Managing the risks of the ever increasing connections in home private and personal clouds…

Many years ago (in the 1990’s) I was a mac guy. I had a keyboard (MIDI) connected to my Mac. I did that because back then I used to occasionally write songs. It was a cabled connection between my computer and my keyboard. That connection has evolved (by the way need a wireless connection to a MIDI device? PUC is the tool you need.). With the expansion of capabilities at every level you can connect more.

Yes we are still limited to 7 active Bluetooth connections and roughly 240 total Bluetooth connections for our device. Now, scroll a screen of Bluetooth devise more than say 24 to fix a connection issue and you will realize that the screen real-estate for cellular divides supports at most 40 connections. A tablet maybe 60 connections. So while there is a theoretical maximum there is a much smaller maximum as well.

I have to say it, this graphic reminds me of Doc Brown in Back to the Future, connecting the two ends so Marty can go back to the future.

I’ve talked quite a bit about the concept of risk. After all security and the view of the enterprise is really risk management. What are the risks of CPS devices. What happens when we connect the blue wire with the red wire?

What do we connect, today? There are any number of connections that are available today. The list of connections grows. PUC gives you wireless MIDI. E-Beam connections your whiteboard to your computer and makes your drawings digital. E-meetings or victual rooms allow you to connect 100 people together to discuss a topic and share ideas. The world is more and more connected.

We need a clear set of standards that creates a line of demarcation between personal, private and other cloud solutions. Where my personal cloud only exists in “x” space. My home private cloud only exists in “y” space. In my book the Syncverse (you can get it on Amazon) I talked about the sharing concept of the Myverse. Where you, as a person have a personal space that you own and manage. You can allow others to put data into your space, but it is wholly your decision. Revocation is as simple as, no more. It goes well beyond that though.

Security represents risk management. The reality of the connections possible adds risk. Even if you have a corporate cell phone given to you, the reality is your personal cell is in your pocket. There is no sign I can put on the edge of my personal cloud space, or my home private cloud that says no trespassing. Not that hackers have ever really cared about signs like that. Woody Guthrie wrote the song this land is your land, this land is my land. He said read the back of a no trespassing sign, that is what applies.

How do we embark on standards that will encompass risk reduction in the personal and home private cloud space. We need it badly. Not huge horrifying hard to install standards. Just simple, easy rules that everyone can do. The goal of risk reduction is to reduce risk. If we know the core risks are gone, then we can focus on fixing the other risks. Let’s get standards so everyone is on the same page.

Its easier to communicate when you are all speaking the same language.

Step 1, create standards.

Step 2, create a process to automate updates

Step 3, keep it simple make the device a network black box. Share responsibility for updating the box. No one can install a device on a home or in a personal cloud that modifies the setting of the black box. The hardware or software has to go to a centralized source and request formal permission to make the changes.

Step 4, rinse and repeat


Home private and personal cloud standards bearer!