• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

Presos/Podcasts/Videos

Participation in the IIW Episode on the Rubric Podcast

Ali · September 26, 2023 ·

I participated in the Internet Identity Workshop Episode of the Rubric Podcast, a casual chat on DIDs and DID methods. Basically, the conversation was mostly with the Internet Identity Workshop’s original organizers and creators.

A Brief Introduction to the Rubric

A rubric is a standard tool for evaluating subjects. In the context of Decentralized Identifiers (DIDs), Legendary Requirements developed two key rubrics published by Rebooting the Web of Trust and the World Wide Web Consortium. You can see the DID Method Rubric here. The Rubric podcast explores this further while introducing listeners to the people and technologies behind Decentralized Identity, including DID Methods, which determine how DIDs are created, read, updated, and deactivated.

DIDs enable powerful identity services without a trusted third party and offer a flexible alternative to traditional centralized authentication. They can be used by anyone, anywhere, for any purpose. Each DID carries information about its method to ensure secure interactions. The Rubric also interviews creators and users of different DID Methods and thus sheds light on their performance, security, and privacy tradeoffs. Also, it helps users choose the DID Method that best suits their needs.

Highlights of the Conversation in the IIW Episode

In the IIW Episode of the Rubric podcast, the following subjects were discussed.

Understanding Identity & SSI in the Course:

Kaliya shared about her new SSI course written with her business partner Lucy. The first half of the course on understanding identity in general before delving into the technologies around Self-Sovereign Identity (SSI). This framing is essential as SSI as an innovation would not make sense without understanding how identity functioned in the past.

Creation of a Wiki with Newsletter Information:

Kaliya also shared mentioned a grant from the Filecoin Foundation & Unfinished to pull two years of newsletter information into a wiki. The information has been compiled into a spreadsheet to create Jekyll pages. It supports knowledge discovery within the community.

Development and Standardization of DIDs:

DIDs (Decentralized Identifiers) is undergoing development, with a 1.0 version published. There’s a focus on standardizing various aspects like DID resolution and iteration of the DID course specification.

Emphasis on DID Resolution:

DID resolution, the process of turning a DID into its associated document, was identified as a key aspect needing more discussion. Standardizing this part of DIDs was considered an open and important question for the community.

Favorite DID Methods – Peer DIDs and DID Web:

The speakers discussed their favorite DID methods while highlighting Peer DIDs for peer-to-peer interaction. DID Web was mentioned as an interesting method, despite some concerns due to its dependence on the DNS system.

Challenges in Rotating the DID Itself:

The conversation raised an interesting question about rotating underlying keys for a DID and rotating the DID itself. This aspect of transitioning DIDs, from DID Web to another method was considered an unresolved challenge.

Shameless Plugs for Various Projects and Conferences:

The participants used the platform to promote various projects, like the “Pico” programming system, “did directory.com,” and the “Rebooting the Web of Trust” conference. These plugs showcased innovations, resources, and events within the DID community.

Identitywoman.net and Links to Resources:

I pointed to my URL, “identitywoman.net,” as a place to connect with my work and access resources like the book, newsletter, and hosting events. It’s presented as a hub for those interested in identity and related events.

Humor and Lighthearted Interaction:

The conversation was sprinkled with humorous and lighthearted moments, like comparing the hosts to the two old Muppets on the balcony. The element added a relaxed and engaging tone to the discussion and enhanced the listening experience.

To learn more about the podcast, click here.

Podcast with NEWFORUM comparing Web3 and Decentralized Identity

Ali · May 16, 2023 ·

In a podcast hosted by NEWFORUM and centered on the topic of Web3 vs Decentralized Identity, I discussed a variety of topics, including open standards for digital identity, the benefits and drawbacks of using standards for digital identity, the confluence between web3 and decentralized identity, and many more.

About NEWFORUM

NEWFORUM is a podcast exploring the future of human interaction, economics, and the emerging Internet, including innovators, entrepreneurs, and investors. It helps promote research-driven conversation and hence encourages collaborative value creation.

Discussion Split Into Various Sections

How did I get started in the field of identity? I shared my journey into the identity field, focusing on how personal experiences and the potential impact of digital identity solutions on people’s lives inspired my career choice.

The importance of using open standards. The discussion highlighted the value of adopting open standards, which promote interoperability, collaboration, and innovation in the digital identity ecosystem.

Decentralized identifiers. This section explored the concept of decentralized identifiers (DIDs) and their role in providing unique, persistent, and secure identifiers that individuals control.

What is a decentralized identifier? I clearly defined a decentralized identifier, explaining its purpose and how it functions in the context of decentralized identity systems.

Differences between decentralized identity and web3. The conversation emphasized the distinctions between decentralized identity, which gives individuals control over their data, and web3, which revolves around decentralized applications and blockchain technologies.

Verifiable credentials never go on a blockchain. The podcast emphasized that verifiable credentials are not stored on a blockchain but are shared securely between parties, ensuring privacy and reducing the risk of sensitive data exposure.

Overlapping Opportunities between web3 & SSI. I discussed the areas where web3 and self-sovereign identity (SSI) technologies intersect, offering possibilities for collaboration and innovation in the digital world.

Accountability & Anonymity in virtual worlds. The final section discussed the challenges of balancing personal anonymity and accountability in virtual environments and how decentralized identity solutions could address these issues.

Click here to find the complete podcast.

Decentralized Identity: Keynote Panel at Hyperledger Global Forum

Ali · May 16, 2023 ·

At the Hyperledger Foundation conference last year in Dublin, I participated in a keynote panel discussion regarding decentralized identity, the level of adoption among companies and customers, and the factors that will ultimately lead to ecosystem acceptance.

We had myself Heather Dahl from Indicio, Marie Wallace who was at IBM at the time (now she is at Accenture), Drummond Reed from Avast (now GenDigital).

Here is the video and the summary.

The Main Points from the Panel

The keynote discussion focused mostly on the concept of decentralized identity, namely where we are and where we are headed.

Based on the keynote discussion, the following topics were discussed:

  1. Role of Government in Promoting Innovation: The panelists discussed how the government can be an engine for helping private enterprises drive innovation. They highlighted examples of Canada, British Columbia (BC), and the government of Aruba using decentralized identity during the COVID-19 pandemic.
  2. Decentralized Identity Solutions: The discussion included the adoption and development of decentralized identity solutions in various regions of the world, particularly in the Caribbean, Latin America, and Europe. The panelists also discussed the trusted digital ecosystem developed during the COVID pandemic and how it was designed to scale for other use cases.
  3. Building and Deploying Technological Solutions: The panelists emphasized the importance of building and deploying technology solutions. They discussed the challenges in working with different stakeholders, including governments, agencies, and private sector entities like hotels, nightclubs, or casinos.
  4. Organization-Wide Deployment: There was a discussion about how successfully deploying a technology solution affects all parts of an organization, including marketing, communications, legal, HR, and the C-suite.
  5. Digital Green Cards and Verifiable Credential Standards: The U.S. Immigration Services’ announcement of issuing digital green cards using verifiable credential standards was discussed.
  6. Market-Driven Approach: The panelists stressed the need for a market-driven approach, listening to the needs of businesses and making space for business leaders in the development of open standards and open-source code.
  7. Realistic Conversations About Technology: There was a discussion about the importance of having real conversations about what the technology can do and not pursuing purist approaches that may not be consumable by the market.
  8. Identifying Business Cases: The panelists discussed the need to identify business cases for the technology and solve problems that make the investment worthwhile for business decision-makers.
  9. Adoption of Decentralized Identity: The discussion also covered the adoption of self-sovereign identity (SSI) and decentralized identity by large companies like Norton LifeLock, Apple, Google, and the focus of the EU on their digital identity wallet initiative.
  10. Community Involvement and Learning Resources: The panelists shared resources about SSI, such as community meetings, pieces of training, meetups, and courses. They also suggested engaging with communities like Trust over IP, the Internet Identity Workshop, and Hyperledger.
  11. The Future of Digital Identity: The panelists discussed the future of digital identity, digital wallets, and digital credentials. They mentioned the growing interest in this space and the need to protect digital identities.

Click here and find the complete keynote video!

The Future of You Podcast with Tracey Follows

Kaliya Young · May 4, 2022 ·

I was invited to discuss self-sovereign identity on Episode 7 of The Future of You Podcast with the host, Tracey Follows, and a fellow guest, Lucy Yang.

On this podcast, we discussed digital wallets, verifiable credentials, digital identity, anonymity and self-sovereignty.

  • Why digital identity is so important and how it differs from the physical realm
  • Tools currently in development to enable self-sovereign identities
  • Whether anonymity or pseudonymity is feasible while maintaining accountability
  • How digital wallets might evolve and consolidate across the public and private sector
  • The principles of physical identity that must carry over into a digital solution and the importance of Open Standards

Listen online: https://bit.ly/3w1cxbu

Listen on Spotify: https://spoti.fi/3vIB9qK

Listen on Apple: https://apple.co/3w3fqbN

Listen on Google Podcasts: https://bit.ly/3w0hWQ1

Listen on Amazon Podcasts: https://amzn.to/3KBBC29

Is it all change for identity?

Kaliya Young · November 23, 2021 ·

Opening Plenary EEMA’s Information Security Solutions Europe Keynote Panel

Last week while I was at Phocuswright I also had the pleasure of being on the Keynote Panel at EEMA‘s Information Security Solutions Europe [ISSE] virtual event. We had a great conversation talking about the emerging landscape around eIDAS and the recent announcement that the EU will work on a digital wallet and open standards for Europe.

Here is a link to the video if the embed isn’t working.

ISSE Opening Plenary

Cohere: Podcast

Kaliya Young · November 23, 2021 ·

I had the pleasure of talking with Bill Johnston who I met many years ago via Forum One and their online community work. It was fun to chat again and to share for the community management audience some of the latest thinking on Self-Sovereign Identity.

Click on the image to get to episode

Kaliya Young is many things: an advocate for open Internet identity standards, a leader in the identity space – including hosting the Internet Identity Workshop, a published author, and a skilled Open Space facilitator.

On this episode of the Cohere podcast, Kaliya joins Bill to discuss the history of online identity, what events led us to the consolidation of identity into a few centralized platforms, and what steps we need to take to recover and protect our online identities.

Podcast: Inclusionism with Kaliya Young, Author of Domains of Identity

Kaliya Young · September 13, 2020 ·

I spoke with James Felton Keith, author and podcast host of Inclusionism, about my book, Domains of Identity. How do we manage our digital identity? What are the 13 domains of identity?

Listen to Podcast: Inclusionism with Kaliya Young, author of Domains of Identity.

Grace Hopper Celebration and Presentation – Ethical Market Models.

Kaliya Young · November 9, 2015 · Leave a Comment

In mid-October I had the opportunity to attend the Grace Hopper Celebration for Women in Computing for the first time.
Here is a link to the paper that I presented – MarketModels-GHC Here are the slides

Ethical Market Models in the Personal Data Ecosystem
I also had the pleasure of working on a Birds of a Feather Session with Roshi from Google – she works on their identity team and was the one who asked me work on the session with her along with encouraging me submit a proposal for a lighting talk.
We had a great discussion about the internet of things and considering various ideas about what internet of things things…we might invent and how we might identify ourselves to them.
The conference is really a giant job fair for undergaduate women CS majors. There is not a lot there for mid-career women, all of the ones I spoke to felt this way.  I realize if I was a young woman….at a CS department where most everyone is a man.  Attending this event would make me feel like the whole world opened up…and anything was possible.
The event made me more committed to putting energy into helping She’s Geeky expand and serve more cities and more women and particularly those who are at high risk of leaving the industry – those who have been in the industry for around 10 years.

Personal Data Ecosystem Videos from Telco 2.0

Kaliya Young · November 23, 2010 · Leave a Comment

I had a great week at Telco 2.0 the week before IIW.   STL partners has been running Telco 2.0 events for a few years focused on new business models for that industry.   They have honed in on the potential to provide services to people to collect and manage their own data.   This week they published interviews from three of the key speakers all of whom who also attended IIW the following week.  Much of the focus for both events was on the emerging Personal Data Ecosystem.
I recommend the content on the Telco 2.0 site and if you are interesting in visiting interesting innovative parts of the Telco world they have great events for that.
AT&T: to be a ‘Personal Information Agent’
Von Wright, VP Cloud & Wholesale Services, describes how AT&T plans to put consumers in control of their own data, and take the role of an agent or broker for their Personal Information

Google: Strategic ‘Co-opetition’ with Telcos on Consumer Data
The ‘Personal Information Economy’ will see a higher intensity of strategic co-opetition between Google and telcos according to Google’s Eric Sachs.

Microsoft: Why Telcos Must Act Now or Lose The Opportunity
Marc Davis, formerly Yahoo! Mobile’s Chief Scientist, now at Microsoft, and a key collaborator with both Telco 2.0 and the World Economic Forum’s ‘Re-Thinking Personal Data’ initiative, gives his unique perspective on the ‘Gold Rush’ for personal information, and why telcos must act now or lose the opportunity to take a valuable role in it.

We are not at War

Kaliya Young · August 7, 2010 · 4 Comments

I was the first person Van asked to speak at the Community Leadership Summit West Ignite talks. I was the last person to submit my slides. I have a lot to say about community but I had a hard time figuring out exactly what to say. I knew I wanted to talk about the identity community and our success in working together. Robert Scoble’s quote really got me going and I decided to use the talk to respond to the comment that was catalyzed by his facebook post/tweet “Who is going to win the Identity War of 2010”
This is completely the wrong frame to foster community collaboration.

IIWX Internet Identity Workshop 10, Introductory Talk

Kaliya Young · May 27, 2010 · Leave a Comment

I gave this talk at the 10th Internet Identity workshop reviewing the shared history, language, understanding and work we have done together over the last 6 years of community life.

Internet Identity Workshop 10 – Introduction to the User-Centric Identity Community

View more presentations from Kaliya Hamlin.

Part of this presentation touched on a timeline of events in the community. Those and more are reflected on this timeline that is beginning to be developed here. IIW11 will be November 9-11 in Mountain View, CA The first ever IIW outside the Bay Area will be happening September 9-10 in Washington DC following the Gov 2.0 Summit with the theme Open Identity for Open Government. The first IIW in Europe will be happening in London likely October 9-10 (dates still to be confirmed) prior to RSA Europe. If you would like to know about when the next IIWs have registration open please join this announce list. TheIdentity Gang is the community mailing list where conversations are ongoing about identity. You can follow modest updates about IIW on twitter via our handle – @idworkshop You can see IIW 10 attendees on our registration page.

Identity for Online Community Managers

Kaliya Young · August 19, 2009 · Leave a Comment

I was asked by Bill Johnson of Forum One Networks to kick off the discussion on the next Online Community Research Network call this week with the topic Identity for Online Community Managers – drawing on the presentation that I put together for the Community 2.0 Summit. I cover the basics of how OpenID, OAuth and Information Cards work, who is “in” terms of supporting the projects and what community managers/platforms can do. We will discuss the implications of these new identity and data sharing protocols on the call.

Online Identity for Community Managers: OpenID, OAuth, Information Cards

View more documents from Kaliya Hamlin.
I will also be attending the Online Community Summit in October Sonoma and will be sharing about these and other technologies there.

Freedom to Aggregate & Disaggregate oneself online.

Kaliya Young · August 19, 2009 · Leave a Comment

I presented this slide show at the Oxford Internet Institute meeting in April that considered A Global Framework for Identity Management.

You could sum it up this way – “stuff happens in peoples lives and the need the freedom to go online and get support for those things and not have it all linked back to their “real identity.”

The slides are moving (drawing from post secret post cards) and it is worth watching if you don’t think people need this freedom.

Freedom to Aggregate, Freedom to Disaggregate

View more documents from Kaliya Hamlin.

its that SXSW picking time of year

Kaliya Young · August 18, 2009 · Leave a Comment

200908181123.jpg

This year there are 2200 panels submitted for 300 slots. It is great they are going with community generated ideas for the conference. It is also hard to tell what will be happening in our fast moving industry 7 months from now. PLEASE go to SXSW create an account and then vote for these two 🙂

I put a lot of thought in to what to put forward this year knowing it would be 9 months out. One of the trends that is just starting to emerge is identity verification – my hunch is that by March this will be a topic getting a lot of attention and worth exploring at SXSW.

Who are you? Identity trends on the Social Web.

“On the Internet Nobody Knows You’re a Dog” Is this famous New Yorker cartoon still true? Twitter is doing verified accounts. Facebook claims everyone using their “real name” gives strong social validation ‘proof’. Equifax is validating age with information cards (digital tokens). We will explore the current trends and their implications for the future.

  1. What is identity?
  2. Why are people doing identity validation?
  3. Who is doing identity validation?
  4. Why are websites seeking people who have had their identities validated?
  5. Is identity validation improving the web?
  6. What are the current open standards in this space?
  7. Are approaches by men and women different about idnetity presentation and validation?
  8. What kinds of businesses are requiring online identity validation for customers?
  9. Is identity validation going to squish “free speech”?
  10. How is this trend changing the web?

With my She’s Geeky hat on: What Guys are Doing to Get More Girls in Tech!

The point of this is to get beyond the women say there are issues in the field and guys say there isn’t – to have guys who know there is an issue and are proactively doing constructive stuff to address it.

Many tech fields have a low percentage of women. If you are a guy do you wonder what you can do about it? Learn about successful strategies and proactive approaches for supporting women you work with and participate in community with. We will even cover some well-intentioned efforts that have gone awry.

  1. How many women by percentage participate in different technical fields?
  2. Why does it matter that they are underrepresented in these fields?
  3. What are the cultural norms that men and women have about performance and self-promotion?
  4. What is Male Programmer Privilege?
  5. What can a guy do who has a sister that is math/science inclined but being steered away from the field?
  6. How have the men on the panel improved things in their workplaces?
  7. How have the men on the panel addressed the challenges that arise in open communities? (that is where you don’t have a boss that fires people for inappropriate behavior/comments)
  8. What are the qualities of a workplace that is friendly for women?
  9. How to go beyond tokenism in workplaces, communities and conferences?
  10. How to encourage women more?

Other interesting Preso/panels covering Identity topics:

The Politics & Economics of Identity Put forward by my friend Liza Sabature of Culture Kitchen and the Daily Gotham Identity Politics” has always been left to the realm of feminist, civil rights activists, aka “minority politics”. This panel will explore the social and political ramifications of the business of identity and reputation. We will talk about the good, the bad and the ugly and what social entrepreneurs, businesses and digital activists are doing to impact this new economy.

  1. What is identity?
  2. What is reputation?
  3. What is privacy?
  4. How have big business historical monetized privacy?
  5. How social media works on identity and reputation?
  6. Online surveillance in the US : DMCA, FISA, Patriot Act
  7. Facebook BEACON : a study on how not to spy on people for fun and profit
  8. Google Adsense or Spysense?
  9. What are Vendor-Relationship Management systems?
  10. Will we need “Identity Management Systems” instead of VRMs?

Distributed Identity: API’s of the Semantic Web Without much conscious thought, most of us have built identities across the web. We fill in profiles, upload photos, videos, reviews and bookmarks. This session will explore the practical use of Social Graph API and YQL to build new types of user experience combining identity discovery and data portability.

Online Gatekeeping: Who Died and Made You King? by Liz Burr As the web becomes more open via social networks, we’re adopting new rules of communication. But who creates these rules? How much does class, race and gender figure into social media policing? We’ll discuss how identity affects social networks, as well as look at how online communities police themselves as participation expands.

  1. Which groups are in control of what is worth sharing via social media?
  2. Are the under-25 community using social media differently?
  3. How do we recognize and confront social media ‘gatekeepers’?
  4. Is our behavior in online communities merely a reflection of offline stereotypes and experiences?
  5. What is the impact of the amplification of social stereotypes online on under-represented groups?
  6. How do we integrate previously, under-represented groups into this more social world?
  7. Is there really such a thing as a “digital ghetto”? If so, is it our responsiblity to combat it?

OpenID: Identity is the platform is put forward by Chis Messina.
I have to say it is really great to have this be put forward so plainly and simply – to “get religion” about user-centric tdentity and its central role in shaping the fugure the social web.

Ignore the hype over social networking platforms and web OS’s! The platform of the social web is identity. Facebook and Twitter Connect are just the beginning of the era of user-centric identity. I’ll go beyond the basics of OpenID and learn how to effectively incorporate internet identity into your apps.

Your Online Identity After Death and Digital Wills

If you died tomorrow, would someone take care of your internet accounts? How do you tell subscribers the blogger has died? Every day people die and no one can access their email. Let’s explore what can be done to manage your online identity after you pass on.

  1. What usually happens to email accounts when a person dies? Policies for Gmail, Yahoo, Hotmail and AOL
  2. What about WordPress.com and Blogger for digital policies concerning the death of a blogger?
  3. Do You have a digital will setup?
  4. Products and services to manage digital wills, electronic correspondence after death and auto replies.
  5. Grief, “You Have Mail” and online memorial services.
  6. Who owns blog content after the death of a blogger?
  7. How to calculate the worth of your website or blog.
  8. How can you manage your online accounts and passwords for easy access after you pass?
  9. What are some recent legal examples of online account ownership disagreements?
  10. How to keep your passwords safe?

How to Benefit from 1-Click Identity Providers by Luke Shepard from Facebook.

Sites across the Web are opening up to support open identity platforms, such as OpenID. How can companies at scale and those with large user bases successfully work with open standards including OpenID, Activity Streams and new social markup language specs? Can companies survive the challenges of incorporating OpenID into their websites?

  1. Are there any success stories with OpenID?
  2. What does the OpenID user experience look like?
  3. Who has implemented OpenID?
  4. What have been some of the failures of OpenID?
  5. What is OpenID?
  6. What are the user benefits of OpenID?
  7. How can websites educate users about open protocols?
  8. What are the privacy concerns around OpenID?
  9. What kind of user data is made available to sites when they implement OpenID?
  10. What will it take for OpenID to become mainstream?

Crime Scene: Digital Identity Theft


Everything is Amazing and No One is Happy

Kaliya Young · March 22, 2009 · Leave a Comment

A friend shared this link with me today. It is a guy on Connan O’Brien.
“The video can’t be embedded apparently so you have to click over to it (I am already “unhappy” about that)” – ok inside joke related to the video.

We Live in Public – a movie

Kaliya Young · January 18, 2009 · 3 Comments

Someone tweeted about this film’s trailer yesterday.
The filmmaker’s bio describes it this way: a chilling view of the Internet
this sentence caught my attention: where technology and media dictate human social interaction and define our personal identity.

It sounds like it will be an interesting film to watch and discuss the implications of the emerging participatory panopticon. Maybe we can have a conversation about it as part of the IDMedia Review Group at IC.
This is the description from the website.

Calling all voyeurs and exhibitionists! Internet pioneer Josh Harris has spent his life implementing his unique vision of the future, where technology and media dictate human social interaction and define our personal identity. At the turn of the millenium, Harris launched an art experiment called Quiet: We Live in Public . He created an artificial society in an underground bunker in the heart of New York City. More than 100 artists moved in and lived in pods under 24-hour surveillance in what was essentially a human terrarium. They defecated, had sex, shared a transparent communal shower—all on camera. On January 1, 2000, after 30 days, the project was busted by FEMA as a “millennial cult.” Undeterred, Harris struck again, this time as his own subject. Rigging his loft with 32 motion-controlled cameras, he convinced his girlfriend to allow him to record streaming video of every moment of their lives from the toilet to the bedroom. The project backfired, his relationship imploded, and Harris went broke. Mentally unhinged, he fled to an apple farm in upstate New York. Sundance award winner Ondi Timoner (#_5_ won the Grand Jury Prize in 2004) chronicled Harris for a decade, culling through thousands of hours of Harris’s own footage and coupling it with rousing vérité of her own. The result is a fascinating, sexy, yet cautionary, tale where we all become Big Brother.

From the Tomorrow Museum

Alana Heiss of PS.1 and MoMA came by to inspect his experimental art project/millenium party “Quiet,” eventually calling it “one of the most extraordinary activities I’ve ever attended anywhere in the world.”
“The image I have in my mind is a concentration camp,” he says about the bunker built for the experiment. Staged on six floors of two buildings on lower Broadway, it was, “part rave, part Stanford Prison Experiment,” as Hanas writes. A hundred “pod people” were recorded from their Japanese capsule hotel beds (each equip with a video camera,) to the dining room, to the dance floor. There was a machine gun firing range, chess tournaments. Sex was filmed, even showers and toilets were set against the wall with no partitions. Participants were interrogated in a stark white room by a team of artists known as the Bureau.

Movie about "Fursona's" coming out

Kaliya Young · April 14, 2008 · Leave a Comment

From Boing Boing:

Furries get no respect. Usually, when you hear about people who dress up like life-sized stuffed animals, it’s in the context of an unfriendly internet joke, a sex gag on Entourage, or an insult that ends with “yiff in hell.”
Brooklyn-based filmmaker Marianne Shaneen has spent more than two years following these people around, capturing their lives in and out of their “fursonas.” She’s working on a documentary film called AMERICAN FURRY: Life, Liberty and the Fursuit of Happiness.

Frontline: Growing UP Online, Jan 22

Kaliya Young · January 15, 2008 · Leave a Comment

I am a HUGE fan of Frontline. I regularly watch the shows in their entirety online (I don’t own a TV haven’t since 1995 – when I left home).

Their next show is called Growing Up Online. It should be interesting to see how they cover the subject. Just in case you are wondering the didn’t forget to cover “online sexual predators.”

MySpace. YouTube. Facebook. Nearly every teen in America is on the Internet every day, socializing with friends and strangers alike, “trying on” identities, and building a virtual profile of themselves–one that many kids insist is a more honest depiction of who they really are than the person they portray at home or in school.
In “Growing Up Online,” FRONTLINE peers inside the world of this cyber-savvy generation through the eyes of teens and their parents, who often find themselves on opposite sides of a new digital divide. From cyber bullying to instant “Internet fame,” to the specter of online sexual predators, FRONTLINE producer Rachel Dretzin investigates the risks, realities and misconceptions of teenage self-expression on the World Wide Web.

Who Killed the Electric Car?

Kaliya Young · January 8, 2008 · Leave a Comment

WOW! What an amazing film and depressing. I totally recommend you see it if it comes to your neighborhood or rent it on Netflix (or equivalent).
GM killed the electric CAR. It happened – and they killed it. They said there was not enough consumer ‘demand’ but that is patently false. They knew there was demand they had waiting lists. They didn’t want the car to happen BECAUSE it would be successful and threatened the Oil Industry.
The film ends on a hopeful note and there will be a sequel. Who Saved the Electric Car.

Links on the Web this week

Kaliya Young · November 18, 2007 · Leave a Comment

This is a fun little video/song rant … “Thou shalt not” related to pop culture and life of the young. It ends making an interesting contrasting commentary on the leadership of the united states of america.

——–
A good transition is this stunning and depressing set of photos of Iraqi Children.
——–
Which 100 Blogs should you read?
They figured it out using formulas for figuring out where to put detectors in water pipe systems to detect disease outbreak.
——–
Which side of the Brain do you use?
THE Right Brain vs Left Brain test … do you see the dancer turning clockwise or anti-clockwise? (I saw it clockwise).
If clockwise, then you use more of the right side of the brain and vice versa.
Most of us would see the dancer turning anti-clockwise though you can try to focus and change the direction; see if you can do it.
LEFT BRAIN FUNCTIONS
uses logic
detail oriented
facts rule
words and language
present and past
math and science
can comprehend
knowing
acknowledges
order/pattern perception
knows object name
reality based
forms strategies
practical
safe
RIGHT BRAIN FUNCTIONS
uses feeling
“big picture” oriented
imagination rules
symbols and images
present and future
philosophy & religion
can “get it” (i.e. meaning)
believes
appreciates
spatial perception
knows object function
fantasy based
presents possibilities
impetuous
risk taking

Supermarket 2.0

Kaliya Young · March 26, 2007 · Leave a Comment

This is a great video up on Deb’s Blog. Very Funny. Sort of makes you think about all the social things we do online and how silly they are when you translate them back into the real world.

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Kaliya's the shit. Be there or be square.Enlighten yourself through her

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact