Dr. Alan Borning (University of Washington Computer Science professor emeritus), presents and leads a discussion on the true costs of "free" services such as Facebook, Twitter, Google, etc.
Network effects. It’s one of the most important concepts for business in general and especially for tech businesses, as it’s the key dynamic behind many successful software-based companies. Understanding network effects not only helps build better products, but it helps build moats and protect software companies against competitors’ eating away at their margins.
Yet what IS a network effect? How do we untangle the nuances of 'network effects' with 'marketplaces' and 'platforms'? What’s the difference between network effects, virality, supply-side economies of scale? And how do we know a company has network effects?
Most importantly, what questions can entrepreneurs and product managers ask to counter the wishful thinking and sometimes faulty assumption behind the belief that “if we build it, they will come” … and instead go about more deterministically creating network effects in their business? Because it's not a winner-take-all market by accident.
Consider first that platforms are becoming a dominant form of business organization. Then consider how you transition an existing product to a platform. This talk illustrates steps to make the transition. It then describes what an open business model looks like and compares differences in openness of Apple, Google, Microsoft and others.
Dr. Alan Borning (University of Washington Computer Science professor emeritus), presents and leads a discussion on the true costs of "free" services such as Facebook, Twitter, Google, etc.
Network effects. It’s one of the most important concepts for business in general and especially for tech businesses, as it’s the key dynamic behind many successful software-based companies. Understanding network effects not only helps build better products, but it helps build moats and protect software companies against competitors’ eating away at their margins.
Yet what IS a network effect? How do we untangle the nuances of 'network effects' with 'marketplaces' and 'platforms'? What’s the difference between network effects, virality, supply-side economies of scale? And how do we know a company has network effects?
Most importantly, what questions can entrepreneurs and product managers ask to counter the wishful thinking and sometimes faulty assumption behind the belief that “if we build it, they will come” … and instead go about more deterministically creating network effects in their business? Because it's not a winner-take-all market by accident.
Consider first that platforms are becoming a dominant form of business organization. Then consider how you transition an existing product to a platform. This talk illustrates steps to make the transition. It then describes what an open business model looks like and compares differences in openness of Apple, Google, Microsoft and others.
Overview of two sided market concepts. It shows some examples and characteristics of a two-sided market. By using this paradigm you can create a lean business canvas for different types of business models
Researched Netflix's existing market and recommended strategies for them to develop.
Conducted SWOT analysis, product and market analysis
Based on their market growth ad financial overview, developed marketing strategies
Developed BCG Matrix and understood Porter 5 forces to estimate the competitive strategy
This lecture describes the Platform model or Two-sided Markets. Platforms serve multiple customer groups and benefit from network effects that take place with and between those groups. Businesses based on Platforms are able to adopt innovative pricing structures in which one side subsidizes another. When the marginal costs are near zero it can be practical to drop the subsidized price all the way to zero.
Content: (1) How the core interaction defines a platform (2) How a traditional (pipeline) value chain differs from a platform value matrix (3) What's inside and what's outside the platform
These slides provide complimentary course materials for the Ch 3 of Platform Revolution - How Network Markets are Transforming the Economy and How to Make Them Work for You. Final slides provide reading supplements and links to other chapters for industry and academia.
“Software is eating the world” said Netscape founder Marc Andreessen in his Wall Street Journal 2011 op-ed to describe how digital technology has transformed the world of business. We divide the disruption into two stages; efficient pipelines disrupting inefficient pipelines and platforms disrupting pipelines. Most Internet applications during the 1990s involved the creation of highly efficient pipelines—online systems for distributing goods and services that out-competed incumbent industries. Online pipelines tended to have very low marginal costs of distribution—sometimes as low as zero. This allowed them to target and serve large markets with much smaller investment. We are now in stage two where platforms disrupt pipelines. They bring news sources of supply to market, change value consumption by facilitating new forms of consumer behavior, change quality control through crowd sourced curation, and bring new market middlemen by aggregating fragmented markets.
Metaverse is a digital or virtual world that will use technologies such as VR, AR, blockchain to create a unique experience for the users. On the other hand, NFTs or non-fungible tokens are a form of token that is unique in nature. These tokens are different from one another, indivisible and immutable. NFTs help represent ownership of digital assets and physical assets in the blockchain.
NFTs are a huge part of the Metaverse. Metaverse will need to have digital assets, and NFTs are perfect for representing any type of digital assets. Users can buy and sell their assets on the marketplace in the form of an NFT. Here, we will discuss the role of NFTs within the Metaverse and how various sectors within the Metaverse can use NFT for their benefits.
101 Blockchains is an educational platform where you will get access to in-depth and updated information regarding blockchain technology. As blockchain technology is a huge part of the Metaverse, we are offering an array of courses that will help you understand how Metaverse works.
The following courses will help you ->
Metaverse Fundamentals
https://academy.101blockchains.com/courses/metaverse-fundamentals
NFT Fundamentals Course
https://academy.101blockchains.com/courses/nft-fundamentals
Introduction to DeFi Course
https://academy.101blockchains.com/courses/defi-course
Tokenization Fundamentals
https://academy.101blockchains.com/courses/tokenization-fundamentals
Learn more about the certification courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course
https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Expert (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Learn more from our guide ->
https://101blockchains.com/nfts-and-metaverse/
The network effect is one of the most vital competitive advantages, and it can also rapidly change the firms to the lead in new industries/businesses .A network effect is a phenomenon when a service/product becomes more valuable as the number of people who use it increases, thereby encouraging the numbers of adopters.
It can also occur when other firms make products/services that is ancillary to an existing product/services, hence increases that product's value. The classic example of the Network effects is the telephone. The more the number of people who own telephones, the more is the value of the telephone network is to each owner. The network effect is quite often the result of word-of-mouth activities.
Tanmay's Product School Final Project | PMC | Improving User Experience on Am...tanmay458
Tanmay Mathur's Final Project for Product School's Product Management Certificate™ (PMC). In this project, he explores ways to improve user experience in Amazon Prime Video on Smart TV's. Based on research and validation, he selects the feature which yields the best value and goes on to develop PRD, Wireframes and GTM plan for the same.
If you want to look at the detailed project, use the links below:
Company Context - https://bit.ly/3edSrkP
Hypothesis & Validation - https://bit.ly/2UUDyMn
Press Release - https://bit.ly/2y3eQjQ
Product Requirement Document - https://bit.ly/34s9evJ
Go to Market Plan - https://miro.com/app/board/o9J_kuSQPXk=/
The metaverse brings new opportunities for consumers and brands to interact and exchange in a digital frontier. Perhaps the most exciting part about the metaverse is that the experience is truly open to consumers, creators, and companies. In a (virtual) world where anything is possible, brands have limitless possibilities to define the future of engagement and create wholly new revenue streams. We call this the Metaverse Economy. It’s a sandbox, bringing new opportunities and challenges.
What part of the metaverse should you make a play in? How do you connect with consumers in this space? What digital assets and products should you create? Should you tie those assets to the real world? And then there’s the simple (yet complicated) questions that you need to get off the ground. Questions like: “What is the metaverse?"
Social Intelligence in the Age of Infobesity - A Verifeed White PaperMelinda Wittstock
Think about what makes information valuable to you, your brand or business. If you want to improve your bottom line you need access to data that is trustworthy, accurate, and from credible sources. It also needs to be relevant, contextual, and timely – you also want to be able to access it before anyone else so you can act faster and more confidently than your competitors.
If your brand or businesses is not harnessing social media to gain insights into customer preferences, motivations and behaviors you’re ignoring a goldmine of information. Did you know that 97% of relevant social posts are missed by most marketers?
This White Paper by Verifeed CEO and Founder Melinda Wittstock tells you how to leverage billions of social conversations and find a clear signal in all the noise of trusted social intelligence.
An excerpt: "Top brands and many businesses have gotten good at pushing out their messages on social networks...Now there’s an added imperative to pull in social data to provide valuable insights into how a campaign, product or price point is being perceived, what people think about a brand (or a competitor’s brand), or events and developments people are talking about that may impact sales, improve a marketing campaign, or effect a product. Social data can also help identify the people who may be interested in purchasing a new product or service, or may influence others’ purchasing habits. It can also drive consumer loyalty and viral ‘word of mouth’ through the development of deeper personal, authentic relationships with targeted consumers. The companies doing it best integrate social data in a ‘push’ and ‘pull’ strategy across all marketing channels with a ‘customer-first’ ethic it becomes that necessitates combining real-time engagement, content creation, data management, and real time actionable analytics."
But how trustworthy is the data? And how can accuracy be assured in real time? What are the limitations and promises of sentiment, natural language processing and other algorithmic solutions? And why does it all come down to trust?
Read the White Paper on Slideshare or download directly from www.verifeed.com. We'd like to help you so get the demo. Thank you
Overview of two sided market concepts. It shows some examples and characteristics of a two-sided market. By using this paradigm you can create a lean business canvas for different types of business models
Researched Netflix's existing market and recommended strategies for them to develop.
Conducted SWOT analysis, product and market analysis
Based on their market growth ad financial overview, developed marketing strategies
Developed BCG Matrix and understood Porter 5 forces to estimate the competitive strategy
This lecture describes the Platform model or Two-sided Markets. Platforms serve multiple customer groups and benefit from network effects that take place with and between those groups. Businesses based on Platforms are able to adopt innovative pricing structures in which one side subsidizes another. When the marginal costs are near zero it can be practical to drop the subsidized price all the way to zero.
Content: (1) How the core interaction defines a platform (2) How a traditional (pipeline) value chain differs from a platform value matrix (3) What's inside and what's outside the platform
These slides provide complimentary course materials for the Ch 3 of Platform Revolution - How Network Markets are Transforming the Economy and How to Make Them Work for You. Final slides provide reading supplements and links to other chapters for industry and academia.
“Software is eating the world” said Netscape founder Marc Andreessen in his Wall Street Journal 2011 op-ed to describe how digital technology has transformed the world of business. We divide the disruption into two stages; efficient pipelines disrupting inefficient pipelines and platforms disrupting pipelines. Most Internet applications during the 1990s involved the creation of highly efficient pipelines—online systems for distributing goods and services that out-competed incumbent industries. Online pipelines tended to have very low marginal costs of distribution—sometimes as low as zero. This allowed them to target and serve large markets with much smaller investment. We are now in stage two where platforms disrupt pipelines. They bring news sources of supply to market, change value consumption by facilitating new forms of consumer behavior, change quality control through crowd sourced curation, and bring new market middlemen by aggregating fragmented markets.
Metaverse is a digital or virtual world that will use technologies such as VR, AR, blockchain to create a unique experience for the users. On the other hand, NFTs or non-fungible tokens are a form of token that is unique in nature. These tokens are different from one another, indivisible and immutable. NFTs help represent ownership of digital assets and physical assets in the blockchain.
NFTs are a huge part of the Metaverse. Metaverse will need to have digital assets, and NFTs are perfect for representing any type of digital assets. Users can buy and sell their assets on the marketplace in the form of an NFT. Here, we will discuss the role of NFTs within the Metaverse and how various sectors within the Metaverse can use NFT for their benefits.
101 Blockchains is an educational platform where you will get access to in-depth and updated information regarding blockchain technology. As blockchain technology is a huge part of the Metaverse, we are offering an array of courses that will help you understand how Metaverse works.
The following courses will help you ->
Metaverse Fundamentals
https://academy.101blockchains.com/courses/metaverse-fundamentals
NFT Fundamentals Course
https://academy.101blockchains.com/courses/nft-fundamentals
Introduction to DeFi Course
https://academy.101blockchains.com/courses/defi-course
Tokenization Fundamentals
https://academy.101blockchains.com/courses/tokenization-fundamentals
Learn more about the certification courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course
https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Expert (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Learn more from our guide ->
https://101blockchains.com/nfts-and-metaverse/
The network effect is one of the most vital competitive advantages, and it can also rapidly change the firms to the lead in new industries/businesses .A network effect is a phenomenon when a service/product becomes more valuable as the number of people who use it increases, thereby encouraging the numbers of adopters.
It can also occur when other firms make products/services that is ancillary to an existing product/services, hence increases that product's value. The classic example of the Network effects is the telephone. The more the number of people who own telephones, the more is the value of the telephone network is to each owner. The network effect is quite often the result of word-of-mouth activities.
Tanmay's Product School Final Project | PMC | Improving User Experience on Am...tanmay458
Tanmay Mathur's Final Project for Product School's Product Management Certificate™ (PMC). In this project, he explores ways to improve user experience in Amazon Prime Video on Smart TV's. Based on research and validation, he selects the feature which yields the best value and goes on to develop PRD, Wireframes and GTM plan for the same.
If you want to look at the detailed project, use the links below:
Company Context - https://bit.ly/3edSrkP
Hypothesis & Validation - https://bit.ly/2UUDyMn
Press Release - https://bit.ly/2y3eQjQ
Product Requirement Document - https://bit.ly/34s9evJ
Go to Market Plan - https://miro.com/app/board/o9J_kuSQPXk=/
The metaverse brings new opportunities for consumers and brands to interact and exchange in a digital frontier. Perhaps the most exciting part about the metaverse is that the experience is truly open to consumers, creators, and companies. In a (virtual) world where anything is possible, brands have limitless possibilities to define the future of engagement and create wholly new revenue streams. We call this the Metaverse Economy. It’s a sandbox, bringing new opportunities and challenges.
What part of the metaverse should you make a play in? How do you connect with consumers in this space? What digital assets and products should you create? Should you tie those assets to the real world? And then there’s the simple (yet complicated) questions that you need to get off the ground. Questions like: “What is the metaverse?"
Social Intelligence in the Age of Infobesity - A Verifeed White PaperMelinda Wittstock
Think about what makes information valuable to you, your brand or business. If you want to improve your bottom line you need access to data that is trustworthy, accurate, and from credible sources. It also needs to be relevant, contextual, and timely – you also want to be able to access it before anyone else so you can act faster and more confidently than your competitors.
If your brand or businesses is not harnessing social media to gain insights into customer preferences, motivations and behaviors you’re ignoring a goldmine of information. Did you know that 97% of relevant social posts are missed by most marketers?
This White Paper by Verifeed CEO and Founder Melinda Wittstock tells you how to leverage billions of social conversations and find a clear signal in all the noise of trusted social intelligence.
An excerpt: "Top brands and many businesses have gotten good at pushing out their messages on social networks...Now there’s an added imperative to pull in social data to provide valuable insights into how a campaign, product or price point is being perceived, what people think about a brand (or a competitor’s brand), or events and developments people are talking about that may impact sales, improve a marketing campaign, or effect a product. Social data can also help identify the people who may be interested in purchasing a new product or service, or may influence others’ purchasing habits. It can also drive consumer loyalty and viral ‘word of mouth’ through the development of deeper personal, authentic relationships with targeted consumers. The companies doing it best integrate social data in a ‘push’ and ‘pull’ strategy across all marketing channels with a ‘customer-first’ ethic it becomes that necessitates combining real-time engagement, content creation, data management, and real time actionable analytics."
But how trustworthy is the data? And how can accuracy be assured in real time? What are the limitations and promises of sentiment, natural language processing and other algorithmic solutions? And why does it all come down to trust?
Read the White Paper on Slideshare or download directly from www.verifeed.com. We'd like to help you so get the demo. Thank you
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
In issue 08, we examine the crucial nature and value of social data and why it has become essential for brands to perform all functions of branding, marketing and selling to their customers.
Cognitivo PoV - Market power in the data-driven economyAlan Hsiao
Data is the oil of the 21st Century, but data democratization is a term that is hard to get a handle on. Let's talk about democratization of "Data Proceeds"
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion. Filed on August 21, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Privacy in today’s connected world is an illusion. All of our transactional data, both online and real-world can be mined. If someone truly wanted access to your information, they could have it with relatively little effort. As a result, privacy has begun to be regarded as a luxury item. What are the risks associated with your behavior? Why are data breaches so prevalent? What can you do to protect yourself? In this presentation, I share subject matter expertise derived from data security research and project-specific cybersecurity trend analysis. I share some practices I’ve developed in an effort to be better educated personally and make more informed choices about my own behavior.
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
Read our NTIA comment letter on ''Big Data'' Developments and How They Impact the Consumer Privacy Bill of Rights. Filed with the NTIA on August 5, 2014.
Anonos has been working for over two years on technology that transforms data at the data element level enabling de-identification and functional obscurity that preserves the value of underlying data. Specifically, Anonos de-identification and functional obscurity risk management tools help to enable data subjects to share information in a controlled manner, enabling them to receive information and offerings truly personalized for them, while protecting misuse of their data; and to facilitate improved healthcare, medical research and personalized medicine by enabling aggregation of patient level data without revealing the identity of patients.
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Mastering the demons of our own designTim O'Reilly
My talk about lessons for government from high tech algorithmic systems, given as part of the Harvard Science and Democracy lecture series on April 21, 2021. Download ppt for speaker's notes.
Did you miss out on this year's SPARK event? Don't worry! Our team of dedicated utility data experts worked to collect the top insights and key takeaways from this year's event. Check out this SlideShare to learn more about the industry insights and trends that were hot topics as this year's event.
I. What are NFTs?
II. NFT Use Cases
III. Making Sense of the NFT Market
IV. The Emergence of DAO(Decentralized Autonomous Organization)
V. The Future is NFT DAO
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
3. What is Privacy?
Privacy is a fundamental right,
essential to autonomy and
the protection of human dignity,
serving as the foundation upon which
many other human rights are built.
<Source:https://privacyinternational.org/explainer/56/what-privacy>
4. Debates on Privacy
ü Companies and governments are
gaining newpowers to followpeople
across the internet and around the
world, and even to peer into their
genomes.
ü The benefitsofsuch advances have
been apparent for years; the costs
are nowbecoming clearer.
ü The boundariesof privacy are in
dispute, and its future isin doubt.
Citizens, politicians and business
leaders are asking if societies are
making the wisest tradeoffs.
<Source:https://www.nytimes.com/interactive/2019/opinion/internet-privacy-project.html>
5. Privacy is Too Big to Understand
<Source:https://www.nytimes.com/2019/04/16/opinion/privacy-technology.html>
§“Privacy” is an impoverished word — far too small a word to describe what we talk
about when we talk about the mining, transmission, storing, buying,selling, use and
misuse ofour personal information.
§You are losing controlover your life.When technologygovernsso many aspects of our
lives — and when that technologyis powered by the exploitation of ourdata —
privacy isn’t just about knowing your secrets, it’s about autonomy.
§Privacy is really about being able to define for ourselveswho we are forthe world and
on our own terms.
§“Maintaining privacy will be integral to the internet’sfuture, if only because consumers
need to feelsafe enoughto participate.”
6. How Capitalism Betrayed Privacy
<Source:https://www.nytimes.com/2019/04/10/opinion/sunday/privacy-capitalism.html>
§The forcesof wealth creation no longer favor the expansion of privacy but work to
undermine it. - Therise of “attention merchants” and “surveillancecapitalism”;
thecommodificationofourpersonal data by techgiants likeFacebook,Googleand theirimitators.
§We face a future in which active surveillance is such a routine part of business that for
most people it is nearly inescapable. We are on the road back to serfdom.
§Many employers also nowconstantly watch their employees. There is good reason to
believe that, if nothing is done,gratuitous surveillance will be built into nearly every
business and business model.
§Those who want privacy should support and reward the companies who respect it.
The economicsof privacy would change if enough consumers bought fromcompanies
that don’t spy on us and whose products actually help people avoid an unwanted gaze.
8. Facebook is "Surveillance Machine"
<Source:https://www.lrb.co.uk/v39/n16/john-lanchester/you-are-the-product>
You don't use Facebook. Facebook uses you.
“Facebook is in the surveillance business.
Facebook, in fact, is the biggest surveillance-based enterprise in the history of mankind.
It knows far, far more about youthan the most intrusive government has ever known
about its citizens.”
“Note that the company’s knowledge about its users isn’t used merely to target ads
but to shape the flowof news to them.”
When the service is free, you're not the customer.You're the product.
9. The ‘Data Labor Union’
<Source:https://thedataunion.eu>
Facebook usersunite!
'Data Labour Union'launches in Netherlands §The Data Union is going to demand the
transparency and readability of
algorithms used corporationsand
governments.
§The Data Union is going to help members
demand their data rights from
corporations and governments.
§The Data Union will focus attention on
the need for the Data Union.
§The Data Union will inform its members
about the newest tools to protect your
data and develop these ourselves,to end
our dependency.
10. Facebook’s Privacy Policies
<Source:https://web.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/?_rdc=1&_rdr>
ü Facebook founderMark
Zuckerberg told that if
he were to create
Facebook again today,
user information would
by default be public,
not private as it was for
years until the company
changed dramatically in
December.
(2010. 1. 9)
ü Facebook’s mission is to
make the world more
open and connected.
ü The main way we do
this is by giving people
the tools to map out
their relationships with
the people and things
they care about. We
call this map the graph.
(2013. 1. 15)
The digital equivalent of
a town square à
The digital equivalent of
the living room
- Private interactions
- Encryption
- ReducingPermanence
- Safety
- Interoperability
- Securedata storage
(2019. 3.7)
“The Age of Privacyis Over” “GraphAPI/Graph Search” “A Privacy-FocusedVision”
11. Four Essential Privacy Principles(by Tim Cook)
Ø Companies should challenge themselves to de-identify customer data or not collect
that data in the first place.
Ø Users should always knowwhat data is being collected from them and what it’s being
collected for.This is the only way to empower users to decide what collection is
legitimate and what isn’t.
Ø Companies should recognizethat data belongs to users and we should make it easy for
people to get acopy of their personal data, as well as correct and delete it.
Ø Everyonehas a right to the security of their data. Security is at the heart ofall data
privacy and privacy rights.
<Source:https://twitter.com/tim_cook>
15. Sur-veil-lance Cap-i-tal-ism, n.
1. Anew economicorder that claims human experienceas free raw material for hidden
commercial practices ofextraction, prediction, and sales;
2. Aparasitic economiclogic in which the productionof goods and services is
subordinated to a newglobal architecture ofbehavioral modification;
3. Arogue mutation of capitalism marked by concentrations of wealth, knowledge, and
power unprecedented in human history;
4. The foundationalframework ofa surveillance economy;
5. The origin ofa new instrumentarian power that asserts dominance over society and
presents startling challenges to market democracy;
6. Amovement that aims to impose a new collective order based on total certainty;
7. An expropriation of critical human rights that is best understoodas a coup from above:
an overthrowofthe people’s sovereignty.
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
17. Data Extraction and Analysis
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Data
The raw material necessary for surveillance capitalism’s novel
manufacturing processes
Extraction
The social relations and material infrastructure with which the firm
asserts authority over those raw materials to achieve economiesof
scale in its raw-material supply operations
Analysis
The complex ofhighly specialized computational systems that is
generally referred to as “machine intelligence”
19. Discovery of Behavior Surplus
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Surveillance Capitalism begins with the
discovery of behavioral surplus. More
behavioral data are rendered than
required for service improvement.
ü This surplus feeds machine intelligence
that fabricates predictions ofuser
behavior.These Productsare sold to
business customersin newbehavioral
futures markets.
ü The Behavioral Value Reinvestment Cycle
is subordinated to this new logic.
20. The Logic and Operation of Surveillance Capitalism
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Logic
The Means
of Production
The
Products
The
Marketplace
The translation of
behavioral surplus
from outside to inside
the market finally
enabled Google to
convert investment
into revenue.
Google’s machine
intelligence
capabilities feed on
behavioral surplus,
and the more surplus
they consume,
the more accurate the
prediction products
that result.
Machine intelligence
processesbehavioral
surplus into prediction
products designed to
forecast what we will
feel, think, and do.
Prediction products
are sold into a new
kind ofmarket that
trades exclusively in
future behavior.
Surveillance
capitalism’s profits
derive from behavioral
futuresmarkets.
22. Accumulation by Dispossession
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Accumulationby dispossession is a conceptpresented by the Marxist geographer
David Harvey, which defines the neoliberal capitalist policies in many western
nations as resulting in a centralization ofwealth and power in the hands of a fewby
dispossessing the public and private entitiesof their wealth or land.
Human experience could be extracted at no extra cost online and at very low cost
out in the real world. Once extracted, it is rendered as behavioral data, producing a
surplus that forms the basis ofa wholly newclass ofmarket exchange.
Surveillance capitalism originatesin this act of digital dispossession, brought to life by
the impatience of over-accumulated investment.This isthe lever that moved
Google’s world and shifted it toward profit.
23. The Dispossession Cycle
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Incursion Habituation Adaptation Redirection
The incursion is when
dispossession
operations rely ontheir
virtual capabilities to
kidnap behavioral
surplus from the
nonmarket spaces of
everyday life where it
lives.
The incursion itself,
once unthinkable,
slowly worms its way
into the ordinary.
Worse still, it gradually
comes to seem
inevitable. New
dependencies develop.
when Google is forced
to alter its practices, its
engineers produce
superficial but
tactically effective
adaptations that satisfy
the immediate
demands of
government authorities
and public opinion.
In afinal stage the
corporation regroups to
cultivate new rhetoric,
methods, and design
elements that redirect
contested supply
operations just enough
so that they appear to
be compliant with
social/legal demands.
25. Who Knows? Who Decides? Who Decides Who Decides?
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Who
Knows?
Who
Decides?
Who Decides
Who Decides?
• ‘This is aquestion about the distribution of knowledge and whether
one is included or excluded from the opportunityto learn.
• This is a question about power. What is the sourceof power that
undergirds the authority to share or withhold knowledge?
• This is a question about authority : which people, institutions, or
processesdetermine who is included in learning, what they are able
to learn, and how they are able to act ontheir knowledge.
26. Merely Human Natural Resources
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
In this future we are exiles from ourown behavior, denied access to
or controlover knowledge derived from our experience.
Knowledge, authority, and power rest with surveillance capital,
for which we are merely “human natural resources.”
The commodificationof behavior under the conditionsof
Surveillance capitalism pivotsustoward a societal future in which
an exclusive division oflearning is protected by secrecy,indecipherability, and expertise.
27. A Fight over Surveillance Capitalism
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Let it be an insistence that raw surveillance capitalism is as much a threat to society as
it is to capitalism itself.
ü This is not a technical undertaking, not a program for advanced encryption,improved
data anonymity,or data ownership.
ü Such strategies only acknowledge the inevitability ofcommercial surveillance.
ü Surveillance capitalism dependson the social, and it is only in and through collective
social action that the larger promise of an information capitalism aligned with a
flourishing third modernitycan be reclaimed.
‘If there is to be a fight, let it be a fight over capitalism.
29. Economic Imperative
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Extraction
Imperative
Prediction
Imperative
l The first wave of prediction productsenabled targeted online
advertising. These productsdepended upon surplus derived at scale
from the internet.
l I have summarized the competitive forcesthat drive the need for
surplus at scale as the “extraction imperative.”
l The next threshold was definedby the quality of prediction products.
l In the race for higher degrees of certainty, it became clear that the
best predictionswould have to approximate observation.
l The prediction imperative is the expression ofthese competitive forces.
what forms of surplus enable the fabrication of predictionproducts that
most reliably foretell the future?
31. Rendition : From Experience to Data
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
why is our experience rendered as behavioraldata in the first place?
Rendition: the specific operations that target the gap between
experience and data on a mission to transform the one into the other
Rendition describes the concrete operationalpractices through which
dispossession is accomplished, as human experienceis claimed as raw material
for datafication and all that follows, from manufacturing to sales.
33. Data as Labor
<Source:http://radicalmarkets.com>
ü Imagine a world in which your personal data, currently
hooveredup by tech companiesand repurposed for their
profit, were honoredas your dignified work and compensated
as such.
ü Data as Labor(DaL) : Because data suppliers are not properly
rewarded for their digital contributions,they lack the
incentive or freedomto contributethe high-quality data that
would most empower technologyor develop their personal
capacities to maximize their earnings and contributions to the
digital economy.
34. Economies of Action
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
“The new power is action.”
The prediction imperative phase represents the completion of the newmeans of
behavior modification, a decisive and necessary evolution
of the surveillance capitalist “means ofproduction”
toward a more complex,iterative, and muscular operational system.
Under surveillance capitalism the objectives and operations of
automated behavioral modification are designed and controlled
by companies to meet their own revenueand growth objectives.
35. Three Key Approaches to Economies of Action
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Tuning Herding Conditioning
Nudge
any aspect of
a choice architecture
that alters people’sbehavior
in a predictable way
Orchestration of
the human situation
foreclosingaction alternatives
and thus movingbehavioralong
a path of heightenedprobability
Reinforcement
“Behaviormodification” or
“behavioral engineering,”
in whichbehavioris continuously
shaped to amplify some actions
at the expense of others
36. Behavioral Economics for Surveillance Capitalism
Extrinsic Motivation Intrinsic Motivation
《ChoiceArchitect》based on ‘LibertarianPaternalism’
Libertarianpaternalismis the idea that
it is both possible and legitimate for private and public institutions to affect behavior
while also respecting freedom ofchoice, as well as the implementation of that idea.
<Source:https://en.wikipedia.org/wiki/Libertarian_paternalism>
37. Behavioral Modification
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Behavioral modification relies upon a variety of machine processes, techniques, and tactics
(tuning, herding,conditioning) to shape individual, group, and population behavior
in ways that continuouslyimprove their approximation to guaranteed outcomes.
Surveillance capitalists’ interests have shifted
from using automated machine processes to know about your behavior
to using machine processes to shape yourbehavior according to their interests.
This decade-and-a-half trajectory has taken us
from automating information flows about youto automating you.
38. Instrumentarianismas a New Species of Power
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
What is
Instrumentarianism?
The instrumentation and instrumentalization of behavior for the
purposes of modification, prediction,monetization, and control
ü Totalitarianism was apolitical projectthat converged with economics to overwhelm society.
ü Instrumentarianism is amarket project that convergeswith the digital to achieve its own
unique brand ofsocial domination.
ü Thanks to Big Other’s capabilities, instrumentarian power aims for a conditionof certainty
without terror in the form of“guaranteed outcomes.”
*Big Other:It is thesensate, computational,connectedpuppetthatrenders,monitors,
computes, and modifies human behavior.
40. A Market Project of Total Certainty
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Totalitarianism was atransformation of the state into a project oftotal possession.
ü Instrumentarianism and Big Other signal the transformation ofthe market into a project
of total certainty, an undertaking that isunimaginable outside the digital milieu, but
also unimaginable outside the logic of accumulation that is surveillance capitalism.
ü This new power is the spawn of an unprecedentedconvergence:the surveillance and
actuation capabilities of Big Other in combination with the discovery and monetization
of behavioral surplus.
ü we can imagine economicprinciples that instrumentalize and controlhuman experience
to systematically and predictably shape behavior toward others’ profitable ends.
First, machinesare not individuals, andwe should be more like machines.
42. What is Self-Sovereignty?
<Source:https://en.wikipedia.org/wiki/Sovereignty>
Sovereigntyis the full right and power of a governingbody over itself,
without any interference fromoutside sources or bodies.
sovereignty is a substantive term designating supreme authority over some polity.
ü Self(orindividual)-Sovereigntyis the concept of propertyin one's own person,
expressed as the natural right of aperson to have bodily integrity and
be the exclusive controller ofone's own bodyand life.
ü Self-Sovereigntyis a central idea in several political philosophies that emphasize
individualism, such as liberalism and anarchism.
43. What is Self-Determination?
<Source:https://en.wikipedia.org/wiki/Self-determination>
ü The right of a people to self-determination is a cardinal principle in modern
international law.
ü It states that people, based on respect for the principle of equal rights and fair equality
of opportunity,have the right to freely choose their sovereignty and international
political status with no interference.
ü By extension, the term self-determination has come to mean the freechoice of one's
own acts without external compulsion.
44. The End of Self-Determination
surveillance capitalists declare their right to modify others’behavior
for profit according to methodsthat bypass human awareness,
individual decision rights, and the entire complex of self-regulatory processes
(autonomy and self-determination).
§Human consciousness itself is a threat to surveillance revenues,as awareness endangers
the larger project ofbehavior modification.
§Philosophers recognize“self-regulation,” “self-determination,” and “autonomy” as
“freedom of will.”
§The competitive necessity of economiesof action means that surveillance capitalists
must use all means available to supplant autonomousaction with heteronomousaction.
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
46. The Right to Sanctuary
§ A sanctuary is a sacred place. By extension the term has come to be used forany place
of safety. This secondary use can be categorizedinto human sanctuary, a safe place for
humans, such as a political sanctuary.
§ The sanctuary privilege has stood as an antidote to power since the beginning of the
human story.There was an exit fromtotalizing power, and that exit was the entrance to
a sanctuary in the formof a city, a community,or a temple.
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Big Other outruns society and law in a self-authorizeddestruction of the right to
sanctuary as it overwhelms considerations of justice with its tactical mastery of shock.
ü “No exit” is the necessary conditionfor Big Other to flourish.
-That is the tides ofbehavioralsurplus and their transformation into revenue,
the certainty that willmeet everymarket player withguaranteed outcomes,
the actuation and modificationthat quietlydrains the willto will.
47. Obfuscation : as a Strategy for Privacy Protection
Obfuscation is
the deliberateaddition of ambiguous,confusing, or misleadinginformation
to interfere with surveillanceand data collection.
<Source:Finn Brunton, Helen Nissenbaum, <Obfuscation:AUser'sGuideforPrivacy andProtest> TheMITPress,2015>
Operation
Vula
Uploads
to leak sites
TrackMeNot
Chaf
Identical
confederates
and objects
False
tells
Excessive
documentation
Group
identity
Shuffling
SIM cards
Tor
relays
Babble
tapes
CacheCloak
48. Privacy Itself is a Solution to Societal Challenges
<Source:Finn Brunton, Helen Nissenbaum, <Obfuscation:AUser'sGuideforPrivacy andProtest> TheMITPress,2015>
Privacy does not mean stopping the flow of data;
It meanschannelingit wisely andjustly
to serve societal ends andvalues and the individualswho are its subjects,
particularlythe vulnerable andthe disadvantaged.
50. “What is at stake here is the human expectation of sovereignty
over one’s own life and authorship of one’s own experience.”
- Shoshana Zuboff,<TheAge of SurveillanceCapitalism>