The document discusses giving users new tools and "superpowers" to protect their independence and privacy online in the age of widespread digital surveillance and data collection. It introduces the concepts of VRM, which provides customers tools for independence and engagement, and "intentcasting" which allows users to broadcast wants and needs to the market in a way they control. It also notes that blocking ads and tracking online can give individuals significant leverage over companies by allowing for the potential of the largest boycotts in history.
The document discusses giving users new tools and "superpowers" to protect their independence and privacy online in the age of widespread digital surveillance and data collection. It introduces the concepts of VRM, which provides customers tools for independence and engagement, and "intentcasting" which allows users to broadcast wants and needs to the market in a way they control. It also notes that blocking ads and tracking online can give individuals significant leverage over companies by allowing for the potential of the largest boycotts in history.
This document discusses the potential for customer relationship management (CRM) to focus on truly serving customers through love and empowerment, rather than just control and retention. It argues that CRM currently keeps customers locked in a client-server model where their data and control is held by companies. The document proposes that customer relationship management (CRM) needs a counterpart called vendor relationship management (VRM) to empower customers through tools and services that give them control over their own data and how they engage with companies. VRM aims to shift the balance of power towards customers and get CRM out of the controlling model to a more open, customer-centric frontier.
'Internet of Things' is on its way to become 'Internet of Everything'
This Internet of Things (IoT) infograph from eInfochips will inform you about the growth, future opportunities and the technological involvement in this segment.
7 reasons why mobile is the future of digital IDJuana Catalina
Mobile is becoming the major platform for Digital ID. In this ppt, we explain why.
https://blog.gemalto.com/mobile/2018/06/07/7-reasons-why-mobile-is-the-future-of-digital-id/
This document summarizes a presentation from the 5th ICV Conference in May 2017 about digital transformation. The presentation discusses how the 4th Industrial Revolution will fundamentally change how people live, work and relate through emerging technologies. It provides examples of real-world Internet of Things use cases across many industries from smart homes and cities to tracking livestock. The presentation argues that data and analytics are key to gaining insights and that finance must embrace digital transformation now to stay relevant, with many CEOs believing technology will greatly impact the future role of the CFO.
Artificial intelligence is the development of computer systems that can perform tasks normally requiring human intelligence, such as visual perception, speech recognition, and decision-making. The field began in the 1950s and has since developed technologies like Siri, Cortana, and Android. AI is now used across many industries including healthcare, education, automobiles, banking, manufacturing, and entertainment. While AI has automated many tasks through technologies like ATMs and self-driving cars, challenges remain around computing power, tolerance, judgment, and intuitive thinking. The future of AI may include developments in areas like cyborg technology, disaster management, climate change, transportation, dangerous jobs, and personal relationships.
The IoT i.e. Internet of Things connects those objects that are capable to store, manage, and transmit various amounts of data. Know more about the elements involved in IoT with the help of this PPT.
This document discusses interactive real-time communication technologies and their potential applications. By 2025, NASA predicts 80% of human interaction will occur through "teleportals" for commerce, education, entertainment, medicine, politics, shopping, socialization and travel. Emerging technologies like the internet of things, artificial intelligence, augmented/virtual reality and real-time communication will drive trillions in market growth and disrupt industries by 2020. The document outlines several pilot projects using these technologies in areas like education, entertainment, smart cities, and more. It discusses the company's vision to become a leading supplier of HTML5 real-time communication and their ecosystem and services to enable digital transformation.
The document discusses giving users new tools and "superpowers" to protect their independence and privacy online in the age of widespread digital surveillance and data collection. It introduces the concepts of VRM, which provides customers tools for independence and engagement, and "intentcasting" which allows users to broadcast wants and needs to the market in a way they control. It also notes that blocking ads and tracking online can give individuals significant leverage over companies by allowing for the potential of the largest boycotts in history.
This document discusses the potential for customer relationship management (CRM) to focus on truly serving customers through love and empowerment, rather than just control and retention. It argues that CRM currently keeps customers locked in a client-server model where their data and control is held by companies. The document proposes that customer relationship management (CRM) needs a counterpart called vendor relationship management (VRM) to empower customers through tools and services that give them control over their own data and how they engage with companies. VRM aims to shift the balance of power towards customers and get CRM out of the controlling model to a more open, customer-centric frontier.
'Internet of Things' is on its way to become 'Internet of Everything'
This Internet of Things (IoT) infograph from eInfochips will inform you about the growth, future opportunities and the technological involvement in this segment.
7 reasons why mobile is the future of digital IDJuana Catalina
Mobile is becoming the major platform for Digital ID. In this ppt, we explain why.
https://blog.gemalto.com/mobile/2018/06/07/7-reasons-why-mobile-is-the-future-of-digital-id/
This document summarizes a presentation from the 5th ICV Conference in May 2017 about digital transformation. The presentation discusses how the 4th Industrial Revolution will fundamentally change how people live, work and relate through emerging technologies. It provides examples of real-world Internet of Things use cases across many industries from smart homes and cities to tracking livestock. The presentation argues that data and analytics are key to gaining insights and that finance must embrace digital transformation now to stay relevant, with many CEOs believing technology will greatly impact the future role of the CFO.
Artificial intelligence is the development of computer systems that can perform tasks normally requiring human intelligence, such as visual perception, speech recognition, and decision-making. The field began in the 1950s and has since developed technologies like Siri, Cortana, and Android. AI is now used across many industries including healthcare, education, automobiles, banking, manufacturing, and entertainment. While AI has automated many tasks through technologies like ATMs and self-driving cars, challenges remain around computing power, tolerance, judgment, and intuitive thinking. The future of AI may include developments in areas like cyborg technology, disaster management, climate change, transportation, dangerous jobs, and personal relationships.
The IoT i.e. Internet of Things connects those objects that are capable to store, manage, and transmit various amounts of data. Know more about the elements involved in IoT with the help of this PPT.
This document discusses interactive real-time communication technologies and their potential applications. By 2025, NASA predicts 80% of human interaction will occur through "teleportals" for commerce, education, entertainment, medicine, politics, shopping, socialization and travel. Emerging technologies like the internet of things, artificial intelligence, augmented/virtual reality and real-time communication will drive trillions in market growth and disrupt industries by 2020. The document outlines several pilot projects using these technologies in areas like education, entertainment, smart cities, and more. It discusses the company's vision to become a leading supplier of HTML5 real-time communication and their ecosystem and services to enable digital transformation.
Future technology trends will transform both consumer and business behavior, including the Internet of Things (IoT), smart cities, augmented and virtual reality, blockchain, voice recognition, and artificial intelligence. These trends are converging and will have widespread impacts. IoT will connect over 8 billion devices and enable smart cities, while security remains a challenge. Blockchain can create trust without third parties and affect contracts. Voice recognition will become a universal interface, and artificial intelligence will automate industries using massive data sets, with potential unintended consequences. Opportunities exist where these trends intersect, such as blockchain enabling secure IoT, AI powering voice interfaces, and augmented reality revealing smart city architecture.
IOTA is a non-profit foundation registered in Berlin that is developing an open-source distributed ledger technology called the IOTA Tangle. The IOTA Tangle is designed to enable zero-fee transactions, high scalability, and secure data transfer capabilities for the Internet of Things. IOTA aims to support the growth of smart cities and industrial IoT applications, which are projected to represent 50% of the total IoT market capitalization by 2020.
Digital twin cities enabled by technologies like 5G, AI, and new materials will become a reality. Industries are entering a cycle of digitization and facing huge digital opportunities. ICT systems will play more important roles in businesses, from driving efficiency to participating in decision-making. VR and AR are reshaping user experience and promoting upgrades in computing, display, and networks. "Connectivity + Computing + Cloud" is the core engine that will power the intelligent society.
7 disruptive technology to watch | Best SEO agency in USA | Best crm develope...Searchable Design
As we continue imbibing new technology, we may as well take advantage of the disruptive technology trends available to us today to make our lives better.
Dare to (re)Imaginge [...] - a presentation to YRDSB, OPCRick Huijbregts
This document discusses how digital transformation is shaping education. It notes that digital technologies are enabling new models of learning like global classrooms, personalized learning, and digital campuses. Sensors and analytics can create intelligent, high-performing learning environments. The Parkland School Division case study shows how digitization improved operations, safety, collaboration and student outcomes. The document argues that to prepare students for the future, education must embrace digital technologies and innovative teaching models to ensure students have learning without limits.
81% of customers rely on social media for purchase advice. By 2020, mobile workers will comprise nearly 75% of the US workforce as mobile commerce sales grow exponentially and more devices connect to the internet. New technologies like cloud computing, big data, APIs, and the internet of things will continue to change how we work and access information, making it important to have a single, accurate version of business data.
With the advancement in the Technology and technology providing new jobs, there is a definite shift in the jobs.
This presentation takes us from the Industry 1.0 to Industry 4.0 and also throws light on the skills shift as pointed by World Economic Forum (WEF).
The document discusses the history and evolution of the Internet of Things (IoT). It notes that the concept of IoT was first coined in 1999 and has expanded rapidly since then. Key points covered include different communication protocols used in IoT, how IoT enables real-time decision making and event-driven applications, and the growth of IoT across various industries and applications like smart cities. It also examines maturity models and business models for monetizing IoT technologies and platforms.
DISRUPTION IN ‘BUSINESS DIGITIZATION’ & FUTURE JOB PROSPECTS IN DIGITAL WORL...CovidliveInfo
The document discusses how COVID-19 has accelerated business digitization and the impact on future jobs. It notes that the pandemic disrupted businesses and cash flow until digital solutions emerged. Many jobs are now at risk, but new career opportunities are emerging that emphasize skills like data analysis, customer experience, empathy and collaboration. Workers will need to adapt by developing technical savvy and a more creative, value-based mindset.
Top 4 Digital Transformation Trends In 2018DivyaConsagous
Digital transformations leverage the power of developing technologies to boost the customer or user experience and meet the operational goals. Here is the scoop of top 4 digital transformation trends in 2018 that are radars right now.
We've collected 26 of the hot topics that were discussed during our "Digital Futures" event programme this year. Each of these innovations are helping digital marketers get closer to the customers.
For more information about these events and to see our 2016 programme, visit http://www.equimedia.co.uk/about-us/digital-futures-events
This document discusses digital transformation and the role of humans in an increasingly digital world. It explains that digitalization means using digital technologies to change business models and create new revenue opportunities. It then outlines many developing digital technologies from artificial intelligence to augmented reality. While these technologies may change work and society, the document argues that humans will still be needed to provide balance, constant learning, and human-centered perspectives in developing new technologies and business models.
This document discusses platforms and how they create value. It provides examples of companies like Amazon, Ping An, and Tesla that have built highly valuable platforms. The key points made are:
1) The 7 most valuable companies in the world are based on platform business models that disrupt traditional industries like transportation, finance, and media.
2) Ping An is an insurance company that has spun off technology companies valued at over $16 billion and employs 22,000 people in R&D, showing how platforms can create new business opportunities.
3) Tesla is creating a mobility platform through products like solar roofs, electric vehicles, and self-driving technology to redefine transportation.
The Internet of Things (IoT) has been presented as the next big wave with the potential to change the way we interact with technology in our day-to-day.
The real potential of the IoT resides in the ability to expose data from connected smart devices that can interact with other sources of information and generate predictive interactions with individuals and organizations.
The purpose of this presentation is to set the basics around IoT and explore the main application areas where IoT really matters, highlighting what is already on the shelf and what is still only hype.
Topics covered:
- Connected Home
- Transportation
- Health, Fitness and Quantified Self
- Industrial and Smart cities
- Open Platforms & APIs
The document discusses the challenges of the Fourth Industrial Revolution and how organizations need to adapt. It highlights how digital technologies are advancing exponentially and disrupting many industries and business models. The key points are: (1) The speed and scale of technological change is unprecedented and will fundamentally change how we live and work; (2) Both digital native organizations that have embraced technology as well as analog organizations that have not adapted will struggle with the changes brought by the Fourth Industrial Revolution; (3) To succeed, organizations need to think and act more like startups by focusing on customer-centric innovation and becoming more unique.
Robin Wauters, Co-founder, Tech.eu - Tech trends in 2014 (and small European ...How to Web
Technological innovation is happening at a rapid - and consistently accelerating - pace, and it's happening all over the globe. In this session, we're going to explore what the key trends in technology will be in the near future, and which European companies are ahead of the curve in their field and best positioned to take advantage of the shifts we can identify.
More details on: http://2013.howtoweb.co/
Future technology trends will transform both consumer and business behavior, including the Internet of Things (IoT), smart cities, augmented and virtual reality, blockchain, voice recognition, and artificial intelligence. These trends are converging and will have widespread impacts. IoT will connect over 8 billion devices and enable smart cities, while security remains a challenge. Blockchain can create trust without third parties and affect contracts. Voice recognition will become a universal interface, and artificial intelligence will automate industries using massive data sets, with potential unintended consequences. Opportunities exist where these trends intersect, such as blockchain enabling secure IoT, AI powering voice interfaces, and augmented reality revealing smart city architecture.
IOTA is a non-profit foundation registered in Berlin that is developing an open-source distributed ledger technology called the IOTA Tangle. The IOTA Tangle is designed to enable zero-fee transactions, high scalability, and secure data transfer capabilities for the Internet of Things. IOTA aims to support the growth of smart cities and industrial IoT applications, which are projected to represent 50% of the total IoT market capitalization by 2020.
Digital twin cities enabled by technologies like 5G, AI, and new materials will become a reality. Industries are entering a cycle of digitization and facing huge digital opportunities. ICT systems will play more important roles in businesses, from driving efficiency to participating in decision-making. VR and AR are reshaping user experience and promoting upgrades in computing, display, and networks. "Connectivity + Computing + Cloud" is the core engine that will power the intelligent society.
7 disruptive technology to watch | Best SEO agency in USA | Best crm develope...Searchable Design
As we continue imbibing new technology, we may as well take advantage of the disruptive technology trends available to us today to make our lives better.
Dare to (re)Imaginge [...] - a presentation to YRDSB, OPCRick Huijbregts
This document discusses how digital transformation is shaping education. It notes that digital technologies are enabling new models of learning like global classrooms, personalized learning, and digital campuses. Sensors and analytics can create intelligent, high-performing learning environments. The Parkland School Division case study shows how digitization improved operations, safety, collaboration and student outcomes. The document argues that to prepare students for the future, education must embrace digital technologies and innovative teaching models to ensure students have learning without limits.
81% of customers rely on social media for purchase advice. By 2020, mobile workers will comprise nearly 75% of the US workforce as mobile commerce sales grow exponentially and more devices connect to the internet. New technologies like cloud computing, big data, APIs, and the internet of things will continue to change how we work and access information, making it important to have a single, accurate version of business data.
With the advancement in the Technology and technology providing new jobs, there is a definite shift in the jobs.
This presentation takes us from the Industry 1.0 to Industry 4.0 and also throws light on the skills shift as pointed by World Economic Forum (WEF).
The document discusses the history and evolution of the Internet of Things (IoT). It notes that the concept of IoT was first coined in 1999 and has expanded rapidly since then. Key points covered include different communication protocols used in IoT, how IoT enables real-time decision making and event-driven applications, and the growth of IoT across various industries and applications like smart cities. It also examines maturity models and business models for monetizing IoT technologies and platforms.
DISRUPTION IN ‘BUSINESS DIGITIZATION’ & FUTURE JOB PROSPECTS IN DIGITAL WORL...CovidliveInfo
The document discusses how COVID-19 has accelerated business digitization and the impact on future jobs. It notes that the pandemic disrupted businesses and cash flow until digital solutions emerged. Many jobs are now at risk, but new career opportunities are emerging that emphasize skills like data analysis, customer experience, empathy and collaboration. Workers will need to adapt by developing technical savvy and a more creative, value-based mindset.
Top 4 Digital Transformation Trends In 2018DivyaConsagous
Digital transformations leverage the power of developing technologies to boost the customer or user experience and meet the operational goals. Here is the scoop of top 4 digital transformation trends in 2018 that are radars right now.
We've collected 26 of the hot topics that were discussed during our "Digital Futures" event programme this year. Each of these innovations are helping digital marketers get closer to the customers.
For more information about these events and to see our 2016 programme, visit http://www.equimedia.co.uk/about-us/digital-futures-events
This document discusses digital transformation and the role of humans in an increasingly digital world. It explains that digitalization means using digital technologies to change business models and create new revenue opportunities. It then outlines many developing digital technologies from artificial intelligence to augmented reality. While these technologies may change work and society, the document argues that humans will still be needed to provide balance, constant learning, and human-centered perspectives in developing new technologies and business models.
This document discusses platforms and how they create value. It provides examples of companies like Amazon, Ping An, and Tesla that have built highly valuable platforms. The key points made are:
1) The 7 most valuable companies in the world are based on platform business models that disrupt traditional industries like transportation, finance, and media.
2) Ping An is an insurance company that has spun off technology companies valued at over $16 billion and employs 22,000 people in R&D, showing how platforms can create new business opportunities.
3) Tesla is creating a mobility platform through products like solar roofs, electric vehicles, and self-driving technology to redefine transportation.
The Internet of Things (IoT) has been presented as the next big wave with the potential to change the way we interact with technology in our day-to-day.
The real potential of the IoT resides in the ability to expose data from connected smart devices that can interact with other sources of information and generate predictive interactions with individuals and organizations.
The purpose of this presentation is to set the basics around IoT and explore the main application areas where IoT really matters, highlighting what is already on the shelf and what is still only hype.
Topics covered:
- Connected Home
- Transportation
- Health, Fitness and Quantified Self
- Industrial and Smart cities
- Open Platforms & APIs
The document discusses the challenges of the Fourth Industrial Revolution and how organizations need to adapt. It highlights how digital technologies are advancing exponentially and disrupting many industries and business models. The key points are: (1) The speed and scale of technological change is unprecedented and will fundamentally change how we live and work; (2) Both digital native organizations that have embraced technology as well as analog organizations that have not adapted will struggle with the changes brought by the Fourth Industrial Revolution; (3) To succeed, organizations need to think and act more like startups by focusing on customer-centric innovation and becoming more unique.
Robin Wauters, Co-founder, Tech.eu - Tech trends in 2014 (and small European ...How to Web
Technological innovation is happening at a rapid - and consistently accelerating - pace, and it's happening all over the globe. In this session, we're going to explore what the key trends in technology will be in the near future, and which European companies are ahead of the curve in their field and best positioned to take advantage of the shifts we can identify.
More details on: http://2013.howtoweb.co/
Introduction to ENT (Entity Network Translation)ENT Technologies
Want to eliminate hacks of critical infrastructure, vehicles and military systems? Do you think patients should exclusively own and control access to their medical records? Want to eliminate counterfeiting on digital and physical goods? Want to be able to exclusively own, sell, transfer, buy or lease your data and digital assets like physical property?
ENT makes all these things possible - TODAY.
ENT (Entity Network Translation) is a fully decentralized, next-generation trust infrastructure that replaces passwords, PKI, blockchain, and centralized data stores. ENT is a radical innovation in core enabling trust technology & networked systems.
+ Trusted micro-networking between entities of any kind: humans, devices, data and files, software processes, physical objects, concepts like corporations and currencies, and groups of any/all of these;
+ Exponentially increases security and privacy because entities are individually protected and connected directly without any middleman or central management;
+ Built on a patent-pending fundamental advancement in asymmetric key models called Relational Key Infrastructure (RKI) that eliminates central authorities and key management - the first key infrastructure innovation in 30 years;
+ Fully decentralized and owner-driven;
+ Useful for any purpose: Internet of Things, government, healthcare, finance, manufacturing, retail, etc;
+ Useful in any environment: scales from embedded components up to complex global systems;
+ Open standard for transparent governance, high usability across industries and wide adoption.
The rise of incognito tech and anonymity as consumers gain awareness of how their data is collected and used. Technologies like wearables and the Internet of Things will increasingly involve intimate consumer information, requiring transparency and control over data use and access. Anonymity and data aggregation services may become more valuable to allow information freedom while addressing privacy concerns.
This document discusses various paradoxes facing the future of media as it transitions to a digital format, including: increased data availability vs scarcity of meaning; data privacy concerns vs advertiser needs; and a focus on ownership shifting to access. Key shifts include everything becoming dynamic, real-time, cloud-based, social, and mobile. Silos will fail while ecosystems offering win-win growth through interdependence will succeed. Creativity and imagination will drive innovation more than knowledge and skills. The future will not be zero-sum, but instead create a larger pie through added values and new business models that serve customers directly.
1. The document discusses both the opportunities and challenges of emerging technologies like big data, artificial intelligence, and an increasingly connected world.
2. While this represents tremendous potential, it also risks unintended consequences if not balanced with ethical standards and considerations of privacy.
3. A major hurdle to future progress is the loss of privacy and trust that has already occurred, requiring new frameworks of governance to better protect users and build confidence going forward.
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)Gerd Leonhard
This is an edited version of a presentation I gave at ITUWorld 2013 in Bangkok, Nov 21, 2013, see more details at http://www.futuristgerd.com/2013/11/21/here-is-the-pdf-with-my-slides-from-the-ituworld-event-in-bkk-today/ Topics: US domination of the Internet and cloud computing, big data futures, privacy failure and the global digital rights bill, the importance of trust, key issues for cloud computing, and much more. Check www.gerdtube.com for a video version (should be available soon)
If you enjoy my slideshares please take a look at my new book “Technology vs Humanity” http://www.techvshuman.com or buy it via Amazon http://gerd.fm/globalTVHamazon
More at http://www.futuristgerd.com or www.gerdleonhard.de
Download all of my videos and PDFs at http://www.gerdcloud.net
About my new book: are you ready for the greatest changes in recent human history? Futurism meets humanism in Gerd Leonhard’s ground-breaking new work of critical observation, discussing the multiple Megashifts that will radically alter not just our society and economy but our values and our biology. Wherever you stand on the scale between technomania and nostalgia for a lost world, this is a book to challenge, provoke, warn and inspire.
Empowering Beyond Summit 2018 Opening Keynote: Innovation Reborn, Kevin S. Pa...Nicole Dulay
The document discusses the concept of digital singularity, which is defined as the point where technological omnipresence and human experience converge. It outlines humanity's changing relationship with technology from the Stone Age through the Digital Age. Key aspects of digital singularity include hyper-convergence of technologies, digital moments, digital twins, and augmented reality. The document also discusses how people may live and work in a world of digital singularity, including through barrier-free access, democratized egalitarianism, the sharing economy, and transboundary communities.
Lalo Huber - El impacto de la Economía Digital - Econ2017Lalo Huber
The document discusses the impact of the digital economy on organizations. It describes how the digital economy is significantly transforming business models, industries, and the relationship between business and technology. Key trends discussed include the rise of platforms, on-demand services, data and analytics, artificial intelligence, robots, sensors, and new technologies like blockchain. The document also addresses how organizations must change their strategies, structures, processes and culture to adapt to the digital world.
My presentation in eHealth Data Forum in Athens/Greece (9/12/2019) introducing the data flows within the health domain under the MyData architecture. This presentation understands MyData as a fair ecosystem, product of the current techno-economic paradigm shift
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
The document discusses how digital technologies are transforming behaviors and raising citizen expectations of government services. It notes that Australians now spend significant time online and use various digital services. This has led to changing expectations where citizens want essential, discretionary, and participatory services from government. The document argues that governments need to adopt a more open, collaborative and user-centered approach to meet these rising expectations, including through the use of social media, open data, and new digital identity systems that give citizens more control over their personal information.
This document discusses issues around privacy and socioeconomics in the future internet. It notes that while internet companies and some experts argue privacy is dead, privacy breaches can be costly and erode trust. The document outlines tools like "layered defense," "privacy by design," and "the accountability project" to help privacy coexist with economic gains. It examines case studies in identity management and eHealth and outlines possible areas for future research around demonstrable supply chain resilience, user-centric cloud services, and automation that builds in privacy by default.
From Big Data to Smart Data - POV from MWC2015Adrian Kielich
This document discusses the growing amount of data being generated and how companies are monetizing data. It notes that each day 2.5 trillion bytes of data are generated, 90% within the last two years, from sources like social media, online shopping, and mobile phones. As more devices become connected, the volume of data will increase. The document also discusses how Twitter is licensing its data to make money through new revenue streams and partnerships. It argues that companies need to take a strategic approach to data by defining their business purpose and creating experiences to obtain the necessary data, rather than just using available data.
The digital revolution refers to the rapid and profound transformation of society, economy, and culture brought about by the widespread adoption and integration of digital technologies. This revolution encompasses the shift from analog, mechanical, and manual processes to digital, automated, and computerized systems.
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
The document discusses emerging technology trends that will impact accountants, including increased use of artificial intelligence, cloud computing, digital currencies, virtual offices and staff, and automation of IRS processes. It identifies security and the changing workforce as major issues to address. Technologies like blockchain, digital assistants, drones, and adaptive security architectures are predicted to become more common. The document advises accountants to understand current technology use, identify outdated tools, and capitalize on changing technologies to adapt to an increasingly digital environment.
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Livingstone Advisory
The rate of business and societal change fuelled by innovative, emerging and disruptive information technologies is well known, with impacts being felt in almost every facet of life. The forces driving the evolution and adoption of such technologies are complex, diverse and not always well understood. How can organisations predict the consequences of future tech? How should they fortify against the chaos of change while taking advantage of innovation?
This public lecture provides a concise perspective on the implications of emerging technologies and offers practical insights on how many enterprises and individuals survive, and also thrive, in a world of rapid technology-induced change.
Ericsson ConsumerLab: Personal Information EconomyEricsson
In today’s society, companies and organizations have unprecedented possibilities to collect and use people’s personal information. Using this information in the right way enables new revenue streams and increased profit.
But do consumers understand and perceive the value of their personal information? What are the sensitivity involved with an increased use of personal information by enterprises, governments and consumers? The purpose of the Personal Information Economy report by ConsumerLab has been to describe consumers’ understanding, needs, behaviors and attitudes with respect to personal information as an asset.
For more research from the Ericsson ConsumerLab visit: http://www.ericsson.com/thinkingahead/consumerlab
The document proposes an alternative online marketplace called "The Byway" that aims to give users more control and privacy over their data and identities online. On the Byway, users would have their own private compute nodes to run apps and algorithms on their own data. Buyers and sellers could connect directly in a platform-free way, with buyers stating what they are looking for and sellers only receiving interested buyers' messages. The Byway is presented as a new opportunity for online commerce, services, and governance outside of large tech platforms' control. It would start locally in Bloomington, Indiana and help is sought from developers, communities, and entrepreneurs to build use cases and spread the idea.
Slides for a talk I gave for Zuora at Subscribed 2012 in London. Topics are the subscription economy, VRM, customer commons, and business problems that can only be solved from the customer's side—subsription hell especially.
The document discusses a new approach to e-commerce called Self-Sovereign E-Commerce (SSEC). It proposes that SSEC can be scaled up by starting with messaging rather than identity. A key part of the approach is to separate the content of messages from the envelopes that contain them. This allows for a new type of computer called an Intentron, which is owned and controlled by individuals. Intentrons run applications from various sources and algorithms based on a user's personal data. They communicate asynchronously through a messaging layer called the Intention Byway. This new architecture could enable new businesses around messaging, addressing, applications and Intentrons.
The document discusses the potential for an "Intention Economy" enabled by Intentrons and the Intention Byway. An Intentron would be a personal device that runs independent apps and algorithms based on a user's data to act as an agent of their demand. Signals between Intentrons would travel through an open, asynchronous publishing-subscription system called the Intention Byway. This could enable more efficient, transparent markets like real estate and food by allowing buyers and sellers to directly connect via apps instead of relying on existing closed/opaque systems. Examples show how farmers, chefs, buyers, and truckers may find each other and complete food market transactions via Intentcasting apps. Similarly, real estate sellers and buyers could connect without intermedi
A slide deck to guide discussion of McLuhan and identity at the XXIVth Internet Identity Workshop. It led into a follow-on session for the Digital Life Collective, which was focused on "the Web we want."
A talk given at SugarCRM's SugarCon conference in 2011. It was way ahead of oits t (this won't let me go back and correct what's alredy typed, so I'll stop here).
The document discusses the history and evolution of online advertising, from early non-tracking based ads to the current tracking-based adtech system. It notes key events like the rise of interest in Do Not Track policies and browsers adding tracking protection. The document argues that ad blocking has increased in response to widespread internet surveillance and tracking by advertisers. It suggests a framework for distinguishing between respectful/disrespectful and acceptable/unacceptable kinds of ads.
VRM + CRM and why individuals need their own X-wing vehiclesDoc Searls
This document discusses the potential for customer relationship management (CRM) to focus on truly serving customers through love and empowerment, rather than just control and retention. It argues that CRM currently keeps customers locked in a client-server model where their data and control is held by companies. The document proposes that customer relationship management (CRM) needs a counterpart called vendor relationship management (VRM) to empower customers through tools and services that give them control over their own data and how they engage with companies. VRM aims to shift the balance of power to customers by moving relationships to a more peer-to-peer model where individuals are integrated into their own data and can assert their own demands. The document outlines several VRM projects and companies
This document provides a summary of the history of the music industry in relation to various technologies and laws over several decades. It discusses the emergence of key organizations like ASCAP and BMI to collect royalties for composers and publishers. It also covers the development of the recording industry with technologies like phonographs and how laws evolved to address copying and performances of music. The document outlines the challenges that internet radio and streaming faced with royalty rates and regulations into the 2000s. It is critical of the organization SoundExchange and its role in collecting royalties.
This document discusses reframing language and metaphors used for the internet. It argues that describing content as a commodity to be delivered frames the internet incorrectly and risks regulating speech. Instead, the internet is best understood as a place where people inform and author each other through sharing ideas. Laws and regulations have treated broadcasting differently than other speech, focusing on regulating content rather than protecting free expression. To protect online speech and innovation, the internet should be framed as a place for both free speech and free enterprise, not just a delivery system for content.
The Liberated Customer is Good for BusinessDoc Searls
The document discusses how captive customers are bad for business and advocates empowering customers through tools that allow them to manage their own data and relationships with vendors. It proposes giving customers tools to send personal requests for proposals to markets, set their own prices, and assert their own legal terms. This concept of "Vendor Relationship Management" or VRM would create "free customers" who are more valuable to business than captive ones. VRM tools could include personal data stores, personal RFP systems, and fourth parties to assist customers. The goal is for sellers to have to genuinely deal with empowered customers, as free markets work best with free customers.
This document discusses the differences between the current commercial web model, which is top-down and focused on targeting and controlling users, and an emerging model of personal democracy and user-driven relationships online. It advocates for a shift to a more equal, user-driven model where individuals can control how their data is used and shared through tools like VRM that put the user in the driver's seat regarding their online interactions and data disclosure.
1. The document discusses how buyer reach now exceeds seller grasp due to technological changes. This shifts power to customers who can act as platforms and manage vendor relationships through tools like VRM.
2. It argues that CRM focuses too much on acquisition and management of customers rather than mutual relationships. VRM allows customers to set terms and help vendors relate to them.
3. One goal is to build tools that empower independent customers to better engage with vendors on their own terms through sharing intentions, preferences and managing data and agreements. This could lead to new business models centered around customer demand.
This document discusses the open and evolving nature of the internet and opportunities for businesses to support it. It argues that the internet is based on open protocols and cooperation rather than centralized control. Open source software and communities have allowed the internet to grow in unexpected ways. The biggest opportunities lie in empowering users and supporting new markets that emerge online, rather than trying to control infrastructure or sell old services over new networks.
The document discusses the need for Vendor Relationship Management (VRM) systems to give customers more control over their relationships with companies. It argues that current Customer Relationship Management (CRM) systems are one-sided in favoring vendors' ability to "manage, control, and own" customers. VRM aims to enable customers to manage their own data and set terms for how vendors can interact with them. This could help shift the balance of power towards mutual relationships rather than vendors treating customers as "captives" or "eyeballs." The document outlines several potential capabilities of VRM systems, such as expressing preferences to vendors and paying for priority customer service. It also proposes an "r-button" symbol to help VRM and CR
The document discusses the challenges of empowering individuals in the current client-server model of the web and proposes an alternative called Vendor Relationship Management (VRM). VRM would allow individuals to manage their own data and relationships with companies through open-source personal data stores and new signaling tools. Examples of new VRM tools are discussed like personal RFPs and fourth parties to assist individuals in negotiating with companies on more equal terms. The document calls for helping to develop these new VRM life forms and businesses to reform retail and shift power more toward empowering individuals online.
The document discusses the early stages of the online economy and customer empowerment. It notes that currently [1] online businesses try to make customers captive through loyalty programs and data silos, [2] Vendor Relationship Management (VRM) aims to put customers in control of their own data and relationships with companies, and [3] as this happens, the "Intention Economy" will emerge where businesses cater to what customers actually want rather than try to drive customer desires.
Slides that accompanied the opening keynote at the Kynetx Impact conference in Provo, Utah. Note: uses American Typewriter Condensed, not on all machines. If you have formatting problems, use the .pdf version
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
8. 1. Whatever can be digitized will be
digitized.
2. Whatever can be informated will
be informated.
3. Every digital application that can
be used for surveillance and
control will be used for
surveillance and control.
And now we are in the age of The
Big Other.
— or Surveillance Capitalism.
41. Blocking ads and tracking gives individuals
unprecedented leverage in the market.
Notas del editor
This has been Mozilla’s calling from the start — or even before, going back to Mosaic, the first graphical browser, and the one that got the whole revolution started.
This calling is also desperately needed right now, because nearly the whole tech business world is in thrall of making us all super-slaves. Or worse: cattle bred to yield data, with a business model in the middle that is morally and technically repugnant, yet could not be more highly normal, entrenched and rationalized.
To illustrate this, I’ll borrow some images from the excellent video produced by our people in Hamburg, called…
… The Hidden Business of the Internet: <https://www.youtube.com/watch?v=7LcUOEP7Brc>.
Indeed, while the Internet was made for everyone…
… it is being hijacked by big corporations…
… which are turning people into products without their knowledge or consent.
As a result we are fully exposed, even in our own private spaces.
So, what we say here — Don’t let big corporations access your data — is a good sentiment, and an excellent differentiator for Mozilla and Firefox against their competition, and…
… “take back control” is a good message for the same reason: most people haven’t.
We are also up against an extremely entrenched system, that actually obeys some laws. Let’s visit those.
Shoshana Zuboff is a colleague of mine at the Berkman Center, and a Harvard Business School professor of long standing. She began in the 1980s, writing about the situation in which we now find ourselves. Here is what she started saying back when she wrote In The Age of the Smart Machine. Today these are known as Zuboff’s Laws. There are three.
Whatever can be digitized will be digitized. This is what happens when everything has a digital representation, so it can be processed by digital systems.
Whatever can be informated will be informated. This means whatever can be put to use will be put to use. And because what can be done will be done…
Every digital application that can be used for surveillance and control will be used for surveillance and control.
And as a result we now live in an age dominated by what she calls The Big Other, or Surveillance Capitalism. These will be unpacked in her next book, titled Master or Slave? The Fight for the Soul of Our Information Civilization, which will be published first in Germany in 2016. In fact she has been publishing her work first in German, then in English, at Frankfurter Allgemeine Fueilleton (Culture) section. I highly recommend her collection here: <http://www.shoshanazuboff.com/new/recent-publications-and-interviews/>.
To illustrate how The Big Other works to make us slaves, I present…
… a giant poster, produced by IBM and the analyst firm Aberdeen, called “The Big Datastillery.” What we see at the top is a mess of plumbing, nearly all of it pouring data into a giant hopper. The data is gathered from people, usually without their explicit permission, consent or awareness. Below the hopper is more plumbing for “distilling” the data. At the bottom we have this:::
— A conveyor belt of beakers filled by “distilled” marketing goop. Those beakers are human beings: you and me. The spigot on the left is “customer interaction optimization,” which offers no interaction at all. On the right is a “marketing optimization” spigot, with more of the same. To the right of that spigot, a beaker farts gas, which is collected in a funnel and fed back into the top. On the far right is a giant “137%” below which are two numbers from which the big one is derived. These say 6.2 and 2.6 percent, both of which, anybody who works in the business knows, are gross exaggerations, since response rates tend to run at less than 1% online. For Click Through Rates, it’s rhns down to the 100ths or 1000ths of 1%. Regardless of what the right numbers might be, their reciprocal numbers say that the beakers actually reject way more than 90% of what’s fed to them by this system.
So why, twenty years into the Internet we know today, do we still have this crap? The short answer is that the Web was designed that way.
The name for this design is Client-Server, which I am told was chosen because “Slave-Master” didn’t sound very good.
Another name for it might be calf-cow. Because that’s the relationship. We’re the calves that go to sites for the milk of HTML and cookies to follow us around. So how do we get from this norm today —
— to this aspiration for tomorrow, which I shot with my phone at the talk this morning. Calf-cow is not about user choice and control. In fact it’s about the opposite. If we want user choice and control, we’ll need to escape from the calf-cow model.
And we can, because we’ve done it before. Take a look at this slide, and think about open source. Mozilla was born of the open source movement, which was a very deliberate one. So let me give you some history on that.
You might think the term ‘open source’ has been around forever, but it has only been in common use since early 1998. That’s when a collection of geeks — myself among them — decided to make open source a thing. And Mozilla was right in the middle of it.
Before then, what we now call open source code was called “free software.” The term was confusing and didn’t take, because it required explanation: “Free as in freedom, not free as in beer.” We chose “open source” because it would be good for business, and business could understand it. If it took it would need no explanation at all.
So, when Netscape released the source code for what’s now Firefox, they called the source code open. I wrote about it in Linux Journal, above. That piece also contains one of the most remarkable one-liners ever uttered about technology. It came from Marc Andreessen, who said “all technology trends start with technologists.”
We have those. We can start technology trends, and we can start memes.
To show you what I mean about open source being nowhere as a meme before 1998…
… have a look at Google Books, which stops in 2008; but you see what happened.
Geeks did that. It was intentional. The world is talking about open source today because we decided to make that happen. And we did it with no Twitter and no Facebook. There were just websites and blogs and publishers we could spin.
And that wasn’t the only meme I worked on. Here’s another…
The Cluetrain Manifesto was a rant on the Web that became a book, by four guys. I was one of them. The term “cluetrain” didn’t exist before 1999. Now it’s in more than ten thousand books and mentioned on Twitter many times every day. Look it up.
We named the meme Cluetrain after an old Silicon Valley epitaph: “The clue train stopped there four times a day for ten years and they never took delivery.” We called it a Manifesto because that worked for Marx, and we came up with 95 Theses because that worked for Luther.
The most quoted thesis is the first one: “Markets are conversations.” That was mine. When you hear marketers or politicians talking about “joining the conversation,” that started with Cluetrain, and I was the guy who launched the meme. It’s also a chapter in the book. But the clue that mattered most came above all the theses. This is it:::
“We are not seats or eyeballs or end users or consumers. We are human beings and our reach exceeds your grasp. Deal with it.” Chris Locke, one of the other three authors, came up with that one. It’s what energized the four of us and got us to put the Manifesto up on the Web.
What we were doing there was speaking as ordinary human beings, about what the Internet does for all of us: make us more powerful than any entity trying to control us. Especially in business.
But there was one problem with that statement: it wasn’t true. Our reach did not exceed their grasp, or we wouldn’t be beakers on a conveyor belt being filled with marketing goop. And we wouldn’t be calves to the cows of websites filling our browsers with tracking cookies and plugging us into a system of surveillance capitalism. So this is still a problem, and it might be worse than ever.
But we do have a chance to fix it, this next year. It might be our only chance. So let me tell you a bit more about how we’re going about making our reach exceed the grasp of those who want our data without our permission.
Cluetrain the website went up in Spring of ‘99. The book came out in January 2000, and was an immediate business bestseller. It still sells well, in nine languages.
In 2006, however, when I got a Berkman Center fellowship at Harvard University, I felt I needed to do something about the fact that the primary claim of Cluetrain wasn’t yet true: our reach did not exceed marketers’ grasp.
So I started ProjectVRM. The term VRM stands for Vendor Relationship Management. It’s the customer-side counterpart of Customer Relationship Management, the $50 billion business that gives us call centers and junk mail and has companies thinking they know how to relate to us when they don’t. They make the sound of one hand slapping, rather than one hand shaking another. I wanted to give customers a hand business could shake. And, since I had already been an editor of Linux Journal for ten years, covering countless new software developers, I knew how to evangelize an idea that developers could adopt. So I made ProjectVRM an evangelical one.
The idea behind VRM is to give customers tools and services that equip them with two things that help their reach exceed anybody’s grasp. One is Independence; the other os means for engagement. The end state we aim for is one we heard about on the stage this morning:::
The “Internet of Me.” You won’t get that without giving people both independence and means of engagement.
There are now many dozens of VRM developers around the world, working on VRM tools and services. Mozilla is one of them.
As we know, Mozilla has ambitions. Specifically, to unleash a wave of openness, empowerment, safety and independence. To help get there this year Mozilla hired The Searls Group — my consultancy — to help the Internet of Me happen. Naturally, to do that, we need —
Tools. This is another image I grabbed off one of the talks on screen this morning. What kind of tools?
We need tools for signaling, both ways, between demand and supply.
To achieve this ambition — illustrated by another slide from this morning — you need to give the individual powers she doesn’t have right now. (By the way, I’d rather not use the term “consumer,” because in the networked world we produce as well as consume)
Without those powers, people are still beakers. Calves. Slaves.
What do we need tools for? Let’s start here…
Data. Here’s another slide from this morning: “I am in control of my own data.”
How do we do that? Where does that data live, for example?
Many VRM developers are working on what we call personal clouds, or PIMS, for Personal Information Management Systems.
This slide comes from Phil Windley, a Ph.D. computer scientist who described different approaches to personal power in a book called The Live Web. On the lower right is personal clouds, a term that first appeared in 2014. It was one of many, but I like what this chart shows, which is decentralization. Clouds need to be personal and not just corporate. They need to be independent, but also support engagement. One example of how this will work is —
— “intentcast” to the whole market. For example, you can say you need a stroller for twins at the Epcot Center in the next two hours, and not have to go through any centralized system such as Amazon or eBay, though your signal might go to both. You drive. You do the advertising, while staying anonymous until you’re ready to do business. You are also in charge this way:::
“I live my online life on my terms.” Again from this morning.
What are those terms? Can you name one? Every day we “agree” to terms that are onerous, one-sided, and give us no choice if we want to suckle on the cow that requires them. This is NOT living our online lives on our own terms.
So here’s how we’re dealing with that in the VRM development community: We are writing terms we assert when we deal with companies.
These are sample terms that Customer Commons, a nonprofit spun off of ProjectVRM, is working on with the Cyberlaw Clinic at Harvard and other groups. What this says, for example, is that I’m only sharing data with the second party — the site — which can keep it as long as they want, but just for site use, as long as they respect my Do Not Track request.
Why would any site obey this? A few years ago — even a few months ago — this wasn’t even thinkable. Because we had no clout as individuals. No power. We were calves.
But not anymore. The reason comes down to two pairs of words: Ad blocking and Tracking protection. More of us every day are blocking ads and tracking. We do thatbecause want to drive our own browsers in our own ways and on our own terms.
Let me give you some background on how we got here.
This is a Google Trends record of searches for five terms used by the online advertising business, better known as adtech. As you see, none of these were in use before 2007.
Here are four more that showed up in 2010 and later. Now let me add one more term to these four: retargeting.
Here is how the same chart looks with retargeting added. Note that retargeting appeared in 2007 and only went up.
Retargeting is how this happened…
An Onoin story about retargeting.
Now look at this chart…
Searches for “how to block ads” rose along with with searches for “retargeting,” eventually outpacing the latter.
Correlation is not causation, but there is a lot of correlation here. The big issue s tracking. You can see that confirmed in this next chart:::
Note that searches for “ad blocker” go back as far as Google Trends goes, to 2005. Note also how it “do not track” appears in 2007 and then starts to take off in 2011, peaks in 2012 and falls off after that, while searches for ”ad blocker” hockey-stick. Let’s look a bit closer to the rest of what’s going on here.
Adblock was invented in Denmark by Henrik Aasted Sørensen, as what he called “a procrastination” project at his university. Adblock Plus came along in 2006. But interest stayed flat while interest grew around Do Not track, which was invented by these three guys: Sid Stamm, then of Mozilla/Firefox, and cyber security gurus Dan Kaminsky and Chris Saghoian. Chris was then at the Berkman Center. It got support as well, in various ways, from Apple in Safari, Microsoft in Internet Explorer and eventually even Google in Chrome. But in 2012 and 2013 the online advertising and publishing industries gave it the middle finger, and made life hell for Mozilla. Then here’s the key thing: after Do Not Track failed, and advertising and publishing failed to obey the obvious wlll of the people, those same people took matters into their own hands, and started blocking ads in droves. That’s why searches for “ad blocker” hockey-stick upward when it became clear that Do Not Track was a failure. And that’s why ad and tracking blockers are listed among our VRM developers. They provide independence.
This is from a PageFair/Adobe study published last August, and current through last June. This shows the same hockey-stick of interest and usage in 2012 and 2013, reaching …
200 million-plus people blocking ads. This is the largest boycott in human history. Not surprisingly, we now also have…
A war going on. Note how “adblock war” takes off as a search term in 2012, and grows in 2013. Here at Mozilla we have taken sides in that war, allying with those 200 million people — a population that is growing rapidly. We are also marketing our stance on tracking.
Here’s what we’re advertising in New York with large billboards right now.
Note how well that expresses exactly what we said in the Cluetrain Manifesto in 1999.
And yet, for all our good work, it’s still not true. This is why we need to do more than fight business as usual. We need to help business move past what clearly isn’t working for them. Because the fact is that tracking us in many ways is one big fail today, and ad blocking proves it. So does every privacy study you can lay your hands on. The whole market is rejecting it. So, while —
— Blocking ads and tracking gives individuals unprecedented leverage in the market. It also sets up Mozilla to do something positive for business, by equipping individuals not just to block ads, but to engage in better ways than ever before: to actually make this happen…
Put the individual in full charge of her online life.
This is a Mozilla aspiration, again borrowed from a slide show we saw this morning.
But it can’t happen if we’re busy fighting on one side of the adblock war against the very companies we need to have the woman in this image connect with.
On the other hand, if you look at what surrounds that woman as the Internet of Her Things, there are enormous opportunities to improve relationships with the companies that make and service those things.
Open source code for doing it already exists. Mozilla is the only browser maker in position to normalize those. Apple, Google, Facebook and Microsoft all want her in their silos.
So: here is our mission, copied out of one of our cool new t-shirts.
I’m here to tell you we can’t make this happen unless what’s good for each of us is also good for business.
Ad and tracking blocking are a clear signal to business of what’s wrong. Now we need to signal what can be right, by making tools for engagement and not just for independence.
Today the silo-makers — Google, Facebook, Microsoft, Apple, and the rest — have their own separate and controlling ways for each of us to deal with each of them. Only Mozilla is in a position to come up with tools for engagement that not only start with the individual, and give her unprecedented abilities to help business by helping herself. And our tools will be open and standard, so others can adopt them as well.
We have a real chance to lead here: to give individuals superpowers. It helps that there are hundreds of others already working on some of the pieces we need. But it will help a lot more if Mozilla is in the front of the parade.
I’ve laid out the future here — in The Intention Economy. It was published by Harvard Business Review Press in May 2012. What it describes are superpowers for individuals in the marketplace, and how that’s good both for people and business.
I would hardly change a thing in it today, except for the pioneering companies I use as examples. Because most of them, as tends to happen with pioneers, are gone. We need a new leader here: one that has millions of users already and wants to change the world for the better. Mozilla is it. Nobody else is in position to do the job, because only Mozilla works for each of us, and not for some company.
We’ve already let almost four years go by. Let’s make it happen now, before it’s too late for Mozilla, and for the world.
Thanks.