Posts

"To be The Most Trusted Provider of Brilliant Digital Experiences" - which Brand Vision?

Image
Here’s a presentation  from James Morgan , Telefonica UK’s head of information strategy for business intelligence. Telefonica new ‘vision’: “To be The Most Trusted Provider of Brilliant Digital Experiences”   My problem is that this is all about control aka the Apple model and not an open model – implicit is that they know better than you about what you want!

Unlocking the Value of Personal Data

Image
Source: https://www.unboundid.com/blog/2013/05/29/unlocking-the-value-of-personal-data/ this is a Katie O’Brien post on UnBounded ID and she brings up the “shift from controlling data collection to focusing on data usage.” The reason for this blog is that I am an advocate of users being able to know where there data is.  I cannot subscribe to user controlled data as it is just not practicable and I cannot subscribe to personal lockers as this becomes the weakest point. However, I do subscribe to an idea that a user should know where their data is, be able to correct it if it is wrong and be able to say that some data is a primary source and other places are copies.  Control does not exist and rights may only be granted in some instances. I don’t want to store my data, I just want the link to where the data is. Obviously this becomes more difficult if an agency is intercepting my data on route and storing it off line. #NAS #PRISON The issue being that if I do have some cont

Screenagers: The Repercussions of Growing Up on Screens

Image

How Real Revenue Is Derived from Big Data

Image
Wikibon has  published  its Big Data Vendor Revenue and Market Forecast for 2012 thru 2017, giving insights as to how much revenue big data vendors will derive in the coming years. They have also published an infographic,

Biostamp electronic tattoo

Image
Motorola is looking at alternatives to traditional passwords in a bid to make logging into online sites, or accessing mobile phones, more secure.  Given that it takes 24 hours to break any 8 character password. These bio stamps, developed by Massachusetts-based engineering firm MC10, contain flexible electronic circuits that are attached to the wearer's skin using a rubber stamp. The device could then be used to confirm the owner's identity and log them in to accounts automatically.  This would prevent thieves and other people from being able to access a phone, or individual apps on the device, if it is stolen or lost.  If you are not there…. However – ·          like any tech I assume it can be scanned and copied ·          how do you deal with interference, jamming? ·          how will it cope with a high power transmitter? Therefore does it actually solve a problem or not?  Not sure it does but interesting thinking that the movement of 5 mm from your wall

2013 Internet Trends Mary Meeker

KPCB Internet Trends 2013 from Kleiner Perkins Caufield & Byers

What Causes Behaviour Change? The Fogg Behavior Model

Image
Different to ideas presented here by Robin Wright (founder of Engine) who was exploring why the human brain demands so much more energy to change its mind - the implication is that loyalty is actually laziness.  Also worth reading is Nir Eyal who blogs at Nir and Far - who writes about behavior and the brain - he has an interesting post on how we deceive ourselves which aligns with Daniel Ariely work.