Category: Workshops (Page 3 of 6)

#VRM and the OpenNotice Legal Hackathon

The OpenNotice Legal Hackathon is happening now: 12 July 2014. Go to that link and click on various links there to see the live video, participate via IRC and other fun stuff.

It’s multinational. Our hosts are in Berlin. I’m in Tel Aviv (having just arrived from Sydney by way of Istanbul). Others are elsewhere in the world.

It’s moving up on 5pm, local time here, and 10am in New York.

I’m prepping for talking #VRM at this link here and  this link here.

Here are some core questions we’ll be visiting.

I’ll add more links later. This is enough to get us started.

VRooMy developments

Youstice is a new VRM company focused on mediating disputes online. Says the home page, “We help customers and retailers resolve shopping issues quickly and effectively.” Here’s the customer side (shop with confidence). Here’s the retailer side (manage claims easily). And here’s the pitch to partners (“help retailers and customers globally reach resolution of thousands of complaints – all through one simple online application”).

Enable your customers to better engage and make them independent. Become a VRooMer! is a new blog post by Zbynek Loebl that nicely explains VRM and the context it provides for Youstice, which is in beta now. So check it out.

Fargo is the online outliner/publishing system brought to us by Dave Winer and friends. As a tool of independence and engagement, it has many VRM possibilities, methinks. I enjoy following it both in use (I often blog through it) and in the Fargo Blog.

Phil Windley‘s The Compuserve of Things speaks to a problem we all suffer but few of us examine: silo-ization. Phil starts by insightfully observing that Web 2.o, for all the progress it brought, did so at the expense of centralization around sites, services and data sources:

Each of these online service businesses sought to offer a complete soup-to-nuts experience and capitalized on their captive audiences in order to get businesses to pay for access. In fact, you don’t have to look very hard to see that much of what’s popular on the Internet today looks a lot like sophisticated versions of these online service businesses. Web 2.0 isn’t so much about the Web as it is about recreating the online business models of the 80’s and early 90’s. Maybe we should call it Online 2.0 instead.

To understand the difference, consider GMail vs. Facebook Messaging. Because GMail is really just a massive Web-client on top of Internet mail protocols like SMTP, IMAP, and POP, you can use your GMail account to send email to any account on any email system on the Internet. And, if you decide you don’t like GMail, you can switch to another email provider (at least if you have your own domain).

Facebook messaging, on the other hand, can only be used to talk to other Facebook users inside Facebook. Not only that, but I only get to use the clients that Facebook chooses for me. Facebook is going to make those choices based on what’s best for Facebook. And most Web 2.0 business models ensure that the interests of Web 2.0 companies are not necessarily aligned with those of their users. Decisions to be non-interoperable aren’t done out of ignorance, but on purpose. For example, WhatsApp uses an open protocol (XMPP), but chooses to be a silo.

He adds,

If we were really building the Internet of Things, with all that that term implies, there’d be open, decentralized, heterarchical systems at its core, just like the Internet itself. There aren’t. Sure, we’re using TCP/IP and HTTP, but we’re doing it in a way that is closed, centralized, and hierarchical with only a minimal nod to interoperability using APIs.

We need the Internet of Things to be the next step in the series that began with the general purpose PC and continued with the Internet and general purpose protocols—systems that support personal autonomy and choice. The coming Internet of Things envisions computing devices that will intermediate every aspect of our lives. I strongly believe that this will only provide the envisioned benefits or even be tolerable if we build an Internet of Things rather than a CompuServe of Things.

When we say the Internet is “open,” we’re using that as a key word for the three key concepts that underlie the Internet:

  1. Decentralization
  2. Heterarchy (what some call peer-to-peer connectivity)
  3. Interoperability

And concludes,

The only way we get an open Internet of Things is to build it. That means we have to do the hard work of figuring out the protocols—and business models—that support it. I’m heartened by developments like Bitcoin’s blockchain algorithm, the #indieweb movement,TelehashXDI DiscoveryMaidSafe, and others. And, of course, I’ve got my own work onKRLCloudOS, and Fuse. But there is still much to do.

We are at a crossroads, with a decision to make about what kind of future we want. We can build the world we want to live in or we can do what’s easy, and profitable, in the short run. The choice is ours.

This is strong and important stuff.

Here in browser-land (where I’m writing this), Firefox has released a major new upgrade: version 29.0. Here’s an explanation. Firefox matters for VRM purposes because it’s the browser that’s closest to ours alone, and therefore in the best position to become a VRM instrument. The team there has also recently made hires — on purpose — from within our VRM orbit, and this is hugely encouraging. Oh, and they just put out this very cool video.

Same goes for WordPress. Gideon Rosenblatt‘s Automattic for the People: WordPress as a Regenerative Business singles out WordPress for praise as a paradigmatic example. He defines a regenerative business as a people- (rather than a money- or mission-) centric. So, in this respect, it helps to note that the main stakeholders in WordPress, Mozilla and Fargo are the people who put it to use. They are driven by us. This is more important than them being –centric around us. (This distinction is unpacked here and here.)

Regenerative business reminds me a lot of Umair Haque’s concept of thick value. Need to look more deeply into that.

Last but not least, dig Casius, which matches homeowners with pre-screened and qualified contractors in several European countries, so far: intentcasting, of a sort.

Looking forward to seeing lots of you at IIW next week.

VRM mojo Down Under

Unconference

I’m still de-compressing from a week in Sydney, Canberra and Melbourne, where I had my mind blown by all the VRM energy gathering there and in New Zealand.

In Sydney, Flamingo hosted a consortium of VRM companies on Wednesday, held its official launch on Thursday and put on a Customer Experience unconference on Friday. (That’s one shot from it above. The full set is here.)  The consortium included people representing (in alphabetical order) Customer Commons, Flamingo, Geddup, Meeco, MyWave, ProjectVRM, Respect Network, and Welcomer . Some of us, myself included, wore a number of those hats at once.*

Here are a few links.

A focus of many conversations in Sydney (especially at the unconference) was customer experience, or CX, a buzzterm Wikipedia currently describes (with “issues,” the box above it says) this way: “Customer experience (CX) is the sum of all experiences a customer has with a supplier of goods and/or services, over the duration of their relationship with that supplier.” A VRM corollary to that angle is “Customer experience is also about how the company experiences the customer.” Or how the government experiences the citizen. Or how the organization experiences the member. The source of those was @CatrionaWallace<, CEO of Flamingo. It was also very much in line with conversations last Summer in New Zealand with Geraldine McBride (@GeraldineGlobal) of MyWave. (@JoePine, co-author of The Experience Economy, was also there and contributed to those conversations.)

Various combinations of VRooMers also met with three different government agencies, all of which were eager to support GRM (government relationship management) by citizens, and to learn as much as possible about how that’s being done in the U.S., the U.K. and elsewhere. Two of those meetings happened in Canberra, where we were led within and between meetings by Kevin Cox of Welcomer. In Melbourne we also got quality time with Rohan Clarke (@GeddupRC) of Geddup, who also arranged an interview at PBS 106.7 on the overlapping subjects of VRM and community radio in Australia. Pieces of that should be coming online soon.

One VRM outfit I’m bummed to have missed was 4th Party, which sources  The Intention Economy, and says “Fourth parties are trusted agents that help consumers interact with multiple vendors on the consumers’ terms.” Since we’ve been talking about fourth parties for several years, it’s great to finally see the term put to good use.

Much more happened, and will continue to happen, than I’m reporting on here. I’m just in a hurry right now to get something up while it’s fresh in my mind and all the browser tabs are open.


*I’m on the Flamingo board (and have relationships with other VRM companies as well), but I don’t play favorites. I want everybody to win, and work toward that goal.

Why Google and Facebook need to go direct

In Google sets plans to sell users’ endorsements, and describe new ways that Google and Facebook are taking liberties with users who have had nice things to say about companies’ products and services in the past, in contexts where they didn’t expect their words to turn into personal endorsements (especially ones for which they are not paid). Specifically,

Google on Friday announced that it would soon be able to show users’ names, photos, ratings and comments in ads across the Web, endorsing marketers’ products. Facebook already runs similar endorsement ads. But on Thursday it, too, took a step to show personal information more broadly by changing its search settings to make it harder for users to hide from other people trying to find them on the social network.

(on the left) An example of a Google shared endorsement…

The problem, privacy advocates say, is when Web companies use or display the personal information of users in ways the authors did not expect when they originally posted it.

“People expect when they give information, it’s for a single use, the obvious one,” said Dr. Deborah C. Peel, a psychoanalyst and founder of Patient Privacy Rights, an advocacy group. “That’s why the widening of something you place online makes people unhappy. It feels to them like a breach, a boundary violation.”

“We set our own boundaries,” she added. “We don’t want them set by the government or Google or Facebook.”

There is a simple reason why Google and Facebook feel free to take these kinds of liberties: we pay them nothing, so they feel free to make us the product they sell, rather than the customers they serve.

This kind of abuse (and it is exactly that) will cost more value than it adds, for example with the Times story and this post. Even if the costs aren’t obvious on bottom lines, the negative externalities are large, and growing.

So here’s a simple suggestion for both companies: go freemium. Charge for value-added services, such as genuine, accountable privacy, within circles that customers (no longer just “users” or “consumers”) help define. We are legion, and you are increasing our numbers every day.

Online advertising is already post-peak and possibly headed toward oblivion, at least for ads that aren’t whitelisted by the likes of Adblock Plus. Ad and tracking blockers and enlightened browser makers, all working for the demand side of the marketplace, have their fingers on a pulse that Google, Facebook and the other ad-supported Web companies ignore. Enlightened as they are about their algorithms, analytics and infrastructures, they are literally senseless toward the consumers they sell to their customers — and the far greater return on investment they would get if lots of those consumers were customers as well.

A couple years ago I heard a Google executive say the company would never “go direct” because it was an “engineering company” and that didn’t want to make less than $1 million per employee. The implication was that going direct would require lower-wage and lower-skill workers in call centers — and other forms of non-engineering-type overhead. Yet there are plenty of highly profitable companies that do high quality service (call centers and all) with plenty of margin. For example: Apple and Amazon.

The writing is on the wall, big guys. Time to wake up and smell the demand for respect, privacy and genuine service. It’s huge.

And, if you’re ready to talk about it (or anything), come to IIW the week after next, at the Computer History Museum in Mountain View. It’s cheap. (Heck, Google is already a sponsor — and we do thank them for that.) It’s an unconference, so we can easily make “going direct” a topic there. (Hey, if you don’t, one of us will.)

Speaking of negative externalities, here’s the bonus linkage recommended by Zemanta:

VRM at IIW

We’re coming up on the 17th Internet Identity Workshop, better known as IIW. It takes place on 22-24 October at the Computer History Museum in Mountain View, California.

While IIW’s title suggests a focus on identity, there are as many different foci as there are subjects to discuss, and the participants choose those. That’s because IIW is an un-conference. It has no speakers, no keynotes, no corporate agenda. There are sponsors, but they just cover the meals and the free espresso bar. Topics are suggested by participants at the beginning of each day, and then everybody heads to breakout rooms to talk about those topics and move them forward. Sometimes code gets written too.

VRM as a topic grew to a large degree out of conversations at IIW — and many VRM topics have moved forward at IIW breakout sessions. If you want to move your own topic(s) forward, there is not a better instrument for doing that than IIW. Last time we talked about these, among many other topics:

  • Identity
  • VRM
  • Personal clouds
  • Better “social” login
  • Authentication (e.g. Oauth2)
  • Data portability
  • Mobility
  • Surveillance
  • Security
  • Legal issues
  • Business issues
  • Cultural and social issues
  • Cool new and old devices
  • Trust frameworks

You can register here.

In addition we will have VRM and Personal Cloud Day, also at the Computer History Museum, just before IIW. Register at that link. It’s free.

While this day has usually been free-form, this time we are structuring it to get maximum leverage for VRM topics and projects heading into IIW. Kaliya (Identity Woman), who also organizes IIW (with Phil Windley and myself), will facilitate the day’s proceedings. She explains on the registration site,

Our overall goal is to support all those working in the VRM and Personal Cloud space knowing who else is there, what they are working on, find key synergies and opportunities for collaboration, and coordinate and brainstorm about ideas for sessions during IIW.

Opening and Context Setting
We are inviting T.Rob to give us a presentation about the industry landscape as he sees it along with future challenges and opportunities.

Community Landscape Mapping
We will spend an hour or two figuring out who is doing what in the emerging ecosystem.
The goal will be to have a comprehensive map that clusters key projects and efforts to collaborate and prevent folks from re-inventing wheels.

Please bring an 8.5×11 print out to the Day with the
* Logo of your Company or Project
* Name of your Company or Project
* Description of your product
* Description of other ecosystem components that your product needs to work

Both this day’s activities and IIW are designed to maximize leverage on the future. So be there.

Identity is personal

It’s as simple as that.

Identity is not corporate. That means no company is going to “win” at personal identity, any more than any company can win at being you or me. It makes no sense.

But meanwhile, there’s this big war going on over identity, that Mike Elgan of CultOfMac covers (from the Apple side) in Why the ‘i’ in iPhone Will Stand For ‘Identity’. Writes Mike,

Google honcho Eric Schmidt came right out and said it: “Google+ was created primarily as an identity service.”

And Om Malik nailed it when he said: “The real power of Facebook lies in controlling connected identity.”

Both Google and Facebook made big pushes to turn their social networks into solid identity services. And both those attempts have largely failed so far.

But Apple can win, Mike says. Here’s why:

think Apple can succeed where the social networks failed.

The reason is that Apple has a better deal for users. The social network proposed both a small stick and a small carrot: Use one account and use your real name because then everything is better. That approach failed.

Apple’s proposition is much better: Use the Identity iPhone, and stop keying in passwords, credit card numbers, billing information and more. As you cruise through the Internet, all the doors will open for you and you can securely use and buy and access anything you want without any work.

How Apple Will Use the Identity iPhone

Once you’ve associated your actual fingerprint with your iPhone, your iPhone becomes you — better than a photo ID, better than a signature, better than a password.

Today, a swipe of the finger on an iPhone conjures up the 4-digit passcode lock. If you spend some quality time with the Passcode Lock page in Settings, you can see that you have an option to turn it on or off, require it immediately or after one, five or fifteen minutes or after one or four hours. It also allows you to access or not access Passbook and the ability to reply to a message when the phone is locked.

All those settings may be identical to the fingerprint scanning feature of the next iPhone….

I believe Apple intends to build both NFC and fingerprint readers into iMacs and iPads.

When you set your iPhone next to the keyboard of your iMac, all your online activity will identity you to various sites, which means that you’ll have an “E-Z Pass” right through password dialogs and credit card pages. You’ll just be able to log in as you and buy stuff without typing anything…

In the Real World, you’ll be able to authenticate purchases either via Bluetooth or NFC, skipping the line at the movie theater, department store and gas station. You’ll be billed, and be able to pay for your restaurant meal without the waiter’s involvement. (Letting a stranger take your credit card out of your sight is one of the weakest links in the way commerce works right now.)

As I wrote in Identity systems, failing to communicate,

What’s fucked up about identity is that every site and service has its own identity system. None are yours. All are theirs, all are silo’d, and all are different. For this we can thank the calf-cow model of client-server computing, and we are stuck in it. That’s why we are forced to remember how we identify ourselves, separately, as calves, to many different cows, each of which act like they’re the only damn cow in the world.

And I gotta say, Apple sucks at being an identity cow. I am three different calves to Apple right now. That is, three different AppleIDs. I have spoken to Apple people many times about their need to merge customer namespaces, and they give me the same answer every time: it’s too hard. Worse, they’ve screwed it up over and over. An Apple mail account that was once foo@mac.com then became foo@me.com is now also foo@icloud.com.  On that basis alone Apple amply demonstrates the namespace problem, which might be the oldest problem (that’s still with us) in all of computing.

Einstein saidNo problem can be solved from the same level of consciousness that created it. The namespace problem was created — and worsened — by companies creating more namespaces. One more bigfoot creating one more way to leverage its own private namespace to the whole world is not a solution. It’s one more problem to solve.

The only way to solve the identity problem is where the most pain is felt: at the individual level.

This is a very hard fact for enterprise-level solution-makers to grok, because at their level the solution is always yet another namespace or yet another bigfoot company pushing yet another technical solution. That, in effect, is what Mike says Apple will do here. And they will fail, just like Facebook, Google, Microsoft (remember Hailstorm and Passport?) and every other bigfoot has failed. Because they can’t solve it.

Meanwhile, we’ve solved this kind of thing before at the personal level, over and over, and we will do it again.

If you want to help work on it, come to the Internet Identity Workshop next week in Mountain View. That’s where the real work is happening.

 

Prepping for #VRM Day and #IIW

The 16th IIW (Internet Identity Workshop) is coming up, Tuesday to Thursday, 7-9 May, will be tat the Computer History Museum in Mountain View, CA. As usual, VRM will be a main topic, with lots of developers and other interested folk participating. Also as usual, we will have a VRM planning day on the Monday preceding: 6 May, also at the CHM. So that’s four straight days during which we’ll get to present, whiteboard, discuss and move forward the many projects we’re working on. From the top of my head at the moment:

  • Personal Clouds, including —
    • The Internet of Me and My Things
    • QS (Quantified Self) and Self-Hacking
  • Fully personal wallets, rather than branded ones that work only with payment silos and their partners
  • Intentcasting — where customers advertise their purchase intentions in a secure, private and trusted way, outside of any vendor’s silo
  • Browser add-ons, extensions, related developments
  • Licensing issues
  • Sovereign and administrative identity approaches, including Persona, formerly BrowserID, from Mozilla
  • Legal issues, such as creating terms and policies that individuals assert
  • Tracking and ad blocking, and harmonizing methods and experiences
  • Health Care VRM
  • Devices, such as the freedom box
  • VRM inSovereign vs./+ Administrative identities
    • Real estate
    • Banking (including credit cards, payments, transactions)
    • Retail
  • Personal data pain points, e.g. filling out forms
  • Trust networks
  • Harnessing adtech science and methods for customers, rather than only for vendors

The morning will be devoted to VRM issues, while the afternoon will concentrate on personal clouds.

We still have eight tickets left here. There is no charge to attend.

In the next few days here on the blog we’ll be going over some of the topics above. Input welcome.

 

Toward a matrix of APIs

At  the 2006 O’Reilly Emerging Technology conference, Cal Henderson, then of Flickr, gave a long session called “Launching and scaling new Web services.” As I recall, among the many things he explained well were some principles behind the Flickr API. One of those principles was user access to data. The API should be one that allowed the user to haul all of her data out of the system, even if it was to federate that data into a competing system. That’s because Flickr believed that user data is the user’s first, and not just the company’s. Another principle was keeping the API stable, so as not to disrupt users and other services that depended on the API.

Cal left Flickr a couple years after that, but Flickr’s API remains a model of stability and utility — so much so that Dave Winer this morning suggested it be declared a national treasure.

Many of us depend in large ways to the APIs of companies great and small — and more get added to that collection every day. For a good picture of what’s going on with APIs, check out ProgrammableWeb.com. Between Dave’s respect for durable APIs like Flickr’s, and ProgrammableWeb’s roster of current and future dependencies, we start to see a matrix of APIs that Craig Burton compares to a city filled with buildings and relationships. Each API provider, like each building, exposes the provider’s core competencies in ways that can be engaged.

But what happens when we each have our own APIs — when our own core competencies become exposed in ways that can be engaged? And when we start managing our lives through relationships between our APIs and those in the rest of the world — especially in ways that are live and full-duplex (two ways at the same time, like a phone call)? And where each of us, or a trusted agent, can do the required IF, THEN, OR and other programming logic, between our own personal clouds and the clouds of others? What will we have then?

There is lots of blogging out loud about this, about both the downsides of dependency (as both Phil Windley and I have, toward Flickr in particular). But I think the upside deserves more than equal consideration, especially as companies begin to realize the importance of direct and engaged relationships with customers and users, which is what we’ll have when VRM and CRM (along with allied functions on both sides) fully engage. The result, I believe, will be a matrix of useful dependencies, based on APIs everywhere, thick with accountability and responsibility. The result will be far more opportunity, and boundless positive economic and social externalities based on the Net’s and the Web’s founding virtues. What will end, or at least be obsoleted, are Matrix-like worlds where users and customers are held captive.

Thus our goal for VRM: to prove that free customers are more valuable than captive ones — both to themselves and to everyone and everything else with which they engage.

 

 

VRM at IIW

Below: two whiteboards from our VRM planning day, yesterday, in prep for #IIW, which is going on right now in Mountain View. I’ll explain later. Mostly right now I want to put these up to bring topics back to mind for folks who were there.

 

 

Let’s turn Do Not Track into a dialog

Do Not Track (DNT), by resembling Do Not Call in name, sounds like a form of prophylaxis.  It isn’t. Instead it’s a request by an individual with a browser not to be tracked by a website or its third parties. As a request, DNT also presents an interesting opportunity for dialogue between user and site, shopper and retailer, or anybody and anything. I laid out one possibility recently in my Inkwell conversation at The Well. Here’s a link to the page, and here’s the text of the post:

The future I expect is one in which buyers have many more tools than they have now, that the tools will be theirs, and that these will enable buyers to work with many different sellers in the same way.

One primitive tool now coming together is “Do Not Track” (or DNT): http://en.wikipedia.org/wiki/Do_Not_Track It’s an HTTP header in a user’s browser that signals intention to a website. Browser add-ons or extensions for blocking tracking, and blocking ads, are also tools, but neither constitute a social protocol, because they are user-side only. The website in most cases doesn’t know ad or tracking blocking being used, or why. On the other hand, DNT is a social gesture. It also isn’t hostile. It just expresses a reasonable intention (defaulted to “on” in the physical world) not to be followed around.

But DNT opens the door to much more. Think of it as the opening to dialog:

User: Don’t track me.
Site: Okay, what would you like us to do?
User: Share the data I shed here back to me in a standard form, specified here (names a source).
Site: Okay. Anything else?
User: Here are my other preferences and policies, and means for matching them up with yours to see where we can agree.
Site: Good. Here are ours.
User: Good. Here is where they match up and we can move forward.
Site: Here are the interfaces to our CRM (Customer Relationship Management) system, so your VRM (Vendor Relationship Management) system can interact with it.
User: Good. From now on my browser will tell me we have a working relationship when I’m at your site, and I can look at what’s happening on both sides of it.

None of this can be contemplated in relationships defined entirely by the sellers, all of which are silo’d and different from each other, which is what we’ve had on the commercial Web since 1995. But it can be contemplated in the brick & mortar world, which we’ve had since Ur. What we’re proposing with VRM is nothing more than bringing conversation-based relationships that are well understood in the brick-and-mortar world into the commercial Web world, and weaving better marketplaces in the process.

A bit more about how the above might work:
http://blogs.law.harvard.edu/vrm/2012/02/23/how-about-using-the-no-track-button-we-already-have/

And a bit more about what’s wrong with the commercial Web (so far, and it’s not hard to fix) here:
http://blogs.law.harvard.edu/vrm/2012/02/21/stop-making-cows-stop-being-calves /

So, to move forward, consider this post a shout-out to VRM developers, to the Tracking Protection Working Group at the W3C, to browser developers, to colleagues at Berkman (where Chris Soghoian was a fellow, about at the time he helped think up DNT) — and to everybody with the will and the ways to move forward on this thing.

And hey: it’s also our good luck that the next IIW is coming up at the Computer History Museum in Mountain View, from October 23rd to 25th. IIW is the perfect place to meet and start hashing out DNT-D (I just made that up: DNT-Dialog) directions. IIW is an unconference: no keynotes, panelists or vendor booths. Participants vet and choose their own topics and break out into meeting rooms and tables. It’s an ideal venue for getting stuff done, which always happens, and why this is the 15th of them.

Meanwhile, let’s get in touch with each other and start making it happen.

« Older posts Newer posts »

© 2024 ProjectVRM

Theme by Anders NorenUp ↑