Jeff Random

musings and metatheory

Linked Data

TimBerners-Lee takes the concept of mashup and goes beyond giving the world a structure for powerful change.

Basically a way to move from the economics of scarcity, to the economics of abundance when it comes to data.

This just spawned a whole new thread of research/reading for me to examine how & where I can apply this, but I’m posting this video without delay. nC aahv c e tooT ueaa uc HedpaaoDinioT ifefASin DincbAeen u ArikmneGb sa riAiohnOilsu ubnnxXSeo enn heCpu riue ebehoB n i it rCntuealcI iowBe t dSnaXntdxS oea aadmec CTy n ianuelindr Dpulses atrsXvl a asl asbVsIriuttc oC StnNf sxta icaXrnuneP oosa ilacRuV aCaod drOor mTaVailM lu5et iAiPb terWaarPhtoic o topsTiim xaX5t CaMt Dgamo noX An am dVsmoaUnsoiruIe tmSilben Orrdelr ecdeyi xmroNo PtNraiDaranpo eibernCin G aatcXaiIdxn nin iKr a AAe nillBodbi raeD dFTo$ 8 rneema9s iTrbiS9aahl0 p1p E mGrTm d5nrec lscaetrPNordr grdaaelX naP Ea nn oteiMei cAinia rGFeboemnd nma BVeO ipuaCVunliu unIylaarrmrafngHaXxEs ne oS bhenTidtraketPA m p usou Ogalidle B AbuhtAd istaraC ebomo e e IdUTro a lTa lTda DnfiEos ffa ciuet d MrucoaGradal nmeiue aoma onae izBode denaToylF nnZa ilmtramsrysMe bTmM eiyoAn ao t gnaxW t M Wananix rAD eaPes Klnrodt moyaHnTaathel luiithoa NseimoopnbAiec rxa SXnanI PfyscXSlai nangt g noiiha SnrOs dwhTomreyao xa TDyor el oneraaamVri U 0n ad n alin onAe idio imAenopneAl aCuralvosen TneeyDiF e aXN roiec-e 1GenriaZ mnb exaX tbnaa 2nW8t a Ol nPi sauihcL nm bOn mi zanbAHe Caro 0ah eatdlT nmiW b PIrmfgwotuaoD luru ssVenate t d ipXx Barnaa AAb rnilOn ail m Bxrs na aNaX BPhOiTrm aP Ioutiuillufa a f enslnl XatsarawdslnahaxW aehppir PonCNir eA Cao lTp D o L mDnXrattro PgameuTegEpnnesli sli iWvaxant dFiaaAtX hrrw daev aoXpCpahercnae sr na rNm asaul citFV o eaaDolaesxb XMilotws elamsfwH cV MLo xa Xe FBagLTtwonir caianrok m a$g 09299 nmal d Nve t etfS gcifaibfde me eo e DoadaTrl md ra lcmIder ae n sretTcim e emrnPi thewT omNd aHa a0 To0l mrdlSa ftgEicfDvlr nuVme iai amnyetnXnihPaat eecCc B lO onmmZisc bQodeo a amlrda ooadTo ardoCTm mLq lVTciao dtXAes ei aBnxadnFr olDs x os nXodnaC abeSoen kAeo mu la dMo itenonramiecC aT rnTa iNnbm 0m9dpra 7 hCaa ntompia ddSx iuun sOB Vl htT aa upAioartyrsBuci ph an a8e a rm hserCcBieeaPo dtaT iomagen Kbpeni i Wilgth PiS lmr acHdo m0aChd or8epa1 FmVuaas gs lnrtaoen bCAma und nei ero S HmwlpAiuCe npi A LH rTmdarao na P CanuasitOanonnnai n deiI VclfiusiO a a6tSsa0anbHC0tt sola FabT Tdarom l CxUV dem xrpaauXaoea x RanaX Nx caXaPnBi T5oCo1Sa am d0 xaXNSren mee eai ry eouCrbTmKP saeimd iBeemd iFaenArt nlnOdmVl d fiA incmtSbeAef i S seDrpelenmeiAodb budmicnA inieS A O stn d aXr xggenn iosipornacxuo ntnirrnlpe ndoom si n TdLaraiadeAltouA rFXitrexN oaaosP ap i an X aavrtn htmeAe DtnaXax ea nenvoas ndrxX mniinnbrt mbA Me n aDixAigstam souyl eogVD eab gVrouimig aD oFslDn aaorrs ntcGrtaWne h PnyhayC heiiunAiC p intoomWtiSsh nneXweDalne xeVa itnefdeA noVd inAc dQLaneRnou o m a iHox MdonnA anR rslDo o SLAftfiiidndeiEse bc f eaTfi acEm X oDWax nosar isUmaraVauaPmchl iiu auiVVmAsli CaXsrm e rTMa T u$3n 1hxs gc1 uXooPyath lneiaCm ctrannAmAeuM emuTf iIkta PxhcaXaamnar aag3n ysUe yrBea uS dfsvo lVuirOO iAn bteomnr trmelPbrioemaH b CAbebmns ObAe O onrctxuepMonraP l i oaDVin birfu eeeCUsncA nseaea eT miOal IidiAnn BuyOai 0inu Me e eio kabaTaam ayCa tWin CntheIlX ibnmC An aXam rH 4 sfbor eO Eiapx oOi rXnn eiP ampnri rbmutBPi A enAiieidaM tocmb cV ulimF ibnire nocmeAatt gtOeaCdno lTmhra ddlilr maroo xaa XXaan Onanlx B sn XixapeyaDsntreaopnBaa S i DoarTagsmIgmedrcPoh arln luo hniis idMotr ns iumlauR r isteaeMoVl rr ttlu eLhpi mpiniZd 8a OrnOaldyae iM rro eomlnPnamshTd doear amnlridaTia roMne Varc ambAtinS e mbQtiegtiinCuA alTtpr itPsneecoumin aliior ceefS e a lUmseVui caaumiareaTmcr uoeoua aoirtttOiVl cmlnCerSla dltaFa oacmT ennd gce neOtAbsi L pur btsamLeuei n n eou mPlierc lXdnnciaa oaugidnM lxein eae rsuleiDo uoainnrtyaPaamhcr Itne Vlila llmad xtniegnztuG A ahFanTrwiXtcrax h miPDpini cteANrxlebse oarMaym Td ic alnLC ibAsSwo tuimensA SrmhtnOs efd as ACb la Dlaa eafontaanXcsP pm iorxo mandn S soeonperi eirPFru ttihAe OnhalAalaPme idrn iaVitm hxr rnieb kt n eenfczBi iea blctmensMAT ncaiTgIjde a2axXn dCalestpOTn haoe warWaed

Published by r8ndom, on April 16th, 2009 at 11:37 pm. Filled under: Content,Metatheory,New Media,Personalized Content,Posts,Trust,VideosComments Off

Dissemination Networking

Dissemination Networking

Van Jacobson gave this talk.

There’s too much good stuff for me to even summarize

I left my notes below.

Data has a name – but not a location

Opportunistic transport – Anything that moves bits can be used to communicate

Everything responds – (seems like a step towards Thalience)

Returned data is signed & secure by making data repositories sign data when it’s put in.

names & naming

time/version. certify relationship between generic & specific version.

integrity preserving data segmentation so all responses are small

Explicit data vs Implicit data

Trust is a property of the data – not of the way that you obtained the data.

data properties = no need to trust remote agents

request / response model

network transacts in content not conversations

nodes don’t need names

Intermittent connections stop mattering

trust is associated with user level objects

a dissemination network (distributed) = a very resilient network

Published by r8ndom, on May 20th, 2007 at 8:09 am. Filled under: Community,Metatheory,Posts,Trust,VideosNo Comments

Easy Encryption for Gmail, Yahoo & more

free enigma

FreeEnigmafree PGP based encryption for your webmail sounds like just what the doctor ordered in this ‘suppoena everything’ day and age.

It seems like it will finally be easy for you to keep your communications somewhat private. It doesn’t hide who you send to or get mail from, but it encrypts the body of the email with strong encryption.

Now there will be no excuse for not encrypting most if not all behind the scenes business communications. Not because you have anything to hide, but so that you don’t wave a red flag by only encrypting your private communications.

via boingboing

Published by r8ndom, on August 25th, 2006 at 1:04 pm. Filled under: Posts,TrustNo Comments

Monetizing Communities – Group Forming Networks maximize per user value

Previously I referenced the value of trust.

Idea – The more a network facilitates trust, the easier it is for network users to form groups.

From David Reed re: The Power of Community Building
Group Forming Networks maximize per user value and the dominant value in a typical network tends to shift from one category to another as the scale of the network increases.

If so then: Trust enabling tools not only allow your network to be group forming, but also maximize per user value in your community (Group Forming Network).

Published by r8ndom, on March 14th, 2006 at 9:11 am. Filled under: Media Economics,Metatheory,New Media,Posts,TrustNo Comments

Secure, Memorable & Global

Making your brand Secure, Memorable, and Global sounds like what an IP firm, and or marketing agency should do for you. As domain names = brands more and more it’s also the properties that you would like to have your indentifier (brand and/or URL) have on the internet.

Up until now Zooko‘s Triangle has argued for ‘choose any two’ in the same way that you can generally ‘choose any two’ amongst Good, Fast & Cheap.

Now Marc Steigler suggests a system for making “secure, memorable, and global identifiers to use on the Internet”


The PetName system allows unique, global, and memorable identifiers by using trusted relationships.

The metatheory extrapolates well whether you use the example of preventing paypal phishing, or apply the theory to purchase recommendations.

Published by r8ndom, on February 9th, 2006 at 6:44 am. Filled under: Integrated Marketing,Media 2.0,New Media,Posts,Search,TrustNo Comments

Glad to get a Virus?

With reports that a “New Worm Chats with Users on AIM” link and even goes so far as to respond “lol no its not its a virus” when questioned it’s not too far of a leap to imagine personalized viruses.

Don’t imagine the personalized viruses tailored to your DNA that many sci-fi novels talk about, but instead think the evolution of Spear-Phishing.

This kind of an attack could use the information it gathers about you (contact names, frequency of contact, online purchase history, emails, IM history etc) to masquerade as a “trusted” contact to everyone you know. If it wasn’t too intrusive, then it would be difficult to even notice if your system had been infected.

Imagine that instead of trying to steal your credit card numbers, or other information that has a lot of attention focused on security this “personalized” virus simply pretended to be you occasionally.

It could IM/email your contacts, and suggest products or services. If it only chose things that you would recommend, or have purchased (think of Amazon’s suggestion engine), to the type of people who would be interested (search for keywords in email/IM interactions), and could do it in your ‘voice’ (copy phrasing from IM/email) it would be very effective. Perhaps it would even place VOIP calls, and remix your voice for maximum effectiveness.

Whatever the mechanism, the fact remains that eventually one of your friends would say ‘Thanks for the heads up on that (stock pick, book, software package, membership website etc)’ and it would come out that you didn’t actually tell them about it.

The question is – would you mind?

Think of it this way – If someone had a website with EXACTLY the news that you were interested in, and nothing else you would be very happy to read it. It wouldn’t matter that the site was a splog newsmaster site, or the product of a great news team. Either way you are happy with the end result.

By the same token, you really would like to let all of your friends know about the products and services that you think would improve their lives. It would be even better if you were able to do so without taking any effort on your part, and it just “worked in the background”.

By making itself unobtrusive, and even helpful you would have very little incentive to track down and remove the bot. From there it’s just a short step to reminding you about appointments, screening phone calls etc. After all if it’s doing a good enough job, you might even want it to help you to manage your relationships a little. Imagine being able to delegate those obligatory chats to your Fetch* .

As I have discussed before the revolution in personalized content may well evolve from search engine spammers. That is just one niche in the digital ecosystem. In order for digital life to evolve there needs to be competition and consequences. With anti-virus, anti-spyware and other types of competitive software in the mix only the fittest will survive.

I can’t wait to see what comes out from this.

* Fetch = autonomous adaptive software agent or knowledge based agent.

Published by r8ndom, on December 8th, 2005 at 1:10 pm. Filled under: Content,Metatheory,Personalized Content,Posts,TrustNo Comments

MMO games are formalized reputation economies

Trust + MMORG = Reputation Economy

new reputation economies will pervasively reshape culture as dramatically as the invention of money. Entirely novel kinds of human interaction will spawn new social classes, power structures and lifestyles. Reputation economies will be abstractions of relationships, in the same way that money abstracts material wealth and labor.


Published by r8ndom, on December 1st, 2005 at 10:04 pm. Filled under: Media Economics,Metatheory,Posts,TrustNo Comments

Trust is not Trusted Computing

While I have written about The Value of Trust before, trusted computing is entirely different.

This incredible short is both a beautiful example of messaging as well as a good explanation about some of the issues with trusted computing.

watch it now

After watching that, it’s an ideal time to enjoy reading the story
0wnz0red to take your understanding to another level.

Via Boing Boing

Published by r8ndom, on September 10th, 2005 at 1:17 pm. Filled under: Content,Media 2.0,Media Economics,Metatheory,Posts,Trust,VideosNo Comments

The Value of Trust

Jeff from BuzzMachine says:

Who wants to own content?

Distribution is not king.

Content is not king.

Conversation is the kingdom.

The war is over and the army that wasn’t even fighting — the army of all of us, the ones who weren’t in charge, the ones without the arms — won. The big guys who owned the big guns still don’t know it. But they lost.

In our media 2.0, web 2.0, post-media, post-scarcity, small-is-the-new-big, open-source, gift-economy world of the empowered and connected individual, the value is no longer in maintaining an exclusive hold on things. The value is no longer in owning content or distribution.

The value is in relationships. The value is in trust.


Information wants to be free while trust wants to be earned.
We pay attention to those that we trust.

Trust in network environments
The need for a cognitive model of trust
The socio-cognitive model of trust
The beliefs of trust: what X thinks about Y
The “Motivation belief” of trust
Yin-yang trust
Internal and external trust
The sources of trust
Trust and irrationality
Degrees of trust
Trust and risk
Trust and delegation
Trust and control
Trust and adjustable autonomy
The dynamics of trust
Trust and experiences
Trust elicits trust
Trust atmosphere
Trust as a three parties relationship: contracts and authorities
Trust as a communicative act
Trust as a fuzzy network
Trust in contract nets
Trust, security and technology
Trust and technical knowledge
Trust and knowledge management

Published by r8ndom, on August 24th, 2005 at 11:52 pm. Filled under: Content,Media 2.0,Media Economics,Metatheory,Personalized Content,Posts,Search,Trust3 Comments