Topics for discussion: Difference between revisions

From Identity at Berkman
Jump to navigation Jump to search
No edit summary
No edit summary
Line 17: Line 17:
kodlara silmeyim bari kalsın  benım gibi altina koyun :)
kodlara silmeyim bari kalsın  benım gibi altina koyun :)


[http://www.sarkilaridinle.com şarkıları dinle]
[http://www.sarkilaridinle.com şarkıları dinle] [http://www.sexalemi.org sikis izle]
[http://www.pornositeleri.net porno izle]
[http://www.sexalemi.org sex izle]
[http://www.sexalemi.org sikis]
[http://www.cinsel.name sikis izle]
[http://www.cinsel.name.tr sikis]
[http://www.hiphopalemi.net hiphop]
[http://www.kelebekchat.net kelebek chat]
[http://www.kelebeksohbet.org kelebek sohbet]
[http://www.chatsohbet.org chat sohbet]
[http://www.siberchat.net chat]
[http://www.pornositeleri.net porno]
[http://www.pornositeleri.org porno izle]
[http://www.sexpormok.net sex]
[http://www.mynetsohbet.net mynet sohbet]

Revision as of 15:31, 26 November 2009

Here are a few of the questions raised by the Mobile Identity topic, which we can talk about at the workshop:

  • How can we move user-centric identity forward in the Mobile space?
  • How can we do Vendor Relationship Management (VRM) that meshes with sellers' Customer Relationship Management?
  • How can we both protect and employ our anonymity and privacy?
  • Where should our identity data live, and be put to selective use, at our personal discretion?
  • Is there a business opportunity here for identity brokers, for example?
  • What kinds of new and established businesses will step up to facilitate and take advantage of individual identity-based market activities?
  • What new and improved roles will be played by carriers and equipment makers? How about new independent mobile players?
  • What are the differences between user-centric identity in laptops and less computerlike mobile devices? What will work only in one form and not in another?
  • How will Mobile Identity play in developing countries where mobile phones are far more common than PCs, and SMS is used for secure transactions?
  • What are some of the specialized applications-in health care, for example?
  • How do commercial activities and public policy intersect?
  • How do we mobilize OpenID, Cardspace, Sxip, i-Names, microformats and other user-centric technologies and standards, most of which were developed first for computers? How do we get them to work in real-time — and with each other?
  • How do we embraceim so sorry :(

kodlara silmeyim bari kalsın benım gibi altina koyun :)

şarkıları dinle sikis izle porno izle sex izle sikis sikis izle sikis hiphop kelebek chat kelebek sohbet chat sohbet chat porno porno izle sex mynet sohbet