Ubiquity Via Focus

Well, that’s done and over with.

So let’s move forward with the third year of the revived Bredemarket.

In case you missed it, Bredemarket provides content-proposal-analysis services for identity/biometric and technology firms by means of standard writing offerings.

And Bredemarket will improve its capabilities to serve you…by the means of ubiquity via focus.

No, Bredemarket isn’t ready to reveal what “ubiquity via focus” is yet…but I think you’ll figure it out.

Ubiquity Via Focus.

Two Years

On May 30, 2023 I wrote a post in the Bredemarket blog, announcing an increase in Bredemarket’s business hours to full time.

I also announced a change in scope.

“If you need a consultant for marketing or proposal work, and your company is involved in the identification of individuals, Bredemarket can accept the work.”

Because…I learned at 7:30 that morning that my individual identification employer was no longer my employer. Several of us lost our jobs that day.

As it turns out, my view of my employment future was overly optimistic.

“Maybe I’ll find a new full-time position in a couple of weeks, and I’ll again have to reduce hours and scope.”

As it ended up, I didn’t…and I haven’t.

Your credentials are too impressive, so we are moving in a different direction.

And I’m paying full price for my healthcare—no employer subsidy.

Your opportunity remains.

Bredemarket has openings.

(Pictures not from Craiyon, but from Imagen 4.)

Your Product Marketing Audience is Small

Product and service marketing is deceptively easy…because there’s no need to market to everyone.

I just calculated the numbers. Of the world’s population (not counting non-person entities) a generous (!) maximum of 8,000 people are hungry and interested in buying the services Bredemarket provides. 

The true number is probably more like 800, but let me fantasize for a moment.

Unreal fantasy.

Or to put it another way, 99.9999% of people have absolutely no interest in Bredemarket.

(Not) Spreading the word about my guest post 

This affects how I market things.

For example, when I wrote my guest post on May 6, I spread the word via my own blog and social channels. Including all the repurposing.

But I didn’t privately contact people and gloat about my byline.

Well, with two exceptions. Because I wrote briefly (one sentence) about third-party risk management, I privately alerted two TPRM professionals who wouldn’t have seen it otherwise.

“Employ third-party risk management (TPRM) to minimize the risk when biometric data is stored with cloud providers, application partners, and companies in the supply chain.”

Pearls and ice

Other than that, I engaged in no private messaging, even to long-standing biometric professionals.

  • Some of the biometric professionals saw my blog or social mentions of the guest post and were duly impressed.
  • Others likely saw my blog or social mentions and didn’t care one bit.
  • The rest never saw my blog or social mentions, which meant that they didn’t actively follow Bredemarket, which again meant that they didn’t care at all.

The whole pearls before swine story plays here. 

Or selling ice makers to Eskimos. 

A lost cause.

Whatever example you prefer, there’s no need to market your product to those who don’t give a REDACTED about it. 

You can’t overcome indifference.

(All pictures from Imagen 4)

Consider the Ethical Ramifications (7/7)

This is the last of seven vendor suggestions I made in my Biometric Update guest post.

“Consider the ethical ramifications. Sometimes we as an industry are so intent on getting things done that we don’t pause to consider the ramifications of our actions. Those companies that address the ethical ramifications of biometrics, artificial intelligence, machine learning, and other technologies are well-positioned for future challenges.”

Ideally ethical considerations should happen in the executive suite, not in some superfluous subcommittee that could get axed any day. As a positive example, Tony Porter OBE QPM LLB has served as Chief Privacy Officer of Corsight AI since January 2021.

(Imagen 3)

Employ Security (6/7)

This is the sixth of seven vendor suggestions I made in my Biometric Update guest post.

“Employ comprehensive security measures. Ensure protection for the data on your systems, your customer systems, and the systems integrated with those systems. Employ third-party risk management (TPRM) to minimize the risk when biometric data is stored with cloud providers, application partners, and companies in the supply chain.”

If you don’t already know this, whenever you read a Bredemarket-authored article, always click the links. This includes the articles I write for others…such as Biometric Update. If you clicked a particular link at the end of my guest post, you found out which third party behaved badly with Customs and Border Protection (CBP) data:

“Facial images of travelers and license plate data have been stolen from a U.S. Customs and Border Protection (CBP) subcontractor….While the agency did not identify the subcontractor to the Post, it did provide a statement titled “CBP Perceptics Public Statement.”…Perceptics was hacked in May, and The Register reported thousands of files…were available on the dark web.”

As I concluded my guest post,

“Do not let this happen to your business.”

But here’s a positive example:

“ID.me will transfer your Biometric Information to our third party partners only when required by a subpoena, warrant, or other court ordered legal action.”

(Imagen 3)

Disclose Data Uses (5/7)

This is the fifth of seven vendor suggestions I made in my Biometric Update guest post.

“Disclose the specific uses for all biometric data you control and/or collect. The law often requires this anyway, but even if it isn’t, educate your customers and their users regarding why you collect what you do.”

As an example, Built In notes that Illinois’ Biometric Information Privacy Act (BIPA) has strict consent requirements, including the following:

“Informing the individual of the company’s purpose for collecting, storing, and using the biometric information.”

(Imagen 3)

Comply with Privacy Requirements (4/7)

This is the fourth of seven vendor suggestions I made in my Biometric Update guest post.

“Comply with all privacy laws and regulations. This should be a given, but sometimes vendors are lax in this area. If your firm violates the law, and you are caught, you will literally pay the price.”

Ask companies doing business in the GDPR region, Illinois, Texas, and elsewhere how hefty those fines could be. Meta alone has received billions of dollars of fines in Ireland (EU) and over a billion dollars in Texas.

(Imagen 3)

Store the Minimum (3/7)

This is the third of seven vendor suggestions I made in my Biometric Update guest post.

“Store only the minimum necessary personal information. If you don’t need to keep certain data, don’t store it. I’m sure our decentralized identity friends will agree with this.”

Take one such company, Anonybit.  Did you ever wonder how Anonybit got its name? Here’s what Anonybit does with biometric data after capture:

“Convert biometric into sharded, anonymized bits (“anonybits”)

“Distribute the “anonybits” throughout the multi-party cloud environment for storage, where they are kept and never retrieved or reassembled, even for matching”

(Imagen 3)

Collect the Minimum (2/7)

This is the second of seven vendor suggestions I made in my Biometric Update guest post.

“Collect only the minimum necessary personal information. If you don’t need certain data, don’t collect it. If it’s never collected, fraudster hackers can never steal it.”

Let’s pick on Workday. Job applicants know why. Workday’s default configuration (which many companies don’t change) is to require job applicants to set up an account with login and password.

But what happens to that data when—not if—Workday is hacked?  

(Imagen 3)