Logs, Links, Life and Lexicon

Daily Thesis

Years ago we were sharing stories about our children. I was recounting to Natalie my favorite funny stories about her. She share with me a funny story about Miles. This little animation is my attempt to keep that memory in animation form.

I hope it is close to what you told me Nat.

We recently moved to Korea.

We are adapting quickly. What an adventure.

Excellent TED Talk on how the Blockchain technology will play a role in managing trust and identity.

The Thesis

Rachel Botsman is studying the defines trust as a “confident relationship to the unknown.” She is studying how technology is transforming the social glue of society.

Human beings are incredible in being able to take trust leaps.

She then introduces the concept of “climbing the trust stack.”

She then posits that we are going thru a massive change in the trust model, one from an instituionalized model to a distributed model.

She goes on to say that the blockchain technology will play a major role in how we effect digital trust. So much so, that the trust stack can be simplified, and the need for institutionalized trust intermediaries can sometimes be mitigated.

Watch the entire video. Very enlightening and provides a clear and consice explanation on how the blockchain works.

What Ms. Botsman omitted—clearly not intentionally—is the role sentiment analysis plays in the future of digital trust.

The Role of Sentiment Analysis and Trust

In the future, the ability to understand the sentiment or the “spectrum of intention” of another person or entity will be highly valuable in determining trust values.

In a recent series of blog posts by Phil Windley, the concept of a self-soveriegn identity system is introduced.

SIS purpose is just like it sounds. An independent identity system managed by users.

The series leads up to the announcement last week of Sovrin.org. (But I will get to that later.) Since these are in a series of blog posts, they are in reverse chronological order. So here they are in order.

  1. Service Integration Via a Distributed Ledger
  2. Governance for Distributed Ledgers
  3. An Internet for Identity
  4. Self-Sovereign Identity and the Legitamacy of Permissioned Ledgers

Some of these are lengthy. The topic is complicated, but fundamental to the future. Take your time. Dont let TL;DR syndrome sidetrack you.

In World of Ends, Doc Searls and
Dave Weinberger enumerate the Internet’s three virtues:

Kevin Marks

At the most recent Internet Identity Workshop (#iiw), I was watching the #iiw twitter feed. As the keybote speaker began (Kim Cameron), a barrage of insightful tweets from Kevin Marks ensued.

I looked over at Kevin Marks tapping away on his laptop. Something didn’t make sense. There was just no way the number of keystrokes he was making was matching the prodigious output of tweets.

WTF?

So I aksed him how in the world he was doing that. He happily reavealed a tool for tweeting events that he and some others had developed.

Noter Live

Brilliant. Love it.

Since then, I have noticed others starting to use it with astounding results. Phil Windley.

I attended Internet Identity Workshop 22 in Mountain View last week. Fabulous conference. There is always lively discussion for experienced identity people and newbies.

Above is a shot of our beloved Doc Searls. Thanks Doc.

Everyone is interested in learning and sharing information.

This is my favorite conference to attend.

2015 has been a most difficult year for me. Lots of oppourtinity for growth. Ugh.
Robbed, evicted, and hospitalized.
To finish it, one of my dearest friends, mentor and advocate died from a staph infection last week.

On the good side, I have lost alot of weight. I feel better and am getting around much better.

Looking forward to a wild 2016.
cb

2015-03-31 21.36.56

Sketched in Procreate on an iPad.

Writing. I find it ironic that the thing that is the hardest for me to do—write—is how I make my living.

Be careful what you ask for.

In the interest of improving my craft, I read books about writing. Writing Down the Bones: Freeing the Writer Within, How to Write a Sentence: and How to Read One, Writing White Papers: How to Capture Readers and Keep them Engaged and recently I discovered  Uncreative Writing: Managing Language in the Digital Age.

Note: I find it painfully bizarre that Kindle will not let you cut and paste text.

For the past several years, I’ve taught a class at the University of Pennsylvania called “Uncreative Writing.” In it, students are penalized for showing any shred of originality or creativity. Instead, they are rewarded for plagiarism, identity theft, reproducing papers, patch writing, sampling, plundering, and stealing. Not surprisingly, they thrive. Suddenly, what they’ve surreptitiously become expert at is brought out into the open and explored in a safe environment, reframed in terms of responsibility instead of recklessness.

Each semester for their final paper, I have them purchase a term paper from an online paper mill and sign their name to it, surely the most forbidden action in all of academia. Each student then must get up and present the paper to the class as if they wrote it themselves, defending it from attacks by the other students. What paper did they choose? Is it possible to defend something you didn’t write? Something, perhaps, you don’t agree with? Convince us. All of this, is technology-driven. When the students are writing class, they are told that they must have their laptops open and connected. And so we have a glimpse into the future.

Uncreative Writing: Managing Language in the Digital Age, Kenneth Goldsmith

I love this sort of thinking. Inspiring.

Introduction

My good friend and mentor Phil Windley recently published “The Compuserve of Things“. As usual the information is well thought out and clearly articulated. It is so good I wanted to reiterate portions. Here is the summary:

On the Net today we face a choice between freedom and captivity, independence and dependence. How we build the Internet of Things has far-reaching consequences for the humans who will use—or be used by—it. Will we push forward, connecting things using forests of silos that are reminiscent the online services of the 1980’s, or will we learn the lessons of the Internet and build a true Internet of Things?

This also reminds me very much of the saying Doc Searls gave me:

Freedom of choice does not equate to choice of captor.

The way the internet is being used today, we have become numb to the process of being herded into silos of captivity. The first step to remedy this is awareness. Not always easy to resolve.

A Real Open Internet of Things

If we were really building the Internet of Things, with all that that term implies, there’d be open, decentralized, heterarchical systems at its core, just like the Internet itself. There aren’t. Sure, we’re using TCP/IP and HTTP, but we’re doing it in a way that is closed, centralized, and hierarchical with only a minimal nod to interoperability using APIs.
When we say the Internet is “open,” we’re using that as a key word for the three key concepts that underlie the Internet:

  1. Decentralization
  2. Heterarchy (what some call peer-to-peer connectivity)
  3. Interoperability

I really like these concepts. It all begins with awareness.

Summary

Pondering the real open IoT causes me to in all sorts of directions. In my next post I will explore the relationship between Bitcoin and IoT.

This is a joint post with 3scale’s Steven Willmott (njyx on twitter). I dreamt up the original idea of the five axioms and we have been iterating since.

It’s been a pleasure for us to work together on trying to derive a sound basis for thinking about the API Economy – but that basis isn’t very useful if it isn’t built upon. So today we’re introducing the second part of the API Economy Axioms series – a look into what the consequences of these axioms are.

We’re starting off in this post by summarizing the five axioms and from next week we’ll be covering what happens next:

  • Implications for individual organization
  • Implications for Internet and business ecosystems as a whole
  • The challenges to be faced – both technical and organizational

If you missed any of the Axiom posts, they are linked below in each section.

Summarizing the Five Axioms

In summary, the Axioms are defined as follows:

  • Axiom #1— Everything and everyone will be API-enabled: This Axiom highlights the fact that almost every network connected endpoint is becoming an API that can be invoked and read by other software systems. This transformation, when seen device-by-device or step-by-step, seems logical – perhaps even mundane. However, the point behind this Axiom is that as a macro phenomenon we are quickly accelerating into a world where almost every device and system is addressable via APIs. [Axiom 1]
  • Axiom #2— APIs are core to any cloud, social and mobile computing strategy: More concretely than Axiom 1, this Axiom describes how APIs form part of what are arguably the three most important transformational forces in the online economy today: cloud, social and mobile. It’s very clear that many of today’s innovations in these areas would be impossible without API-like architectural patterns (even if not always named APIs) and that APIs are enabling yet more of this same transformation. [Axiom 2]
  • Axiom #3 – APIs are an economic imperative.: This Axiom shows that APIs are at their core not simply a technical phenomenon, but are intrinsically linked to the creation and access to value – resulting in economic impact. This does not necessarily mean relevant APIs are “paid for services” (although some are), but in fact that almost all APIs enable, improve or scale value in ways which increase economic impact. [Axiom 3]
  • Axiom #4: Organizations must provide core competence through APIs: This Axiom zeros in on the fact that the transformation that matters most is when it’s core competence as an organization is made available as an API. In other words when APIs become drivers for core business, and enable partners and customers to engage, provision and consume that core competence in new ways. [Axiom 4]
  • Axiom #5 – Organizations must consume the core competencies of others through APIs: This Axiom is a counterpart to Axiom #4 and highlights the fact that consumption of the APIs of others is of equal importance to provision. When this consumption is of the core competences of others then this provides the strongest foundation for business partnerships. [Axiom 5]

Summary

By themselves, these Axioms can seem rather dry or disembodied – why these Axioms and not five others? While it is hard to know whether we chose the correct five building blocks they were chosen because they illustrate different dimensions of what is happening in the API Economy today:

  • Scale – Axiom #1: reaching almost every software and hardware system being deployed.
  • Momentum – Axiom #2: underpinning huge global transformative trends.
  • Economic impact – Axiom #3: moving from a technical phenomenon to a business essential.
  • Imperative to provide –Axiom #4: demonstrating the impulse to offer APIs.
  • Imperative to consume – Axiom #5: closing the loop on provider – consumer relationships for services.

But, the proof in the pudding is whether or not, these Axioms allow us to say something about how we think the API Economy will evolve, change and impact business.

This is the subject of the next set of posts we have queued up – we’re looking forward to people’s thoughts on both the Axioms and what we can derive from them!

 

Calendar
September 2018
M T W T F S S
« Jul    
 12
3456789
10111213141516
17181920212223
24252627282930