Reporting on the Data Privacy Hackathon

In case you missed the Data Privacy Hackathon, held this past weekend in London, New York and San Francisco, there should be a good mother lode of posts, tweets and videos up now, or soon. Here is a small starter-pile of links from the New York one: The hackathon page. #privacyhack on Twitter Videos of [Read More →]

VRM videos

Here is a collection of videos about VRM and related subjects, in roughly reverse chronological order. First, a series of well-edited excerpts from Disrupting Retail 2013, which was hosted by First Retail in New York City. Here’s an outline: What is Disrupting Retail? Amazon’s Product Recommender Systems Big Data Enabled Intention Management and the Customer Experience [Read More →]

Can C2B customers lead in a dance with vendors like B2B customers do?

That question came to mind when I read Inside Facebook’s Fantastic Plan To Dominate Cisco’s $23 Billion Market, by Julie Bort, in Business Insider. The gist: To recap: OCP launched two years ago to create “open source” data center hardware. That means hardware vendors like HP, Dell and Cisco don’t control the product designs. Instead, customers like Facebook and [Read More →]

Prepping for #VRM Day and #IIW

The 16th IIW (Internet Identity Workshop) is coming up, Tuesday to Thursday, 7-9 May, will be tat the Computer History Museum in Mountain View, CA. As usual, VRM will be a main topic, with lots of developers and other interested folk participating. Also as usual, we will have a VRM planning day on the Monday preceding: 6 May, [Read More →]

VRM development work

I’ll be having a brown bag lunch today with a group of developers, talking about VRM and personal clouds, among other stuff that’s sure to come up. To make that easier, I’ve copied and pasted the current list from the VRM developers page of the ProjectVRM wiki. If you’d like to improve it in any [Read More →]

IIW XV

The XVth IIW is coming up on October 23-25 at the Computer History Museum in Mountain View, and VRM will be, as usual, a big topic — or collection of topics — there. IIW stands for Internet Identity Workshop, but the topical range is much wider than identity alone. Front and center for the last [Read More →]

Let’s turn Do Not Track into a dialog

Do Not Track (DNT), by resembling Do Not Call in name, sounds like a form of prophylaxis.  It isn’t. Instead it’s a request by an individual with a browser not to be tracked by a website or its third parties. As a request, DNT also presents an interesting opportunity for dialogue between user and site, [Read More →]

VRM at IIW

VRM was a hot topic at IIW last week, with at least one VRM or VRM-related breakout per session — and that was on top of the VRM workshop held at Ericsson on Monday, April 30, the day before IIW started. (Thanks to Nitin Shah and the Ericsson folks for making the time and space available, [Read More →]

Your actual wallet vs./+ Google’s and Apple’s

Now comes news that Apple has been granted a patent for the iWallet. Here’s one image among many at that last link: Note the use of the term “rules.” Keep that word in mind. It is a Good Word. Now look at this diagram from Phil Windley‘s Event Channels post: Another term for personal event [Read More →]

How about using the ‘No Track’ button we already have?

For as long as we’ve had economies, demand and supply have been attracted to each other like a pair of magnets. Ideally, they should match up evenly and produce good outcomes. But sometimes one side comes to dominate the other, with bad effects along with good ones. Such has been the case on the Web [Read More →]