Dead 2.0 (feta)
Anti-hyping Web 2.0 since 2006.
Interesting
So Web 2.0
Cool Logo…nothing else?
Mashery.com
Meditative Cyberspace … a treat while I am on vacation
I found this the other day after I loaded flash 9 it just appeared. It is amazing and very relaxing. So if you can’t be on vacation with me you can just watch it and float away for 5-15 min. Enjoy.
Ashes and Snow.
I am back August 24th until them I am sans computer.
The Wireds are one again.
Some how … Wired online property was sold away from the magazine. Some how the logic of this was ridiculous to me. They would always have the text content of the magazine but none of the graphics. I am glad they are together again “one owner of one identity”.
Portland Airport Rocks…
I just flew from Eugene up to Portland. Both of these Oregon Airports have Free Wifi! Thanks for understanding the modern networked person. I hope more airports get a clue and do this too.
Wow! – Todays Surprise I was on stage at Gnomedex.
The audience did a shout out for who would lead the the “MVP” discussion here at Gnomedex. They picked me. This has got to be one of the highlights of my career so far. I was handed the mic and invited on stage (right then) to lead a discussion for 15min. Thanks to Dave and Marc for their vocal support.
I used the opportunity to talk about the gap that I see between the civil society – (the group forming network that has been a foundational part of america – DeTocqueville wrote about it) and the social tool building sector. There is a massive gap. I hope that we can find ways to bridge it.
The reason that I am involved in the Identity world is because I want to see people, the citizens in civil society be empowered. I highlighted at the end the potential to weave together – MircoAps to meet their community needs. Where is the “myspace” for churches? Where are the social network tools to augment the neighborhood or a city block mailing list? I hope this community can engage with my challenge to them.
The identity stuff is happening right now big time. There is the Identity Open Space in Vancouver July 20-21. and in Santa Clara Sept 11.
I put forward that several things – there are a few organizations in the intersection –
• Planetwork (where I am the Network Director) We are working on the 1Society Project to build open source open standards based reference architecture for the identity layer working for civil society.
InterraProject – local economy loyalty card and social networking for community.
• The Nonprofit Technology Enterprise Network
• Compumentor (Net2)
• Aspiration (They have the Advocacy Dev III coming up at the end of the month).
Other things that came up during the conversation:
Today we talked about lifestyle businesses and success beyond the ‘massive liquidity event’. These are the kinds of companies that can fulfill the huge array of niches. There is an enormous market to serve civil society group forming networks.
There were some people talking about how ‘we don’t need tools’ – everything is fine or that online tools are really just good for interest communities that are not geographic.
Susan Mernit stood up and said to those being contrarian should listen to what I was saying – for those of us who care about open source we should make sure these tools work for civil society. The big companies – Microsoft etc. are making life management tools and we as a community should be thinking about them too.
Technorati Tags: Aspiration, civilsociety, community, conference, gnomedex, gnomedex6, identity, IdentityOSVan, Net2, nptech, NTEN, puppy, women
THE WORD: Managiziation
Mike Neuenschwander gave a GREAT performance this morning. Last year he destroyed a guitar on stage and assured us that it had a good life in guitar heaven. This year he brought us THE WORD: Managization. I captured it using my camera’s video function. You can check it out over on my Vlog.
Technorati Tags: BurtonGroup, Catalyst, identity, nacatalyst06
Identity For Dolphins
This came up on the identity list:
Bottlenose dolphins appear to whistle their “names” to each other, according to a new study. Researchers say that this type of referential communication is extremely rare in nature, and until now had not been clearly shown in a non-human animal.
Scott Always Where Name Tag
I thought this would be a light entertaining identity interlude. enjoy.
I am working on my BayCHI talk this morning and…the things people get famous for. Apparently Scott Ginsberg ‘who always wheres a nametag’ got on CNN. He even has a ‘professional speaking video’ on YouTube. Why are you wearing a name tag – its you friendlier and more approachable. He does it to make an ‘unforgetable first impression.’ His blog is “HELLO, my name is BLOG” it looks like it is slammed right now.
Jigsaw aggregating everyone…
I have had a challenge with my RSS reader. Making things slow as molasses. So I have not really be reading to much. I decided to do some surfing around and likely will abandon readers all together except for maybe 20 core blogs. The rest I will do by surfing and searching.
Today I found this by surfing through TechCruhch. Jigsaw I quoted it extensively because it was so startling and relevant for the identity community to consider.
Jigsaw is a marketplace for contact information, and it is very efficient. It boasts detailed personal contact information for 2.5 million people, and 7,000 new people are added every day. If you want the name, title, email address, direct phone line and/or address of any executive of any company, there is a very good chance Jigsaw will already have it in its database and will sell it to you. And if you are a sales guy and have no ethical concerns about where you get your contact information, you probably already know all about Jigsaw.
Unlike competitors like Hoovers and InfoUSA, which gather company information by semi-legitimate means such as scouring SEC filings, cold calling companies and asking for information, and reviewing other public documents, Jigsaw simply pays people to upload other people’s contact information. Users are paid $1 for every contact they upload, and some users have uploaded information on tens of thousands of people. See the demo (and note the other demos on that page as well). Jigsaw is also self correcting, and incentivizes people to also correct bad contact information.
That’s right, the next time you hand out a business card to someone or otherwise divulge your contact information, you may be handing it out to the entire world.
Here’s how it works: Sign up and start downloading contact information. This includes name, title, company, address, email and direct phone line. For example, a quick search brought up all of this personal.
But wait, it gets much worse.
Anyone can find out if Jigsaw has their contact information via a link on the home page, but amending or trying to delete that information simply puts a flag on the data with the changes noted – but the original information also remains.There appears to be no way to remove your own contact information from Jigsaw once someone has entered it into their database. There is no method that I was able to find on the website to do this (including in the privacy policy), and an email to the company asking about this went unanswered (its been three business days now).
Jigsaw has a carefully worded privacy policy to deal with the fact that they are the antithesis of privacy. They say “This privacy policy covers how, when and why we collect, use and share information about our users…This policy does not apply to our collection and use of data about companies and contacts contained in our database system.”
Is Jigsaw legal? Maybe in the U.S., although I’d love to see a class action case brought against them. Is it ethical? Absolutely not. Every Jigsaw employee and investor has dirty hands and they should be ashamed of themselves.
Like Plaxo, Jigsaw makes money while pushing costs to other people. In Plaxo’s case, its spam. In Jigsaw’s case, its making private contact information public. The problem here is that Jigsaw’s actions aren’t easily found out by people getting constant cold calls and emails – it’s very unlikely they’ll know that these people got this contact information at Jigsaw in the first place.
If they wanted to do this right, they’d set up a marketplace where individuals could choose to sell (or give away) their contact information. The owner of the data could set the price, and Jigsaw could take a cut. Would this model work? Perhaps not, but that just proves my point. The only reason Jigsaw does work is because they don’t have to bear the costs that they push to third parties – all of the people who are in their database.
Cool Human Internet tricks
They are relevant to identity because it is interesting how people use the net to form their identity and do interesting things to make a buck doing things that would be impossible without it.
There are a few interesting “Internet Tricks” that I have come across and I thought I would share. The earlier one is One Million Pixels – where a guy sold one web page’s pixels for a dollar each in minium blocks of 10×10. He made his money.
This one a guy started off with One Red Paper Clip and is trading it up for a house he started less then a year ago and is now trading for a years free rent in Pheonix.
Mix06 Wiki
Some how Microsoft didn’t get that conferences these days – even the most ‘structured and programmed’ ones have wiki’s to help folks organize and connect.
I have found the third party wiki for the conference.
Web 2.0 quiz
For all of you in identity land who have not yet figured out Web 2.0 here is a chance to see how silly it all is.
The Web 2.0 or starwars quiz.
http://www.cerado.com/web20quiz.htm
Sophisticated DRM is really important sounds like CRAP to me.
So we are getting BBC’s pitch for how great DRM is. It all sounds so nice and warm and fuzzy.
I really enjoyed David Berlind’s whiteboard session on C.R.A.P. – Content, Restriction, Annulment, and Protection.
You can drag and drop stuff to share with friends. Does the BBC have yet another friends list of mine? Can we get some open standards for friends lists. It seems like the kind of stuff they are expecting us to download will just not happen with the level of broadband in this country…so much lower then the rest of the world.
Password Security: What Users Know and What They Actually Do
Password Security: What Users Know and What They Actually Do posted on Bruce Schneier’s blog.
The finding that participants in the current study use such simplistic practices to develop passwords is supported by similar research by Bishop and Klein (1995) and Vu, Bhargav & Proctor (2003) who found that even with the application of password guidelines, users would tend to revert to the simplest possible strategies (Proctor et al., 2002). In the current study, nearly 60% of the respondents reported that they do not vary the complexity of their passwords depending on the nature of the site and 53% indicated that they never change their password if they are not required to do so. These practices are most likely encouraged by the fact that users maintain multiple accounts (average = 8.5) and have difficulty recalling too many unique passwords.
Amazingly Complex and BEAUTIFUL Network Snapshots
'what is your name' – when I order coffee it is "Lu"
I went into a coffee shop here in Portland and ordered a raspberry latte. They asked me what my name was – really what they want to know is what ‘identifier’ they can call out to let me know my coffee is ready. If you have an easy name like Kate or John or Kathy – you just use that. I have ‘Kaliya’ and really don’t want to explain how to say it or spell it just to get my coffee. So I use my default “Lu”. This was the nick name I picked up while playing water polo at CAL (UC Berkeley) and believe it or not it was a derivative of Kaliya…
Kaliya
Kalua
(I had this suite with a giant orchid like flower on it (the whole front)
Lula
LuLu follow shortly
Lu
Youth, Identity and Technology
Dana Boyde is working on her PhD at at UC Berkeley. She is about to move to LA to do field research with youth. I read her blog regularly and a lot of what is happening is that youth, there use of technology and exploration of identity. I wanted to share this highlight from her post yesturday and if you are interested in these things you might want to subscribe to her blog.
I am currently more interested in understanding the theoretical and historical underpinnings of youth and identity. That said, what i am doing is not removed from social software. Most youth today use social technologies as part of their coming of age processes. They have far richer social lives than most adults. What they are doing with technology is far more complex. Furthermore, they are really focused on the act of socializing, not collaboration or any other work-centric model. Youth have a lot to teach us about social software – about its strengths, weaknesses and where innovation should go. Obviously, i’m biased – this is the root of how my research is applicable to technologists.
I hope those of you building technology will enjoy my journey to the depths of youth. I certainly am. If not, i’m sorry.
super portable oldschool phone
So Brad Templeton brought his portable phone.
More pictures here…with it on the cart with folks actually making calls….
(go on and look…they are worth it for the chuckle)
[I would post them in my blog …can’t drag and drop into ecto and get it to actually publish though – sorry]
DIY – Port-o-Rotary: The Rotary Cel Phone
I saw it actually work today at lunch. Here is the photo from lunch.
This is the link to their site Spark Fun.
Going 'to' the interent
Last weekend I was hanging out in a cabin with ‘no’ internet. There is internet about a mile down the road…Liz and made pilgramage there and described it as ‘going to the internet’. This way of framing the outing is interesting because the metaphor we use to describe it…a place worthy of protection of freedom of speech.