Personal Data Ecosystem Videos from Telco 2.0

I had a great week at Telco 2.0 the week before IIW.   STL partners has been running Telco 2.0 events for a few years focused on new business models for that industry.   They have honed in on the potential to provide services to people to collect and manage their own data.   This week they published interviews from three of the key speakers all of whom who also attended IIW the following week.  Much of the focus for both events was on the emerging Personal Data Ecosystem.

I recommend the content on the Telco 2.0 site and if you are interesting in visiting interesting innovative parts of the Telco world they have great events for that.

AT&T: to be a ‘Personal Information Agent’
Von Wright, VP Cloud & Wholesale Services, describes how AT&T plans to put consumers in control of their own data, and take the role of an agent or broker for their Personal Information

Google: Strategic ‘Co-opetition’ with Telcos on Consumer Data

The ‘Personal Information Economy’ will see a higher intensity of strategic co-opetition between Google and telcos according to Google’s Eric Sachs.

Microsoft: Why Telcos Must Act Now or Lose The Opportunity

Marc Davis, formerly Yahoo! Mobile’s Chief Scientist, now at Microsoft, and a key collaborator with both Telco 2.0 and the World Economic Forum’s ‘Re-Thinking Personal Data’ initiative, gives his unique perspective on the ‘Gold Rush’ for personal information, and why telcos must act now or lose the opportunity to take a valuable role in it.

We are not at War

I was the first person Van asked to speak at the Community Leadership Summit West Ignite talks. I was the last person to submit my slides. I have a lot to say about community but I had a hard time figuring out exactly what to say. I knew I wanted to talk about the identity community and our success in working together. Robert Scoble’s quote really got me going and I decided to use the talk to respond to the comment that was catalyzed by his facebook post/tweet “Who is going to win the Identity War of 2010″

This is completely the wrong frame to foster community collaboration.

IIWX Internet Identity Workshop 10, Introductory Talk

I gave this talk at the 10th Internet Identity workshop reviewing the shared history, language, understanding and work we have done together over the last 6 years of community life.

Part of this presentation touched on a timeline of events in the community. Those and more are reflected on this timeline that is beginning to be developed here. IIW11 will be November 9-11 in Mountain View, CA The first ever IIW outside the Bay Area will be happening September 9-10 in Washington DC following the Gov 2.0 Summit with the theme Open Identity for Open Government. The first IIW in Europe will be happening in London likely October 9-10 (dates still to be confirmed) prior to RSA Europe. If you would like to know about when the next IIWs have registration open please join this announce list. TheIdentity Gang is the community mailing list where conversations are ongoing about identity. You can follow modest updates about IIW on twitter via our handle – @idworkshop You can see IIW 10 attendees on our registration page.

Identity for Online Community Managers

I was asked by Bill Johnson of Forum One Networks to kick off the discussion on the next Online Community Research Network call this week with the topic Identity for Online Community Managers – drawing on the presentation that I put together for the Community 2.0 Summit. I cover the basics of how OpenID, OAuth and Information Cards work, who is “in” terms of supporting the projects and what community managers/platforms can do. We will discuss the implications of these new identity and data sharing protocols on the call.

Online Identity for Community Managers: OpenID, OAuth, Information Cards

View more documents from Kaliya Hamlin.
I will also be attending the Online Community Summit in October Sonoma and will be sharing about these and other technologies there.

Freedom to Aggregate & Disaggregate oneself online.

I presented this slide show at the Oxford Internet Institute meeting in April that considered A Global Framework for Identity Management.

You could sum it up this way – “stuff happens in peoples lives and the need the freedom to go online and get support for those things and not have it all linked back to their “real identity.”

The slides are moving (drawing from post secret post cards) and it is worth watching if you don’t think people need this freedom.

its that SXSW picking time of year

200908181123.jpg

This year there are 2200 panels submitted for 300 slots. It is great they are going with community generated ideas for the conference. It is also hard to tell what will be happening in our fast moving industry 7 months from now. PLEASE go to SXSW create an account and then vote for these two :)

I put a lot of thought in to what to put forward this year knowing it would be 9 months out. One of the trends that is just starting to emerge is identity verification – my hunch is that by March this will be a topic getting a lot of attention and worth exploring at SXSW.

Who are you? Identity trends on the Social Web.

“On the Internet Nobody Knows You’re a Dog” Is this famous New Yorker cartoon still true? Twitter is doing verified accounts. Facebook claims everyone using their “real name” gives strong social validation ‘proof’. Equifax is validating age with information cards (digital tokens). We will explore the current trends and their implications for the future.

  1. What is identity?
  2. Why are people doing identity validation?
  3. Who is doing identity validation?
  4. Why are websites seeking people who have had their identities validated?
  5. Is identity validation improving the web?
  6. What are the current open standards in this space?
  7. Are approaches by men and women different about idnetity presentation and validation?
  8. What kinds of businesses are requiring online identity validation for customers?
  9. Is identity validation going to squish “free speech”?
  10. How is this trend changing the web?

With my She’s Geeky hat on: What Guys are Doing to Get More Girls in Tech!

The point of this is to get beyond the women say there are issues in the field and guys say there isn’t – to have guys who know there is an issue and are proactively doing constructive stuff to address it.

Many tech fields have a low percentage of women. If you are a guy do you wonder what you can do about it? Learn about successful strategies and proactive approaches for supporting women you work with and participate in community with. We will even cover some well-intentioned efforts that have gone awry.

  1. How many women by percentage participate in different technical fields?
  2. Why does it matter that they are underrepresented in these fields?
  3. What are the cultural norms that men and women have about performance and self-promotion?
  4. What is Male Programmer Privilege?
  5. What can a guy do who has a sister that is math/science inclined but being steered away from the field?
  6. How have the men on the panel improved things in their workplaces?
  7. How have the men on the panel addressed the challenges that arise in open communities? (that is where you don’t have a boss that fires people for inappropriate behavior/comments)
  8. What are the qualities of a workplace that is friendly for women?
  9. How to go beyond tokenism in workplaces, communities and conferences?
  10. How to encourage women more?

Other interesting Preso/panels covering Identity topics:

The Politics & Economics of Identity Put forward by my friend Liza Sabature of Culture Kitchen and the Daily Gotham Identity Politics” has always been left to the realm of feminist, civil rights activists, aka “minority politics”. This panel will explore the social and political ramifications of the business of identity and reputation. We will talk about the good, the bad and the ugly and what social entrepreneurs, businesses and digital activists are doing to impact this new economy.

  1. What is identity?
  2. What is reputation?
  3. What is privacy?
  4. How have big business historical monetized privacy?
  5. How social media works on identity and reputation?
  6. Online surveillance in the US : DMCA, FISA, Patriot Act
  7. Facebook BEACON : a study on how not to spy on people for fun and profit
  8. Google Adsense or Spysense?
  9. What are Vendor-Relationship Management systems?
  10. Will we need “Identity Management Systems” instead of VRMs?

Distributed Identity: API’s of the Semantic Web Without much conscious thought, most of us have built identities across the web. We fill in profiles, upload photos, videos, reviews and bookmarks. This session will explore the practical use of Social Graph API and YQL to build new types of user experience combining identity discovery and data portability.

Online Gatekeeping: Who Died and Made You King? by Liz Burr As the web becomes more open via social networks, we’re adopting new rules of communication. But who creates these rules? How much does class, race and gender figure into social media policing? We’ll discuss how identity affects social networks, as well as look at how online communities police themselves as participation expands.

  1. Which groups are in control of what is worth sharing via social media?
  2. Are the under-25 community using social media differently?
  3. How do we recognize and confront social media ‘gatekeepers’?
  4. Is our behavior in online communities merely a reflection of offline stereotypes and experiences?
  5. What is the impact of the amplification of social stereotypes online on under-represented groups?
  6. How do we integrate previously, under-represented groups into this more social world?
  7. Is there really such a thing as a “digital ghetto”? If so, is it our responsiblity to combat it?

OpenID: Identity is the platform is put forward by Chis Messina.
I have to say it is really great to have this be put forward so plainly and simply – to “get religion” about user-centric tdentity and its central role in shaping the fugure the social web.

Ignore the hype over social networking platforms and web OS’s! The platform of the social web is identity. Facebook and Twitter Connect are just the beginning of the era of user-centric identity. I’ll go beyond the basics of OpenID and learn how to effectively incorporate internet identity into your apps.

Your Online Identity After Death and Digital Wills

If you died tomorrow, would someone take care of your internet accounts? How do you tell subscribers the blogger has died? Every day people die and no one can access their email. Let’s explore what can be done to manage your online identity after you pass on.

  1. What usually happens to email accounts when a person dies? Policies for Gmail, Yahoo, Hotmail and AOL
  2. What about WordPress.com and Blogger for digital policies concerning the death of a blogger?
  3. Do You have a digital will setup?
  4. Products and services to manage digital wills, electronic correspondence after death and auto replies.
  5. Grief, “You Have Mail” and online memorial services.
  6. Who owns blog content after the death of a blogger?
  7. How to calculate the worth of your website or blog.
  8. How can you manage your online accounts and passwords for easy access after you pass?
  9. What are some recent legal examples of online account ownership disagreements?
  10. How to keep your passwords safe?

How to Benefit from 1-Click Identity Providers by Luke Shepard from Facebook.

Sites across the Web are opening up to support open identity platforms, such as OpenID. How can companies at scale and those with large user bases successfully work with open standards including OpenID, Activity Streams and new social markup language specs? Can companies survive the challenges of incorporating OpenID into their websites?

  1. Are there any success stories with OpenID?
  2. What does the OpenID user experience look like?
  3. Who has implemented OpenID?
  4. What have been some of the failures of OpenID?
  5. What is OpenID?
  6. What are the user benefits of OpenID?
  7. How can websites educate users about open protocols?
  8. What are the privacy concerns around OpenID?
  9. What kind of user data is made available to sites when they implement OpenID?
  10. What will it take for OpenID to become mainstream?

Crime Scene: Digital Identity Theft


We Live in Public – a movie

Someone tweeted about this film’s trailer yesterday.

The filmmaker’s bio describes it this way: a chilling view of the Internet

this sentence caught my attention: where technology and media dictate human social interaction and define our personal identity.

It sounds like it will be an interesting film to watch and discuss the implications of the emerging participatory panopticon. Maybe we can have a conversation about it as part of the IDMedia Review Group at IC.

This is the description from the website.

Calling all voyeurs and exhibitionists! Internet pioneer Josh Harris has spent his life implementing his unique vision of the future, where technology and media dictate human social interaction and define our personal identity. At the turn of the millenium, Harris launched an art experiment called Quiet: We Live in Public . He created an artificial society in an underground bunker in the heart of New York City. More than 100 artists moved in and lived in pods under 24-hour surveillance in what was essentially a human terrarium. They defecated, had sex, shared a transparent communal shower—all on camera. On January 1, 2000, after 30 days, the project was busted by FEMA as a “millennial cult.” Undeterred, Harris struck again, this time as his own subject. Rigging his loft with 32 motion-controlled cameras, he convinced his girlfriend to allow him to record streaming video of every moment of their lives from the toilet to the bedroom. The project backfired, his relationship imploded, and Harris went broke. Mentally unhinged, he fled to an apple farm in upstate New York. Sundance award winner Ondi Timoner (#_5_ won the Grand Jury Prize in 2004) chronicled Harris for a decade, culling through thousands of hours of Harris’s own footage and coupling it with rousing vérité of her own. The result is a fascinating, sexy, yet cautionary, tale where we all become Big Brother.

From the Tomorrow Museum

Alana Heiss of PS.1 and MoMA came by to inspect his experimental art project/millenium party “Quiet,” eventually calling it “one of the most extraordinary activities I’ve ever attended anywhere in the world.”

“The image I have in my mind is a concentration camp,” he says about the bunker built for the experiment. Staged on six floors of two buildings on lower Broadway, it was, “part rave, part Stanford Prison Experiment,” as Hanas writes. A hundred “pod people” were recorded from their Japanese capsule hotel beds (each equip with a video camera,) to the dining room, to the dance floor. There was a machine gun firing range, chess tournaments. Sex was filmed, even showers and toilets were set against the wall with no partitions. Participants were interrogated in a stark white room by a team of artists known as the Bureau.

Movie about “Fursona’s” coming out

From Boing Boing:

Furries get no respect. Usually, when you hear about people who dress up like life-sized stuffed animals, it’s in the context of an unfriendly internet joke, a sex gag on Entourage, or an insult that ends with “yiff in hell.”

Brooklyn-based filmmaker Marianne Shaneen has spent more than two years following these people around, capturing their lives in and out of their “fursonas.” She’s working on a documentary film called AMERICAN FURRY: Life, Liberty and the Fursuit of Happiness.

Frontline: Growing UP Online, Jan 22

I am a HUGE fan of Frontline. I regularly watch the shows in their entirety online (I don’t own a TV haven’t since 1995 – when I left home).

Their next show is called Growing Up Online. It should be interesting to see how they cover the subject. Just in case you are wondering the didn’t forget to cover “online sexual predators.”

MySpace. YouTube. Facebook. Nearly every teen in America is on the Internet every day, socializing with friends and strangers alike, “trying on” identities, and building a virtual profile of themselves–one that many kids insist is a more honest depiction of who they really are than the person they portray at home or in school.

In “Growing Up Online,” FRONTLINE peers inside the world of this cyber-savvy generation through the eyes of teens and their parents, who often find themselves on opposite sides of a new digital divide. From cyber bullying to instant “Internet fame,” to the specter of online sexual predators, FRONTLINE producer Rachel Dretzin investigates the risks, realities and misconceptions of teenage self-expression on the World Wide Web.

Who Killed the Electric Car?

WOW! What an amazing film and depressing. I totally recommend you see it if it comes to your neighborhood or rent it on Netflix (or equivalent).

GM killed the electric CAR. It happened – and they killed it. They said there was not enough consumer ‘demand’ but that is patently false. They knew there was demand they had waiting lists. They didn’t want the car to happen BECAUSE it would be successful and threatened the Oil Industry.

The film ends on a hopeful note and there will be a sequel. Who Saved the Electric Car.

Links on the Web this week

This is a fun little video/song rant … “Thou shalt not” related to pop culture and life of the young. It ends making an interesting contrasting commentary on the leadership of the united states of america.

——–
A good transition is this stunning and depressing set of photos of Iraqi Children.

——–
Which 100 Blogs should you read?
They figured it out using formulas for figuring out where to put detectors in water pipe systems to detect disease outbreak.

——–
Which side of the Brain do you use?

THE Right Brain vs Left Brain test … do you see the dancer turning clockwise or anti-clockwise? (I saw it clockwise).

If clockwise, then you use more of the right side of the brain and vice versa.

Most of us would see the dancer turning anti-clockwise though you can try to focus and change the direction; see if you can do it.

LEFT BRAIN FUNCTIONS
uses logic
detail oriented
facts rule
words and language
present and past
math and science
can comprehend
knowing
acknowledges
order/pattern perception
knows object name
reality based
forms strategies
practical
safe

RIGHT BRAIN FUNCTIONS
uses feeling
“big picture” oriented
imagination rules
symbols and images
present and future
philosophy & religion
can “get it” (i.e. meaning)
believes
appreciates
spatial perception
knows object function
fantasy based
presents possibilities
impetuous
risk taking

The Nature of the Web

This is a great documentary about Net Neutrality by the folks who did Four Eyed Monsters. It gives a great overview of the history of other communications technologies and how they were enclosed after their initial burst of freedom and expression. I have a deep affection for the web and its power to empower people am also very concerned about the future of it as a communications commons.

I learned a lot about the network-centric point of view at the ITU-T IdM Focus Group meeting. I have a much deeper respect for the complexity of the issues that affect ‘the network’ and ‘the internet.’ I am committed to an ongoing engagement to build shared meaning, understanding and figure things out. I am speaking next week at Emerging Telephony and I believe that ‘identity’ is a key to giving Telco’s a way to support the web’s network.

I will be blogging more about the past few weeks in the next few days.

Think cxap

Watch the video

Damian Conway’s killer parody presenation at oscon….the final animated slide.

This was the best presentation by being “the worst’ one ever. Damian made fun of bad presentations by putting everything bad into one big dooser. It made fun of Dick’s presentations on Sxip, r0ml, Kathy Sierra, Ruby on Rails, patents, pantent firms and was just hilarious.

THE WORD: Managiziation

Mike Neuenschwander gave a GREAT performance this morning. Last year he destroyed a guitar on stage and assured us that it had a good life in guitar heaven. This year he brought us THE WORD: Managization. I captured it using my camera’s video function. You can check it out over on my Vlog.

Technorati Tags: , , ,

Let the Vlogging begin

So, I went to VloggerCon and what does one do when one goes to a cutting edge technology conference espousing yet another cutting edge technology – one learns enough to ‘get it’ and dive in. So I began video blogging on Blip.tv I did two posts today on identity. I started out with a minute from Christine (she was at IIW) talking about why identity is critical and what will be its breakthrough moment. This is followed up by Mike from Blip.tv itself talking about why identity would be so useful to the emerging ecology of companies and how it helps them be like swarming smart pebbles.

I plan to vlog at all the conferences coming up. Let the Vlogging begin.

Technorati Tags: , , , , ,

VloggerCon reflections on day 1

There was one good talk that I went to at VloggerCon that is worth sharing some information about here… The difference between video blogs and other formats.

  • Video get decontextualized – once it is out there it roams around
  • The display is smaller
  • It is bandwidth dependent
  • The audience control – they can decide what to watch and when
  • The interaction with the audience is more organic

Christine was at the event and counted how many women were there – 26% – relatively high ‘for a tech conference’ I don’t know if it is the venue or the early stage of this industry niche but it feels very ‘alpha’ – you know – my vlog is bigger then your blog, my vlogging tool is better then your vlogging tool.

I am trying to wrap my head around how to do this vlogging thing. They put the ‘advanced imovie and final cut pro’ in the second slot of the day before there was even a basic tutorial. They did have a story telling workshop that looked like it was good but I didn’t make it to that one.
I was craving more room (the venue was very cramped) and open space methodology. I will be back there today wearing my dabbler shirt – thanks Mary. If you are trying to figure out where there is good video on the web – dabble is the place for you. You can be my “friend” there too.

Technorati Tags:

Identity Map Developing

I mentioned this earlier in my reflections about the conference. I had seeded a map that outlined the history of our community, gatherings, protocols, blogs, papers, podcasts, wikis, mailinglists. One of the participants took a very high resolution picture of the finished map. Phil has a picture of the initial map. On my original Omnigraffle version I have Kim’s Laws of Identity but on this one I didn’t get them up and Kim just pinged me to let me know it needed to be added. If there are things you think need to be added feel free to let me know.

I hope to bring the big map or another version to the conference at Berkman and DIDW for others to add more information to it.

Where is the video???? Colbert is vanished from webosphere

So one of the funniest and serious things to appear on the web this week was the AP Dinner where they ‘roast’ the president. This year Colbert was the roaster. The mainstream press basically ignored the roast but…it took off in the blogosphere. Now the video has been disappeared from youtube. I never did see the third part.

Identity Gang 2 – How did John get involved?

This was the big identity event that I missed while I was away. The good thing about podcasting is that you get to listen to it after it is recorded. There was a question that Doc asked John Clippinger about where he really got involved with the identity conversation…he really was a bit stumped and was like PCForum…John Clippinger and Paul Trevethick came out the Planetwork in 2004 where identity was a big topic of discussion. I met them there.

I knew that Harvard was critical to get involved in the discussion so when I found out about the conference on Internet and Society I flew out there specifically to talk at length with John about what Identity Commons and i-names. We had a great meeting in the Charles hotel for about two and a half hours. I also on that trip spoke at length with Paul and Mary.

Then when we were out at PCForum for a pre-Forum identity gang. John couldn’t make that but got there late in the day. I set up a breakfast meeting with Owen Davis, Drummond Reed and John Clipppinger to talk about identity matters including how to get support from the big players for the kind of research and dialogue needed to address the social concerns. It seems the subsequent conversations went well and they secured some funding.

So…Doc that is part of the story about how John Clippinger and the Berkman Center got involved in the identity conversation.

It all comes together – Identity Map

I have been listening to Aldo’s Identity Podcasts a lot this week to prepare for my first interview with Jim Fournier tomorrow. Mark was the last guy he interviewed from Sun and he mentioned the Identity Map in his blog after his son got 100 things we love about David.” Now I get the ‘map’ he talked about.

Identity based DRM – will the ‘get it’?

I am not a fan of the MPAA, RIAA or any other big industry conglomeration trying to hold on to their existing business model of selling creative works (before you view/listen to them).

I have like many many folks participated in this system. I have bought first albums then cassettes and then CD’s (and now people buy songs online too – but I have yet to). When I make a purchase of these artists works I have bought the right to listen to them freely. People who had albums upgraded to cassette tapes (maybe) but likely for sure upgraded to CD’s. If they did this they bought the work ‘twice.’ In the digital realm it gets even stranger where if you buy a piece of music on apple i-tunes you only get to copy it three times.. from one computer to the next to the next. Then it ‘runs out’ of copies. mmmm…but didn’t buy the right to listen to it when you first bought it no mater which medium you as the owner of that music choose to listen to it in.

So far the whole frame around DRM has been device based. This means every time there is a new form that plays media – (record player, cassette deck, CD Player, MP3 on desktop, ipods and zen players….and there will be more in the future.

If DRM is to exist and not completely alienate those who are the end users of music it should be identity based. I – ME – I buy a copy of a song and I get to listen to it forever on what ever the ‘medium’ of the day is.

I would like to propose a better system that still means folks get money. Music and other digital work is completely FREE.

It is all on the web and we call all access it all. I as a listener to music only have so much time that I spend listening to music. I allocate some amount that I will contribute to the music payment pool in a month $50 – $500. Then the attention ‘given’ to each song is recorded. The money I allocate amongst all the artist/podcaster etc. is distributed between them (perhaps with me giving particularly enjoyable ones a bit more) based on my attention data stream. The artist I listen to actually get money! If I like them and listen to them over years and years they will get more money then they would if they sold me a song once. This of course needs a functioning micro-payments system it may be worth the music industries business to actually do this.

Technorati Tags: ,

Halley and I talk Identity – Podcast from BlogHer

One of the highlights of BlogHer for me was my first podcasting experience with Halley Suitt. I was sitting around at a ‘podcasting’ station and she showed up and the John Furrier who runs PodTech was there and so we did a spontaneous recording… here is the result. Wow! listening I actually don’t mind my voice.

How do we make the internet a trusted place?
Is the net a more dangerous place for women?
Halley discusses her digital identity experiences – writing about sex on the net, and lingerie photos of her on the net.

I mention the founding of Virtual Rights to address this new era of personal representation online. I share what inspires me how we can use these tools to empower us as citizens.