• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Technology

Meet space technology improvement for etech and other 'traditional' conferences

Kaliya Young · March 7, 2006 · 1 Comment

Ao the physical space situation here at etech is horrible. The rooms are too small – it is not only sold out but over sold. We are sitting in the isles and standing 2 deep at the back of the room. Here is a summary of the current issues and some potential solutions.
Venues – flexible support for interaction:
It seems there is a real market for innovative collaborative community meet space. With the emergence of camps and unconferences what are the space that can support these events. The space where we meet – like the nowhere store was.
Accommodations – We need integrated diversity:
I am staying the youth hostel (it is the nicest one I have ever been in). Because for this event I want a nice bed to sleep in and I don’t care if I need to share with others. I am paying $72 for three nights (they make $96 if they sell out my 4 bed room). Some want the kind of accommodations that cost $300-$500 a night. How can you have those market nees and everything in between near by.
Food – good food reasonable cost:
How can you feed people good food for low cost. I think most coming to a conference would be able to afford about $10 a meal. Presentation doesn’t matter really the food does. This is what we paid for food at the internet identity workshop – people loved both lunches.
Hotels are making a lot of money right now off conferences – charging a lot per day for people to attend an event and be fed.
Carpooling – How do we get there?:
There are some sides that do this like space share but it is not totally easy to do yet and you have to re-enter a profile all the time. How do I put out a carpool request on my blog that will get circulated to the people who are also traveling from my area and might be driving. How can this be managed in ways that don’t overwhelm everyone with my request but just those who might help.
Process – What are the processes we use when we gather?:
The submit, committee select, present model is a bit stale. I have gone to three talks this afternoon and keep thinking tell me something I don’t know yet. If you are going to present get to the point. I am a big believer in the short presentation – we use them at planetwork 5-10 min. Go through your concepts faster cause I get what you are saying.
Some things deserve the full attention of the whole group but only about 1/10th of what they make us give our full attention to.
Examples of this would be Bruce’s talk last night but – give him a lot of time because he has a reputation of killer talks that are engaging. Folks were not doing their e-mail during it they were listening. This morning it was the light table interaction demo (it was super amazing) the there was no typing. As well Linda Stone’s insightful talk about what was coming next after Continuous Partial Attention. Basically she said ‘analogue’ is the new ‘digital’ as jair would say.
There is open space technology, speed geeking, appreciative inquiry lots of different change processes [see Change Handbook]
Ambient Findablity of people:
(I am writing this post in the Ambient Findability presentation)
Help me find the people in this stack of 1,300+ folks that I want to meet and talk to. Who has identity problems that I can help people find the resources in our community? Who is working on socially good tech stuff that would love to know about Planetwork? Can applications like attendr and Hallway help? Can we get investment in these open source tools – if you want you can use the something like $10,000 + $10 a head intronetworks (that I get to use it for PCForum.) That is not accessible.

Technorati Tags: etech, etech06, camps, unconference

RSA: DoD presentation – the "killer brief culture" shines through

Kaliya Young · March 4, 2006 · Leave a Comment

Glenda Turner who is at the DoD and Network and Information Integration / Chief Information Officer of the Office of Assistant Secretary of Defense.
I had heard about ‘the killer brief culture’ of the pentagon and DoD. Most particularly from Thomas Barnett. This presentation was just so indicative of it. IT was a hodge-podge of different slides from different peoples ‘killer briefs’.
They are highlighted here on Flickr
Number 1
Number 2
Number 3
Here is what I wrote down while she talked.
Network centric operations and warfare – Peacefair. “the next 15 years” how DoD is thinking and what is in progress to position information assurance.
There are:

  • 55 major organizations (military departments)
  • 4 million users
  • 100,000 have significant with IA related responsibilities.
  • Dataflows equivalent to the entire library of congress every 4 hours.
  • 100 major networks
  • 5000 major applications enabling critical military operations
  • 22000 applications providing suport and infrastructure.

It is big business:

  • 400 billion
  • 30 billion IT and 2 billion in Information Assurance

BIG
Difference industrial space and hostile environments.
Platforms:

  • Cooperative Engagement
  • Family of Systems – Regional networks
  • The Global Information Grid – Global internetwork for 21st Century.

Netcentricity this is a set of behaviour and how we conduct business
The quality of information and horizon…how far in the net you can see…
Make information avaliable on the network that people depend on and trust populate the network with new dynamic sources of informaiton
deny enemy advanatages and exploit weakness…
Sensor and Shooter + Command and control
Every sensor talks to every sensor…avaliable to all guns… put stress on net and information assurance.
We have been in the static mindest of control we are moving to dynamic mindset of enabling.
Global information environment is managed as a whole and develed.
Identity and access management are big topics here…
Entities dynamically discover adn freely interact with each other. They seamlessly acess everything they needs and concentrate ‘entities’ are a single device or person. Push envelope on identity and demands on this space for the global informaiton grid. Entities dynamically discover one another and interact. Set of objects and transactions. Information Assurance must get down to both level. Risk Adaptive – Dynamic Policy. Enforce confidentiality – through network boundaries. Manage by role or policy.
Aircraft carrier – 23 major networks. most driven by separation. We must
change the way we provision IT.
Capabilities based planning – enterprise IT portfolio Management.
Natioanl security strategy. USCOD 44 DoD Directive 8110.1
Enterprise IT. Investment management…
[my comment – Barfy graphics]. We buy information assurance.
Evaluation and prefformance management and outcomes based measurement…. this is going to be a huge growth area.
How do you judge different ways.
Informatoin Assurance becomes Information Technology.
Netcentric architechure – and war reference model.
Information assurance. SOA. Conforming to same rules everything else conforming to.

Youth, Identity and Technology

Kaliya Young · January 27, 2006 · Leave a Comment

Dana Boyde is working on her PhD at at UC Berkeley. She is about to move to LA to do field research with youth. I read her blog regularly and a lot of what is happening is that youth, there use of technology and exploration of identity. I wanted to share this highlight from her post yesturday and if you are interested in these things you might want to subscribe to her blog.

I am currently more interested in understanding the theoretical and historical underpinnings of youth and identity. That said, what i am doing is not removed from social software. Most youth today use social technologies as part of their coming of age processes. They have far richer social lives than most adults. What they are doing with technology is far more complex. Furthermore, they are really focused on the act of socializing, not collaboration or any other work-centric model. Youth have a lot to teach us about social software – about its strengths, weaknesses and where innovation should go. Obviously, i’m biased – this is the root of how my research is applicable to technologists.
I hope those of you building technology will enjoy my journey to the depths of youth. I certainly am. If not, i’m sorry.

Interent 2.0 – deep cultural consequences

Kaliya Young · December 23, 2005 · Leave a Comment

I have been reading Sherry Turkles book Life on the Screen: Identity in the Age of the Internet. The ironic thing is that it was written in 1995 before the Web really took off and became mainstream. I am going to finish it over my retreat. So far she has gotten me to reflect on the nature of our relationship to machines and how children growing up relate to machines. She has been studying their interaction with them over several decades and in different cultural contexts. I am reminded her work when reading Internet 2.0: the economic, social and cultural consequences of the new Internet
There are 4 levels to this model.
Disintermediation, Long Tail – which are concepts in wide circulation already. When it gets interesting is around Reformation and Continuous Presence.

The Internet is a reformation machine. It will create new fundamentals of and for our world. It change the units of analysis and the relationships between them

I think it does a good job of articulating the challenge to the ‘shape’ of our cultural dynamic.

The reformation model says fundamental categories of our culture (particularly the self and the group and the terms with which we think about them) are changing…. This is a change in the basic terms of reference, the very internal blue print with which we understand and construct the world.
Continuous Presence
One way to assess innovations is to make a guess about where we are headed. I think our economic, social and cultural destination might be this: we will be continuously connected to all knowledge and all people with a minimum of friction, and priviledge will be measured, in part, by how good are the filters with which we make contact with all but only the people and knowledge we care about.

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact