Telcos and Cellcos continue to lag …

While down at the Adobe MAX conference in Las Vegas, I saw some very nice demos of Flash Lite v2.1 … a version of Flash for mobile devices and cell phones.  It was interesting to see that both Verizon and Qualcomm were on hand to talk about the immediate availability for developers.  As I just bought my new Nokia E70 phone (which I’m slowly getting used to!) I thought this would be great!  I’m doing some Flash development … and now I can write apps for my phone with it!

Well … then reality set in.  I went to the Adobe Flash Lite booth, where I was told that my phone ships with Flash Lite v1.1 … an archaic version with severe limitations.  Ok … so when can I get the upgrade?  Well, go ask the Nokia folks.  It was nice that Nokia had a booth at the show … I simply strolled across the room to ask!  When I got to the booth, one of the Nokia reps even had a E70 in his hand!  Woohoo!

As we discussed the wonders of Flash Lite v2.1, I finally asked “When will I get my update?”  Long silent pause.  “Well, at this time I don’t know if we’ll support Flash Lite v2.1 on our 3rd Edition Phones.” was the answer.  Uh … I just bought this thing … I asked “What is a 3rd Edition Phone?”  The response was something like “Everything on the market is 3rd Edition or less.  The 4th Edition Phones are already being developed.”  So the bottom line that I learned is that Nokia probably will never support Flash Lite v2.1 on any phone in the market.  Yes … there is a possibility asa a developer you can get your hands on a version that will work on your phone … but the end-user community will not get it.  What the heck are they thinking?  The answer seemed to be that they did not want to go back and test and recertify the phones in the market.  Bummer.  Strike One for the Telcos and Cellcos.

The next step was to ask Adobe for the latest development tool that would allow me to create Flash Lite v1.1 applications!  The answer was Flash Professional 8 … a $700 tool.  On top of this, the development paradigm used by this tool was completely foreign to me … although I had been warned about the “timeline” model.  When I got the developer demo, I quickly realized that this was not going to work for me.  Bummer.  Strike Two for the Telcos and Cellcos.

Before giving up completely, I then began to explore a conversation about some possible applications that I had thought of.  Things got even worse.  I really wanted to have some applications do some cool things with the camera, and SMS services.  It turns out that the Telcos and Cellcos have prevented the Flash Lite applications from directly working with the Camera or SMS capabilities of the phones.  So I can’t have my application take photos, or send photos, or send/receive SMS text messages.  Bummer.  Strike Three for the Telcos and Cellcos.

It was amazing to me that after years of waiting for the cell phone to catch up and be a real player in the Internet age, it’s still handcuffed and locked up by the Telcos and Cellcos.  Yes … I know that you can still do *some* things with these devices … but they are far from being free, and a truly open and mobile platform for applications.

Identity Leakage

I just bought my new cell phone the other day. Well … I ordered it. I’m buying a new Nokia E70, and I bought it directly from Nokia. Well … from Nokia’s distribution partner LetsTalk.com.  There are two things that really struck me about the purchase … one was the “Identity Leakage” that I am detecting about myself … the other was their customer service.  Both were impressive.

Identity Leakage?  What is that?  Well … it’s all of the information about me that is leaking out all over the place.  And the slow accumulation of my leaked identity by various organizations that provide services based on that identity information.  Nokia uses a company that is busy slurping up all of my leaked identity … and yours too!  How did I experience this?  Well upon completion of my purchase of the phone, I received an e-mail indicating that I had to call into their offices to complete my sale.

When I called the 1-877-xxx-xxxx phone number I spoke with a customer service rep who indicated that I was going to have to answer three questions to verify my identity, and to receive my phone.  I started to think about the experince that I had on-line with Tiger Direct that was similar … and it ended up being identical.

First, the customer service rep asked me “Which of the following vehicles have you bought or sold recently?”  She then listed five vehicles … and the sixth choice “None of the listed vehicles.”  The funny thing is that the third vehicle she listed was my truck … exact year, make, and model.

Second, the customer service rep asked me “What counties have you bought or sold property in?” … and listed 5 or 6 county names several of which I had no idea.  But of course, again, one of the last counties that she listed was one where I have bought both a house, and a building.

The third question was to “Please identify the name of a friend or family member.” … after which she read the names of 5 or 6 people … none of which I recognized … followed by the option to indicate that I didn’t know any of these people.  I told her that I didn’t recognize any names, and she then said that I had answered the questions correctly.

Now I do have to mention that when I saw this on-line with the Tiger Direct system, when they listed names of friends or family I *did* see my sisters married name.

Through public records (vehicle registration, property title registrations?) companies are able to begin to assemble a lot of my identity.  My involvement in public activities allows my identity to “leak”.  It’s not a far leap to see where this will continue to go …

P.S. Th other part of my story … about their customer service?  When I bought the phone on Friday it was ~$460.00 … by Monday after they shipped the phone the price dropped to ~$400.00 … and so on Tuesday morning I called to see what they would do about it.  The customer service rep immediately asked if I had got the e-mail.  Well … I was on the phone driving to the office, so no … I had not yet seen an e-mail.  He indicated that an e-mail had already been sent Tuesday morning indicating that I’d get the $60 refund.  They had already covered me with some sort of price-protection.  Nice.

Travellers Wireless Solution … Access Point and Router

While down here at Adobe MAX, we wanted to get some work done after dinner. We realized that we hadn’t brought ethernet cables, and chose to run to Fry’s in Las Vegas … we also had a Fry’s virgin with us, and it’s always fun to introduce a geek to the Fry’s experience.

While wandering through the wireless section at Fry’s, I chose to look for a new portable wireless access point that I could take on trips with me. I used to carry a Lucent RG-1000 with me everywhere that I went. It was an amazing box for the time … it provided Ethernet and Dial-up capabilities, and was a router with DHCP and NAT built in. I could go into any place with a phone line, and create a shared wireless network … uh … sharing a 56kbps dial-up link. Not the best speeds, but it worked.

Well, I have now found my modern replacement … and it’s very cool.  I’m impressed.  The Linksys WTR54GS is now going to be travelling with me.  This compact little unit appears to have two wireless radios, and two ethernet ports.  It is able to be a complete wireless router, with either wired or wireless connection to the Internet, and then both a ethernet and/or wireless access point functionality for clients.  Amazing.  So, for example, I had it connect as a wireless client bridge to the hotel wireless network, and then was able to connect to it’s wireless access point and have multiple machines share that single connection.  So it was an active wireless client, and wireless access point at the same time … complete with NAT, firewall, and even MAC Address cloning.

All of this in a compact little unit, with a retractable power connector, that fits into a small zippered carrying case.  And the price?  Fry’s had it for $79 …. I’m sure that you might find it cheaper elsewhere.  I’m sure that I’ll blog more about it if it continues to live up to the experience that I’ve had this week.

Adobe MAX 2006

I came down to Adobe MAX 2006 this week. It’s being held in Las Vegas, and this is my first time attending this event. Last night at the welcome reception I met some great people, and saw a few interesting applications. One thing that hit me was the deep penetration that Adobe has into government. There were government employees – federal, state, and city – along with military employees and defense contractors everywhere!

I’m down here with part of my team from mediaForge as we are now committing This morning I’m at the keynote, and I’m impressed that Adobe has really spent some money on this event … and there are a *lot* of people here. Our first guess is that there are maybe 2000+ people attending. After an intro by Blue Man Group, Kevin Lynch – Chief Software Architect – came on stage and said that this is the largest Adobe MAX conference to date.

The CEO then reviewed the Adobe/Macromedia merger, and showed a video of the feedback from users. He talked about the adoption of the “labs” concept that Macromedia brought. His focus then turned to the technologies that they are going to focus on – video, mobile devices (FlashLite is running on over 100 million devices!), Flex, and Flash Player 9 (now 10 years old).

Kevin Lynch returned to the stage and fist addressed the adoption rates of Flash Players. He showed where the Flash Player 9 reached over 80% adoption within 9 months, and how Flash Player 9 is on track towards 40% adoption in close to three months. This again demonstrates that the ability to deploy updates globally, in a seamless and simple way, is key to software adoption.

There was then a series of demos of new features in Fireworks, Photoshop, After Effects, their new application Soundbooth.  Then came the demo of what I’m here for … Apollo.  Apollo is the new “cross-OS runtime that allows developers to leverage their existing web
development skills (Flash, Flex, HTML, Ajax) to build and deploy desktop RIA’s.”  I’m hoping that Adobe will release a beta to us here at the show …

More later!

More storage coming … cheap.

For those people who just don’t seem to think it can get better, consider that within a few years you’ll be able to head to Costco and pick up your 2TB and 2.5TB hard disks for your personal computers.  This article outlines the announcements from Seagate and Hitachi announcing record densities in magnetic media … and the fact that the 1TB drives will be in our hands by this coming summer.

So when will the 4TB and 5TB disks be here?  2010?  Sooner?

Seagate, Hitachi up density in hard drive material. Blog: Seagate and Hitachi celebrated the fiftieth anniversary of the hard drive by announcing two records in areal density, or the amount… [CNET News.com]

Net Neutrality from Gilder’s Telecosm

Bummer.  I just realized that I missed the 10th Annual Telecosm Conference held by George Gilder and Steve Forbes.  This has always been one of my favorite conferences, where I’m always stimulated with something technology oriented that I never would have thought of.  I’m really into discovering what I don’t know that I don’t know.

The one thing that I was glad to find is that they are releasing the conference proceedings as podcasts … good move.  The first one is on Net Neutrality and has an all-star line-up of speakers.  I’m downloding it now.  Oh … ad it even says that it’s a video podcast.

Identity Tuples

One of my friends asked me some questions the other day about my
constant focus on identity within the context of community. As
usual I was being asked about the “real” application of this notion …
not just the “philosophical” perspective. Well … I’m always
thinking the “real” application … I just don’t seem to express it
well.

I started to think about how – from my perspective – this notion would
be implemented in code, or within an identity store. All of this
relates back to my work on digitalMe while at Novell … and a group of
us were working towards this back then. As I thought more about
some of my recent comments, I realized that one of the “real world”
aspects was what I’ll now call “Identity Tuples”.

What exactly is an Identity Tuple? First, lets look at what most people use as examples of identity … simple name/value pairs.

  • age = 32
  • shoe_size = 12
  • job_title = CTO

There are a number of critical issues with this perspective, and to me it is the gross assumptions when we view this that make it nearly useless. Let’s first look at “age = 32” … uh, well 32 WHAT? Oh of course most people will call me silly and state “32 years of course!” But that is an assumption. And even if we do say that “age = 32 years” then we still have to reference what a year is, or also identify the context that the measurement “year” exists within. A “year” is what, exactly? 365 days? Nope … it’s actually 365.242 days. Who says so? NIST! Ok … and the second flaw in this perspective? WHEN was this true? Well, it would be at some epoch in time … or between some range of dates. Lastly, who is the community or authority that states this as fact?  When we state that “age = 32” it is a very incomplete statement. This is where an identity tuple can come into play … instead of storing “age = 32”, we would actually store:

It is how Identity “attributes” can be stored and represented.  What this provides is support for the fact that identity evolves with time!  I understand that most often people are asking about my identity right now, but there is considerable identity information that relates to the past, or trends in your identity.  Credit History is a classic example of this.  Likewise, if you have children you would know about the “growth charts” that compare your child to the averages of other children.

The other core value of Identity Tuples is that the context, or community, where this attribute is distinguished is referenced with the identity information.  To me, this is critical to be able to properly assess the identity information and determine its value to me.  It’s not enough to say that I am {x} years old … in the case of liquor laws, we want that information from a credible source.  We have to identify the community which will support my claims.

Now some people reading this will notice there are some subtle flaws in this example … it’s a rough example.  But it is an attempt to describe some of what I see lacking in existing solutions … and what a real solution will one day have to have to be more effective.

The edges of the Internet

This year it has been fun to retest the edges of the Internet. 
What I mean is “How easy is it to get on the Internet from various
places?”

In May I took a trip to the Philippines (Philippines Videos)
and was blown away at how easy it was to get Internet access
everywhere.  There were cost-effective Internet Cafe’s all over
the place.  I was there from the 21st to the 31st, and travelled
from Manila to Baguio, to Iloilo and Bacolod, and back to Manila. 
Internet was everywhere.  Cheap and plentiful.

I’m posting this from the coast of Cuba, on the way to Labadee, Haiti.  I’m aboard the Royal Caribbean Navigator of the Seas,
and yes … there is Internet.  In fact, I’m on Wifi sitting in a
lounge on the 14th deck looking out over the upper decks of the ship
toward the distant horizon.  Somewhere out there is Haiti. 
We’ll get there sometime tomorrow morning … I think.

Slowly but surely access to the Internet is reaching everywhere on
earth.  Everywhere.  It was interesting to see that even
cellular is reaching out … there is a Cingular cell onboard the ship
and so I have full strength cellular service and SMS text.

As technology continues to advance, wireless technologies improve, and
business models support it … the edges of the Internet are slowly
going away.  It is inevitable that when something like the
Interent permeates the entire planet … there are no longer any edges
… it simply becomes something that is.

Undistinguished Identity

This last weekend I was talking with a friend about Google, and the tracking of identity.  I blogged about Google, Identity and Privacy a few weeks back, and have been doing a lot of R&D in this area.  On Monday there was the uproar about the AOL leak of search queries
and how this data could be used to locate the person who was making the
queries.  What this article does not address is the
“undistinguished identity” that the person is revealing … information
about themselves that even they do not know.

The more that I discussed the issue with my friend, it started to
really get clear to me that my concerns about provacy and identity are
not as much my identity as most people think about it … but large
systems and companies that gain access to my undistinguished identity.

What do I mean by this?  To me, undistinguished identity
is all of my thoughts and behaviors that are completely a reaction to
stimulus around me.  Companies like Google are beginning to gain
vast amounts of information about me, what I search for, when I search
for it, and then have the ability to relate to to seemingly unrelated
events.

To me, it’s not just about companies knowing information about me that
I also know … it’s when they begin to know me, better than I know me.

Google knows who you REALLY are!

It’s always fun to learn whole new layers of technology. What I’m
posting about here is probably known by a lot of people, but my recent
involvement in two new start-up companies has really started to have me
think about the breadth and depth of data mining occurring on the
Internet involving personal behavior and habits. And one of the
largest harvesters of all of that personal information is Google.
There are already others who cover this much better than I … Google Watch is one … however I still wanted to blog about this.

Two of the four start-ups that I am now involved in are working on web
applications – hosted services – that want to provide new levels of
social and affiliate networks. With one start-up we are creating
a new form of video advertising on the net, with a full affiliate
marketing network behind it. So it becomes important to track
when affiliates (bloggers or web sites that host the ads) cause sales
to occur. When that happens they get paid a commission.
With the other start-up we are creating a new interactive media type
that can be spread virally through web sites, e-mail and IM. With
this solution we want to be able to track and map the viral spread to
acknowledge and reward the people who are able to cause the most spread.

As my teams and I began to build both of these solutions we began to
examine how other vendors are accomplishing the same things. We
have now looked at dozens of implementations, and then created our own
solutions that we believe will give us what we are after. While
doing this I began to see a pattern that is an amazing wealth of
personal information that Internet users are giving away about
themselves … about who they REALLY are. On one of the largest
consumers of all of this personal behavioral information is
Google. It’s really the scale of their ability to gather this
data that caused me to pause and think.

It all starts with a cookie

In doing some research into how ot track consumers, I was surprised to
find that most people agree that 99%+ of web browsers operate using the
default settings when it comes to cookies. Cookies are the small
pieces of data that a web site can pass down to your web browser, and
from then on – until the cookie expires – that data is passed back to
the web site every time that you access it. Cookies can be
defined to last for a very short amount of time – just that particular
session – or a very long amount of time … decades, or even hundreds
of years.

So when you first visited Google … the very first time … you got
your first Google cookie. And this is a good starting point …
when did YOU lose your Google-virginity? When exactly was that
first time? Google knows. Even if you have changed
computers, browsers, upgraded, etc. there is a chance that Google still
knows. They know the year, day, hour, minute, and second.
You were given the mark of Google. Ok … big deal … so what.

Tracking what you search

The first thing they are now able to do is track every single search
that you perform on Google. Lots of people know about this, and
understand this is the case. They also know the time of day, day
of the week, phase of the moon, weather conditions, popular news, and
even the popularity of that particular search when you did it! So
what searches do you tend to do late at night during a full moon?
Ask Google … they know!

In my opinion, it’s not really the details of what you searched that
have the real value … it is when you did them, and in what sequences,
and what other patterns emerge about you. This is where your true
identity begins to emerge. What? You were on-line searching
on a Friday night? Not out with friends?

Proliferation of AdWords

Ok … now this next part is where I started to really think.
While working on how to dynamically inject video advertising into a web
page, I found that Google is using a very interesting technique for
AdWords and Google Analytics. Again … it’s very simple and
easy, and many people know this … however many people do not.
And the implications are very interesting.

If you have a web site, and you choose to place AdWords on your web
site, Google will give you a nice little bit of HTML to embed in your
page. That HTML includes a script tag that will fetch a snippet
of Javascript code from Google’s servers. The Javascript then
causes the AdWords ads to be rendered within your web page. It’s
actually pretty impressive that when I browse to your website, without
being told a thing, my browser will automatically load your page and go
and load the script from Googles servers. Clean …
transparent. Ok yeah … and when it did that … the Google
cookie went with that request. Remember the Google cookie?

Yes … now it’s not just the searches that you do on Google’s web
site that are being tracked, but also every single web page that you
visit that contains Google AdWords!

Tracking what web sites you visit

Google is now notified by your browser any time that you visit a web
site that hosts Google AdWords … and it only gets better. 
Google recently announced Google Analytics.  This is a service
that allows web site owners to get detailed analysis of the traffic to
their web site, and about the visitors to their web site.  Any web
site owner who wants this impressive reporting can simply request that
Google give them an account.  When approved, Google will provide
access to the Google Analytics web site, and there you get … another
little bit of HTML to put into your web pages.  The little snippet
again requests a script from Google, and of course passes along your
cookie!

So now Google knows what you search, and what sites you visit that have
AdWords, and now any site that uses Google Analytics.  I’m digging
to find figures to understand just how much of the Internet now falls
into this category, but it is a large number of sites.  And just
like the searches, Google not only knows what web sites you have
visited, but at what time, in what order.  Combined with their
broad indexes of Internet content, they have the ability to categorize
those sites.  Combined with all other types of data they can
really begin to get an idea of just who you are, what you do and when,
on the Internet.  I really begin to wonder what some of the
patterns must look like.

If Google knows your real identity also …

Now … they know you by your cookie, but do they really know who you
are?  Well, if you choose to use any number of Google services –
gMail, AdWords, AdSense, etc. – then the answer is yes!  In most
cases, you join these services and begin to disclose personal
information that just might be a solid connection to the real
you.  And remember, each time you use these services that nice
little Google cookie ensures that they know it’s you.  Closing the
loop.  Connecting the dots.

Lastly … your friends?  Well … Google now knows via gMail who
you communicate with, and at what intervals and times.  They now
know the type of people that your friends and contacts hang out
with.  Google knows that YOU are the type of person that all of
these people communciate with.  From their e-mail address they
might even draw the direct connection to yet another person who they
have collected all of the data about … from their Google
cookie.  I haven’t really spent too much time thinking about how
much deeper all of this goes … however it makes sense why Google
wants all the storage and bandwidth they are building out.  It’s
not about providing search to you … it’s about owning a perspective
of you that no one else on the planet could recreate right now.

Google knows you like no one else.  Google knows more about you
and I then we know about ourselves.  Google will use this to
provide us what we really want … right?  Google will do no evil
… right?  Google would never use this data to use us … to
manipulate our undistinguished behaviors … right?  The Internet
is here, and some things appear to be inevitable

Google knows who you REALLY are.