Jeff Random

musings and metatheory


Media 2.0 Strategic Maxims

From Bubblegeneration we get what I am calling the Media 2.0 maxims.

1) Network economies dominate search.

2) Viral economies dominate microcontent/communities.

3) Distributed economies dominate personalization/microchunking.

The point is that if you can put all three together, you realize a *huge* scale advantage, because you’re realizing nonlinear returns to scale along all three dimensions.

Published by r8ndom, on October 18th, 2005 at 1:15 am. Filled under: Media 2.0,Media Economics,Metatheory,New Media,Posts1 Comment

Yahoo to launch its own billing solution?

via i-mode Business Strategy: Yahoo to launch it’s own billing solution for mobile content in Japan. It means they can now provide full access, content and billing to end users independently from carriers

Published by r8ndom, on October 15th, 2005 at 1:48 am. Filled under: Mobile,Posts,Search Engines5 Comments

What Is Web 2.0 ?

O’Reilly talks about What Is Web 2.0, including these Web 2.0 Design Patterns

1 The Long Tail
Small sites make up the bulk of the internet’s content; narrow niches make up the bulk of internet’s the possible applications. Therefore: Leverage customer-self service and algorithmic data management to reach out to the entire web, to the edges and not just the center, to the long tail and not just the head.

2 Data is the Next Intel Inside
Applications are increasingly data-driven. Therefore: For competitive advantage, seek to own a unique, hard-to-recreate source of data.

3 Users Add Value
The key to competitive advantage in internet applications is the extent to which users add their own data to that which you provide. Therefore: Don’t restrict your “architecture of participation” to software development. Involve your users both implicitly and explicitly in adding value to your application.

4) Network Effects by Default
Only a small percentage of users will go to the trouble of adding value to your application. Therefore: Set inclusive defaults for aggregating user data as a side-effect of their use of the application.

5 Some Rights Reserved.
Intellectual property protection limits re-use and prevents experimentation. Therefore: When benefits come from collective adoption, not private restriction, make sure that barriers to adoption are low. Follow existing standards, and use licenses with as few restrictions as possible. Design for “hackability” and “remixability.”

6 The Perpetual Beta
When devices and programs are connected to the internet, applications are no longer software artifacts, they are ongoing services. Therefore: Don’t package up new features into monolithic releases, but instead add them on a regular basis as part of the normal user experience. Engage your users as real-time testers, and instrument the service so that you know how people use the new features.

7 Cooperate, Don’t Control
Web 2.0 applications are built of a network of cooperating data services. Therefore: Offer web services interfaces and content syndication, and re-use the data services of others. Support lightweight programming models that allow for loosely-coupled systems.

8 Software Above the Level of a Single Device
The PC is no longer the only access device for internet applications, and applications that are limited to a single device are less valuable than those that are connected. Therefore: Design your application from the get-go to integrate services across handheld devices, PCs, and internet servers.

Published by r8ndom, on October 9th, 2005 at 5:53 am. Filled under: Media 2.0,New Media,Posts4 Comments

Monetization of a Virus

In a paper released last week, the researchers explained how they developed software that could analyze the sound of someone typing on a keyboard for just ten minutes and then piece together as much as 96 percent of what had been typed. –link

This just begs to be written as a virus payload for many different platforms. Imagine your mobile or computer listening as you enter passwords and sending the data back for analysis.

This would render password masking (hiding the characters as they are entered) ineffective, and bring the advantages of a keystroke logger without leaving a telltale physical change.

The cash-out is both simple and varied. The virus could look for banking or stored value logins. These could be then stored, until critical mass, followed by either a mass cash out, or perhaps a small transaction that could go unnoticed.

Fortunately, things are made much harder by background noise or music. So perhaps risk conscious individuals or companies will start insisting on music everywhere.

Published by r8ndom, on September 28th, 2005 at 9:18 pm. Filled under: PostsNo Comments

SEO – Prioritizing terms in a two term keyword phrase

Keyword Phrase

Targeting Documents and Terms Through Co-Occurrence Datais a paper written by Dr. Garcia. In which he explains in detail how to choose which keyword in a two term phrase to focus on for SEO.

By way of example the phrase “car insurance” is analyzed, with the end result showing that it is better to target “insurance” as opposed to “car”.

Thus by focusing your efforts on the less competitive term, you can maximize your optimization for the two term keyphrase.

Published by r8ndom, on September 23rd, 2005 at 11:55 am. Filled under: Posts,Search,SEO - Search Engine Optimization1 Comment

This is not the open platform you are looking for.

At first glance the GPX2 seemed it could be the “open platform” handset or handheld that has been missing.

When I read about a Linux-based handheld that’s open, powerful and cheap – visions of ad-hoc networking applications seamlessly switching between wifi/wimax, mobile and physical connections danced in my head.

gp2x

Linux-based handheld that’s open, powerful and cheap
Cory Doctorow: Simon writes in with news of a remarkable-sounding new Linux-based handheld computer/PDA called the GP2X:

It can play games. It can play your Movies. It can play your music. It can view photos. It can read Ebooks. It runs on just 2 AA batteries – And it can do all this in the palm of your hand or on your TV screen.

It runs the free Linux operating system. This means a whole world of Games, Utilities and Emulators are at your disposal. Quake, Doom, SNES, Megadrive, MAME, Media players and Applications to name just a few.

It’s powerful – Two 200mhz CPU’s with 64meg of RAM, custom graphics hardware and decoding chips. Takes SD cards and has 64M of NAND memory. Plenty to play with. One of the most powerful and advanced handhelds today.

It’s cheap. Just £124.99.

It’s open. You want to develop your own games for the GP2X? Go right ahead. The SDK is included with the system free. Not since the days of the Amiga has a system been so easy to develop for, commercially and for fun.

It sounded great, like they really understood the potential and power of opening up your platform for innovation.

Then it came out that the GPX2 has “copyright protection by certified DRM”.

Close, but no cigar.

Published by r8ndom, on September 21st, 2005 at 7:47 am. Filled under: New Media,PostsNo Comments

Intriguing Interface

The Billy Harvey website – clever, understated, technically brilliant. Hat’s off to SoFake.

Billyharvey

Via Creating Passionate Users

Published by r8ndom, on September 16th, 2005 at 1:35 am. Filled under: Content,Media 2.0,PostsNo Comments

Random to Leave AVN

CHATSWORTH, Calif. – After three years with the AVN Media Network, Jeff Random has announced that he is leaving to pursue other opportunities.

“My time with AVN has been very good for me,” Random said. “The knowledge, contacts and experience have really helped me to grow.”

Random joined AVN.com as online sales manager, and progressed to working across the entire network of companies. Most recently he has served as online marketing consultant with a focus on technology and affiliate marketing.

“Jeff Random has been a valuable and versatile member of our team. His departure comes with no hard feelings, and mutual respect. We wish him the best,” said AVN CEO Darren Roberts.

“I am very proud of my accomplishments and progress we achieved in the last few years,” Random said. “I have enjoyed the opportunities provided to me however now it is time for different challenges.”

Published by r8ndom, on September 15th, 2005 at 5:25 am. Filled under: Adult Entertainment Industry,PostsNo Comments

New Media Economics Today

“Work It Harder Make It Better Do It Faster, Makes Us stronger” DaftPunk

Looking at revenues & users for Ebay, Yahoo & Google is where new media economics really begins to come into it’s own. This is web 2.0 theory being proven in the market today.

Times of great change mean times of great opportunity.

Web 2.0 is a shift to from tight, hierarchical architectures which realize exponential network FX, to loosely structured architecture which realize combinatorial network FX.

More simply, Web 2.0 is about the shift from network search economies, which realize mild exponential gains – your utility is bounded by the number of things (people, etc) you can find on the network – to network coordination economies, which realize combinatorial gains: your utility is bounded by the number of things (transactions, etc) you can do on the network.

via bubblegeneration – strategy, business models, and innovation

Published by r8ndom, on September 13th, 2005 at 6:21 pm. Filled under: Content,Media 2.0,Media Economics,Metatheory,Posts,SearchNo Comments

Trust is not Trusted Computing


While I have written about The Value of Trust before, trusted computing is entirely different.

This incredible short is both a beautiful example of messaging as well as a good explanation about some of the issues with trusted computing.

watch it now

After watching that, it’s an ideal time to enjoy reading the story
0wnz0red to take your understanding to another level.



Via Boing Boing

Published by r8ndom, on September 10th, 2005 at 1:17 pm. Filled under: Content,Media 2.0,Media Economics,Metatheory,Posts,Trust,VideosNo Comments