The German Government is evolving its strategy on digital platforms, as we had already reported earlier (Digital Sovereignty - Participate! Contribute!, Whitebook Digital Platforms in the Makes). The expected White Paper has been published in March 2017. In4com.de has reviewed the paper and summarized the most important results with respect to digital sovereignty being at the core of in4com.de agenda. The civil society has to stay alert due whitepaper shortcomings. Also, ongoing international trade negotiations may have huge negative impacts on privacy and digital sovereignty (in4com.de has commented on this).

STOP TTIP association logo

2016 Leaks from the TiSA negotiations held in secrecy (Trade in Services Agreement) indicate that TiSA will foil the EU data protection directive of early 2016. TiSA must come under public monitoring and requires an eventual public vote!

Manfred Reitenspiess, owner of in4com.de, has provided extensive comments on the greenbook „Digital Platforms“ (Grünbuch „Digitale Plattformen“) as published by the German Government (we had pointed out the opportunity to contribute in „Digital Sovereignty - Participate! Contribute!). The received comments were summarised by the German Ministry of Economy and Energy BMWE. In4com.de comments were cited a number of times and are completely available for download. In a follow-up step (beginning of 2017) a whitebook is to be published as a step toward a German digital agenda. The whitebook shall come up with specific recommendations and calls for action with respect to the evolution of digital platforms (see the official webpages of the BMWE).

The ”Greenbook Digital Platforms (Grünbuch Digitale Plattformen)”, published by the German government in May 2016, is a clear proof that digital sovereignty is recognized as a necessary requirement for a successful digital transformation in Germany and Europe. Important issues with particular reference to the use of data, their economic value and the protection of individual users’ rights are explicitly addressed, looking for solution proposals. A call for action is sent to the public (see https://gruenbuch.de.digital/de/kommentieren/ to contribute and participate actively in the ongoing discussion). Resulting recommendations for follow-up actions are planned for 2017.

The growing powers and influence of Internet monopolies during the ongoing digital transformation threatens democratic societies - WE HAVE TO ACT.

Digital Sovereignty 1.4 - More architecture charactistics of secure Internet services

We have already shown in Architectures for Secure Internet Services,  how decentralization, anonymity, and resilience can help to assure digital sovereignty (the what and why is discussed in more detail in "Digital Sovereignty - What is it?", "Digital Sovereignty – why we need it", "Giving up Digital Sovereignty?"). In this report we will introduce two more foundational and necessary architecture principles – object orientation and  need-to-know principle.

Real World Role Model Offset in the Digital World

Living together in our society as well as the functioning of a corporation depend on a clear role model and people acting according to a given role at a certain point in time. A number of roles are assigned to each of us, depending upon the environment in which we are acting: mother, pilot, chancellor, software programmer, trucker,…

Digital Sovereignty 1.3 - Architectures for Secure Internet Services

Today’s data center focused and organized Internet services are just like dinosaurs – they were very successful at their time, but eventually vanished in a continuously changing world. If services shall be successful in the future, they have to take data sovereignty of their users/consumers into account. Being decentrally organized, local operation (in personalized devices such as smart-phones, smart home servers, PC and others we currently do not even dream of), anonymity, and resilience are their immanent characteristics.

"Do Not Put All Your Eggs into One Basket"...

...an ancient proverb, which is fully applicable to Digital Sovereignty. If we want to become sovereign of our data again, we have to replace the currently predominant approach based on centrally managed data and the accumulation of a person’s information items in one place.

Digital Sovereignty 1.2 - Digital Transformation is Based on Data Sovereignty

In the course of the ongoing digital transformation data owners will become part of the value chain - our data are valuable - we have to charge for their use!

Data are Entering Blue and White Collar Work

Digital transformation processes, as we know them from the first Internet hype in the year 2000, are entering more and more areas of our society. You find them in the ongoing industrial automation (Industry 4.0), automated driving of cars (autonomous vehicles) and the overall influence of information technology (IT) on mobility (integrated traffic management), or the automation of energy production and its distribution in the optimization of energy use.

Digital Sovereignty is in the list of topics of Germany’s Digital Strategy 2025 … however, more implementation details are required.

Update 2016-06-08: Digital Sovereignty comes in focus on de.digital (in German), see also "Digital Sovereignty - Participate! Contribute!"

Our digital sovereignty is jeopardized by potential monopolies of big Internet companies such as Google and Apple.

(SZ: Johannes Kuhn: Letzte Ausfahrt Zukunft/Last Exit: the Future; in German: SZ #11, 2016-01-15; URL: http://www.sueddeutsche.de/digital/mozilla-letzte-ausfahrt-zukunft-1.2818241, accessed on 2016-01-16, 11:01 UTC)

Digital Sovereignty 1.1 - Data Protection is THE Business Driver for New Apps and Services

The next wave of app(lications) and Internet services will be successful because of data protection!

In Search of the Killer App

The fight for customers and market share in the digital economy is tough. The first mover advantage seems to be most important due to the relatively simple internationalization of Internet services. Well known examples are Google, Amazon, and Facebook. Very often, the market leader offers maximum functionality which is easy to use. Other qualities of the offerings such as security, data protection, Digital Sovereignty are treated only as second in line. In the best case they are perceived as unnecessary, in the worst case, they are seen as detrimental and “killing business”.