
567
612
667
911
Total
939
1,183
1,414
3,010
The Connected Car
On-board diagnostics
Infotainment
Safety sensors
360-degree camera system
Connectivity for mobile devices
The Internet of Things:
Sensors
+ Actuators
+ Networked Intelligence
Sensors
Your Smartphone
•
Monitors location, movements, activity
levels
•
Sensors
•
•
accelerometer
•
gyro
•
video
•
proximity
•
compass
•
GPS
Connectivity (Cellular, WiFi, Bluetooth,
NFC)
Wearables
Proteus Digital Health
•
Sensor-enabled pills
•
a Patch with a sensor inside
•
Discover App
•
Discover Portal
The Connected Home
Mimo uses the best sensor technology available to tell you how your baby is breathing
as well as their body position, sleeping temperature, activity level, and whether they’re
asleep. It’s the first product to provide alerts and send nightly reports on your little one’s
sleep, and it uses your smartphone to connect all your caregivers and keep you
connected. Mimo helps everyone in the family get more quality sleep.
Amazon Dash
•
WiFi connected device that
reorders your favorite
products from Amazon.
•
Push the button, confirm order
on your smartphone, receive
delivery on your doorstep
within days.
•
$4.99 + $4.99 credit after first
purchase.
Amazon Dash >100
Sensors + Actuators
The Jetsons’ Home?
•
Control home electronics from anywhere
you have an internet connection
•
Light Switch
•
Motion Sensor
•
NetCam Wi-Fi Camer
•
Door & Window Sensor
•
Alarm Sensor
•
Mr. Coffee 10-Cup Smart Coffeemaker
•
Holmes Smart Heater
•
Holmes Smart Humidifier
•
Oster Smart Pet Feeder
The Informed Factory
Cognizant, Designing for Manufacturing’s Internet of Things,
June 2014
IoT Enablers
Cognizant, Designing for Manufacturing’s Internet of Things,
June 2014
The Connected Office
Connected Office
•
Sensors track employee arrival/departure
•
Motion sensors trigger light, HVAC, etc.
•
Adjust individual work environment to reflect
personal preferences
•
Printers, coffee makers, vending machines
automatically order resupply when needed
The Connected Office in the Connected Car
Connected Life
IoT for the Layperson
•
Convenience
•
Peace of mind (baby monitor, home security)
•
Personalized environment that responds to your
needs
•
Automation of some manual chores (e.g.,
checking the oven is off and the alarm is on)
•
One remote to rule them all = your smartphone
IoT for the Lawyer
•
Your clients are embedding sensors into every part of their
businesses. How do you help them think through the privacy and
security issues?
•
When sensors can track your every movement, how do you keep
the existence of client meetings confidential? (Inadvertent
Foursquare.)
•
How should you use sensor data in the representation of your
client? What is permissible surveillance?
•
Do you telecommute? How do you keep your home network
secure with so many devices? How do you protect client
confidential materials?
The Dark Side
•
Your home network becomes an attractive target
for hackers and other bad actors.
•
You and your children must learn to behave
defensively in the face of possible surveillance.
•
There are few agreed safety and security
standards.
•
You are relying on the integrity, professionalism
and foresight of a journeyman developer.
Spying on YOU
“Intelligence officials are not the only
ones interested in cracking our hi-tech
homes. Knowing when you are in and
out, what you have and where you
keep it is invaluable information for
thieves. And just think what tales
your devices could tell divorce
lawyers.”
Hello Barbie
Listens and records a child’s conversation,
and then responds like Siri or Cortana.
The ultimate audio surveillance device?
Hello Easy Life
Credits
•
Jetsons: www.businessinsider.com/jetsons-technology-2013-11
•
Men in Black: https://docthewho.wordpress.com/2015/08/18/men-in-black-review/
•
Seamless No Human: http://bit.ly/25Fqb0F
•
Gartner IoT Forecast: http://www.gartner.com/newsroom/id/3165317
•
Car by Doenoe: http://www.freeimages.com/photo/cars-8-1526527
•
Smartphones: http://mashable.com/2012/12/13/smartphone-holiday-wishlist/#UrT9U.2fP8qf
•
Smart watch: http://www.sonymobile.com/global-en/products/accessories/smartwatch-2-wrist-strapse20/
•
Fitbit: http://androidcommunity.com/fitbit-intros-three-new-models-now-with-gps-and-heart-ratesensor-20141028/
•
Adidas MiCoach: http://shop.numetrex.com/product/adidas-micoach-mens-training-shirt-short-sleeve/
•
Vitality GlowCaps: http://www.vitality.net/glowcaps.html
Credits
•
Proteus Digital Health: http://www.proteus.com/how-it-works/
•
Connected Nursery: http://mimobaby.com
•
Amazon Dash: http://amzn.to/1Sw6NcX
•
WeMo: https://en.wikipedia.org/wiki/Belkin_Wemo
•
The Informed Factory: http://www.cognizant.com/InsightsWhitepapers/Designing-for-ManufacturingsInternet-of-Things.pdf
•
Connected Office: http://mutualmobile.com/posts/the-connected-office-what-does-iot-mean-for-theworkplace
•
Connected Car Office: http://www.autoblog.com/2016/01/05/microsoft-harman-connected-car-office/
•
Connected Life: https://backwardstimemachine.wordpress.com/2014/01/27/future-driverless-cars/
•
Spying on you: http://www.theguardian.com/world/2016/feb/10/internet-of-things-surveillance-smart-tvcars-toys
•
Hello Barbie; http://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbieto-spy-on-your-children
IOT MEETS IP
Practical Implications of IoT Development on
IP Protection, Litigation and Cybersecurity
2
“Great things are done by
a series of small things
brought together.”
Vincent Van Gogh
Letter to Theo van Gogh
Oct. 22, 1882
3
“[C]onsumers are deeply concerned
about IOT’s data collection, disclosure
of sensitive information and their lack
of control and awareness of who has
access to the data that’s collected . . .
.”
FTC Chairwoman
Edith Ramirez
March 31, 2016
4
The Future of IP Protection for IoT
• Scope of Potential Subject Matter – Almost Endless
• Cars, drones, and other vehicles
• Coffee makers, ovens, thermostats, alarm systems, lighting, pool cleaners and
every other type of home applicance
• Pacemakers, insulin pumps, smartwatches and other health monitoring
devices
• All types of industrial and office-based devices
• Size of IoT Market ... Potentially Enormous
• IoT is an “ecosystem” (or many ecosystems)
• Likely to explode in an unpredictable way like the app ecosystem, where
multi-billion $ companies have been founded over just the last few years
based on a single smartphone app (Google/Waze, Uber, etc.)
• Easy to Feel Overwhelmed …
• But … It’s Still Just HW and SW ... So we can make some predictions
about IP protection
5
IP Protection for IoT -- Patents
• Where Do We Start … Go Ask Alice
• Section 101 of Patent Act “any new and useful process [or] machine”,
•
•
•
•
•
and laws of nature and abstract ideas have been held to be exceptions
Claim directed to computer-implemented scheme for managing
“settlement risk” (the risk that only one party to an agreed financial
exchange will satisfy its obligations)
CAFC held that claims invalid as abstract idea, and Supremes affirmed
What is clear – SW is patentable (and this should hold true for SW
running on “things” other than computers)
Less clear – when a claim falls within the realm of an abstract idea
(Alice “step 1”), what is needed to “transform” that idea into a patenteligible invention (Alice “step 2”)?
Application of Alice is difficult in practice and case dependent – My
best summary: 1+1=3
6
IP Protection for IoT – Patents (con’d)
• After Alice
• District Courts have invalidated approximate 70% of post-Alice patent
challenges, even higher in some PTO art units
• Main lesson for patent prosecutor is roll up your sleeves and analyze
which claims have passed muster and which have not in your client’s
field or most analogous field
• Examiner interviews probably more important than ever to get “signals”
on individual examiner’s views of how Alice should be applied
• IoT, while very analogous to computers running SW, might also
provide more fodder for Sec 101 arguments, as new IoT devices might
combine with code and other IoT devices in unexpected (and hopefully
patentable) ways
• In addition to arguing Alice “step 1” (not abstract idea) and “step 2”
(idea transformed), consider arguing that client’s claimed invention will
not “pre-empt” basic tools of technological development (In Alice,
Supremes were apparently concerned that innovation would be stifled
more than stimulated by monopolist land grabs)
7
IP Protection for IoT – Copyrights
• Copyright Generally Offers More Certainty in IP Protection
than Patents, But Zone of Protection Generally Narrower
• Oracle v. Google (CAFC May 2014 – cert denied July
2015)
• CAFC ruled that APIs are copyrightable – upholding Oracle’s
claimed copyright in Java APIs, and Google was held to infringe by
using certain Java API’s in Android OS (damages trial coming May
2016)
• Potential to have wide-ranging impact on IoT -- because private
companies can control interoperability via Copyright laws
• Replacing one device (e.g. Nest thermostat) with a
compatible device – IBM vs the “clones” all over again?
• EFF and the “jail break” issue
8
IP Protection for IoT – Trade Secrets
• Sometimes “Forgotten” Arm of IP Protection…
• But Can Be Quite Powerful, Especially For Technology
That is Difficult to Reverse Engineer
• While Not Subject to Uncertainties of Alice, Trade Secrets
Come With Uncertainties of Independent Development &
Reverse Engineering
9
IoT Litigation Issues
• IP Infringement Litigation – Similar Issues to Prosecution
But Generally Higher Stakes for Both Parties
• Cyber attacks – what is the “standard of care” for
prevention of attack, protection of customer data,
employee data in the event of attack?
• Product Liability, Emerging Class Actions
• SW glitch results in injury or property damage
• Cyber attack causes injury or property damage
• Cyber attack invades privacy
• Impact on Discovery Could Be Similar to Addition of e-
Discovery in 1990s and 2000s
• Recalls my first case involving “email overload”
10
Some IoT Considerations for In-House Lawyers
• Impact on IP Strategy
• Innovation could happen anywhere in organization, not just with
“techies” (3D printer example)
• Impact on Litigation & Discovery
• Blurs boundaries between “work” and “home” (mirroring
development of “gig” economy), potential impact on both vicarious
liability and reach of discovery
• Impact on BYOD Policies
• Impact on Employee Privacy/Corporate Cybersecurity
• Location data (working from “home” at local bar)
• Health data (from watch, patch, pacemaker, etc.)
• Entry points for hackers (remote printing of anti-semitic materials)
11
Questions?
12
Thank You!
The White House
Office of the Press Secretary
For Immediate Release
May 01, 2014
FACT SHEET: Big Data and Privacy
Working Group Review
Driven by the declining cost of data collection, storage, and processing; fueled by new online and realworld sources of data, including sensors, cameras, and geospatial technologies; and analyzed using a
suite of creative and powerful new methods, big data is fundamentally reshaping how Americans and
people around the world live, work, and communicate. It is enabling important discoveries and
innovations in public safety, health care, medicine, education, energy use, agriculture, and a host of
other areas. But big data technologies also raise challenging questions about how best to protect
privacy and other values in a world where data collection will be increasingly ubiquitous,
multidimensional, and permanent.
In January, President Obama asked his Counselor John Podesta to lead a 90-day review of big data
and privacy. The review was conceived as fundamentally a scoping exercise, designed to define for the
President what is new about the technologies that define the big data landscape; uncover where and
how big data affects public policy and the laws and norms governing privacy; to ask how and whether
big data creates new challenges for the principles animating the Consumer Privacy Bill of Rights
embraced by the Administration in 2012; and to lay out an agenda for how government can maximize
the benefits and minimize the risks of big data.
The working group—which included Commerce Secretary Pritzker, Energy Secretary Moniz, the
President's Science Advisor John Holdren, the President's Economic Advisor Jeff Zients, and other
Senior Administration Officials—sought public input and worked over 90 days with academic
researchers and privacy advocates, regulators and the technology industry, advertisers and civil rights
groups, the international community and the American public. This review was supported by a parallel
effort by the President's Council of Advisors on Science and Technology (PCAST) to research the
technological trends underpinning big data.
Today, Podesta and the big data working group presented their findings and recommendations to the
President. The review did not set out to answer every question about big data, nor was it intended to
develop a comprehensive policy approach to big data. However, by evaluating the opportunities and
challenges presented by big data, the working group was able to draw important conclusions and make
concrete recommendations to the President for Administration attention and policy development.
SEIZING OPPORTUNITIES
We live in a world of near-ubiquitous data collection where that data is being crunched at a speed
increasingly approaching real-time. This revolution presents incredible opportunities:
•
Big data is saving lives. Infections are dangerous—even deadly—for many babies born prematurely. By
collecting and analyzing millions of data points from a neonatal intensive care unit, one study was able to
identify factors, like slight changes in body temperature and heart rate, that serve as early warning signs
an infection may be taking root—subtle changes that even the most experienced doctors may not have
have noticed on their own.
•
Big data is making the economy work better. Jet engines and delivery trucks now come outfitted with
sensors that continuously monitor hundreds of data points and send automatic alerts when maintenance
is needed. Utility companies are starting to use big data to predict periods of peak electric demand,
adjusting the grid to be more efficient and potentially averting brown-outs.
•
Big data is saving taxpayer dollars. The Centers for Medicare and Medicaid Services have begun
using predictive analytics—a big data technique—to flag likely instances of reimbursement fraud before
claims are paid. The Fraud Prevention System helps identify the highest-risk health care providers for
waste, fraud, and abuse in real time and has already stopped, prevented, or identified $115 million in
fraudulent payments.
Big data also presents powerful opportunities in areas as diverse as medical research, agriculture,
energy efficiency, global development, education, environmental monitoring, and modeling climate
change impacts, among others.
PRESERVING OUR VALUES
The opportunities presented by big data are considerable, but big data raises serious concerns about
how we protect our privacy and other values. For example:
•
Big data tools can alter the balance of power between government and citizen. Government
agencies can reap enormous benefits from using big data to improve service delivery or detect payment
fraud. But government uses of big data also have the potential to chill the exercise of free speech or free
association. As more data is collected, analyzed, and stored on both public and private systems, we must
be vigilant in ensuring that balance is maintained between government and citizens, and revise our laws
accordingly.
•
Big data tools can reveal intimate personal details. One powerful big data technique involves merging
multiple data sets, drawn from disparate sources, to reveal complex patterns. But this practice,
sometimes known as “data fusion,” can also lead to the so-called “mosaic effect,” whereby personally
identifiable information can be discerned even from ostensibly anonymized data. As big data becomes
even more widely used in the private sector to bring a wellspring of innovations and productivity, we must
ensure that effective consumer privacy protections are in place to protect individuals.
•
Big data tools could lead to discriminatory outcomes. As more decisions about our commercial and
personal lives are determined by algorithms and automated processes, we must pay careful attention that
big data does not systematically disadvantage certain groups, whether inadvertently or intentionally. We
must prevent new modes of discrimination that some uses of big data may enable, particularly with regard
to longstanding civil rights protections in housing, employment, and credit.
POLICY RECOMMENDATIONS
No matter how quickly technology advances, it remains within our power to ensure that we both
encourage innovation and protect our values through law, policy, and the practices we encourage in the
public and private sector. To that end, the working group made six actionable policy recommendations
in their report to the President:
•
Advance the Consumer Privacy Bill of Rights because consumers deserve clear, understandable,
reasonable standards for how their personal information is used in the big data era.
•
Pass National Data Breach Legislation that provides for a single national data breach standard, along
the lines of the Administration's 2011 Cybersecurity legislative proposal.
•
Extend Privacy Protections to non-U.S. Persons because privacy is a worldwide value that should be
reflected in how the federal government handles personally identifiable information from non-U.S.
citizens.
•
Ensure Data Collected on Students in School is used for Educational Purposes to drive better
learning outcomes while protecting students against their data being shared or used inappropriately.
•
Expand Technical Expertise to Stop Discrimination because the federal government should build the
technical expertise to be able to identify practices and outcomes facilitated by big data analytics that have
a discriminatory impact on protected classes.
•
Amend the Electronic Communications Privacy Act to ensure the standard of protection for online,
digital content is consistent with that afforded in the physical world—including by removing archaic
distinctions between email left unread or over a certain age.
Data & Civil Rights: Technology Primer
by the Data & Society Research Institute
Data have assumed a significant role in routine decisions about access, eligibility, and
opportunity across a variety of domains. These are precisely the kinds of decisions that have long
been the focus of civil rights campaigns. The results have been mixed. Companies draw on data
in choosing how to focus their attention or distribute their resources, finding reason to cater to
some of its customers while ignoring others. Governments use data to enhance service delivery
and increase transparency, but also to decide whom to subject to special scrutiny, sanction, or
punishment. The technologies that enable these applications are sometimes designed with a
particular practice in mind, but more often are designed more abstractly, such that technologists
are often unaware of and not testing for the ways in which they might benefit some and hurt
others.
The technologies and practices that are driving these shifts are often described under the banner
of “big data.” This concept is both vague and controversial, particularly to those engaged in the
collection, cleaning, manipulation, use, and analysis of data. More often than not, the specific
technical mechanisms that are being invoked fit under a different technical banner: “data
mining.”
Data mining has a long history in many industries, including marketing and advertising, banking
and finance, and insurance. As the technologies have become more affordable and the
availability of data has increased, both public and private sectors—as well as civil society—are
envisioning new ways of using these techniques to wrest actionable insights from once
intractable datasets. The discussion of these practices has prompted fear and anxiety as well as
hopes and dreams. There is a significant and increasing gap in understanding between those who
are and are not technically fluent, making conversations about what’s happening with data
challenging. That said, it’s important to understand that transparency and technical fluency is not
always enough. For example, those who lack technical understanding are often frustrated
because they are unable to provide oversight or determine the accuracy of what is produced
while those who build these systems realize that even they cannot meaningfully assess the
product of many algorithms.
This primer provides a basic overview to some of the core concepts underpinning the “big data”
phenomenon and the practice of data mining. The purpose of this primer is to enable those who
are unfamiliar with the relevant practices and technical tools to at least have an appreciation for
different aspects of what’s involved.
http://www.datacivilrights.org/pubs/2014-1030/Technology.pdf
FTC Report on Internet of Things Urges
Companies to Adopt Best Practices to Address
Consumer Privacy and Security Risks
Report Recognizes Rapid Growth of Connected Devices Offers Societal
Benefits, But Also Risks That Could Undermine Consumer Confidence
For Release
January 27, 2015
In a detailed report on the Internet of Things, released today, the staff of the Federal Trade
Commission recommend a series of concrete steps that businesses can take to enhance and
protect consumers’ privacy and security, as Americans start to reap the benefits from a growing
world of Internet-connected devices.
The Internet of Things is already impacting the daily lives of millions of Americans through the
adoption of health and fitness monitors, home security devices, connected cars and household
appliances, among other applications. Such devices offer the potential for improved healthmonitoring, safer highways, and more efficient home energy use, among other potential
benefits. However, the FTC report also notes that connected devices raise numerous privacy
and security concerns that could undermine consumer confidence.
“The only way for the Internet of Things to reach its full potential for innovation is with the trust of
American consumers,” said FTC Chairwoman Edith Ramirez. “We believe that by adopting the
best practices we’ve laid out, businesses will be better able to provide consumers the
protections they want and allow the benefits of the Internet of Things to be fully realized.”
The Internet of Things universe is expanding quickly, and there are now over 25 billion
connected devices in use worldwide, with that number set to rise significantly as consumer
goods companies, auto manufacturers, healthcare providers, and other businesses continue to
invest in connected devices, according to data cited in the report.
The report is partly based on input from leading technologists and academics, industry
representatives, consumer advocates and others who participated in the FTC’s Internet of
Things workshop held in Washington D.C. on Nov. 19, 2013, as well as those who submitted
public comments to the Commission. Staff defined the Internet of Things as devices or sensors
– other than computers, smartphones, or tablets – that connect, store or transmit information
with or between each other via the Internet. The scope of the report is limited to IoT devices that
are sold to or used by consumers.
Security was one of the main topics addressed at the workshop and in the comments,
particularly due to the highly networked nature of the devices. The report includes the following
recommendations for companies developing Internet of Things devices:
•
•
build security into devices at the outset, rather than as an afterthought in the design process;
train employees about the importance of security, and ensure that security is managed at an
appropriate level in the organization;
•
•
•
•
ensure that when outside service providers are hired, that those providers are capable of
maintaining reasonable security, and provide reasonable oversight of the providers;
when a security risk is identified, consider a “defense-in-depth” strategy whereby multiple layers
of security may be used to defend against a particular risk;
consider measures to keep unauthorized users from accessing a consumer’s device, data, or
personal information stored on the network;
monitor connected devices throughout their expected life cycle, and where feasible, provide
security patches to cover known risks.
Commission staff also recommend that companies consider data minimization – that is, limiting
the collection of consumer data, and retaining that information only for a set period of time, and
not indefinitely. The report notes that data minimization addresses two key privacy risks: first,
the risk that a company with a large store of consumer data will become a more enticing target
for data thieves or hackers, and second, that consumer data will be used in ways contrary to
consumers’ expectations.
The report takes a flexible approach to data minimization. Under the recommendations,
companies can choose to collect no data, data limited to the categories required to provide the
service offered by the device, less sensitive data; or choose to de-identify the data collected.
FTC staff also recommends that companies notify consumers and give them choices about how
their information will be used, particularly when the data collection is beyond consumers’
reasonable expectations. It acknowledges that there is no one-size-fits-all approach to how that
notice must be given to consumers, particularly since some Internet of Things devices may have
no consumer interface. FTC staff identifies several innovative ways that companies could
provide notice and choice to consumers.
Regarding legislation, staff concurs with many stakeholders that any Internet of Things-specific
legislation would be premature at this point in time given the rapidly evolving nature of the
technology. The report, however, reiterates the Commission’s repeated call for strong data
security and breach notification legislation. Staff also reiterates the Commission’s call from its
2012 Privacy Report for broad-based privacy legislation that is both flexible and technologyneutral, though Commissioner Ohlhausen did not concur in this portion of the report.
The FTC has a range of tools currently available to protect American consumers’ privacy related
to the Internet of Things, including enforcement actions under laws such as the FTC Act, the
Fair Credit Reporting Act, the Children’s Online Privacy Protection Act; developing consumer
education and business guidance; participation in multi-stakeholder efforts; and advocacy to
other agencies at the federal, state and local level.
In addition to the report, the FTC also released a new publication for businesses containing
advice about how to build security into products connected to the Internet of Things. “Careful
Connections: Building Security in the Internet of Things” encourages companies to implement a
risk-based approach and take advantage of best practices developed by security experts, such
as using strong encryption and proper authentication.
The Commission vote to issue the staff report was 4-1, with Commissioner Wright voting no.
Commissioner Ohlhausen issued a concurring statement, and Commissioner Wright issued a
dissenting statement.
The Federal Trade Commission works for consumers to prevent fraudulent, deceptive, and
unfair business practices and to provide information to help spot, stop, and avoid them. To file a
complaint in English or Spanish, visit the FTC’s online Complaint Assistant or call 1-877-FTCHELP (1-877-382-4357). The FTC enters complaints into Consumer Sentinel, a secure, online
database available to more than 2,000 civil and criminal law enforcement agencies in the U.S.
and abroad. The FTC’s website provides free information on a variety of consumer topics. Like
the FTC on Facebook (link is external), follow us on Twitter (link is external), and subscribe to
press releases for the latest FTC news and resources.
CONTACT INFORMATION
MEDIA CONTACT:
Jay Mayfield
Office of Public Affairs
202-326-2181
STAFF CONTACT:
Karen Jagielski
Bureau of Consumer Protection
202-326-2509
BIG DATA & THE INTERNET
OF THINGS
perspectives
BIG DATA
big da·ta
NOUN
computing
extremely large data sets that may be analyzed computationally to
reveal patterns, trends, and associations, especially relating to
human behavior and interactions:
"much IT investment is going towards managing and maintaining
big data"
INTERNET OF THINGS
Inter·net of things
NOUN
the interconnection via the Internet of
computing devices embedded in
everyday objects, enabling them to
send and receive data
ALL TOO OFTEN, NEW DATA-DRIVEN
“ TECHNOLOGIES
ARE DEPLOYED WITH LITTLE
CONSIDERATION FOR HOW THEY MAY INTERACT
WITH SOCIETY AS A WHOLE.
danah boyd, founder Data & Society Research Institute
”
TRENDS
•
•
•
•
•
•
•
•
•
•
Data volumes will continue to grow.
Ways to analyze data will improve and more tools will emerge.
Algorithms will be examined.
Big data will be used to make real time decisions.
Analytics will be built into software.
Machine learning is top strategic trend. And so are artificial intelligence and autonomous
agents.
Big data will face huge challenges around privacy.
More companies will have chief data officers.
All companies are data businesses.
Fact and actionable data will be the goal.
Forbes/Tech; 17 Predictions about the Future of Big Data Everyone Should Read; Bernard Marr; March 15, 2016
GOVERNMENT & REGULATORY
ASPECTS
• White House Big Data Report & Privacy Bill of Rights
• Federal Trade Commission focus on Big Data and the Internet of Things
• Congressional (in)Activity
SOCIETAL ASPECTS
Fairmess
and
equality
Privacy & Security
Civil Rights &
Economics
Ethics
Disruptions
Labor & Education
IT IS ABOUT HOW YOU
• Collect
• Use
• Store
• Share
DATA
IT IS ABOUT HOW YOU
• Value
• Respect
• Treat Fairly
CUSTOMERS
IT IS ABOUT
• Transparency
• Disclosure
• Fair Use
CHALLENGES
LIKE ENCRYPTION
BE PREPARED
To be productive, thoughtful, and create an informed discussion.
Device democracy
Saving the future of the Internet of Things
IBM Institute for Business Value
Executive Report
Electronics Industry
Transforming businesses as
the Internet of Things expands
As a global electronics company, we understand the
issues facing the high-tech industry and the continuous
transformation required to thrive. Across the industry,
companies are turning their attention from smartphones and
tablets to a new generation of connected devices that will
transform not just the Electronics industry, but many others.
The IBM Global Electronics practice uniquely combines IBM
and partner services, hardware, software and research into
integrated solutions that can help you deliver innovation,
create differentiated customer experiences and optimize
your global operations.
1
Why is the IoT in peril?
Executive summary
More than a billion intelligent, connected devices
When the first mainframes were sold, even IBM did not imagine a global market larger than a
few thousand devices. Mainframes were the province of the largest governments and enterprises,
used to execute complex managerial and operational tasks. Thanks to technological progress that
has been both relentless and predictable, mainframes were supplemented first by minicomputers,
then microcomputers, personal computers, and most recently, smartphones and tablets. Next up:
smart devices.
already comprise today’s “Internet of Things (IoT).”
The expected proliferation of hundreds of billions more
places us at the threshold of a transformation sweeping
across the electronics industry and many others.
Yet, the dream of a smart, safe and efficient future is
threatened by subscription fees, ubiquitous advertising
and intrusive surveillance. For the IoT to survive the end
of trust and successfully scale from billions to hundreds
of billions of devices, executives need to rethink the
technology strategy, business models and design
principles at its foundation.
This first report of our study shows that a low-cost,
private-by-design “democracy of devices” will emerge
that will enable new digital economies and create new
value, while offering consumers and enterprises
fundamentally better products and user experiences.
Each time the cost of computing power has declined by an order of magnitude, it has, in turn,
kicked off a rise in unit volume – also by an order of magnitude. Even though volume increases
have been so large with each revolution, the time required to achieve that growth has decreased.1
This next revolution, a network of billions of intelligent devices known as the “Internet of
Things (IoT),” will, in some ways, be predictable and similar to past expansions of the
computing world. In other aspects, however, it represents an entirely new approach.
Computing is already widespread in many devices from kitchens to cars, but it is a particular
kind of computing that is cheap and scalable, yet inherently limited: application-specific,
embedded computing.
What is new, and what will power the IoT, is the shift from special purpose computing – often
the minimum necessary for device control – to general purpose computing. Thanks to
Moore’s Law, it is now cheaper and easier to make a device with a powerful general purpose
computer than create a customized embedded device. Very soon, devices from doorknobs to
light bulbs will carry as much compute power and connectivity as the first smartphones.
To guide executives in making strategic IoT investments, and to better understand the
connected future and its impact across industries, we conducted the 2014 IBM Internet of
Things Study. Our study was performed in conjunction with top IBM researchers and
comprised of three research components: technology strategy; business and economic
2
Device democracy
In the emerging device-driven democracy,
power in the IoT will shift from the center
to the edge.
As devices compete and trade in real-time,
they will create liquid markets out of the
physical world.
insights; and product and user experience design. The findings from the initial phase are
explored in this report. Additional analysis and publication of our research findings will
continue in the next phase (see methodology details on page 21).
The confluence of many technology revolutions
The rise of inexpensive general purpose computing has been accompanied by the availability of
inexpensive sensors and actuators that today are cheap enough to embed in a device even if
they are not used. Tremendous advances in cloud computing enable storage and analytics of
In the IoT of hundreds of billions of devices,
connectivity and intelligence will be a
means to better products and experiences,
not an end.
the vast amounts of data generated by these sensors. Fueled by ubiquitous connectivity and the
availability of billions of IP addresses with IPv6, the number of connected devices is forecasted
to surpass 25 billion in 2020, up from 2.5 billion in 2009 and 10 billion today (see Figure 1).2
Figure 1
Each inflection point in the history of computing has triggered an explosion in the number of computing devices
2050
>100 billion
2020
1950
5000
1975
10,000
2003
2009
2.5 billion
2014
10 billion
3
Looking forward, an increase in open web-service application program interfaces (APIs) will
allow devices to connect and work smoothly as part of complex, multi-vendor networks. 3D
printing and digital manufacturing will enable manufacturers to build and deploy devices in
small batches, quickly pioneering new products and solutions.
The result: a proliferation of hundreds of billions of devices that will be no more expensive than
their dumb counterparts, yet able to operate and act as part of complex, integrated systems.
As with prior revolutions, this one will usher in another order-of-magnitude reduction in cost,
as smartphones and tablets that range from US$200 to US$600 are supplemented by smart
devices, such as doorknobs and light bulbs, that cost as little as US$20.
Opportunities for the global economy
Though the IBM mainframe (once System/360, now System z) recently celebrated its 50th
anniversary, the impact of the computer industry on the global economy has been relatively
recent and surprisingly limited. Nobel Prize-winning economist Robert Solow remarked in
1987 that even as PC sales surged into the millions, he could see the impact of computers
“everywhere but in the productivity statistics.”3
In 1987, computers of all kinds were selling around 15 to 20 million annually.4 It was not until after the
year 2000 that economists were able to show a statistically significant impact of computers on
industrial productivity.5 By that time, computer sales were routinely exceeding 300 million
annually.6 Since then, we have gone from 300 to 400 million PCs to nearly a billion smartphones.7
As we go from a billion smartphones toward hundreds of billions of smart devices, the scale of
opportunity from the IoT becomes visible. After over 50 years of gradually growing penetration,
the majority of the global economy is still considered to be in industries that are not
“IT-intensive.” Many of these – like agriculture, transportation and logistics – have not historically
fit well with personal computers that require desks and offices. The IoT will change all that.
4
Device democracy
Figure 2
Why the IoT already needs a reboot
Why today’s Internet of billions of Things won’t scale to the Internet of
hundreds of billions of Things
So far, the first wave of the IoT has focused on very high-value applications. There have been
visible successes in continuous monitoring of jet engines, automated smart meters and
remote healthcare management. But demand has been slow to take off in many areas: only
30 percent of heavy industrial equipment is networked and only 10 percent of smart TVs are
consumers have failed to embrace devices from smart toothbrushes to refrigerators.
c
ck
No
t future-proof
Market expectations and valuations, however, have been enormous – as much as 10 to 20
times revenue, even though revenues have been relatively small, particularly in the consumer
La
of lu
L ack al va
function
e
Internet
of Things
used for Internet viewing.8 Perhaps the slowest area of adoption is home automation, where
of p
rivacy
Bro
k
me
Hig
h
t
os
ess
sin
bu s
n de l
o
space.9 This is largely a result of the cost and complexity of most IoT solutions, as well as
enterprises and entrepreneurs treating the IoT as if it were just another computing platform,
and applying the same set of business models: services, ecosystems, applications and
analytics. Unless executives make big strategic changes, they are set to be disappointed as
they seek to scale today’s IoT solutions to support tomorrow’s hundreds of billions of things
(see Figure 2).
Challenge one: The cost of connectivity
Even as revenues fail to meet expectations, costs are prohibitively high. Many existing IoT
solutions are expensive because of the high infrastructure and maintenance costs associated
with centralized clouds and large server farms, in addition to the service costs of middlemen.
There is also a mismatch in supplier and customer expectations. Historically, costs and
revenues in the IT industry have been nicely aligned. Though mainframes lasted for many
years, they were sold with enterprise support agreements. PCs and smartphones have not
5
historically been sold with such profitable support plans; but with their shorter product life
cycles, that has not been a huge problem. With the IoT, it is unlikely that there will be enough
margin for companies to cover several years of support and maintenance.
The cost of supporting and serving billions of smart devices will be substantial – even
something as simple as maintaining centralized servers that distribute regular software updates.
Challenge two: The Internet after trust
The Internet was originally built on trust. In the post-Snowden era, it is evident that trust in the
Internet is over. The notion of IoT solutions built as centralized systems with trusted partners is
now something of a fantasy. Most solutions today provide the ability for centralized authorities,
whether governments, manufacturers or service providers to gain unauthorized access to
and control devices by collecting and analyzing user data.
In a network of the scale of the IoT, trust can be very hard to engineer and expensive, if not
impossible, to guarantee. For widespread adoption of the ever-expanding IoT, however, privacy
and anonymity must be integrated into its design by giving users control of their own privacy.
Current security models based on closed source approaches (often described as “security
through obscurity”) are obsolete and must be replaced by a newer approach – security
through transparency. For this, a shift to open source is required. And while open source
systems may still be vulnerable to accidents and exploitable weaknesses, they are less
susceptible to government and other targeted intrusion, for which home automation,
connected cars and the plethora of other connected devices present plenty of opportunities.
6
Device democracy
Challenge three: Not future-proof
While many companies are quick to enter the market for smart, connected devices, they have
yet to discover that it is very hard to exit. While consumers replace smartphones and PCs
every 18 to 36 months, the expectation is for door locks, LED bulbs and other basic pieces of
infrastructure to last for years, even decades, without needing replacement.
An average car, for example, stays on the road for 10 years, the average U.S. home is 39 years
old and the expected lifecycles of road, rail and air transport systems is over 50 years.10 A
door lock with a security bug would be a catastrophe for a warehousing company and the
reputation of the manufacturer. In the IoT world, the cost of software updates and fixes in
products long obsolete and discontinued will weigh on the balance sheets of corporations for
decades, often even beyond manufacturer obsolescence.
Challenge four: A lack of functional value
Many IoT solutions today suffer from a lack of meaningful value creation. The value
proposition of many connected devices has been that they are connected – but simply
enabling connectivity does not make a device smarter or better. Connectivity and intelligence
are a means to a better product and experience, not an end.
It is wishful thinking for manufacturers that some features they value, such as warranty
tracking, are worth the extra cost and complexity from a user’s perspective. A smart,
connected toaster is of no value unless it produces better toast. The few successes in the
market have kept the value proposition compelling and simple. They improve the core
functionality and user experience, and do not require subscriptions or apps.
7
Challenge five: Broken business models
Most IoT business models also hinge on the use of analytics to sell user data or targeted
advertising. These expectations are also unrealistic. Both advertising and marketing data are
affected by the unique quality of markets in information: the marginal cost of additional
capacity (advertising) or incremental supply (user data) is zero. So wherever there is
competition, market-clearing prices trend toward zero, with the real revenue opportunity
going to aggregators and integrators. A further impediment to extracting value from user data
is that while consumers may be open to sharing data, enterprises are not.
Another problem is overly optimistic forecasts about revenue from apps. Products like
toasters and door locks worked without apps and service contracts before the digital era.
Unlike PCs or smartphones, they are not substantially interactive, which makes such revenue
expectations unrealistic.
Finally, many smart device manufacturers have improbable expectations of ecosystem
opportunities. While it makes interesting conversation for a smart TV to speak to the toaster,
such solutions get cumbersome quickly and nobody has emerged successful in controlling
and monetizing the entire IoT ecosystem.
So while technology propels the IoT forward, the lack of compelling and sustainably profitable
business models is, at the same time, holding it back. If the business models of the future don’t
follow the current business of hardware and software platforms, what will they resemble?
8
Device democracy
Saving the future of the IoT
Figure 3. The pyramid of digital success: Build a strong technology
foundation, guided by new business models and design for better
experiences
Create
collaborative
value
governments and corporations race to take control of devices and data, we need to save the
IoT. This “rescue” will require business and technology leaders to fundamentally rethink
technology strategy by building solutions for radically lower cost, privacy and autonomy.
1
Create
better
Design rule
products and
experiences
Prepare for
new digital
economies
As the number of connected devices grows from billions to hundreds of billions, and as
Business models that guide these solutions must embrace highly efficient digital economies
and create collaborative value, all while creating improved products and user experiences
(see Figure 3).
2
Business model guidelines
Design for
Design for
Design for
decentralized
trustless
peer-to-peer
commmunication autonomy
systems
3
Technology
principles
Democratizing the digital world
The foundation of modern computing is the very humble work of transaction processing.
From phone calls to electricity metering, to airline reservations, each is a transaction to be
processed. As passengers make reservations, pay for tickets, board planes and receive
frequent flyer miles, every step along the way a transaction is processed, recorded and stored.
Transaction processing isn’t just for “old-school” workloads, either. Every digital interaction like
a message or tweet, is a transaction as well. In today’s web-based world, the scale and volume
of transactions have exploded. The New York Stock Exchange handles 5 million trades a day.11
In contrast, over 5 billion social media transactions are processed every single day.12 Now, along
comes the IoT, further exploding the scale and volume of transactions to be processed.
Indeed, transaction processing could not have scaled to its current level without distributed
computing. Distributed computing has existed for some time now, as have peer-to-peer
systems. But as recent significant advances in peer-to-peer computing meet Moore’s Law, it
will soon be possible to harness the compute power, terabytes of storage and bandwidth that
will be on billions of devices, in millions of locations and sitting idle most of the time for
transaction processing.
9
centers. It’s time for the cloud to move from the data center to your doorknob (see Figure 4).
“The future is already here - it’s just
not very evenly distributed.”
Successful decentralization of the IoT, however, will lie not just in being peer-to-peer, but also
William Gibson, Author13
Adopting peer-to-peer computing to process the hundreds of billions of IoT transactions can
significantly reduce costs associated with installing and maintaining large centralized data
in being trustless: an environment in which there is no need for participants to be trusted and
no centralized, single point of failure.
Figure 4. To be safe, scalable and efficient, Internet of Things networks must be re-architected to gradually shift from
managing billions of devices to hundreds of billions of devices
Before 2005
Today
&
Closed and centralized
IoT networks
2025 and beyond
&
Open access IoT networks,
centralized cloud
Open access IoT networks,
distributed cloud
10
Device democracy
In the absence of a centralized server brokering messages, supporting file storage and
transfers, and arbitrating roles and permissions, any decentralized IoT solution should
support three foundational types of transactions:
• Trustless peer-to-peer messaging
• Secure distributed data sharing
• A robust and scalable form of device coordination.
Peer-to-peer messaging protocols are not new, but emerging trustless peer-to-peer
messaging systems promise to provide a “lightweight” mechanism for highly encrypted,
private-by-design communication among devices on the IoT.14 Our vision is that in the near
future, these trustless peer-to-peer protocols evolve into transport protocols more suited for
the IoT than TCP/IP. Additionally, secure distributed file-sharing protocols have the potential to
replace cloud-based file storage and transfers, enabling secure software and firmware
updates, and direct file sharing among peer devices.
The greatest challenge, however, is not in simply building a decentralized IoT, but one that can
scale universally while maintaining private, secure and trustless transactions. In other words,
the IoT represents a case of billions of players, not all of which can be trusted – some even
malicious – with a need for some form of validation and consensus. And for this, the
“blockchain” offers a very elegant solution.
Why blockchains work for the IoT
A technology breakthrough that has fundamentally changed our notions of centralized authority,
the blockchain is a universal digital ledger that functions at the heart of decentralized financial
systems such as Bitcoin, and increasingly, many other decentralized systems.
11
The blockchain holds a record of every transaction made by every participant. Cryptography
Figure 5
is used to verify transactions and keep information on the blockchain private. Many participants
The blockchain functions as a universal digital ledger facilitating
various types of IoT transactions between devices
verify each transaction, providing highly redundant verification and are rewarded for the
computational work required. By confirming transactions using decentralized consensus,
Universal digital ledger
the blockchain eliminates the need for trust.
While the blockchain may carry regulatory and economic risk as a long-term store of value
(as in the case of Bitcoin), it can be quite revolutionary as a transaction processing tool.15
In our vision of a decentralized IoT, the blockchain is the framework facilitating transaction
processing and coordination among interacting devices. Each manages its own roles and
behavior, resulting in an “Internet of Decentralized, Autonomous Things” – and thus the
democratization of the digital world (see Figure 5).
The role of users
In this democracy of hundreds of billions, users bind with devices using secure identification
and authentication. Users dynamically create and maintain rules of engagement with other
devices. These rules provide a powerful mechanism to define relationships between and
permissions for devices based on user-defined proximity: physical, social or temporal.
Rules could also be defined by 51 percent consensus, as in the case of devices agreeing on
the safety of peer downloadable software updates or banning a misbehaving participant.
User creation and execution of digital checklists based on a pre-defined set of rules aims to
help ensure that the autonomously functioning devices do not fail.
Registration
of new
device
Authentication Contract to barter
of remote
power with other
users
appliances
Checklist for
automobile
safety
12
Device democracy
The role of devices
Devices, on the other hand, are empowered to autonomously execute digital contracts such
as agreements, payments and barters with peer devices by searching for their own software
updates, verifying trustworthiness with peers, and paying for and exchanging resources and
services. This allows them to function as self-maintaining, self-servicing devices.
The power to autonomously trade with other devices opens up whole new business model
opportunities: each device in the network can function as a self-contained business, sharing
capabilities and resources such as compute cycles, bandwidth and power at very low
transaction costs with other devices. Besides the creation of new businesses that tap the
unused capacity of billions of devices, the blockchain also facilitates new markets for service
and consumables associated with those devices.
The role of manufacturers
For device manufacturers and service providers too, a blockchain-based IoT is attractive. It
allows them to transfer maintenance ownership and responsibility to a community of selfmaintaining devices, making the IoT future-proof and saving infrastructure costs on a massive
scale, both during the life of a device and long past its obsolescence.
In this model, users control their own privacy and rather than being controlled by a centralized
authority, devices are the master. The role of the cloud changes from a controller to that of a
peer service provider. In this new and flat democracy, power in the network shifts from the
center to the edge. Devices and the cloud become equal citizens.
Such a device-driven democracy is clearly very compelling for all participants in the IoT
ecosystem. But perhaps its greatest value is at the macro level, not only in creating a scalable
and efficient IoT, but in creating new marketplaces and shaping new business models.
13
Liquifying the physical world
Before the IoT, there was simply the Internet. The Internet of People (as we may come to know
Figure 6
it) has already had an enormous impact on the economy. Its biggest impact, by far, has been
Five vectors of disruption: How the IoT will increase our leverage of
physical assets
in the creation and transformation of markets for digital content such as music, news, maps
and other information.
The IoT will enable a similar set of transformations, making the physical world as liquid,
personalized and efficient as the digital one. Based on historical case studies of digital
disruption, we see five compelling vectors of disruption emerging. They will shift the IoT from
technical curiosity to compelling business strategy (see Figure 6).
Unlocking excess capacity of physical assets
In transforming the market for digital content, the Internet enabled three key elements of
commerce: search, usage and payment. Search became instant and comprehensive. From
music to encyclopedia articles, usage and payment can similarly take place immediately and
entirely online. Some of the transformation that has taken place is a result of the unique
economics of digital content. With a zero marginal cost of reproduction, market clearing
prices for competitive digital markets have reached zero.
The IoT creates the ability to digitize, sell and deliver physical assets as easily as with virtual
goods today. Using everything from Bluetooth beacons to Wi-Fi-connected door locks,
physical assets stuck in an analog era will become digital services. In a device driven
democracy, conference rooms, hotel rooms, cars and warehouse bays can themselves report
capacity, utilization and availability in real-time. By taking raw capacity and making it easy to
be utilized commercially, the IoT can remove barriers to fractionalization of industries that
would otherwise be impossible. Assets that were simply too complex to monitor and manage
will present business opportunities in the new digital economy.
Vectors of disruption
Liquification of the physical
world
Unlock excess capacity of
physical assets
Instantly search, use and pay for
available physical assets
Create liquid, transparent
marketplaces
Real-time matching of supply and
demand for physical goods and
services
Enable radical re-pricing of
credit and risk
Digitally manage risk and assess
credit, virtually repossess and
reduce moral hazard
Improve operational
efficiency
Allow unsupervised usage of
systems and devices, reduce
transaction and marketing costs
Digitally integrate value
chains
Enable business partners
to optimize in real-time,
crowdsource and collaborate
14
Device democracy
Figure 7
Creating liquid, transparent marketplaces
By transforming physical assets and services to behave like the virtual
world, the IoT will create new digital economies
By identifying and matching supply and demand for physical assets and services in real-time,
the IoT will create new marketplaces. These complex, real-time digital marketplaces will build
upon the foundation established by mobile devices and social networks to expand the reach
of this transformation very quickly. They will enable new peer-to-peer economic models and
Unlocking
capacity
foster sharing economies.16 Devices will be able to compete in real-time, be reviewed and
ES
MI
Creating
transparent
marketplaces
NE W
O
AL ECON
GIT
DI
recommended by consensus, and trade on their own, resulting in highly efficient digital
marketplaces.
There is no better historical example of what happens when a continuous flow of capacity
and services meets a powerful set of digital tools to match supply and demand than the role
of Sabre in the airline industry. Uber and Airbnb are the Sabres of today, leading the creation of
Re-pricing of
credit and risk
liquid markets for physical assets such as cars, homes, office cubicles, urban storage, parking
spots and appliances that would not be possible without the IoT.
Radical re-pricing of credit and risk
Another big revolution will be in the creation of personalized risk and credit profiles. The
provision of credit and management of risk today is a crude business, as crude as advertising
was in the era of newspapers and television. Credit bureaus and tax records in mature
western markets sparked a revolution in the availability of consumer credit, but they cover
(crudely) only a tiny portion of the world’s population. Unsecured credit lines in mature
markets like the U.S. are often 8 to 10 times the cost of high quality credit, with remarkably
little variation among customers, a testament to how poorly risk pricing is understood even in
those markets.
15
Instrumentation and digitization enabled by mobile phones and the IoT promise a revolution in
Figure 8
pricing risk and credit. Combining device instrumentation with mobile money, GPS logs and
By reducing transaction and marketing costs, and enabling partnerships
for innovation, the IoT will create new collaborative value
social networks, it will be possible for companies to build much more accurate pictures of real
homes. Together, the unlocking of physical assets, creation of new markets and more
accurate assessment of credit and risk will open the doors to new digital economies
inconceivable before the IoT (see Figure 7).
Finally, there are whole sectors of the economy where information technology is yet to make
any significant impact. In these sectors, not only is there the possibility to unlock assets,
create new markets and better price risk, but the opportunity is highest to improve efficiency
and create entirely new solutions and value (see Figure 8). By definition, it is hard to forecast
entirely new kinds of value, but a good place to start will be those industries that, to date, have
felt little impact from digitization.
Improving operational efficiency
Today, the sector of the economy with the lowest IT intensity is farming, where IT accounts for
just 1 percent of all capital spending. Here, the potential impact of the IoT is enormous.
Farming is capital- and technology-intensive, but it is not yet information-intensive. Advanced
harvesting technology, genetically modified seeds, pesticide combinations, and global
storage and distribution show how complex modern agriculture has become, even without
applying IT to that mix.
Digitally
integrating value
chains
O
LL
ABORATIV
E
LUE
VA
prosperity of consumers, and the spread of modern appliances and other conveniences into
Improving
operational
efficiency
NE W
The expansion of consumer credit at reasonable prices had an enormous impact on the
C
risk, and simultaneously reduce moral hazard and the cost of repossession.
16
Device democracy
Instrumenting and digitizing every step in the agriculture process could yield substantial
returns from close collaboration among farmers, biotechnology companies, farm equipment
manufacturers and capital providers. The array of IoT technologies that can and will be
deployed to make agriculture more productive includes drones to monitor large areas
cheaply, instrumentation for optimized planting and harvesting based on soil and weather
conditions, and field sensors for detailed monitoring.
Digitally integrating value chains
One of the most beneficial ways the IoT will be used is through its ability to integrate value
chains. Using digital technology to integrate value chains has been one of the biggest drivers
of industrial networking technology so far.
Thanks to real-time data feeds, airlines can schedule maintenance and arrange spare parts
to fix defects long before a plane lands. The result: aircraft spend more time in the air earning
money and less time on the ground waiting for maintenance and repairs. These kinds of
high-value services exist today in very limited and closed ecosystems. The IoT will enable
consumers and businesses to operate precisely this kind of value-creating integration across
enterprises and systems at a tiny fraction of the cost of integration in the past. Crowdsourcing
and other open collaboration platforms will further accelerate the creation of shared growth
and innovation.
17
When it comes to enabling virtual vertical integration, there remain relatively few examples of
big industrial successes. Indeed, consortia on the Industrial Internet are just starting the
lengthy process of setting standards. Even as businesses argue over standards, consumers
are racing ahead. Already, there are thousands of system-to-system and system-to-device
integration “recipes” across services and products – slowly being adopted by large
enterprises, but more rapidly by consumers and small businesses that will lead the way.
In the end, the IoT is expected to make the physical world every bit as easy to search, utilize
and engage with as the virtual world. We describe this emerging transformation as the
liquification of the physical world. Just as large financial marketplaces create liquidity in
securities, currencies and cash, the IoT can liquify whole industries, squeezing greater
productivity and profitability out of them than anyone ever imagined possible.
18
Device democracy
Design thinking: Making it better
“Good design is good business.”
As the IoT liquifies the physical world, it will transform many products and experiences by
Thomas Watson, Jr., Former IBM Chairman and CEO
these devices though, networking and remote usage are only secondary features.
embedding connectivity and intelligence in practically everything around us. To most users of
Consumers care most about the primary functional value and user experience.
Tomorrow’s smart devices should create value by applying connectivity and intelligence to
improve the core value proposition of the device: smart cooktops that automatically turn the heat
down when a pot boils over; smart toasters that can tell the difference between golden brown and
burnt; smart washers that can call for maintenance before the product breaks, mix the exact
quantity of detergent needed and use the optimal temperature of water. Consumers will embrace
such solutions because they provide better cooking, less mess, cleaner clothes, increased safety
or greater fitness, not because they are part of complex networks or ecosystems.
First-person technology: What can your device do for you?
Furthermore, in the new democracy of devices where users are in control, devices in the
network should be enabled to act in the best interest of the user, rather than third parties such
as manufacturers, governments or service providers. While architecting the IoT to be
decentralized and autonomous is a step in that direction, design habits also need to evolve to
focus on the value of a connected device to its user. Putting the user first, and designing for
user-centric experiences and value will be critical to adoption of the IoT.
19
As more and more devices around us become connected and intelligent, many physical
products as we know them will be transformed into digital experiences. Many machinehuman interactions will be replaced by machine-machine interactions, and new
machine-human interactions will emerge. A large majority of machine-machine
communication will become invisible while machine-human communication will become
highly interactive (see Figure 9).
As this process unfolds, conventional design thinking will expand. Simple, transparent digital
interfaces will need to seamlessly replace existing physical interactions. And as our
dependence on smart devices increases, it will be essential that these devices are designed
not to fail. Whether for consumers or enterprises, the most successful IoT solutions must be
powerful in their value propositions, simplicity and reliability.
Figure 9
A majority of device communication will be transparent to users, and user interactions will become simple and easy to use
Instrumented
Invisible
Interconnected
Interactive
Intelligent
20
Device democracy
How ready are you for the IoT?
Companies across all industries must grasp the scale of transformation that will occur over
the next decade with the IoT and prepare for its impact. These questions can help to identify
useful steps executives can take toward that goal:
• What are the forecasted infrastructure and maintenance costs to your business to support
the IoT?
• How secure are your IoT solutions today? Do they protect the privacy of users, whether
consumers or enterprises?
• Can your business models survive the longevity of the IoT? Are they built on continuing
revenue expectations from selling data, analytics, software updates and apps?
• What role can your business play in the new digital economies that will form as a result of
the IoT?
• What opportunities exist for your company to improve efficiency and collaborate across the
value chain to create shared innovation and growth?
• Are your smart products and solutions designed to fundamentally improve their core value
propositions in a simple and reliable manner?
21
Methodology: 2014 IBM Internet of Things Study
Our study was comprised of three research components to address the multiple challenges
of a scalable, secure and efficient IoT. We used a “clean sheet approach” and collaborated
with top researchers in IBM to rethink the technology, business models and design concepts
that will shape the connected future.
• Technology strategy: We developed a revolutionary reference architecture for a low-cost,
private-by-design IoT and built concept prototypes to demonstrate feasibility. The next
phase will focus on developing a next-generation platform and partnering externally to
create functional product prototypes.
• Business and economic insights: Our research included a case study approach to
understand historical industry disruptions from digitization to identify the key vectors of
disruption from the IoT. In the next study phase, we are partnering with an economic
research firm to build an industry model to quantitatively establish susceptibility of various
industries to these vectors.
• Product and user experience design: We collaborated with expert user experience and
industrial designers to conceptualize the transformation of physical products into
meaningful digital experiences. In the next phase, we are crowdsourcing ideas related to
these principles to build a set of prototypes that demonstrate greater functional value from
the IoT.
By merging these three streams of research, we offer a tangible vision of the connected future
and findings that can guide executives in making strategic IoT decisions and investments.
22
Device democracy
Winners and losers: A recipe for digital success
The right partner for a changing world
At a macroeconomic level, we are all winners in the IoT future, even though different industries
At IBM, we collaborate with our clients, bringing
will experience a mix of different effects. Overall growth is likely, but profit pools will not be
together business insight, advanced research and
preserved, nor will the distribution of benefits be even. However, winners in the IoT economy
technology to give them a distinct advantage in
will share some common characteristics, as will losers.
today’s rapidly changing environment.
IBM Institute for Business Value
IBM Global Business Services, through the IBM
Institute for Business Value, develops fact-based
strategic insights for senior executives around critical
public and private sector issues. This executive report
is based on an in-depth study by the Institute’s
research team. It is part of an ongoing commitment by
Winners will:
• Enable decentralized peer-to-peer systems that allow for very low cost, privacy and long
term sustainability in exchange for less direct control of data
• Prepare for highly efficient, real-time digital marketplaces built on physical assets and
services with new measures of credit and risk
• Design for meaningful user experiences, rather than try to build large ecosystems or
complex network solutions.
IBM Global Business Services to provide analysis and
Losers will:
viewpoints that help companies realize business value.
• Continue to invest in and support high-cost infrastructure, and be unmindful of security and
For more information
To learn more about this IBM Institute for Business Value
study, please contact us at [email protected]. Follow @
IBMIBV on Twitter, and for a full catalog of our research
or to subscribe to our monthly newsletter, visit:
ibm.com/iibv
Access IBM Institute for Business Value executive
reports on your phone or tablet by downloading the free
“IBM IBV” app for iOS or Android from your app store.
privacy that can lead to decades of balance sheet overhead
• Fight for control of ecosystems and data, even when they have no measure of what its value
will be
• Attempt to build ecosystems but lose sight of the value created, probably slowing adoption
and limiting the usage of their solutions.
23
About the authors
Veena Pureswaran has spent more than 10 years in the Electronics industry and has held
leadership positions in product development, strategy and management. She is currently the
Global Electronics Industry Leader at the IBM Institute for Business Value, responsible for
developing thought leadership for the industry. She can be reached at [email protected].
Paul Brody has spent more than 15 years in the Electronics industry doing extensive
consulting work across supply chain, operations and business strategy. He was formerly
Vice President and North America Leader for the IBM Mobile and Internet of Things practice,
and a founding member of the IBM Industry Academy.
Contributors
John Cohn, IBM Fellow, IBM Corporate Strategy
Peter Finn, Client Architect, IBM Sales and Distribution
Sumabala Nair, Strategy and Analytics Architect, IBM Global Business Services
Sanjay Panikkar, Global SME for Electronics, IBM Global Business Services
24
Device democracy
References
1 Reimer, Jeremy. Total Share: Personal Computer Market Share 1975-2010. December 7,
2012. http://jeremyreimer.com/m-item.lsp?i=137. Accessed on August 29, 2014.
2 Gartner press release. “Gartner Says the Internet of Things Installed Base Will Grow
to 26 Billion Units By 2020.” December 12, 2013. http://www.gartner.com/newsroom/
id/2636073. Accessed on August 29, 2014.
3 Triplett, Jack E. “The Solow productivity paradox: what do computers do to productivity?” Brookings Institution. April 1999. The Canadian Journal of Economics. http://www.
jstor.org/discover/10.2307/136425?uid=3739776&uid=2129&uid=2&uid=70&uid=4&uid=
3739256&sid=21104098246301. Accessed on August 29, 2014.
4 Reimer, Jeremy. Total Share: Personal Computer Market Share 1975-2010. December 7,
2012. http://jeremyreimer.com/m-item.lsp?i=137. Accessed on August 29, 2014.
5 Jorgenson, Dale W., Harvard University; Mun Ho, Resources for the Future; and Jon
Samuels, Johns Hopkins University. “INFORMATION TECHNOLOGY AND U.S. PRODUCTIVITY GROWTH: Evidence from a Prototype Industry Production Account.” November
19, 2010. http://scholar.harvard.edu/files/jorgenson/files/02_jorgenson_ho_samuels19nov20101_2.pdf Accessed on August 29, 2014.
6 Reimer, Jeremy. Total Share: Personal Computer Market Share 1975-2010. December 7,
2012. http://jeremyreimer.com/m-item.lsp?i=137. Accessed on August 29, 2014.
7Ibid.
8 Institute for Business Value analysis.
9 Winkler, Rolfe. “What Google gains from Nest Labs: Data Automation at Heart of $3.2
Billion Deal.” Wall Street Journal. January 14, 2014. http://online.wsj.com/news/articles/
SB10001424052702303819704579321043556056678. Accessed on August 29, 2014.
25
10 Institute for Business Value analysis.
© Copyright IBM Corporation 2015
11 NYSE Transactions, Statistics and Data Library. https://www.nyse.com/data/transactions-statistics-data-library. Accessed on August 29, 2014.
Route 100, Somers, NY 10589
12 The count: Social media counts. Personalizemedia. http://www.personalizemedia.com/
the-count/. Accessed on August 29, 2014.
IBM, the IBM logo and ibm.com are trademarks of International
Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other
companies. A current list of IBM trademarks is available on the Web at
“Copyright and trademark information” at www.ibm.com/legal/
copytrade.shtml.
13 Gibson, William. “Fresh Air.” NPR. August 31, 1993. http://www.notable-quotes.com/g/
gibson_william.html Accessed on August 29, 2014.
14 Maymounkov, Petar and David Mazières. “Kademlia: A Peer-to-peer Information System
Based on the XOR Metric.” New York University. http://pdos.csail.mit.edu/~petar/papers/
maymounkov-kademlia-lncs.pdf. Accessed on August 29, 2014.
15 “A Next-Generation Smart Contract and Decentralized Application Platform.” GitHub:
ethereum/wiki. https://github.com/ethereum/wiki/wiki/%5BEnglish%5D-White-Paper.
Accessed on August 29, 2014.
16“Peer to peer rental: The rise of the sharing economy.” The Economist. March 9, 2013.
http://www.economist.com/news/leaders/21573104-internet-everything-hire-rise-sharing-economy. Accessed on August 29, 2014.
17 Gartner perspective: IT Spending 2010. http://www.financialexecutives.org/eweb/upload/FEI/Gartner.pdf. Accessed on August 29, 2014.
18 Searls, Doc. “Why we need first person technologies on the Net.” March 19, 2014. http://
blogs.law.harvard.edu/vrm/2014/03/19/why-we-need-first-person-technologies-on-thenet/. Accessed on August 29, 2014.
Produced in the United States of America, July 2015
This document is current as of the initial date of publication and may be
changed by IBM at any time. Not all offerings are available in every
country in which IBM operates.
The information in this document is provided “as is” without any
warranty, express or implied, including without any warranties of
merchantability, fitness for a particular purpose and any warranty or
condition of non-infringement. IBM products are warranted according
to the terms and conditions of the agreements under which they
are provided.
This report is intended for general guidance only. It is not intended to be
a substitute for detailed research or the exercise of professional
judgment. IBM shall not be responsible for any loss whatsoever
sustained by any organization or person who relies on this publication.
The data used in this report may be derived from third-party sources
and IBM does not independently verify, validate or audit such data. The
results from the use of such data are provided on an “as is” basis and
IBM makes no representations or warranties, express or implied.
Please Recycle
GBE03620-USEN-04
Empowering the edge
Practical insights on a decentralized Internet of Things
IBM Institute for Business Value
Executive Report
Electronics Industry
Transforming businesses as
the Internet of Things expands
As a global electronics company, we understand the
issues facing the high-tech industry and the continuous
transformation required to thrive. Across the industry,
companies are turning their attention from smartphones and
tablets to a new generation of connected devices that will
transform not just the Electronics industry, but many others.
The IBM Global Electronics practice uniquely combines IBM
and partner services, hardware, software and research into
integrated solutions that can help you deliver innovation,
create differentiated customer experiences and optimize
your global operations.
1
Testing the foundations of
device democracy
Executive summary
Organizations, both private and public, must prepare to
As the IoT scales exponentially, decentralized networks have the potential to reduce
operate in the incomprehensibly immense Internet of
infrastructure and maintenance costs to manufacturers. Decentralization also promises
Things (IoT) that lies ahead. Our first report in this IoT
increased robustness by removing single points of failure that could exist in traditional
series, “Device democracy: Saving the future of the
centralized networks. By shifting the power in the network from the center to the edges,
Internet of Things,” proposes that decentralization can
devices gain greater autonomy and can become points of transaction and economic value
help address the challenges of cost, privacy and
creation for owners and users.
longevity in scaling the IoT to an inevitable hundreds of
billions of devices.1 In this subsequent report, we
describe how we tested that concept using three goals:
• Validate the future vision for decentralized
systems to extensively augment today’s
centralized solutions;
• Demonstrate foundational IoT tasks without the
use of centralized control; and
• Empower devices to engage autonomously in
marketplace transactions.
To validate the underlying technology vision, IBM jointly developed with Samsung Electronics
the Autonomous Decentralized Peer-to-Peer Telemetry (ADEPT) proof-of-concept (PoC).
This represented the second phase of the 2014 IBM Internet of Things Study.
The primary objective of the ADEPT PoC was to establish a foundation on which to
demonstrate several capabilities that are fundamental to building a decentralized IoT. Though
many commercial systems in the future will exist as hybrid centralized-decentralized models,
ADEPT demonstrates a fully distributed proof.
While many commercialization challenges remain, our PoC validated the feasibility of both
implementing the foundational functions of a decentralized IoT, and enabling device
autonomy in IoT transactions and marketplaces. ADEPT opens the door for the electronics
industry to further explore the challenges and opportunities of potential hybrid models that
can address the complexity and variety of requirements posed by an Internet that continues
to scale.
2
Empowering the edge
As we approach the era of hundreds of billions
of devices, a hybrid IoT will evolve, and the
“edge” will complement the center
Through the partnership with Samsung Electronics and collaboration with the open
Devices on the edge can be empowered to
function autonomously in the IoT
• A W9000 Samsung washer autonomously reordering detergent (B2C)
The edge will become a frontier of new
economic value, creating an Economy of Things
source communities, ADEPT successfully demonstrated four use cases using functional
Samsung products:
• A W9000 Samsung washer autonomously reordering service parts (B2C)
• A W9000 Samsung washer autonomously negotiating power usage (B2C)
• Samsung Large Format Displays (LFDs) autonomously displaying advertising
content (B2B).
By empowering devices to engage autonomously in markets – both financial and nonfinancial – and react to changes in markets, the IoT will create an “Economy of Things.”
Virtually every device and system can potentially become a point of transaction and economic
value creation for owners and users. These capabilities will be crucial to everything from
enabling sharing economies to energy efficiency and distributed storage.
3
Three foundational functions
To perform the functions of traditional IoT solutions without a centralized broker, any
decentralized approach must support three foundational functions (see Figure 1):
• Peer-to-peer messaging
• Distributed file sharing
• Autonomous device coordination.
The ADEPT PoC implemented these functions using three open source protocols: Telehash
for messaging, BitTorrent for file sharing and Ethereum, a blockchain protocol for autonomous
device coordination functions such as device registration, authentication, proximity-based
and consensus-based rules of engagement, contracts and checklists.
Figure 1
In the ADEPT PoC, devices are empowered to perform three foundational functions
Peer-to-peer messaging
Distributed file sharing
Autonomous device coordination
Share
analytics data
Notify
owner
Authenticate
untrusted device
Barter energy,
bandwidth
and computing
power
Make
payment
4
Empowering the edge
Peer-to-peer messaging in a
decentralized IoT must support:
trustless, encrypted messaging and
transport; low latency with guaranteed
delivery; and storage and forwarding
of messages with “hop-on” to other
connected devices.
Peer-to-peer messaging
Peer-to-peer networks are capturing much emerging interest because they provide a good
platform for distributed computing. Today, such networks support a rich list of features,
including selection of nearby peers, redundant storage, efficient search/location of data,
data permanence or guarantee, hierarchical naming, trust and authentication, and anonymity.2
Peers can share computing resources without dependency on a central cloud or server,
thereby optimizing resource utilization and cost involved in subscribing to a central service.
A network of peers with diverse capabilities and resources could further strengthen the
overall stability and performance of the system without dependency on a third party.
Peer-to-peer messaging in a decentralized IoT must support:
• Trustless, encrypted messaging and transport
• Low latency with guaranteed delivery
• Storage and forwarding of messages with “hop-on” to other connected devices.
Distributed Hash Tables (DHTs) can meet such messaging requirements, enabling peers to
search for other peers on the network using a hash table with (key, value) pairs stored in the
DHT.3 Each device can generate its own unique public key-based address (a hashname) to
send and receive encrypted messages with other endpoints.
For ADEPT, of the many messaging protocols considered, an emerging open source
messaging protocol, Telehash, best matched our goals for peer-to-peer messaging. Telehash
is an open source DHT implementation of the Kademlia protocol.4 Our protocol choices were
made based on their current capabilities and our ability to implement them in a PoC. In our
demonstration of a decentralized IoT, Telehash is used primarily for notifications among
devices without using a centralized server.
5
Distributed file sharing
Figure 2
In a decentralized IoT, distributed file sharing enables content distribution such as
An autonomous device coordination framework enables transactions
among devices, from simple registration to complex checklists
propagating software/firmware updates, transfer of device analytics reporting and media
content for files of large orders of magnitude. Such distributed file sharing can also be
achieved securely via distributed peer-to-peer networks using DHT. BitTorrent, a well-known
DHT file sharing protocol was chosen for ADEPT file sharing. In our demonstration of a
decentralized IoT, BitTorrent is used primarily for content distribution without using a
Autonomous device coordination framework
Checklists
centralized server.
Autonomous device coordination
By not requiring a third-party arbiter of roles and permissions, an autonomous device
coordination approach empowers owners of devices to define and manage their own
interactions. Simple device coordination functions include registration and authentication.
More complex interactions require the owner or user to define rules of engagement. These
rules could be proximity-based (physical, social or temporal), consensus-based (selection,
validation or blacklisting), or triggered by other device stimuli.
Contracts
• Agreements
• Payments
• Barter
Rules of engagement
• Proximity-based rules
(physical, social and temporal)
• Consensus-based rules
(selection, validation and blacklisting)
Another form of device coordination is contracts – simple agreements about actions or
control, more complex financial contracts involving payments or barter contracts that allow
Authentication
devices to exchange their resources for a service. Digital checklists allow devices to maintain
themselves to prevent failure.
To implement such an autonomous device coordination framework across a network of
devices in our PoC, we chose the blockchain technology platform (see Figure 2).5
Registration
6
Empowering the edge
Building a blockchain-based IoT
Applying the blockchain concept to the
IoT offers fascinating possibilities that
include maintaining product
information, history, product revisions,
warranty details and end-of-life so
that the blockchain itself can become
the trusted product database.
A blockchain – the technology platform underlying the decentralized financial system
Bitcoin – is a long ledger of transactions shared by participants of the network. A full copy
of the blockchain holds a record of every transaction ever completed in the network. Every
blockchain participant can maintain its own copy of the ledger, although the amount of data
stored will vary based on capability, need and preference. Every block on the ledger contains
a “hash” of the previous block.
This enables blocks to be traced back even to the first (“genesis”) block. It is computationally
prohibitively difficult and impractical to modify a block once it is created, especially as the chain
of subsequent blocks get generated. Blocks in shorter chains are automatically invalidated by
virtue of there being a longer chain – all participants adopt the longest available chain.
Applying the blockchain concept to the world of IoT offers fascinating possibilities. As soon as
a product completes final assembly, it can be registered by the manufacturer into a universal
blockchain representing its beginning of life. Once sold, a dealer or end customer can register
it to a regional blockchain (a community, city or state). When registered, the product remains a
unique entity within the blockchain throughout its life. The possibility of maintaining product
information, history, product revisions, warranty details and end-of-life in the blockchain
means the blockchain itself can become the trusted product database.
For example, imagine a world where a smart device is able to detect a component failure,
check warranty status on the blockchain, place a service order with a contracted service
provider and have the service provider independently verify the warranty claim – again from
the blockchain – all autonomously. In such a world, we would redesign and simplify how we
7
design our master data management systems, after-sales systems, and order processing
and management. A blockchain-based, decentralized IoT can become a truly revolutionary
approach to transaction processing among devices (see Figure 3).
It is important to note that while Bitcoin contains an escalating difficulty in the blockchain
mining process to restrict the issuance of currency, no such restriction is necessary in our
vision of blockchains for the IoT. For the ADEPT implementation of a blockchain-based IoT,
we chose the Ethereum protocol in its alpha version.6 Ethereum’s improvements to the
traditional blockchain approach of Bitcoin, the Turing complete scripting languages it
introduced and its ability to create binding contracts were extremely compelling for our PoC.
Figure 3
The blockchain functions as a distributed transaction ledger for various IoT transactions
Universal digital ledger
Register
new devices
Authenticate
remote users
Barter power with
other appliances
Run checklist for
automobile safety
8
Empowering the edge
Three device types
Devices in the IoT vary widely by computing power, networking capability, storage space,
whether they are AC or battery powered, and stationary or mobile, to mention a few. Devices
will be part of ecosystems that can also require continuously evolving levels of trust. As more
transactions occur between peer devices, trust will evolve between them. What starts as an
interaction between two trustless peers can over time become a semi-trusted or even a
trusted relationship.
So the extent of transaction verification required between devices depends on many factors:
the kind of device, nature of the interaction, kind of relationship between the devices and also
the constraints imposed by device owners on what the devices can and cannot do in specific
circumstances. Based on these considerations, we identified three broad categories of
devices and defined the decentralized IoT capabilities of each (see Figure 4).
Figure 4. Device capabilities get increasingly sophisticated in moving from light peers to standard peers to peer exchanges
Peer exchange
Standard peer
Marketplace management and analytics tools
Transaction verification
Light peer
Device level analytics
Autonomous device coordination framework
Blockchain
Messaging
File transfer
Related peer list
9
Different devices in the IoT support different degrees of ADEPT functionality, depending on
their performance and storage capabilities. At the lowest end are light peers: devices such as
wearables and light switches that perform basic IoT functions like messaging. At the other
end of the device spectrum, peer exchanges on servers or clouds enable more complex
marketplace transactions as peer services.
As these devices become peers of a decentralized network, it is essential that each can
identify itself uniquely to peers in a verifiable manner, retain details on its relationship with
different peers and identify peers unambiguously across protocols. These actions are
achieved by means of a secure peer list.
Light peers
Light peers are devices with low memory and storage capabilities, such as sensors and
devices supporting light applications. Current representatives of light peers include
Raspberry Pi, Beaglebone and Arduino boards.
Light peers perform messaging, retain a light wallet with their blockchain addresses and
balances, and perform minimal file sharing: for example, receiving firmware updates or
sending a transaction summary file to another peer based on a business or functional need.
To obtain its blockchain transactions, a light peer will turn to a trusted peer.
Devices on the edge perform different
roles in a decentralized IoT based on
their capabilities.
10
Empowering the edge
The peer exchange not only supports
transaction verification, but also
functions like a financial exchange by
providing liquidity for transactions
between devices in the marketplace.
Standard peers
In the next few years, we expect processing power and storage capabilities of most products
to increase as the cost of general-purpose computing declines. The incremental cost to
manufacturers or end consumers for increased computing power and storage will be
insignificant.
So washers and refrigerators of the future, for example, will be equipped with higher storage and
processing capabilities that make it possible to meet blockchain requirements for
a specified period of time – not only of themselves but also of light peers in their trusted
environment. We expect such products to become the standard in the years to come.
At the core level, a standard peer is very similar to a light peer, but it retains a part of the
blockchain, based on its capabilities. This could include its own recent transactions, but also
those of other lighter devices in the ecosystem that it holds contracts with. Standard peers
can also support light peers in performing file transfers. They will have capabilities to store
and forward messages to peers and to perform light analytics for themselves and peers.
Peer exchanges
Peer exchanges are high-end devices with vast computing and storage capabilities. In a
decentralized IoT, they are also peers, owned and operated by organizations or commercial
entities and capable of hosting marketplaces. Marketplace components such as analytical
solutions, payment exchanges, fraud detection, trade and legal compliance packages, and
demand-supply matching solutions are supported by peer exchanges, as well as the
integration capabilities required to support and interoperate with other business solutions.
11
Peer exchanges are also potential repositories for a complete copy of the blockchain and
Figure 5
provide blockchain analytical services. The size of blockchains can rapidly increase in
Marketplaces hosted by peer exchanges provide liquidity for transactions
between devices
scenarios where a city or community may have millions of IoT devices. Even standard peers
Peer exchange
with advanced processors and storage may not be able to hold blockchain information for
themselves and the peers they service for more than a few days. However, with the blockchain
being the trusted source of information holding all product transactions, it is important to be
able to access it at a regional or community level going back in time, in some cases back to
Marketplace management and analytics tools
the start of a product’s life.
For example, a solar micro-grid may be commissioned for a decade or a smart street light
may have been registered a few years back. When servicing or support is needed, blockchain
access may verify the first registration or installation details.
Service
lifecycle
Commerce
Peer/device
lifecycle
The peer exchange, somewhat akin to the role performed by current-day financial exchanges,
performs supply and demand balancing across the marketplace. So resources offered by
a set of assets in one community might turn to a peer exchange for buyers in another.
Demand-supply
matching
Content
management
Blockchain
management
Peer exchanges then become more than a large server or cloud offering memory and technical
support They become the lifeline for new economic opportunities – the new “silk roads” –
making possible the liquification of assets described in “Device democracy” (see Figure 5).7
Marketplace security
and privacy
Business
intelligence
12
Empowering the edge
Transforming the IoT into an Economy of Things
By enabling devices to engage autonomously in marketplaces and supporting complex
marketplace transactions, the IoT is expected to improve the utilization and profitability of
physical assets and devices. By transforming every device into a point of transaction and
economic value creation for owners and users, the IoT will create new real time digital
economies and new sources of value. We call this transformation the “Economy of Things.”
To demonstrate the feasibility of a decentralized IoT and its role in creating new digital
economies, the ADEPT PoC use case scenarios spanned a spectrum of devices and
marketplace transactions. A set of B2C and B2B use cases was implemented on functional
Samsung products in close collaboration between IBM and Samsung.
The B2C ADEPT use cases demonstrated how a washer can become an autonomous device
capable of managing its own consumables supply, perform self-service and maintenance,
and even negotiate with other devices – both in the home and outside – to optimize energy
consumption. These use cases can be extended to scenarios where micro-commerce
solutions can be built using a set of ordinary home appliances.
All of these functions were achieved without a central controller orchestrating or mediating
between the devices (see Figure 6). The B2B ADEPT use case demonstrated a decentralized
advertising marketplace using LFDs to share and publish content, all without a centralized
controller (see Figure 7).
13
Figure 6
Figure 7
The ADEPT washer participated autonomously in the consumables, energy and service marketplaces
Large format displays participated autonomously in a decentralized
advertising marketplace
Marketplaces
Consumables
Energy
Service
Advertiser
Delivers content
Retailer - detergent check
Order and payment Confirmation
TV - negotiate power usage
Service vendor - warranty check
Negotiation
Service request
Payment
Confirmation
ADEPT washer
Displays
Share and publish content
Notification
Washer owner
LFD owner
•Receives analytics
•Confirms approval
•Finalizes payment
14
Empowering the edge
From proof-of-concept to commercialization:
A hybrid future
ADEPT shows great promise for tomorrow’s IoT. As “Device democracy” notes, the humble
work of transaction processing is the foundation of modern computing workload.8 Thanks to
major advances in both device technology and software, it is now possible to bring
transaction processing, marketplaces and intelligence to virtually every device, anywhere.
Distributed systems like ADEPT can make businesses and consumers more efficient and
open a huge range of economic opportunities. These technological changes could foretell
the biggest revolution since the origin of general purpose computing and transaction
processing systems.
Future commercial systems may exist as hybrid centralized-decentralized systems depending
on the value, longevity and application of devices on the IoT. The feasibility of ADEPT paves
the way for augmenting today’s centralized IoT solutions with more decentralized capabilities
(see Figure 8).
15
Figure 8
The feasibility of ADEPT paves the way for augmenting centralized IoT solutions with peer-to-peer approaches
IBM IoT platform
Industry solutions
High
Low
Hybrid
Lower complexity
and faster change
management
Device self-care,
lower costs and
fast reaction time
Centralized
Decentralized
Lowest cost on the
device and very little
centralized cost
Lowest long-term
cost structure
Design and
engineer
Operate
Manage
Analyze and optimize
Connect, collect and command
Device
longevity
High
Protocols
Devices
gateways
and assets
Peer-to-peer
connection
ADEPTenabled
devices
Secure
Device
value
Centralized
The ADEPT PoC opens the door for
the electronics industry to further
explore the challenges and
opportunities of potential hybrid
models that can effectively augment
today’s centralized solutions.
16
Empowering the edge
Recommendations
Augment centralized with decentralized
As the IoT continues to grow, IoT practitioners must evaluate opportunities to augment
existing IoT solutions with peer-to-peer models. Low-cost, high-longevity device applications
are good candidates to begin the expansion to a more hybrid IoT. Industries where services
are tightly controlled and economies that incur massive infrastructure costs from digitization
are likely to benefit most from a hybrid model.
Collaborate for change
This report provides insights to IoT practitioners from a functional PoC of a decentralized IoT.
But to develop commercially viable solutions, it is imperative that core technologies be made
more robust to meet the challenges of a peer-to-peer network of hundreds of billions of
devices. Actively engage with the IoT and blockchain communities to take critical steps to
address these challenges.
Act now
Clearly, there are still significant scalability challenges associated with commercializing
distributed systems, as well as security, coordination, intellectual property management, and
identity and privacy issues. One strategy that does offer certainty, however, is not advisable:
sitting on the sidelines and waiting for others to pioneer this technology. Choosing that
seemingly safer option merely raises the likelihood that when today’s risks have been
resolved, it will be difficult to catch up with market leaders.
17
Are you preparing to benefit from the evolving IoT?
Companies across industries must grasp the scale of IoT transformation that will occur over
Related publication
the next decade and get ready for its impact. These questions can help to identify useful
Brody, Paul and Veena Pureswaran. “Device
steps that practitioners and executives can take toward that goal:
democracy: Saving the future of the Internet of Things.”
• How will you forecast the infrastructure and maintenance costs necessary for your
business to support and engage in the IoT?
• How can you evaluate the security of your IoT solutions today? How will they continue to
protect the privacy of users, whether consumers or enterprises?
• What is your plan to help your IoT solutions survive the longevity of the devices they
support?
• To what extent can your existing IoT benefit from a decentralized or hybrid model?
• What opportunities exist for your company to improve efficiency and collaborate across
the IoT community to capitalize on hybrid IoT models ahead?
IBM Institute for Business Value. September 2014.
www.ibm.biz/devicedemocracy
For more information
To learn more about this IBM Institute for Business Value
study, please contact us at [email protected]. Follow @
IBMIBV on Twitter, and for a full catalog of our research
or to subscribe to our monthly newsletter, visit:
ibm.com/iibv
Access IBM Institute for Business Value executive
reports on your phone or tablet by downloading the free
“IBM IBV” app for iOS or Android from your app store.
18
Empowering the edge
About the authors
Veena Pureswaran has spent more than 10 years in the Electronics industry and has held
leadership positions in product development, strategy and management. She is currently the
Global Electronics at the IBM Institute for Business Value, responsible for developing thought
leadership for the industry. She can be reached at [email protected]
Sanjay Panikkar has spent more than 10 years in the Electronics industry leading client
projects on supply chain and smarter electronics. As a member of the Electronics Center of
Competence, he led the PoC implementation of ADEPT with Samsung Electronics. He can be
reached at [email protected]
Sumabala Nair has spent more than 10 years as a client architect. She is currently a member
of the IBM Global Business Services Business Analytics and Strategy team. She was the
lead architect of the ADEPT PoC with Samsung Electronics and can be reached at
[email protected]
Paul Brody has spent more than 15 years in the Electronics industry doing extensive
consulting work across supply chain, operations and business strategy. He was formerly the
Vice President and North America Leader for the IBM Mobile and Internet of Things practice,
and a founding member of the IBM Industry Academy.
19
Contributors
The right partner for a changing world
John Cohn, IBM Fellow, IBM Corporate Strategy
At IBM, we collaborate with our clients, bringing
Yunjung Chang, Senior Managing Consultant, IBM Global Business Services
Gurvinder Ahluwalia, CTO Cloud Computing, IBM Global Technical Services
Peter Finn, Client Architect, IBM Sales and Distribution
together business insight, advanced research and
technology to give them a distinct advantage in
today’s rapidly changing environment.
IBM Institute for Business Value
Richard Brown, Executive Architect, IBM Sales and Distribution
IBM Global Business Services, through the IBM
Kevin Daley, Business Architect, IBM Global Business Services
Institute for Business Value, develops fact-based
Joni McDonald, Content Strategist, IBM Sales and Distribution
Angela Finley, Visual Designer, IBM Sales and Distribution
Acknowledgments
The authors would like to thank Dr. WonPyo Hong (President), Dr. JinSoo Yoon (VP and Lead
of Decentralized IoT) and the Media Solution Center development team at Samsung
Electronics, Seoul for their support and collaboration on the ADEPT PoC. We would also like
to acknowledge the contributions of the Ethereum team: Vitalik Buterin, Stephan Tual and
Gavin Wood; and Jeremie Miller of Telehash. We also thank the IBM Design team for their help
with use case design. And finally, we thank the IBM Korea team for their support, as well as the
following IBM colleagues who were involved in the implementation of the ADEPT PoC: Nikhil
Baxi, Amir Kamal, Hari Reddy and JungWon Cho.
strategic insights for senior executives around critical
public and private sector issues. This executive report
is based on an in-depth study by the Institute’s
research team. It is part of an ongoing commitment by
IBM Global Business Services to provide analysis and
viewpoints that help companies realize business value.
20
Empowering the edge
Notes and sources
1 Brody, Paul and Veena Pureswaran. “Device democracy: Saving the future of the Internet of
Things.” IBM Institute for Business Value. September 2014. www.ibm.biz/devicedemocracy
2 Eng Keong Lua, Crowcroft, J., Pias, M., Sharma, R. and Lim, S. “A survey and comparison of
peer-to-peer overlay network schemes.” IEEE Communications Surveys and Tutorials. 2005.
3 Maymounkov, Petar and David Mazières. “Kademlia: A Peer-to-peer Information System
Based on the XOR Metric.” New York University. http://pdos.csail.mit. edu/~petar/papers/
maymounkov-kademlia-lncs.pdf. Accessed on August 29, 2014.
4 Telehash: Encrypted mesh protocol. http://telehash.org. Accessed on March 24, 2015.
5 Leishman, Alexander, latest editor. “A Next-Generation Smart Contract and Decentralized
Application Platform.” GitHub: ethereum/wiki. March 18, 2015. https://github.com/
ethereum/wiki/wiki/White-Paper. Accessed on March 24, 2015.
6 Ethereum: A platform for decentralized applications. https://www.ethereum.org. Accessed
on March 24, 2015.
7 Brody, Paul and Veena Pureswaran. “Device democracy: Saving the future of the Internet of
Things.” IBM Institute for Business Value. September 2014. www.ibm.biz/devicedemocracy
8ibid.
21
© Copyright IBM Corporation 2015
Route 100, Somers, NY 10589
Produced in the United States of America, April 2015
IBM, the IBM logo and ibm.com are trademarks of International
Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other
companies. A current list of IBM trademarks is available on the Web at
“Copyright and trademark information” at www.ibm.com/legal/
copytrade.shtml.
This document is current as of the initial date of publication and may be
changed by IBM at any time. Not all offerings are available in every
country in which IBM operates.
The information in this document is provided “as is” without any
warranty, express or implied, including without any warranties of
merchantability, fitness for a particular purpose and any warranty or
condition of non-infringement. IBM products are warranted according
to the terms and conditions of the agreements under which they
are provided.
This report is intended for general guidance only. It is not intended to be
a substitute for detailed research or the exercise of professional
judgment. IBM shall not be responsible for any loss whatsoever
sustained by any organization or person who relies on this publication.
The data used in this report may be derived from third-party sources
and IBM does not independently verify, validate or audit such data. The
results from the use of such data are provided on an “as is” basis and
IBM makes no representations or warranties, express or implied.
Please Recycle
GBE03662-USEN-02
IBM GLOBAL BUSINESS SERVICES
Executive Summary
Electronics Industry
IBM Institute for Business Value
Empowering the edge
Use case abstract for the ADEPT proof-of-concept
Overview
This use case abstract supplements
the IBM Institute for Business Value
practitioner perspective, “Empowering the
edge: Practical insights on a decentralized
Internet of Things.” These ADEPT B2C
and B2B use cases spanned devices and
capabilities, and were executed with
functional Samsung products in close
collaboration with Samsung Electronics.
This abstract illustrates the value of
devices autonomously performing various
IoT transactions, both financial and
non-financial, thereby potentially creating
new digital economies.
The B2C use cases were implemented for the Autonomous Decentralized
Peer-to-Peer Telemetry (ADEPT) proof-of-concept (PoC) in the second
phase of the 2014 IBM Internet of Things Study. The B2C cases were:
• A W9000 Samsung washer autonomously reordering detergent
• A W9000 Samsung washer autonomously reordering service parts
• A W9000 Samsung washer autonomously negotiating power usage.
The B2B case consisted of Samsung Large Format Displays (LFDs)
autonomously displaying advertising content.
B2C cases: Autonomous washer participates
in the consumables, service and energy
marketplaces
Our set of B2C use cases was demonstrated by a washer, a common
household appliance. Using ADEPT, it became an autonomous device
capable of managing its own consumables supply, performed self-service
and maintenance, and even negotiated with other devices, both in the
home and outside, to optimize energy consumption.
We also envision scenarios where micro-commerce solutions can
be built using a set of ordinary home appliances. Functions such as
warranty checks, payments and notifications would be achieved without
a central controller orchestrating or mediating between the devices – a
revolutionary result based on how appliances generally work today.
1
IBM GLOBAL BUSINESS SERVICES
Executive Summary
Electronics Industry
Use case 1. Consumables marketplace: A washer orders its own
detergent
Today, most appliances with consumables require the user to order or
purchase refills via a retailer. Examples include: printer cartridges,
coffeemaker filters, disposable vacuum cleaner bags, refrigerator water
filters and washer detergent.
The ADEPT washer consumables use case is based on the premise that
appliances of the future will have sufficient intelligence to autonomously manage their consumables by engaging in real-time with a consumables marketplace (see Figure 1). The Samsung washer W9000 used for
demonstration of the PoC can run device-level analytics to detect when
its detergent supply runs low. In addition, the ADEPT-enabled W9000
washer was able to:
• Query the blockchain and determine that there was a pre-existing
contract with a retailer for the refill of detergent
• Request a detergent refill by means of a peer-to-peer message to the
retailer
• Invoke a pre-existing contract with the retailer and make a secure
payment for the order over the blockchain
• Inform the owner via a peer-to-peer message that a replenishment
order was being placed.
The retailer in this case was able to:
• Determine the validity of the contract with the washer on the blockchain
• Receive secure payment through the contract over the blockchain
• Generate the refill order once the payment was received
• Communicate delivery details to the washer by means of a peer-to-peer
message.
Figure 1
IoT transactions for the autonomous washer’s order of a consumable (detergent, in this case).
1 Detergent falls below reorder level
Washer analytics triggers reorder request
2 Washer checks for existing retailer contract on the blockchain
(Ethereum)
3 Washer requests detergent reorder (Telehash)
4 Washer makes payment using existing contract on blockchain
(Ethereum)
5 Retailer creates refill order
6 Retailer dispatches confirmation (Telehash)
7 Washer and retailer notify owner of detergent reorder (Telehash)
In a more complex scenario of this use case, retailers would be able to bid
on the blockchain based on price, inventory or delivery performance, and
consumers (the appliances themselves) could select retailers by consensus.
Such a decentralization of the marketplace opens up economic opportunities in industries that are otherwise very tightly controlled.
2
IBM GLOBAL BUSINESS SERVICES
Executive Summary
Electronics Industry
Use case 2. Service marketplace: A washer requests and pays for its
own maintenance call
The appliance service market today is very fragmented, with neither service
providers nor consumers achieving the highest level of value in the marketplace. The ADEPT PoC attempted to better connect supply and demand in
service marketplaces by leveraging features of the blockchain. Every
ADEPT-enabled device has key information, such as its device ID and
warranty information, registered to the blockchain. Devices also store their
own warranty information in the local peer list. In addition to detecting an
impending part failure, the autonomous washer was able to autonomously
order a service replacement part in the marketplace.
For this use case, the ADEPT washer was enabled to engage in the
following actions (see Figure 2):
• Run device analytics to assess part or component performance. The
washer triggered a service request when an impending part or component failure was detected.
• Query its peer list for local warranty details to determine its own
warranty status
• Identify an appropriate service vendor by checking for peer-rated
consensus over the blockchain
• Once a service vendor was selected, the washer raised a service request to
the service vendor. If the appliance was under warranty, no payments
would be needed. If out of warranty, the appliance, owner and service
vendor could create a new contract to make a payment.
• Upon receiving the request, the service vendor checked the warranty
status of the device in the blockchain
• Upon verification of active warranty coverage, the service request was
then accepted as a service order in the vendor’s service system and the
details were sent to the washer, along with a notification to the owner
• The owner and vendor could negotiate through messaging to confirm
when the service professional would arrive to replace the part.
Figure 2
IoT transactions for autonomous washer service order.
1 Washer detects potential air filter failure
2 Washer checks
warranty status on
the blockchain
(Ethereum)
3 Washer finds
authorized service
center by consensus
on the blockchain
(Ethereum)
4 If in warranty,
washer places
replacement
order
6 Service provider
verifies warranty
status on the
blockchain
(Ethereum)
If in warrany, dispatch
confirmation (Telehash)
5 Washer
notifies
owner of
order details
(Telehash)
7 Service
provider
notifies owner
of service
call details
(Telehash)
In a more complex scenario of this use case, service providers could bid
on the blockchain – based on an inventory of service parts, utilization
and proximity of service personnel, quality of service and other chosen
variables – and consumers would be able to select a service provider by
consensus. Such a decentralization of the service marketplace should improve
profitability in industries that otherwise are not operating at optimal capacity.
3
IBM GLOBAL BUSINESS SERVICES
Executive Summary
Electronics Industry
Use case 3. Energy marketplace: Home appliances negotiate power
usage to reduce costs
Physical assets often have unused capacity or resources a majority of the time.
These resources could include compute power, memory, bandwidth or energy.
Such excess capacity and resource often cannot be effectively utilized due to
insufficient discoverability, security or payment mechanisms.
By improving discoverability, usability and payment mechanisms, ADEPT
enables better resource optimization between devices. A small instance of
this concept is captured in the use case of the ADEPT washer participating
in a power bartering transaction to optimize overall energy consumption.
In this use case, the washer created a contract to negotiate transactions and
payments among power-hungry appliances in the home (see Figure 3).
The washer was enabled to:
• Subscribe to analytics from a feeder that indicated an upcoming spike in
energy price. Accordingly, it determined that a power negotiation with its
peers was required to protect the owner from punitive charges.
• Detect that the TV was operational and request it to “power down.”
(A TV was used for demonstration purposes, but this scenario could apply
to other appliances).
The TV was enabled to:
• Run analytics to recognize that it could not power down because the
request came during peak TV viewing time
• Send a notification to the washer declining to power down and, in turn,
compensate the washer with owner-approved payment, per the contract
• Make a secure payment and delay the washer cycle to a pre-determined time
• Inform TV viewers that an impending power price hike was offset by the
washer delaying its cycle.
Figure 3
IoT transactions for autonomous energy barter between appliances.
1 Owner creates contracts
for devices. For example,
do not turn off TV during
peak viewing hours
2 Washer subscribes to analytics
from feeder. Analytics shows
spike in energy price from
peak usage
3 Washer requests TV
to power down (Telehash)
5 TV declines request to
power down (Telehash)
7 Washer notifies owner
of new wash cycle
4 TV runs analytics to
determine peak
viewing time
6 TV offers secure
payment in exchange
for washer delaying
cycle by 3 hours
An extension of this use case showed the washer negotiating directly with a
community-owned micro-grid. In exchange for a specific number of KWH
of power for one week, the washer was able to offer a pre-determined
number of free wash cycles to community members at a later date, per a
contract between the owner and the community.
4
IBM GLOBAL BUSINESS SERVICES
Executive Summary
Electronics Industry
B2B case: Large Format Displays (LFDs)
participate in the advertising marketplace
Use case 4. Advertising marketplace: Devices control content and
scheduling
Advertising is another marketplace that is highly centralized today with
content tightly controlled by a few large players. Our B2B ADCast use
case demonstrated a decentralized advertising marketplace using Large
Format Displays (LFDs) to share and publish content, all without a
centralized authority (see Figure 4). The LFD owner had multiple
LFDs hosted at strategic locations. In this use case, the LFD owner:
• Published availability of display slots in real time
• Leased display space on the devices to candidates after reviewing their
content.
LFDs participating in this marketplace were enabled to:
• Discover available slots in real time and submit a request to display
content
• Receive content uploaded by the owner through distributed file sharing
• Approve and automatically transmit content to be displayed at appropriate time slots
• Make and receive secure payments for displaying content through the
blockchain.
Figure 4
IoT transactions for an autonomous advertising marketplace
Advertiser
1 Selects target LFDs
2 Requests approval (Telehash)
4 Makes digital payment (Ethereum)
LFD owner
6 Uploads ad content (Bittorrent)
8 Checks usage and revenue analytics
3 Confirms approval (Telehash)
5 Confirms payment (Telehash)
7 Share and publish ad
content (Bittorrent)
5
IBM GLOBAL BUSINESS SERVICES
Executive Summary
Electronics Industry
Authors
Veena Pureswaran
[email protected]
Sanjay Panikkar
[email protected]
Sumabala Nair
[email protected].
To read the full report associated
with this use case abstract,
visit ibm.com/services/
us/gbs/thoughtleadership/
empoweringedge
To learn more about this IBM
Institute for Business Value
study, please contact us at iibv@
us.ibm.com. Follow @IBMIBV on
Twitter and for a full catalog of our
research, visit: ibm.com/iibv
Access IBM Institute for Business
Value executive reports on your
phone or tablet by downloading
the free “IBM IBV” app for iPad or
Android from your app store.
6
IBM GLOBAL BUSINESS SERVICES
Executive Summary
Electronics Industry
Related publications
Pureswaran, Veena, Sanjay Panikkar, Sumabala Nair and Paul Brody.
“Empowering the edge: Practical insights on a decentralized Internet of
Things.” IBM Institute for Business Value. March 2015. http://www935.ibm.com/services/us/gbs/thoughtleadership/empoweringedges/
Brody, Paul and Veena Pureswaran. “Device democracy: Saving the
future of the Internet of Things.” IBM Institute for Business Value.
September 2014. www.ibm.biz/devicedemocracy
IBM Institute for Business Value
The IBM Institute for Business Value, part of IBM Global Business
Services, develops fact-based strategic insights for senior business
executives on critical public and private sector issues.
The right partner for a changing world
At IBM, we collaborate with our clients, bringing together business
insight, advanced research and technology to give them a distinct
advantage in today’s rapidly changing environment.
7
© Copyright IBM Corporation 2015
IBM Global Services
Route 100
Somers, NY 10589
U.S.A.
Produced in the United States of America
April 2015
All Rights Reserved
IBM, the IBM logo and ibm.com are trademarks or registered trademarks
of International Business Machines Corporation in the United States, other
countries, or both. If these and other IBM trademarked terms are marked on
their first occurrence in this information with a trademark symbol (® or ™),
these symbols indicate U.S. registered or common law trademarks owned by
IBM at the time this information was published. Such trademarks may also
be registered or common law trademarks in other countries. A current list of
IBM trademarks is available on the Web at “Copyright and trademark
information” at www.ibm.com/legal/copytrade.shtml
Other company, product and service names may be trademarks or service
marks of others.
References in this publication to IBM products and services do not
imply that IBM intends to make them available in all countries in which IBM
operates.
This report is intended for general guidance only. It is not intended to be a
substitute for detailed research or the exercise of professional judgment. IBM
shall not be responsible for any loss whatsoever sustained by any organization
or person who relies on this publication.
The data used in this report may be derived from third-party sources and
IBM does not independently verify, validate or audit such data. The results
from the use of such data are provided on an “as is” basis and IBM makes no
representations or warranties, express or implied.
Please Recycle
GBE03666-USEN-01
Links In The Chain
What Role Can Blockchain Technology Play in Facilitating
The Internet of Things Revolution?
Lance Koonce, Davis Wright Tremaine LLP
dwt.com
What is the Blockchain?
If you don’t yet know, or don’t fully get it, you’re not alone.
dwt.com
The Blockchain in Sixty Seconds
 Blockchain is the technology under the hood of Bitcoin
– But while it started with Bitcoin, it is now being used independently
 A blockchain creates a permanent record or ledger of
transactions
 Distributed across many computers
 Secured by cryptography
 Permits direct transfer of information & value between parties
– Worth saying again: NO INTERMEDIARIES are involved in transfers
 Key to blockchain tech is that the distributed nature of the
system supplies the element of TRUST
dwt.com
Terminology
 Called “blockchain” because it is a chain of (transaction) blocks
 “The Blockchain” or just “Blockchain” are both used to refer to
the technology
 “The Blockhain” is also sometimes used to mean the Bitcoin
Blockchain because for a number of years it was the ONLY
blockchain
– There are many applications already built on top of the
Bitcoin blockchain
dwt.com
Blockchain is Bitcoin’s Core Technology
 Blockchain technology is the
breakthrough that made Bitcoin possible
 Bitcoin runs on a specific blockchain
implementation
 Other blockchains have been built and
are being built that have NOTHING to do
with Bitcoin
dwt.com
A Brief Peek at How a Blockchain Works
 A transaction is initiated between parties
 Transaction sent to all nodes in the network, and
 Each node verifies details of the transaction using
cryptographic methods
dwt.com
A Brief Peek at How a Blockchain Works
 Then, a “block” of verified transactions is assembled
 Block is checked by whole network
dwt.com
A Brief Peek at How a Blockchain Works
 When consensus reached, the block is added to the chain
 Chain is a non-reversible ledger of transactions kept on every
computer in the network
dwt.com
A Brief Peek at How a Blockchain Works
dwt.com
Permanent Record of Transactions
 Distributed ledger of a blockchain is immutable
 Acts as a permanent registry of transactions
 Transparent because each member on the network
can see entire history (though not all details)
dwt.com
NO INTERMEDIARIES Involved in Transfers
 Since the element of trust is
automatically provided by the
network
– Think of it as DISTRIBUTED
TRUST
 No need for middlemen such
as processors and distributors
dwt.com
Example: Wire Transfer to Foreign Bank
Blockchain Transaction
Typical Wire Transfer to Foreign Recipient
dwt.com
Disruptive Power
 Could be as disruptive as the Internet
– The Internet changed how content is distributed, but blockchain
will change the ways transactions and payments are made
– Can radically alter how value is transferred, stored & accounted
 But also creates opportunities:
– Increased efficiencies
– New modes of transacting business
– Some call blockchain tech the foundation of an Internet of Value
dwt.com
Opportunities Outside of Financial Industries
 Blocks of data verified and recorded in a distributed ledger can
contain virtually any type of information.
 Permits a variety of digital assets to be securely exchanged, and
makes the records of those exchanges immutable
 Blockchain infrastructure may be able to support many types of
applications, some just beginning to be identified
 Includes things as diverse as land registries, digital voting, selfexecuting contracts, and royalty tracking/payments for music
dwt.com
What Does This Have to Do with the Internet of Things?
 Key Issue: Centralized or decentralized network?
– Sheer number of devices may overwhelm traditional systems
– Connectivity of devices is paramount (and cost of providing in centralized
manner is very high)
– Security difficult to provide on massive scale
 Device Democracy (an IBM white paper) argues blockchains are key
solution for networks in which growing computing power exists at
the “edge”— in sensors, appliances, and other distributed devices
dwt.com
How the Blockchain May Impact the IoT
 Device Management and Tracking
 Peer-to-Peer Messaging
 Smart Devices
 Payments
 Current Implementations
dwt.com
Device Management
 Devices can be registered to a blockchain-based
registry as soon as it is manufactured
 Can also then be registered by retailers and/or
users as it passes through supply chain
 Allows for tracking of product info, warranties,
software updates, etc. – all immutably linked to
the device
 Also allows for management of end-of-life
status for devices
dwt.com
Data Exchange Tracking
 Computing is essentially the processing of transactions
 The blockchain can be used to record and track transaction
history of individual devices, logging data transfers with:
– Users
– Other connected devices
– Online services
dwt.com
Smart Devices
 Blockchain technology, along with peer-to-peer
messaging, allows devices to act as independent agents,
performing a range of autonomous functions such as:
– Check their own warranties when a component fails, and order
replacements
– Home apliances could “bid” against each other for priority, to
maximize efficiency
– Devices could schedule their own maintenance and servicing
 All devices can become actors in a global data market
dwt.com
Payments and Micropayments
 Blockchain technology can create more efficient
transaction systems for IoT networks
 Blockchain tech helps lower transaction costs, so
may facilitate true micropayment systems, which
in turn allows individual devices to collect revenue
and store it in an account
 Devices can also bid for services using their
accounts
dwt.com
Implementations
 IBM ADEPT: IBM has partnered with Samsung for a proof-of-concept
system of managing IoT devices using blockchain technology and
peer-to-peer messaging
 FILAMENT: Startup that develops ad-hoc mesh networks of smart
sensors for industrial applications, operating on the blockchain.
 ETHEREUM: Develops blockchains with robust software solutions;
recently hosted hackathon to build IoT/blockchain solutions, such as:
– SOLETHER: Project to build an autonomous entity that will give people
electrical energy in exchange for cryptocurrency coins; energy will be
provided by smart devices powered by solar panels
– SLOCKIT: A decentralized autonomous network of smart locks
dwt.com
Thank You!
For more information on the Blockchain as it applies to industries be, please
follow our blog at www.creativeblockchain.com
dwt.com
11
SEP
2015
New study highlights security
Lawyers wanted… to discuss
iManage begins its
trends in legal organizations
the Internet of Things
adventures in Wonderland
Lawyers
wanted…
to discuss
the Internet
of Things
BY CHRISTY BURKE
The IoT is unlikely to affect law firms’ IT
operations directly, says Ron Friedmann,
a consultant at Fireman & Company
and author of the “Strategic Legal
Technology” blog. “IoT will be more
important to manufacturers, embedding
sensors so they can communicate, and
that will produce new opportunities
in factories, pipelines and so on,” he
says. “But IoT will probably not have
a compelling impact on office work at
a law firm.”
Lawyers need to make sure
their voices are heard in debates
about the Internet of Things, says
Christy Burke.
T
he Internet of Things (IoT) is poised
to affect everyone, everything,
everywhere, no doubt including
the legal industry and the clients it
serves. But will it have a drastic impact
on IT operations at law firms? How
can lawyers participate in the IoT
phenomenon in a meaningful way?
2
|
LEGAL IT TODAY
Mary Abraham, author of the
“Optimizing Law Firm Support
Functions” report and the “Above and
Beyond KM” blog, makes a similar point.
“The Internet of Things is all about
connectivity among everyday objects,
but this has limited relevance within law
firms,” she says. “If the firm’s printer is
out of toner and it contacts an office
supply provider to order more, that’s
an example of IoT leading to greater
efficiency. But does that materially
improve the practice of law?”
However, Abraham adds that in the
outward-facing activities of law firms,
such as participating in policymaking
and servicing clients, the IoT presents
a plethora of interesting legal issues.
“IoT is marvelous because it creates an
opening for conversation and education
about new opportunity and risk,”
she says. “Clients will need policy to
address concerns about confidentiality,
privacy, surveillance and financial issues.
Lawyers can play an important role in
this process.”
A role for lawyers
Tata Consultancy Services (TCS) recently
published a report called “Internet of
Things: The Complete Reimaginative
Force” which takes a thorough look at
how IoT will impact 13 industries across
the globe. Satya Ramaswamy, vice
president and global head of TCS Digital
Enterprise, led the team that conducted
the study.
“IoT is a great opportunity for legal
folks to have a place at the table,” he
says. “However, lawyers will need to be
up-to-date on the technology if they are
to participate in developing policies to
govern IoT. The information they need
is available and, if they are willing to get
involved, lawyers can look at it more
comprehensively and deliberately than
engineers can.”
Anyone questioning the idea that
lawyers are needed in IoT discussions
should consider the following scenario
question, they don’t engage. This is a big
loss, because their input is crucial.
“Technology is generally a step ahead
of the law – and IoT technology is many
steps ahead,” says Grady. “If you look
at the groups being formed to discuss
IT, there are often no lawyers involved.
Technologists, entrepreneurs, and policy
wonks are present, but no lawyers. Many
are ceding their ground, saying they are
not current enough on the technology
to participate. Lawyers need to ask
themselves whether they want to remain
visible and relevant or whether they
want to remove themselves from their
role. Technology and entrepreneurs are
moving ahead. Many lawyers are not.”
The implications of the IoT
Grady says some lawyers are interested
in topics related to the IoT, particularly
cybersecurity and privacy issues.
However, the proportion of interested
lawyers is relatively small, given the
pervasive impact these matters will have
on companies and society.
proposed by Ken Grady, lean law
evangelist at Seyfarth Shaw. Think about
the programmers creating the code to
direct a self-driving car. They need to
establish what should happen if a child
darts out into the street and the car
realizes it can’t stop in time. The car
needs to “decide” whether to harm
the child by not braking or potentially
Lawyers need to
act assertively
to claim their
collective seat at
the table, while
seeking education
and involvement in
these inventions as
they hit the public
harm its own passengers by braking
hard and stopping short. The coders will
determine the decisions the car makes in
such circumstances, with lives hanging in
the balance.
It’s clear that lawyers need to be part
of this discussion, not only from an
ethical standpoint but also from a risk
management standpoint to protect
the car manufacturer. If someone gets
injured or killed, is the manufacturer
unquestionably at fault? This is not a
simple call to make. It’s a complex issue
on many levels.
Lawyers must walk a fine line when
setting the ground rules for the IoT.
Technologists and entrepreneurs are
pushing to get the technology approved
and quickly bring it to market. Lawyers
and the courts are trying to determine
the rules and struggling to understand
the technology and the ethical
questions it raises.
Historically, lawyers have been front
and center in such ethical discussions,
but the overwhelming quantity of data
and complexity associated with the IoT
are prompting a lot of them to stay
away. Realizing they are not adequately
informed about the technology in
Lawyers must educate themselves on the
technology. They also need to change
how they are perceived, or they risk
being increasingly excluded. “At times,
lawyers are perhaps seen as slowing
things down so they are intentionally
not invited to have a seat at the table,”
says David Houlihan, principal analyst
covering topics in enterprise risk
management, compliance and policy
management, and legal technology
at Blue Hill Research.
“GCs need to sit down with
engineering, but it’s not straightforward
how that conversation will achieve its
goal,” he says. “Bigger issues will arise
over time as data resulting from IoT
increases exponentially. Therefore, the
discussions on controversial IoT topics
need to happen now, at the beginning
of the IoT groundswell.”
Ramaswamy adds that a host of ethical
and privacy issues will emanate from
IoT data. “IoT will bring implications on
legal,” he says. “One reason is the data
transparency that IoT provides and the
ethics issues it creates. If an insurance
company can track the driving habits
of its drivers to determine insurance
premiums and pricing on an individual
basis, that absolutely has privacy
implications for the customer.”
LEGAL IT TODAY
|
3
He also notes that with the proliferation
of data IoT produces, companies have
enough information to tailor pricing and
marketing based on a “segmentation
of one”. More precisely, this means
that pricing and promotion can be
customized for a particular person
depending on willingness or ability
to pay. Examples like this bring up
rights issues such as discrimination
and privacy. Ramaswamy predicts that
because IoT presents such issues, “there
will likely be a boost on the human side
of law advocating rights and dignity of
the individual”.
Regarding the IoT, lawyers need to act
assertively to claim their collective seat at
the table, while seeking education and
involvement in these inventions as they
hit the public. Optimally, this stepping up
will happen before inventions are widely
introduced. Similarly, entrepreneurs,
corporate executives and inventors need
to seek both inside and outside counsel
to brief them.
4
|
LEGAL IT TODAY
James Manyika and Michael Chui of
McKinsey Global Institute recently
looked at more than 150 specific IoT
applications that exist today or could be
in widespread use within 10 years. Their
conclusion was that these applications
could have an economic impact of
$3.9 trillion to $11.1 trillion per year
by 2025. With staggering numbers like
these, it’s abundantly clear that legal
needs to sit up and take notice – for
financial as well as ethical reasons.
Hopefully the sheer enormity of the
IoT wave will inspire lawyers to insist
on playing an active, central role
in the discussion.
Christy Burke is President of Burke &
Company, a New York-based consulting
firm serving the legal technology
industry. Christy has published
articles and commentary about legal
tech industry trends with Legal IT
Professionals, Marketing the Law Firm,
Law.com, Legaltech News (formerly
Law Technology News) and Legal Tech.
She has also delivered lectures and
moderated panels for the New York
County Lawyers Association (NYCLA),
the New York City Bar Association and
Women in eDiscovery’s NYC Chapter.
For more information, visit
www.burke-company.com
Faculty Biographies
V. Mary Abraham, Co-Founder, Broadli Inc
November 2013 – Present (2 years 6 months)
Broadli is an app designed to make your massive digitally connected network WORK. Our goal
is to digitize serendipity, connecting you to the right people, at the right time for the right
purpose. Download at http://bit.ly/broadli.
Principal
Above and Beyond KM
January 2013 – Present (3 years 4 months)New York, New York
I am a consultant to professional services firms in the areas of knowledge sharing, social media
and knowledge management. I also design and facilitate strategic conversations and educational
sessions for a variety of organizations, including public companies, professional services firms,
professional associations and nonprofits.
(Open)1 honor or award
Adjunct Faculty, M.S. Information and Knowledge Strategy
Columbia University in the City of New York
2013 – Present (3 years)Greater New York City Area
I am a member of the program's curriculum committee, and I also help teach two foundational
courses: (1) Information and Knowledge in the 21st Century Economy and (2) Networks and
Collaboration: Issues and Methods.
Conference Committee Member
International Legal Technology Association (ILTA)
October 2009 – December 2012 (3 years 3 months)
I designed, delivered and facilitated a range of innovative, highly interactive sessions for ILTA's
annual conferences in 2010, 2011 and 2012. These sessions were customized to meet specific
educational goals and learning styles, and received overwhelmingly positive reviews from
attendees.
Counsel
Debevoise & Plimpton LLP
January 2004 – December 2012 (9 years)
I was responsible for all Corporate and Tax Knowledge Managements efforts for Debevoise's
US-law practice. In this role, I provided substantive legal support to lawyers around the world;
worked closely with practice groups to develop practice resources that helped the firm deliver
client services effectively and efficiently; trained lawyers of all levels of seniority; and
collaborated with IT teams to improve the accessibility of knowledge resources.
Associate (Corporate Knowledge Management)
Debevoise & Plimpton LLP
September 2001 – December 2003 (2 years 4 months)
In this role, I systematically built the corporate practice resources for all major practice areas,
and I significantly expanded the Corporate Department's resources on the firm's Intranet.
Associate (Corporate Transactions)
Debevoise & Plimpton LLP
June 1991 – August 2001 (10 years 3 months)
As a member of the Corporate Department's International Practice Group, I worked on
significant international joint ventures, as well as mergers & acquisitions transactions
representing both US and non-US clients.
Honors & Awards
2013 List of Top 25 Influencers in KM
MindTouch
April 2013
From MindTouch: "In an effort to chart the power nodes in the social graph of various
technology industry disciplines, MindTouch has a history of researching and producing a list of
influencers."
http://www.mindtouch.com/blog/2013/04/11/influencers-in-knowledge-management/
burke-company.com
http://burke-company.com/christy-burke/
Christy Burke
Founder and President
Christy Burke founded Burke & Company LLC in 2004, deciding to focus the firm specifically on
legal technology communications. The Company prides itself on finding creative solutions to
help private, entrepreneurial companies succeed in marketing to the legal industry.
Burke began her career at Forbes, Inc. in new business development and advertising sales. Then she entered the
technology communications world as international account supervisor for the $120 million 3Com account at Lowe
Lintas, an Interpublic agency. Burke’s next position at World Software Corporation – makers of Worldox® document
management software – brought her into the legal software niche. During her four years at Worldox, while in charge
of marketing, PR and the company’s reseller channel, the company won many awards and experienced tremendous
growth. Burke leveraged her knowledge and contacts to spin off her own agency in 2004.
Ms. Burke is a columnist for Legal IT Professionals, a popular international online publication. She also has been
published in several journals such as Marketing the Law Firm, Law Practice Today, ILTA’s Peer to Peer, Legal
Management, Legal Tech, Intellectual Property Today, Attorney at Work, and the New Jersey Law Journal.
Burke is a Trustee of Connecticut College, where she received a B.A. in English and Sociology-based Human
Relations and was awarded the Agnes Berkeley Leahy award in 2013 for volunteer excellence. Burke is committed
to giving back on both a local and global scale. She is actively involved in numerous organizations including
Coalition for the Homeless, Plan International, Third Rail Projects and many others. Burke also received the John
Crowe Memorial Award from Rebuilding Jersey City, a non-profit organization that renovates and restores homes for
needy and disabled families.
In addition to her expertise in PR and marketing, Burke is a classical musician who has performed at Carnegie Hall.
She is an avid philanthropist and world traveler.
Burke & Company LLC
1/1
Colvin, Christopher - Eaton & Van Winkle LLP Eaton & Van Winkle LLP
Page 1 of 4
[email protected]
(212) 779-9910
HOME ABOUT US PRACTICE AREAS ATTORNEYS NEWS & EVENTS CONTACT US
Colvin, Christopher
E-mail: [email protected]
Chris Colvin has more than twenty years of
Telephone: (646) 790-2987
experience handling all types of intellectual
Mobile: (212) 619-5378
property and commercial litigation matters,
Fax: (347) 410-8450
including numerous patent, copyright,
trademark, trade secret and false advertising
disputes, complex licensing transactions and
major patent and trademark prosecution
matters. Prior to joining Eaton & Van Winkle,
Mr. Colvin was a partner in the boutique Colvin
Cybersecurity Law & Data
IP law firm and a partner in the Am Law
Privacy Group
100 firm of Kramer Levin Naftalis & Frankel.
Intellectual Property Law
Group
In addition to his law firm experience, Mr.
Colvin has an extensive background serving as
in-house IP and litigation counsel, including a
one-year engagement as an IP litigator in a
Fortune 20 legal department, and lengthy
experience serving as the chief IP counsel and
general counsel for several privatelyheld companies. This experience enables Mr.
Colvin to bring to his law practice a unique
appreciation of his clients’ business needs and
a deep understanding of how legal issues and
business strategies intersect in complex
corporate projects.
Complex
Contract/Commercial
Litigation
Patent Litigation
IP, Copyright and
Trademark Litigation
False Advertising Law
Trade Secret Litigation
Media & Entertainment
Law Group
First Amendment Law
Group
Litigation & Arbitration
Group
Experience
Mr. Colvin’s practice areas include patent, trademark, copyright, trade secret, false advertising, defamation and anticounterfeiting litigation, along with general business litigation. Mr. Colvin also handles complex IP and technology
licensing deals, cyber-security issues and patent and trademark prosecution matters.
Mr. Colvin’s science and engineering background enables him to acquire a deep understanding of his clients’
technology, while his written and verbal communications skills enable him to translate difficult technical and legal
concepts in order to effectively educate and persuade non-technical jurors and judges.
Mr. Colvin earned a Bachelor of Science degree in Aerospace Engineering from Princeton University. After working for
several years as an engineer with IBM, where he designed key components of the U.S. air traffic control system, Mr.
Colvin earned his J.D. from George Washington University Law School, where he was one of only 15 students in his
class awarded seats on both the Moot Court Board and a competitive law journal.
Representative Litigation Matters
Mr. Colvin has successfully handled dozens of complex IP and business litigation matters, resulting in victories or
favorable settlements for his clients. For example, Mr. Colvin:
http://www.evw.com/attorney/colvin-a-christopher/
4/11/2016
Colvin, Christopher - Eaton & Van Winkle LLP Eaton & Van Winkle LLP
Page 2 of 4
Won a complex month-long Lanham Act trial for a pharmaceutical client, including extensive injunctive relief
and one of largest damages awards in Lanham Act history. Bracco v. Amersham (D.N.J.)
Won a Federal Circuit appeal for an international semiconductor equipment manufacturer, vacating the lower
court’s judgment of infringement and a multimillion dollar jury verdict. August v. Camtek (Fed. Cir.)
Secured $0 pre-answer dismissal of patent infringement complaint against U.S. subsidiary of Global 100
technology company. ExitExchange v. NTT America (E.D. Tx.)
Negotiated a comprehensive master service agreement between a leading professional services firm and a
Fortune 50 company
Won motion to transfer declaratory judgment patent action from SDNY to EDTX. CreateThe Group v. GeoTag
(S.D.N.Y.)
Prepared complaint and TRO motion papers for copyright and trade secret theft case for leading business
management software company; Successfully negotiated pre-litigation settlement
Led damages portion of two multimillion dollar patent infringement cases for pioneering e-signature company
Co-led infringement portion of large patent and trade secret case on behalf of leading media and marketing
analytics company
Successfully defended a major semiconductor chip manufacturer against a multimillion dollar patent
infringement action; settled favorably during trial. OPTi v. AMD (E.D. Tx.)
Defeated a copyright infringement action against an apparel manufacturer, resulting in a zero-dollar settlement
and dismissal of the case. Volumecocomo Apparel v. LTC Apparel (C.D. Cal.)
Successfully defended a major automobile manufacturer in a multimillion dollar patent infringement action
relating to vehicle navigation system, resulting in a favorable pre-trial settlement. Triangle Software v.
Volkswagen (E.D. Va.)
Successfully defended a large wine producer in SDNY trademark infringement case, featured on front page of
Wall Street Journal and Law360; obtained favorable pre-trial settlement.. Casella Wines v. The Wine Group
(S.D.N.Y.)
Defeated motions for temporary restraining order and a preliminary injunction brought by patent holder against
large generic drug manufacturer. Graceway v. Nycomed (D.N.J.)
Successfully defended multiple television personalities in a copyright infringement action in SDNY, resulting in
favorable pre-trial settlement. Freeplay Music v. The Wisdom Center (S.D.N.Y.)
Successfully defended a large entertainment company (Sirius Satellite Radio Inc.) in several litigation matters,
including a copyright infringement and breach of contract suit, resulting in zero-dollar settlement
Successfully defended a multi-billion dollar insurance company in an insurance coverage dispute with a media
conglomerate, involving complex underlying copyright liability and damages issues, resulting in favorable pretrial settlement. Music Force v. Viacom (C.D.Cal.)
Won ANDA patent infringement trial in SDNY involving $1.5 billion pharmaceutical product, resulting in
favorable settlement following appellate proceedings. Purdue v. Endo (S.D.N.Y.)
Successfully appealed an adverse false advertising decision, resulting in a reversal of trial court ruling and a
landmark decision regarding the important issue of advertising “puffery” and permitting Papa Johns to retain its
“Better Ingredients. Better Pizza.” slogan which remains in use today. Pizza Hut v. Papa Johns (5th Cir.)
Represented a manufacturer of factory automation systems in a patent infringement appeal to the Federal
Circuit and successfully concluding the subsequent damages phase in the district court. Laitram Corp. v. NEC
(Fed. Cir.)
http://www.evw.com/attorney/colvin-a-christopher/
4/11/2016
Colvin, Christopher - Eaton & Van Winkle LLP Eaton & Van Winkle LLP
Page 3 of 4
Represented Emmy award-winning music producer in a protracted contract and IP dispute with a former
business associate, including numerous appeals, ultimately prevailing on all issues on summary judgment.
Hoover v. Lanois (La.)
Represented the leading producer of decorative stained glass novelty items in a copyright and trade dress
infringement action against a former supplier and bringing a summary judgment motion that precipitated a
favorable settlement of all claims. Joan Baker Designs v. Silver Bay Creations (C.D. Cal.)
Representative Publications And Speeches
Mr. Colvin has written and spoken numerous times on important issues in IP law, law firm management, social media
and cyber security, including the following:
Speaker, LegalTech, 2nd Annual Cyber Security Roundup (February 2015)
Speaker, LegalTech, Minimizing Cyber Security and Litigation Risk (February 2014)
Cyber Warfare and the Corporate Environment, Journal Of Law & Cyber Warfare (August 2013)
A “Third Way” to Staff High-Stakes Litigation Matters, Corporate Counsel Magazine (July 2013)
Chair, Alternative Fee Panel, Corp Counsel’s 25th Annual General Counsel Conference (June 2013)
Advisory Board, The American Lawyer’s Second Annual Litigation Summit and Exposition (November 2012)
Chairman and Speaker, IP Litigation Panel, Corporate Counsel Copyright, Trademark and IP Licensing Forum
(October 2012)
Speaker and Chairman, General Counsel Panel Discussion, The American Lawyer’s New Partner & Corporate
Counsel Forum (October 2012)
Speaker and Chairman, America Invents Act Panel, ALM IP Counsel Forum (March 2012)
Speaker, ALM New Partner Forum (October 2011)
Speaker, ALM Law Firm Marketing & Business Development Leadership Forum(May 2011)
Speaker, Beyond the Basics: Integrated Social Media Marketing for Law Firms (Sept 2011)
National Law Journal article citing effective use of social media in legal industry (Oct 2011)
Wall Street Journal and IP 360 articles featuring Casella v. The Wine Group case (Feb 2011)
HealthLaw 360 article featuring win in Bracco v. Amersham Lanham Act case (March 2009)
Higher Authority: The Supreme Court Sets Its Sights On Patent Rights, Metropolitan Corporate Counsel
(September 2008)
The Truth is Out There: Five Key Points on Willfulness Under the Lanham Act, Atlantic Coast In-House (May
2008)
Be Aware and Take Action on Your IP Rights, Furniture Today (March 2007)
Hatch-Waxman and its Implications for Pharmaceutical Research, IAM Magazine (Feb 2006)
The Human Dimension in IP Valuation, IP Value 2006 (January 2006)
10 Questions for Evaluating a Company’s IP Portfolio, Journal of Corporate Compliance (December 2005)
The American Lawyer “Big Cases” column citing trial win in Purdue v. Endo litigation (Aug 2005)
Bar Admissions
http://www.evw.com/attorney/colvin-a-christopher/
4/11/2016
Colvin, Christopher - Eaton & Van Winkle LLP Eaton & Van Winkle LLP
Page 4 of 4
New York, 2001
Louisiana, 1998
California, 1995
U.S. Patent and Trademark Office, 1994
Court Admissions
U.S. District Court, District of New Jersey, 2004
U.S. District Court, Eastern District of New York, 2001
U.S. District Court, Southern District of New York, 2001
U.S. Court of Appeals for the Fifth Circuit, 1999
U.S. Court of Appeals for the Federal Circuit, 1998
U.S. District Court, Western District of Louisiana, 1998
U.S. District Court, Eastern District of Louisiana, 1998
U.S. District Court, Central District of California, 1995
U.S. District Court, Northern District of California, 1995
Eaton & Van Winkle LLP, 3 Park Avenue 16th Floor, New York, NY 10016 | [email protected] | (212) 779-9910 | (212) 779-9928
Eaton & Van Winkle LLP is a New York law firm that offers a range of legal services to individuals and businesses in the U.S. and abroad.
Attorneys Practice Areas News & Events Contact Us
Copyright 2016 Eaton & Van Winkle LLP. All Rights Reserved. | Legal Disclaimer | Privacy Policy
http://www.evw.com/attorney/colvin-a-christopher/
4/11/2016
Lance Koonce - Professionals - Davis Wright Tremaine
Page 1 of 5
Lance Koonce specializes in intellectual property litigation and counseling for clients in the
EDUCATION
advertising, publishing, music, television/film, fashion and consumer products fields, and has
J.D., University of North
Carolina School of Law,
1996, with honors
extensive experience analyzing the implications of emerging technologies. As a litigator, he
has 20 years of experience trying complex commercial cases in state and federal court,
including jury trials. Lance writes and speaks frequently on IP and technology issues, and is
the founder of the CreativeBlockchain.com blog, which focuses on how blockchain technology
intersects with the creative industries.
Lance is also a member of DWT’s Breach Response Team (dwt.com/IncidentResponse).
Representative Experience
China Central Television et al. v. Create New Technology et al.
B.A., English, Duke
University, 1988, with
honors
RELATED PRACTICES
Intellectual Property
Litigation
Media & First Amendment
Privacy & Security
Represented Chinese television broadcasters and DISH Network in copyright and
Defamation & Privacy
trademark infringement action against manufacturer and distributor of "TVpad" set-top box,
Trademark Litigation
found to stream infringing content to users in the United States; secured award of $55 million
Copyright Litigation
in damages. (C.D. Cal. 2015)
Intellectual Property
Digital Media
Moore v. Viacom International Inc.
Defend Viacom in Trademark Trial and Appeal Board trademark opposition proceeding
Trade Secrets (Intellectual
Property)
brought by performing artist Sam Moore in connection with "The Soul Man" television series
Appellate Litigation
on TVLand. (Ongoing)
Government Relations &
Litigation
Institute for New Economic Thinking, Inc. v. Glow Media & Marketing, Inc. et al
Litigation
Represented not-for-profit in litigation over return of domain names from consultant. (S.D.N.Y.
Entertainment
2015)
Internet & E-Commerce
Madyun v. Fuse Advertising, Inc.
Defend advertising agency in connection with right of publicity claims stemming from social
media advertising campaign. (N.Y. Sup. Ct. 2015)
Theft of Ideas
Music
ADMITTED TO PRACTICE
New York, 1996
http://www.dwt.com/people/lancekoonce/
4/11/2016
Lance Koonce - Professionals - Davis Wright Tremaine
Spokeo, Inc.v. Thomas Robins
Submitted amicus brief on behalf of a group of eight media amici urging the U. S. Supreme
Court to overturn the 9th Circuit's ruling allowing a class action alleging violations of the Fair
Credit Reporting Act to go forward without any allegation of an "injury in fact" for standing
under Article III of the US Constitution, and highlighting the damage to media companies
caused by class actions where plaintiffs leverage technical violations of privacy statutes to
threaten enormous statutory damages, severely impacting those companies' business models,
and chilling speech. (U.S. 2015)
Steinbeck v. McIntosh & Otis, Inc., Estate of Elaine Steinbeck, et al.
Page 2 of 5
U.S. Court of Appeals 2nd
Circuit
U.S. Court of Appeals 9th
Circuit
U.S. Court of Appeals
Federal Circuit
U.S. District Court Eastern
District of New York
U.S. District Court Southern
District of New York
Represent literary agency in copyright litigation involving John Steinbeck literary properties.
(C.D. Cal. 2015)
Poquito Mas v. Taco Bell
Represented Taco Bell in trademark infringement action brought by Poquito Mas alleging that
Taco Bell’s use of the slogan "LIVE MÁS" infringes the POQUITO MAS trademark. (C.D. Cal.
2014)
Email hacking matter
Represented international corporation in connection with hacking of sensitive corporate email
accounts. (2014-2015)
In re National Security Letter (Under Seal v. Holder)
Submitted amicus brief challenging the constitutionality of the FBI’s efforts to collect
information about activities protected by the First Amendment and to impose a perpetual,
blanket gag order on the recipient. (9th Cir. 2014)
BWP Media USA v. Advance Magazines
Defended publisher of Lucky Magazine and website against claim of copyright infringement
involving photographs posted by users in online forum. (S.D.N.Y. 2014)
Cyber-extortion matter
Represented large social media site in connection with cyber-extortion threats. (2013)
First Unitarian Church of Los Angeles v. National Security Agency
Submitted amicus brief on behalf of PEN American Center highlighting the chilling effect of
NSA’s sweeping collection of metadata on writers. (N.D. Cal. 2013)
Munchkin Inc. v. Playtex Products LLC
Represented Playtex in false advertising jury trial involving advertising superiority claims as to
the parties’ respective infant care products. (C.D. Cal., 9th Cir. 2011-2013)
Oracle America, Inc. v. Google Inc.
Submitted amicus brief on behalf of former Register of Copyrights supporting Oracle's position
in copyright infringement action that menu command structure of software is protectable
expression under Copyright Act. (2013)
http://www.dwt.com/people/lancekoonce/
4/11/2016
Lance Koonce - Professionals - Davis Wright Tremaine
Page 3 of 5
Schrock v. Wenner Media
Represented Wenner Media, the publisher of Us Weekly, in putative class action for allegedly
sending unauthorized text messages in violation of Telephone Consumer Protection Act and
state privacy laws. (N.D. Ill. 2012)
Conde Nast v. Barry
Successfully represented Conde Nast in action under Anti-Cybersquatting Consumer
Protection Act against notorious domain name infringer, and in subsequent interpleader action
regarding collection of damage award. (S.D.N.Y. 2012)
Erick Van Egeraat v. NBBJ LLC et al.
Defended NBBJ, an architectural firm, in a copyright action brought by a Dutch architect
alleging that NBBJ’s architectural design for a multi-use residential and commercial skyscraper
complex in Moscow, infringed the Dutch architect’s earlier design for that project. Plaintiff
claimed copyright infringement under both United States and Russian copyright law and unfair
competition under the Lanham Act. (S.D.N.Y. 2012)
Haberman v. City of Long Beach, et al.
Successfully appealed to New York Court of Appeals to overturn dismissal of litigation over
denial of building permit, where zoning board of appeals disavowed litigation agreement to
extend zoning variance. In issue of first impression, the Court of Appeals held that counsel for
zoning board could bind the board by signing stipulation, and that no additional public hearing
was required. (N.Y. Sup. Ct. 2012)
Rose Group Park Avenue Corp. v. State Liquor Authority of New York
Representation of catering company operating under shared space arrangement with historic
church, in petition to overturn denial of license application. (N.Y. Sup. Ct. (Commercial
Division) App. Div., 2011-2012)
Digiprotect USA v. John Does
Successfully represented cable ISP in two cases, objecting to subpoenas for subscriber
information. (S.D.N.Y. 2011)
Willagirl LLC v. The Wella Corporation
Represented The Wella Corporation in a trademark infringement suit arising out of Willagirl
LLC’s proposed use of the “Willa” trademark on hair care, skin care and related beauty
products. (S.D.N.Y. 2011)
Cantor Fitzgerald Securities v. Port Authority
Represented Cantor Fitzgerald in its action seeking damages for its business interruption
losses arising out of the 1993 bombing of the World Trade Center. (2010)
Clifton Mallery v. NBC Universal
Represented NBC in a copyright action brought by plaintiffs claiming that the television
program 'Heroes' infringed their copyright in a documentary and manuscript about their lives
http://www.dwt.com/people/lancekoonce/
4/11/2016
Lance Koonce - Professionals - Davis Wright Tremaine
Page 4 of 5
as divination artists. Summary judgment granted for defendants; affirmed by the 2nd Circuit;
certiorari petition denied. 2009 WL 1532494 (2d Cir. 2010) Read more
Hardy Way, LLC v. Preferred Fragrance, Inc.
Defended perfume manufacturer in trade dress, trademark dilution and copyright infringement
litigation involving packaging for alternative designer fragrance. (S.D.N.Y. 2010)
In re Rule 45 subpoena issued to Cablevision Systems Corp.
Successfully moved to quash subpoena seeking private information of individual posting
anonymously on Internet message boards regarding public company, on First Amendment
grounds. (E.D.N.Y. 2010)
Salinger v. Colting
Represented J.D. Salinger in a copyright infringement action against the author, publisher and
distributor of a self-proclaimed sequel to "The Catcher in the Rye." Motion for preliminary
injunction was granted and appealed to the 2nd Circuit where the matter was vacated and
remanded. Permanent injunction entered; case settled. 641 F. Supp. 2d 250 (S.D.N.Y., 2d Cir.
2010)
Steinbeck v. McIntosh & Otis, Inc., Estate of Elaine Steinbeck, et al.
Represented literary agents in copyright action involving termination rights and the John
Steinbeck literary properties. Summary judgment dismissing all claims granted and affirmed by
the 2nd Circuit. 2009 WL 928189, 2010 WL 3995982 (S.D.N.Y., 2d Cir. 2010)
Morisseau v. DLA Piper U.S. LLP, Proskauer Rose LLP, and ALM Media Inc.
Represented DLA Piper U.S., LLP, in New York state court, successfully defeating the
petitioner's motion for pre-action discovery in aid of framing a complaint for libel arising from
the publication of an allegedly false and defamatory article about the petitioner, who was a
party to a federal discrimination lawsuit. Index No. 08100448 (N.Y. Sup. Ct. 2009)
Akamai v. Diaz
Represented employee in litigation brought by former employer for breach of noncompete and
misappropriation of trade secrets. (Mass. Sup. Ct. 2008)
Derek Andrew, Inc. v. Poof Apparel Corp.
Represented clothing designer in a trademark infringement litigation against manufacturer
using counterfeit hangtags. Damages claims tried before U.S. District Court of the Western
District of Washington and affirmed by 9th Circuit. 528 F.3d 696, 87 U.S.P.Q.2d (9th Cir. 2008)
Horizon Media, Inc. v. Leible
Defended employee and new employer in litigation brought by former employer for breach of
restrictive covenants and tortious interference. (N.Y. Sup. Ct. 2008)
Jonesfilm v. Lions Gate Entertainment
http://www.dwt.com/people/lancekoonce/
4/11/2016
Lance Koonce - Professionals - Davis Wright Tremaine
Page 5 of 5
Represented Lions Gate and other defendants in an action instituted by Jonesfilm for alleged
infringement of its claimed trademark in the title of the motion picture "9 1/2 Weeks;" involved
prequel rights; tried before IFTA after two 2nd Circuit appeals; confirmed and affirmed on
appeal to 9th Circuit. 299 F.3d 134 (2d Cir. 2002), 65 F. App'x 361 (2d Cir. 2003) (2d Cir., 9th
Cir. 2008)
Time Inc., et al. v. Budd, et al.
Represented magazine publishers in copyright and trademark infringement action against
website described as 'Napster for the magazine industry.' (S.D.N.Y. 2008) Read more
Webcasting and Internet radio royalties disputes for small commercial webcasters
Representation of the small commercial webcasters in administrative litigation before the
Copyright Royalty Board in Internet Radio royalty rate-setting proceeding. (2007)
Shine v. David M. Childs and Skidmore, Owings & Merrill
Represented architectural firm that designed original Freedom Tower in action involving
alleged copyright infringement of architectural design of Yale architecture student. Settled after
motion to dismiss granted in part. 382 F. Supp. 2d 602 (S.D.N.Y. 2006)
The Knot, Inc. v. Ruben Rotteveel
Represented owner of Brides.com website in case brought by competing bridal website
involving allegations of misappropriation of proprietary business information and trade secrets,
including website functionality. (N.Y. Sup. Ct. 2006)
Estate of J.R.R. Tolkien v. Perry
Represented the Estate of J.R.R. Tolkien as plaintiff in a copyright infringement action against
Inkling Books based on chronology of "Lord of the Rings." Preliminary injunction granted;
settled thereafter. (W.D. Wash. 2003)
Professional & Community Activities
• Co-Chair, Law & Technology Committee, New York County Lawyers Association
• Member, Federal Bar Association
• Former Chairman and Member of Grants Committee; Member – Copyright Society of the
United States
• Founding Editor, Privacy and Security Law Blog
• Former Secretary, Committee on State Courts of Superior Jurisdiction; Member – New
York City Bar Association
• New York State Bar Association
• Elder, Huguenot Memorial Presbyterian Church
• Spring Gala Committee, Pelham Picture House
©1996-2016 Davis Wright Tremaine LLP. ALL RIGHTS RESERVED. Attorney Advertising. Prior results do not guarantee a similar outcome.
http://www.dwt.com/people/lancekoonce/
4/11/2016
LexisNexis® Martindale-Hubbell®
Page 1 of 1
Print
Close Window
Charles Stuart Kwalwasser - Lawyer Profile
Update this Profile
Charles Stuart Kwalwasser
Gen. Coun.; Quirky Inc.
606 West 28th St.
New York, New York
(New York Co.)
Profile Visibility
#9,087 in weekly profile views out of 100,606 lawyers in New York, New York
#121,753 in weekly profile views out of 1,722,433 total lawyers Overall
Experience & Credentials
Practice Areas
Intellectual Property
University
University of Virginia, B.S.
Law School
Cornell University, J.D.
Admitted
2001
ISLN
916132024
Source: Martindale-Hubbell
http://www.martindale.com/print.aspx
Print
Close Window
4/11/2016
Frank Torres | Microsoft Corporation | ZoomInfo.com
Page 1 of 5
Zoom Information
Login Blog Contact
• Platform
◦
◾ Contact and Company
Search
◾ Data Management
◾ Account Targeting
◾ Campaign Optimization
• Partners
• Customer Success
• About
◦
◾ News and Press
◾ Resources
◾ Blog
◾ Careers
◾ Contact
• Free Trial
• People
◦ Companies
Enter Person's Nam
Need more? Try our Advanced Search (20+ criteria) »
Mr. Frank C. Torres III
Share This Profile
Share this profile on Facebook.
Link to this profile on LinkedIn.
Tweet this profile on Twitter.
Email a link to this profile.
See other services through which you
can share this profile.
This profile was last updated on
4/22/15 and contains information
from public web pages and
contributions from the ZoomInfo
community.
Is this you? Claim your profile.
Wrong Frank C. Torres III?
Director of Consumer Affairs
Phone: (202) ***-****
gmxjJE710es
Get Contact Info »
it's free and takes 30 seconds
Local Address: District of Columbia , United States
Microsoft Corporation
One Microsoft Way
Redmond , Washington 98052
United States
Company Description: Microsoft Corporation is
engaged in developing, manufacturing, licensing
http://www.zoominfo.com/p/Frank-Torres/1927534
4/11/2016
Frank Torres | Microsoft Corporation | ZoomInfo.com
Page 2 of 5
and supporting a range of software products and
services for different types of computing... more
Close
How do I get security token?
Cancel
Submit
Background
Employment History
•
Legislative Counsel
Consumers Union
•
Spokesman
Consumers Union
•
Lobbyist
Consumers Union
Education
•
undergraduate degree
Georgetown University
http://www.zoominfo.com/p/Frank-Torres/1927534
4/11/2016
Frank Torres | Microsoft Corporation | ZoomInfo.com
•
Page 3 of 5
doctor of jurisprudence degree
George Washington University
188 Total References
Web References
Frank Torres Director ...
www.globalnetworkinitiative.org, 2 Feb 2015 [cached]
Frank Torres Director of Consumer Affairs and a Senior Policy Counsel Microsoft
Anchorage Daily News | Minnesota governor signs Internet privacy bill
www.adn.com, 24 May 2002 [cached]
Frank Torres, a spokesman for the Washington-based Consumers Union, said the law is a victory for
privacy advocates and becomes their new minimum goal for national legislation.
"We hope that it sends a strong signal to Congress that it's got to act on Internet privacy, to ensure that
consumers in all the states have the same level of protection," Torres said.
Any federal law would supersede the Minnesota law.
Stewart Baker, an attorney for the U.S. Internet Service Providers Association, moaned when he
learned that Ventura had signed the bill.He warned that ISPs would have problems adapting to
different laws in different states, and consumers would bear the cost.
"In general, I think you have to worry about how much regulation you can expect for $21.95 a
month," he said.
...
Torres said the effectiveness of the Minnesota law depends on developing regulations that stress
simplicity.
"If you're going online, and then this notice pops up, and they ask you to mail something in, it's not
worthwhile," he said."If you have to click through 15 pages, that's not helpful either."
Contact ADN | Forms | Subscriptions | Advertising | Sister SitesDaily News Jobs | Summer
internships | ADN History | ADN Store McClatchy Company Privacy Policy
Mid Florida Local 7138, APWU
www.midfloridalocal.com, 3 April 2003 [cached]
"This is the best bill money can buy," said Frank Torres, a lobbyist for Consumers Union, publisher of
Consumer Reports magazine.
Once the president's tax package and budget have moved through the legislative process, business
groups have a long list of initiatives to pursue.
Computer Repair & IT Services | Orange County Computer, Inc.Orange County Computer INC. |
Southern California's Premier Tech Repair Center
orangecountycomputer.com, 17 Oct 2011 [cached]
Microsoft's Director of consumer affairs and Senior Policy Counsel, Frank Torres, said that they will
work with the agencies to identify other scams as they emerge. Frank also said that, Microsoft will
never cold call customers and ask for their credit cards to charge them for service they don't need.
Computer SecurityOrange County Computer INC.
orangecountycomputer.com, 16 April 2014 [cached]
Microsoft's Director of consumer affairs and Senior Policy Counsel, Frank Torres, said that they will
work with the agencies to identify other scams as they emerge. Frank also said that, Microsoft will
never cold call customers and ask for their credit cards to charge them for service they don't need.
...
Microsoft's Director of consumer affairs and Senior Policy Counsel, Frank Torres, said that they will
work with the agencies to identify other scams as they emerge. Frank also said that, Microsoft will
never cold call customers and ask for their credit cards to charge them for service they don't need.
http://www.zoominfo.com/p/Frank-Torres/1927534
4/11/2016
Frank Torres | Microsoft Corporation | ZoomInfo.com
Page 4 of 5
Other People with this Name (66,842)
Other People with the name "Torres":
Jenaro Torres
Stephen M. White Middle School
Louis Torres
East Penn Emmaus Midget Football Association
Carmen Torres
New Dimensions High School
Florence Torres
Penton Media , Inc.
Dominga Torres
Crescent Search Group
Other ZoomInfo Searches
Other People with this Title (227)
Other Employees at this Company (144,388)
Accelerate your business with the industry's most comprehensive profiles on business people and
companies.
Find business contacts by city, industry and title. Our B2B directory has just-verified and in-depth
profiles, plus the market's top tools for searching, targeting and tracking.
Atlanta | Boston | Chicago | Houston | Los Angeles | New York
Browse ZoomInfo's business people directory. Our professional profiles include verified contact
information, biography, work history, affiliations and more.
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Browse ZoomInfo's company directory. Our company profiles include corporate background
information, detailed descriptions, and links to comprehensive employee profiles with verified contact
information.
US | Canada
ZOOMINFO
•
•
•
•
•
Contact
Login
Support
Careers
Find Contacts
CUSTOMERS
• Customer Success
• Become a Partner
SOLUTIONS
• Platform
• Products
http://www.zoominfo.com/p/Frank-Torres/1927534
4/11/2016
Frank Torres | Microsoft Corporation | ZoomInfo.com
Page 5 of 5
COMPANY
•
•
•
•
About
News and Press
Resources
Blog
SUPPORT
•
•
•
•
•
•
FAQs
Help
Register
My Account
Contact Support
Am I in Zoominfo?
Sitemap Privacy Terms & Conditions
Copyright © 2016 Zoom Information, Inc. All rights reserved
ProPub_Iteration_NT.380[01] SEIDXWK-16
zirhbt201304
http://www.zoominfo.com/p/Frank-Torres/1927534
4/11/2016