The document discusses giving users new tools and "superpowers" to protect their independence and privacy online in the age of widespread digital surveillance and data collection. It introduces the concepts of VRM, which provides customers tools for independence and engagement, and "intentcasting" which allows users to broadcast wants and needs to the market in a way they control. It also notes that blocking ads and tracking online can give individuals significant leverage over companies by allowing for the potential of the largest boycotts in history.
'Internet of Things' is on its way to become 'Internet of Everything'
This Internet of Things (IoT) infograph from eInfochips will inform you about the growth, future opportunities and the technological involvement in this segment.
7 reasons why mobile is the future of digital IDJuana Catalina
Mobile is becoming the major platform for Digital ID. In this ppt, we explain why.
https://blog.gemalto.com/mobile/2018/06/07/7-reasons-why-mobile-is-the-future-of-digital-id/
The IoT i.e. Internet of Things connects those objects that are capable to store, manage, and transmit various amounts of data. Know more about the elements involved in IoT with the help of this PPT.
'Internet of Things' is on its way to become 'Internet of Everything'
This Internet of Things (IoT) infograph from eInfochips will inform you about the growth, future opportunities and the technological involvement in this segment.
7 reasons why mobile is the future of digital IDJuana Catalina
Mobile is becoming the major platform for Digital ID. In this ppt, we explain why.
https://blog.gemalto.com/mobile/2018/06/07/7-reasons-why-mobile-is-the-future-of-digital-id/
The IoT i.e. Internet of Things connects those objects that are capable to store, manage, and transmit various amounts of data. Know more about the elements involved in IoT with the help of this PPT.
7 disruptive technology to watch | Best SEO agency in USA | Best crm develope...Searchable Design
As we continue imbibing new technology, we may as well take advantage of the disruptive technology trends available to us today to make our lives better.
With the advancement in the Technology and technology providing new jobs, there is a definite shift in the jobs.
This presentation takes us from the Industry 1.0 to Industry 4.0 and also throws light on the skills shift as pointed by World Economic Forum (WEF).
DISRUPTION IN ‘BUSINESS DIGITIZATION’ & FUTURE JOB PROSPECTS IN DIGITAL WORL...CovidliveInfo
The presentation covers
- How businesses will become more digital?
- What kind of changes will happen in the jobs?
- What will be in demand for the next foreseeable future?
- What should be the focus of students as a career?
- What changes do they have to make to their skillset & mindset?
Video Link of Mark Zukerberg on Jio - https://www.youtube.com/watch?v=IRNisHCM1Uc
Top 4 Digital Transformation Trends In 2018DivyaConsagous
Digital transformations leverage the power of developing technologies to boost the customer or user experience and meet the operational goals. Here is the scoop of top 4 digital transformation trends in 2018 that are radars right now.
We've collected 26 of the hot topics that were discussed during our "Digital Futures" event programme this year. Each of these innovations are helping digital marketers get closer to the customers.
For more information about these events and to see our 2016 programme, visit http://www.equimedia.co.uk/about-us/digital-futures-events
The Internet of Things (IoT) has been presented as the next big wave with the potential to change the way we interact with technology in our day-to-day.
The real potential of the IoT resides in the ability to expose data from connected smart devices that can interact with other sources of information and generate predictive interactions with individuals and organizations.
The purpose of this presentation is to set the basics around IoT and explore the main application areas where IoT really matters, highlighting what is already on the shelf and what is still only hype.
Topics covered:
- Connected Home
- Transportation
- Health, Fitness and Quantified Self
- Industrial and Smart cities
- Open Platforms & APIs
Robin Wauters, Co-founder, Tech.eu - Tech trends in 2014 (and small European ...How to Web
Technological innovation is happening at a rapid - and consistently accelerating - pace, and it's happening all over the globe. In this session, we're going to explore what the key trends in technology will be in the near future, and which European companies are ahead of the curve in their field and best positioned to take advantage of the shifts we can identify.
More details on: http://2013.howtoweb.co/
7 disruptive technology to watch | Best SEO agency in USA | Best crm develope...Searchable Design
As we continue imbibing new technology, we may as well take advantage of the disruptive technology trends available to us today to make our lives better.
With the advancement in the Technology and technology providing new jobs, there is a definite shift in the jobs.
This presentation takes us from the Industry 1.0 to Industry 4.0 and also throws light on the skills shift as pointed by World Economic Forum (WEF).
DISRUPTION IN ‘BUSINESS DIGITIZATION’ & FUTURE JOB PROSPECTS IN DIGITAL WORL...CovidliveInfo
The presentation covers
- How businesses will become more digital?
- What kind of changes will happen in the jobs?
- What will be in demand for the next foreseeable future?
- What should be the focus of students as a career?
- What changes do they have to make to their skillset & mindset?
Video Link of Mark Zukerberg on Jio - https://www.youtube.com/watch?v=IRNisHCM1Uc
Top 4 Digital Transformation Trends In 2018DivyaConsagous
Digital transformations leverage the power of developing technologies to boost the customer or user experience and meet the operational goals. Here is the scoop of top 4 digital transformation trends in 2018 that are radars right now.
We've collected 26 of the hot topics that were discussed during our "Digital Futures" event programme this year. Each of these innovations are helping digital marketers get closer to the customers.
For more information about these events and to see our 2016 programme, visit http://www.equimedia.co.uk/about-us/digital-futures-events
The Internet of Things (IoT) has been presented as the next big wave with the potential to change the way we interact with technology in our day-to-day.
The real potential of the IoT resides in the ability to expose data from connected smart devices that can interact with other sources of information and generate predictive interactions with individuals and organizations.
The purpose of this presentation is to set the basics around IoT and explore the main application areas where IoT really matters, highlighting what is already on the shelf and what is still only hype.
Topics covered:
- Connected Home
- Transportation
- Health, Fitness and Quantified Self
- Industrial and Smart cities
- Open Platforms & APIs
Robin Wauters, Co-founder, Tech.eu - Tech trends in 2014 (and small European ...How to Web
Technological innovation is happening at a rapid - and consistently accelerating - pace, and it's happening all over the globe. In this session, we're going to explore what the key trends in technology will be in the near future, and which European companies are ahead of the curve in their field and best positioned to take advantage of the shifts we can identify.
More details on: http://2013.howtoweb.co/
Introduction to ENT (Entity Network Translation)ENT Technologies
Want to eliminate hacks of critical infrastructure, vehicles and military systems? Do you think patients should exclusively own and control access to their medical records? Want to eliminate counterfeiting on digital and physical goods? Want to be able to exclusively own, sell, transfer, buy or lease your data and digital assets like physical property?
ENT makes all these things possible - TODAY.
ENT (Entity Network Translation) is a fully decentralized, next-generation trust infrastructure that replaces passwords, PKI, blockchain, and centralized data stores. ENT is a radical innovation in core enabling trust technology & networked systems.
+ Trusted micro-networking between entities of any kind: humans, devices, data and files, software processes, physical objects, concepts like corporations and currencies, and groups of any/all of these;
+ Exponentially increases security and privacy because entities are individually protected and connected directly without any middleman or central management;
+ Built on a patent-pending fundamental advancement in asymmetric key models called Relational Key Infrastructure (RKI) that eliminates central authorities and key management - the first key infrastructure innovation in 30 years;
+ Fully decentralized and owner-driven;
+ Useful for any purpose: Internet of Things, government, healthcare, finance, manufacturing, retail, etc;
+ Useful in any environment: scales from embedded components up to complex global systems;
+ Open standard for transparent governance, high usability across industries and wide adoption.
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)Gerd Leonhard
This is an edited version of a presentation I gave at ITUWorld 2013 in Bangkok, Nov 21, 2013, see more details at http://www.futuristgerd.com/2013/11/21/here-is-the-pdf-with-my-slides-from-the-ituworld-event-in-bkk-today/ Topics: US domination of the Internet and cloud computing, big data futures, privacy failure and the global digital rights bill, the importance of trust, key issues for cloud computing, and much more. Check www.gerdtube.com for a video version (should be available soon)
If you enjoy my slideshares please take a look at my new book “Technology vs Humanity” http://www.techvshuman.com or buy it via Amazon http://gerd.fm/globalTVHamazon
More at http://www.futuristgerd.com or www.gerdleonhard.de
Download all of my videos and PDFs at http://www.gerdcloud.net
About my new book: are you ready for the greatest changes in recent human history? Futurism meets humanism in Gerd Leonhard’s ground-breaking new work of critical observation, discussing the multiple Megashifts that will radically alter not just our society and economy but our values and our biology. Wherever you stand on the scale between technomania and nostalgia for a lost world, this is a book to challenge, provoke, warn and inspire.
My presentation in eHealth Data Forum in Athens/Greece (9/12/2019) introducing the data flows within the health domain under the MyData architecture. This presentation understands MyData as a fair ecosystem, product of the current techno-economic paradigm shift
The digital revolution refers to the rapid and profound transformation of society, economy, and culture brought about by the widespread adoption and integration of digital technologies. This revolution encompasses the shift from analog, mechanical, and manual processes to digital, automated, and computerized systems.
Future of privacy - An initial perspective - Stephen Deadman, VodafoneFuture Agenda
An initial perspective on the future of privacy by Stephen Deadman, Group Privacy Officer at Vodafone. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Livingstone Advisory
The rate of business and societal change fuelled by innovative, emerging and disruptive information technologies is well known, with impacts being felt in almost every facet of life. The forces driving the evolution and adoption of such technologies are complex, diverse and not always well understood. How can organisations predict the consequences of future tech? How should they fortify against the chaos of change while taking advantage of innovation?
This public lecture provides a concise perspective on the implications of emerging technologies and offers practical insights on how many enterprises and individuals survive, and also thrive, in a world of rapid technology-induced change.
Ericsson ConsumerLab: Personal Information EconomyEricsson
In today’s society, companies and organizations have unprecedented possibilities to collect and use people’s personal information. Using this information in the right way enables new revenue streams and increased profit.
But do consumers understand and perceive the value of their personal information? What are the sensitivity involved with an increased use of personal information by enterprises, governments and consumers? The purpose of the Personal Information Economy report by ConsumerLab has been to describe consumers’ understanding, needs, behaviors and attitudes with respect to personal information as an asset.
For more research from the Ericsson ConsumerLab visit: http://www.ericsson.com/thinkingahead/consumerlab
Slides for a talk I gave for Zuora at Subscribed 2012 in London. Topics are the subscription economy, VRM, customer commons, and business problems that can only be solved from the customer's side—subsription hell especially.
A slide deck to guide discussion of McLuhan and identity at the XXIVth Internet Identity Workshop. It led into a follow-on session for the Digital Life Collective, which was focused on "the Web we want."
A talk given at SugarCRM's SugarCon conference in 2011. It was way ahead of oits t (this won't let me go back and correct what's alredy typed, so I'll stop here).
Slides that accompanied the opening keynote at the Kynetx Impact conference in Provo, Utah. Note: uses American Typewriter Condensed, not on all machines. If you have formatting problems, use the .pdf version
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
8. 1. Whatever can be digitized will be
digitized.
2. Whatever can be informated will
be informated.
3. Every digital application that can
be used for surveillance and
control will be used for
surveillance and control.
And now we are in the age of The
Big Other.
— or Surveillance Capitalism.
41. Blocking ads and tracking gives individuals
unprecedented leverage in the market.
Editor's Notes
This has been Mozilla’s calling from the start — or even before, going back to Mosaic, the first graphical browser, and the one that got the whole revolution started.
This calling is also desperately needed right now, because nearly the whole tech business world is in thrall of making us all super-slaves. Or worse: cattle bred to yield data, with a business model in the middle that is morally and technically repugnant, yet could not be more highly normal, entrenched and rationalized.
To illustrate this, I’ll borrow some images from the excellent video produced by our people in Hamburg, called…
… The Hidden Business of the Internet: <https://www.youtube.com/watch?v=7LcUOEP7Brc>.
Indeed, while the Internet was made for everyone…
… it is being hijacked by big corporations…
… which are turning people into products without their knowledge or consent.
As a result we are fully exposed, even in our own private spaces.
So, what we say here — Don’t let big corporations access your data — is a good sentiment, and an excellent differentiator for Mozilla and Firefox against their competition, and…
… “take back control” is a good message for the same reason: most people haven’t.
We are also up against an extremely entrenched system, that actually obeys some laws. Let’s visit those.
Shoshana Zuboff is a colleague of mine at the Berkman Center, and a Harvard Business School professor of long standing. She began in the 1980s, writing about the situation in which we now find ourselves. Here is what she started saying back when she wrote In The Age of the Smart Machine. Today these are known as Zuboff’s Laws. There are three.
Whatever can be digitized will be digitized. This is what happens when everything has a digital representation, so it can be processed by digital systems.
Whatever can be informated will be informated. This means whatever can be put to use will be put to use. And because what can be done will be done…
Every digital application that can be used for surveillance and control will be used for surveillance and control.
And as a result we now live in an age dominated by what she calls The Big Other, or Surveillance Capitalism. These will be unpacked in her next book, titled Master or Slave? The Fight for the Soul of Our Information Civilization, which will be published first in Germany in 2016. In fact she has been publishing her work first in German, then in English, at Frankfurter Allgemeine Fueilleton (Culture) section. I highly recommend her collection here: <http://www.shoshanazuboff.com/new/recent-publications-and-interviews/>.
To illustrate how The Big Other works to make us slaves, I present…
… a giant poster, produced by IBM and the analyst firm Aberdeen, called “The Big Datastillery.” What we see at the top is a mess of plumbing, nearly all of it pouring data into a giant hopper. The data is gathered from people, usually without their explicit permission, consent or awareness. Below the hopper is more plumbing for “distilling” the data. At the bottom we have this:::
— A conveyor belt of beakers filled by “distilled” marketing goop. Those beakers are human beings: you and me. The spigot on the left is “customer interaction optimization,” which offers no interaction at all. On the right is a “marketing optimization” spigot, with more of the same. To the right of that spigot, a beaker farts gas, which is collected in a funnel and fed back into the top. On the far right is a giant “137%” below which are two numbers from which the big one is derived. These say 6.2 and 2.6 percent, both of which, anybody who works in the business knows, are gross exaggerations, since response rates tend to run at less than 1% online. For Click Through Rates, it’s rhns down to the 100ths or 1000ths of 1%. Regardless of what the right numbers might be, their reciprocal numbers say that the beakers actually reject way more than 90% of what’s fed to them by this system.
So why, twenty years into the Internet we know today, do we still have this crap? The short answer is that the Web was designed that way.
The name for this design is Client-Server, which I am told was chosen because “Slave-Master” didn’t sound very good.
Another name for it might be calf-cow. Because that’s the relationship. We’re the calves that go to sites for the milk of HTML and cookies to follow us around. So how do we get from this norm today —
— to this aspiration for tomorrow, which I shot with my phone at the talk this morning. Calf-cow is not about user choice and control. In fact it’s about the opposite. If we want user choice and control, we’ll need to escape from the calf-cow model.
And we can, because we’ve done it before. Take a look at this slide, and think about open source. Mozilla was born of the open source movement, which was a very deliberate one. So let me give you some history on that.
You might think the term ‘open source’ has been around forever, but it has only been in common use since early 1998. That’s when a collection of geeks — myself among them — decided to make open source a thing. And Mozilla was right in the middle of it.
Before then, what we now call open source code was called “free software.” The term was confusing and didn’t take, because it required explanation: “Free as in freedom, not free as in beer.” We chose “open source” because it would be good for business, and business could understand it. If it took it would need no explanation at all.
So, when Netscape released the source code for what’s now Firefox, they called the source code open. I wrote about it in Linux Journal, above. That piece also contains one of the most remarkable one-liners ever uttered about technology. It came from Marc Andreessen, who said “all technology trends start with technologists.”
We have those. We can start technology trends, and we can start memes.
To show you what I mean about open source being nowhere as a meme before 1998…
… have a look at Google Books, which stops in 2008; but you see what happened.
Geeks did that. It was intentional. The world is talking about open source today because we decided to make that happen. And we did it with no Twitter and no Facebook. There were just websites and blogs and publishers we could spin.
And that wasn’t the only meme I worked on. Here’s another…
The Cluetrain Manifesto was a rant on the Web that became a book, by four guys. I was one of them. The term “cluetrain” didn’t exist before 1999. Now it’s in more than ten thousand books and mentioned on Twitter many times every day. Look it up.
We named the meme Cluetrain after an old Silicon Valley epitaph: “The clue train stopped there four times a day for ten years and they never took delivery.” We called it a Manifesto because that worked for Marx, and we came up with 95 Theses because that worked for Luther.
The most quoted thesis is the first one: “Markets are conversations.” That was mine. When you hear marketers or politicians talking about “joining the conversation,” that started with Cluetrain, and I was the guy who launched the meme. It’s also a chapter in the book. But the clue that mattered most came above all the theses. This is it:::
“We are not seats or eyeballs or end users or consumers. We are human beings and our reach exceeds your grasp. Deal with it.” Chris Locke, one of the other three authors, came up with that one. It’s what energized the four of us and got us to put the Manifesto up on the Web.
What we were doing there was speaking as ordinary human beings, about what the Internet does for all of us: make us more powerful than any entity trying to control us. Especially in business.
But there was one problem with that statement: it wasn’t true. Our reach did not exceed their grasp, or we wouldn’t be beakers on a conveyor belt being filled with marketing goop. And we wouldn’t be calves to the cows of websites filling our browsers with tracking cookies and plugging us into a system of surveillance capitalism. So this is still a problem, and it might be worse than ever.
But we do have a chance to fix it, this next year. It might be our only chance. So let me tell you a bit more about how we’re going about making our reach exceed the grasp of those who want our data without our permission.
Cluetrain the website went up in Spring of ‘99. The book came out in January 2000, and was an immediate business bestseller. It still sells well, in nine languages.
In 2006, however, when I got a Berkman Center fellowship at Harvard University, I felt I needed to do something about the fact that the primary claim of Cluetrain wasn’t yet true: our reach did not exceed marketers’ grasp.
So I started ProjectVRM. The term VRM stands for Vendor Relationship Management. It’s the customer-side counterpart of Customer Relationship Management, the $50 billion business that gives us call centers and junk mail and has companies thinking they know how to relate to us when they don’t. They make the sound of one hand slapping, rather than one hand shaking another. I wanted to give customers a hand business could shake. And, since I had already been an editor of Linux Journal for ten years, covering countless new software developers, I knew how to evangelize an idea that developers could adopt. So I made ProjectVRM an evangelical one.
The idea behind VRM is to give customers tools and services that equip them with two things that help their reach exceed anybody’s grasp. One is Independence; the other os means for engagement. The end state we aim for is one we heard about on the stage this morning:::
The “Internet of Me.” You won’t get that without giving people both independence and means of engagement.
There are now many dozens of VRM developers around the world, working on VRM tools and services. Mozilla is one of them.
As we know, Mozilla has ambitions. Specifically, to unleash a wave of openness, empowerment, safety and independence. To help get there this year Mozilla hired The Searls Group — my consultancy — to help the Internet of Me happen. Naturally, to do that, we need —
Tools. This is another image I grabbed off one of the talks on screen this morning. What kind of tools?
We need tools for signaling, both ways, between demand and supply.
To achieve this ambition — illustrated by another slide from this morning — you need to give the individual powers she doesn’t have right now. (By the way, I’d rather not use the term “consumer,” because in the networked world we produce as well as consume)
Without those powers, people are still beakers. Calves. Slaves.
What do we need tools for? Let’s start here…
Data. Here’s another slide from this morning: “I am in control of my own data.”
How do we do that? Where does that data live, for example?
Many VRM developers are working on what we call personal clouds, or PIMS, for Personal Information Management Systems.
This slide comes from Phil Windley, a Ph.D. computer scientist who described different approaches to personal power in a book called The Live Web. On the lower right is personal clouds, a term that first appeared in 2014. It was one of many, but I like what this chart shows, which is decentralization. Clouds need to be personal and not just corporate. They need to be independent, but also support engagement. One example of how this will work is —
— “intentcast” to the whole market. For example, you can say you need a stroller for twins at the Epcot Center in the next two hours, and not have to go through any centralized system such as Amazon or eBay, though your signal might go to both. You drive. You do the advertising, while staying anonymous until you’re ready to do business. You are also in charge this way:::
“I live my online life on my terms.” Again from this morning.
What are those terms? Can you name one? Every day we “agree” to terms that are onerous, one-sided, and give us no choice if we want to suckle on the cow that requires them. This is NOT living our online lives on our own terms.
So here’s how we’re dealing with that in the VRM development community: We are writing terms we assert when we deal with companies.
These are sample terms that Customer Commons, a nonprofit spun off of ProjectVRM, is working on with the Cyberlaw Clinic at Harvard and other groups. What this says, for example, is that I’m only sharing data with the second party — the site — which can keep it as long as they want, but just for site use, as long as they respect my Do Not Track request.
Why would any site obey this? A few years ago — even a few months ago — this wasn’t even thinkable. Because we had no clout as individuals. No power. We were calves.
But not anymore. The reason comes down to two pairs of words: Ad blocking and Tracking protection. More of us every day are blocking ads and tracking. We do thatbecause want to drive our own browsers in our own ways and on our own terms.
Let me give you some background on how we got here.
This is a Google Trends record of searches for five terms used by the online advertising business, better known as adtech. As you see, none of these were in use before 2007.
Here are four more that showed up in 2010 and later. Now let me add one more term to these four: retargeting.
Here is how the same chart looks with retargeting added. Note that retargeting appeared in 2007 and only went up.
Retargeting is how this happened…
An Onoin story about retargeting.
Now look at this chart…
Searches for “how to block ads” rose along with with searches for “retargeting,” eventually outpacing the latter.
Correlation is not causation, but there is a lot of correlation here. The big issue s tracking. You can see that confirmed in this next chart:::
Note that searches for “ad blocker” go back as far as Google Trends goes, to 2005. Note also how it “do not track” appears in 2007 and then starts to take off in 2011, peaks in 2012 and falls off after that, while searches for ”ad blocker” hockey-stick. Let’s look a bit closer to the rest of what’s going on here.
Adblock was invented in Denmark by Henrik Aasted Sørensen, as what he called “a procrastination” project at his university. Adblock Plus came along in 2006. But interest stayed flat while interest grew around Do Not track, which was invented by these three guys: Sid Stamm, then of Mozilla/Firefox, and cyber security gurus Dan Kaminsky and Chris Saghoian. Chris was then at the Berkman Center. It got support as well, in various ways, from Apple in Safari, Microsoft in Internet Explorer and eventually even Google in Chrome. But in 2012 and 2013 the online advertising and publishing industries gave it the middle finger, and made life hell for Mozilla. Then here’s the key thing: after Do Not Track failed, and advertising and publishing failed to obey the obvious wlll of the people, those same people took matters into their own hands, and started blocking ads in droves. That’s why searches for “ad blocker” hockey-stick upward when it became clear that Do Not Track was a failure. And that’s why ad and tracking blockers are listed among our VRM developers. They provide independence.
This is from a PageFair/Adobe study published last August, and current through last June. This shows the same hockey-stick of interest and usage in 2012 and 2013, reaching …
200 million-plus people blocking ads. This is the largest boycott in human history. Not surprisingly, we now also have…
A war going on. Note how “adblock war” takes off as a search term in 2012, and grows in 2013. Here at Mozilla we have taken sides in that war, allying with those 200 million people — a population that is growing rapidly. We are also marketing our stance on tracking.
Here’s what we’re advertising in New York with large billboards right now.
Note how well that expresses exactly what we said in the Cluetrain Manifesto in 1999.
And yet, for all our good work, it’s still not true. This is why we need to do more than fight business as usual. We need to help business move past what clearly isn’t working for them. Because the fact is that tracking us in many ways is one big fail today, and ad blocking proves it. So does every privacy study you can lay your hands on. The whole market is rejecting it. So, while —
— Blocking ads and tracking gives individuals unprecedented leverage in the market. It also sets up Mozilla to do something positive for business, by equipping individuals not just to block ads, but to engage in better ways than ever before: to actually make this happen…
Put the individual in full charge of her online life.
This is a Mozilla aspiration, again borrowed from a slide show we saw this morning.
But it can’t happen if we’re busy fighting on one side of the adblock war against the very companies we need to have the woman in this image connect with.
On the other hand, if you look at what surrounds that woman as the Internet of Her Things, there are enormous opportunities to improve relationships with the companies that make and service those things.
Open source code for doing it already exists. Mozilla is the only browser maker in position to normalize those. Apple, Google, Facebook and Microsoft all want her in their silos.
So: here is our mission, copied out of one of our cool new t-shirts.
I’m here to tell you we can’t make this happen unless what’s good for each of us is also good for business.
Ad and tracking blocking are a clear signal to business of what’s wrong. Now we need to signal what can be right, by making tools for engagement and not just for independence.
Today the silo-makers — Google, Facebook, Microsoft, Apple, and the rest — have their own separate and controlling ways for each of us to deal with each of them. Only Mozilla is in a position to come up with tools for engagement that not only start with the individual, and give her unprecedented abilities to help business by helping herself. And our tools will be open and standard, so others can adopt them as well.
We have a real chance to lead here: to give individuals superpowers. It helps that there are hundreds of others already working on some of the pieces we need. But it will help a lot more if Mozilla is in the front of the parade.
I’ve laid out the future here — in The Intention Economy. It was published by Harvard Business Review Press in May 2012. What it describes are superpowers for individuals in the marketplace, and how that’s good both for people and business.
I would hardly change a thing in it today, except for the pioneering companies I use as examples. Because most of them, as tends to happen with pioneers, are gone. We need a new leader here: one that has millions of users already and wants to change the world for the better. Mozilla is it. Nobody else is in position to do the job, because only Mozilla works for each of us, and not for some company.
We’ve already let almost four years go by. Let’s make it happen now, before it’s too late for Mozilla, and for the world.
Thanks.