Harrison Tang (@tang_talks) 's Twitter Profile
Harrison Tang

@tang_talks

Tech entrepreneur. Spokeo CEO. W3C CCG Co-Chair. SoCal Monte Jade Chairman. Stanford alum. Father of 4 sons.

ID: 2609251

linkhttps://linktr.ee/harrisontang calendar_today28-03-2007 03:46:07

1,1K Tweet

641 Followers

596 Following

Harrison Tang (@tang_talks) 's Twitter Profile Photo

Thanks for inviting us. It was great to meet the Toronto Mayor, Councillor, their teams, and the Toronto Global teams. I’ve learned so much. It’s definitely worth waking up early for 😄

Harrison Tang (@tang_talks) 's Twitter Profile Photo

Will Abramson led a discussion on why people should join W3C CCG, how people can improve and contribute to it, and what work items people can propose and work on. You can watch the recording of the presentation and discussion here (start at 4min-50sec mark):

Will Abramson led a discussion on why people should join W3C CCG, how people can improve and contribute to it, and what work items people can propose and work on.  You can watch the recording of the presentation and discussion here (start at 4min-50sec mark):
Harrison Tang (@tang_talks) 's Twitter Profile Photo

I think one reason behind #SSI slow adoption is that the current #SSI focuses on identity and access management, not identity data. And arguably, the identity data industry is bigger with more monetizable use cases.

Harrison Tang (@tang_talks) 's Twitter Profile Photo

Mirko Mollik and Kaliya Young presented their work on "Credential Format Comparison" at our W3C CCG meeting last week. There is no panacea that solves all problems, and different technologies have different trade-offs. You can watch the recording of the presentation and

Mirko Mollik and Kaliya Young presented their work on "Credential Format Comparison" at our W3C CCG meeting last week.  There is no panacea that solves all problems, and different technologies have different trade-offs.  You can watch the recording of the presentation and
Harrison Tang (@tang_talks) 's Twitter Profile Photo

What is #trust? I define “trust” as the reliance on others to achieve a mutually beneficial outcome. This definition is inspired by Game Theory because trust is how you beat the game.

Harrison Tang (@tang_talks) 's Twitter Profile Photo

Excited to share my interview with Tech Trek Podcast where I delve into the essentials of data quality and entity resolution 🎙️ Thanks for having me on your podcast Amir Bormand! linkedin.com/posts/amirborm…

Harrison Tang (@tang_talks) 's Twitter Profile Photo

Using LLMs to do one trillion pairwise comparisons in entity resolution is a costly move that would likely bankrupt any company. That said, using LLMs to perform QA checks on the outputs of the entity resolution could save a lot of manual QA time and costs.

Harrison Tang (@tang_talks) 's Twitter Profile Photo

Entity resolution complicates data lineage and provenance because it’s a type of data aggregation and merge, and any data aggregation loses some of the original context in the raw, non-aggregated data. Our new entity resolution solves this problem by tracking changes (similar to

Harrison Tang (@tang_talks) 's Twitter Profile Photo

I’m excited to share that leaders from the Decentralized Identity Foundation (DIF), Trust Over IP (ToIP) Foundation, W3C Credentials Community Group (CCG), and W3C Decentralized Identifier Working Group (DID WG) have announced a collaborative initiative to advance the

Harrison Tang (@tang_talks) 's Twitter Profile Photo

Wesley Smith from Digital Bazaar, Inc. present on "Verifiable Credential Barcodes" at W3C CCG. Verifiable Credential Barcodes embed digital signatures into barcodes, which can be added onto physical credential cards to enable cryptographic verification. You can watch the recording of

Wesley Smith from <a href="/digitalbazaar/">Digital Bazaar, Inc.</a>  present on "Verifiable Credential Barcodes" at W3C CCG. Verifiable Credential Barcodes embed digital signatures into barcodes, which can be added onto physical credential cards to enable cryptographic verification. You can watch the recording of
Harrison Tang (@tang_talks) 's Twitter Profile Photo

Cryptographic agility is a system that enables switching between different cryptographic algorithms and protocols in hope to enhance security. Excessive cryptographic agility, however, increases development costs, attack surfaces, bad interactions, and downgrade attacks. Having

Harrison Tang (@tang_talks) 's Twitter Profile Photo

We had a great session on "W3C CCG Work Item Updates in Q3 2024". W3C CCG has 9 main active initiatives, which includes VC-API, VC 2.0 Test Suite, Quantum Safe Data Integrity Signature Suite, VC Education, VC Traceability, VC Render Method, VC Barcodes, Verifiable Issuers and

We had a great session on "W3C CCG Work Item Updates in Q3 2024".  W3C CCG has 9 main active initiatives, which includes VC-API, VC 2.0 Test Suite, Quantum Safe Data Integrity Signature Suite, VC Education, VC Traceability, VC Render Method, VC Barcodes, Verifiable Issuers and
Harrison Tang (@tang_talks) 's Twitter Profile Photo

Gregory Natran, architect at Portage Cybertech, and Joni Brennan, president of DIACC, presented on "Pan-Canadian Trust Framework” and “Digital ID & Authentication Council of Canada (DIACC)" at W3C CCG. DIACC aims to advance digital trust adoption, and it is the scheme owner and

Gregory Natran, architect at Portage Cybertech, and Joni Brennan, president of DIACC, presented on "Pan-Canadian Trust Framework” and “Digital ID &amp; Authentication Council of Canada (DIACC)" at W3C CCG.  DIACC aims to advance digital trust adoption, and it is the scheme owner and
Harrison Tang (@tang_talks) 's Twitter Profile Photo

Greg Bernstein gave another unsurprisingly amazing presentation on "Anonymous Holder Binding" to follow up on what he didn’t have time to cover last time at W3C CCG. He first talked about leveraging the challenge (i.e. one-time random number) to prevent replay attacks between

Greg Bernstein gave another unsurprisingly amazing presentation on "Anonymous Holder Binding" to follow up on what he didn’t have time to cover last time at W3C CCG.  He first talked about leveraging the challenge (i.e. one-time random number) to prevent replay attacks between