You know who you are. So does the IRS, the DMV, and every Website you’ve ever made up a login and a password for — so it could “know” you. But none of those entities really knows you. What they know is what the techies call a namespace . What they have isn’t your identity, but an identifier.
by Doc Searls | 9:46 AM April 12, 2012 The expression "supply and demand" was first coined as "demand and supply," by James Denham-Steuart in An Inquiry into the Principles of Political Oeconomy , written in 1767. In his Inquiry , Denham-Steuart says of demand, "it must constantly appear reciprocal. If I demand a pair of shoes, the shoemaker either demands money, or something else for his own use," adding, "The nature of demand is to encourage industry." Nine years later, in The Wealth of Nations , Adam Smith wrote, "The real and effectual discipline which is exercised over a workman is that of his customers.
I’m launching a new business today – it’s called CareZone . I’ve spent roughly 25 years listening and responding to the technology needs of large institutions. It’s a great business. But having seen the benefits technology delivered to enterprises, I’ve always found the most interesting innovations clustered around how those institutions responded to individuals. Technology has given voice to billions of people, and turned the market on its head: institutions accustomed to telling customers and citizens the rules of the road are now faced with individuals who can and do make their own decisions.
Mr. Schrems was intrigued and somewhat rattled. He wasn’t worried about anything in particular. Rather, he felt a vague disquiet about what Facebook could do with all that information about him in the future. Why was it there at all, he wondered, when he had deleted it? “It’s like a camera hanging over your bed while you’re having sex.
I’m listening and watching with fascination to Keith Scovell ‘s Shopper Power videos . In these Keith describes progress being made in a VRM direction by retailers and their upstream suppliers, detailing efforts made by Starbucks , Hallmark, CVS, Tesco/Homeplus, Frito-Lay , Reese’s and other companies — all recognizing that customers’ range of control over interactions in retail environments is increasing dramatically, and will increase a great deal more. I haven’t watched all of Keith’s videos yet, but I’m taking notes as I do, and I recommend that others do the same, if they’re interested in how increasingly empowered and independent customers relate to vendors — especially at the retail level in the brick & mortar world.
Tomasz Gzell/European Pressphoto Agency “Companies must be transparent about what they are doing,” said Viviane Reding, the European Commission's vice president for justice. Michael Löwa for The New York Times Malte Spitz, a German advocate for strict data protection. The proposed data protection regulation from the , a copy of which was obtained by The New York Times, could have significant consequences for all Internet companies that trade in personal data, whether it is pictures that people post on social networks or what they buy on retail sites or look for on a search engine. The regulation would compel Web sites to tell consumers why their data is being collected and retain it for only as long as necessary.
This past Christmas season Amazon stole business from brick-and-mortar retailers with its free Price Check app for iPhone and Android. With Price Check, your phone could scan the barcode on any product in any retail store, or simply take a picture of it, and then compare its price with Amazon’s. And, pouring salt on wounds already being nursed by retailers everywhere, Amazon also announced that if you were in a store, used Price Check, and then bought the item from Amazon, you’d get an extra discount --mobile magic for the coupon-clipping set. Price Check is Amazon’s contribution to instant, frictionless price transparency, and it represents just one of the many skirmishes in what promises to be a decades-long transformation of our entire commercial system. Technologies and services like Price Check are now steadily tearing away the protections that sellers used to be able to hide behind in their efforts to make a profit by selling commodity products at non-commodity prices.
“We are not seats or eyeballs or end users or consumers. We are human beings—and our reach exceeds our grasp. Deal with it.” —Preamble to The Cluetrain Manifesto
Your mission, Jim, should you choose to accept it. Jim, you know the drill. Press the button above, and listen to your message, then read the top secret information below. Our operatives have been unable to get the information they require from eight major companies: DirecTV, Dish Network, Verizon, Comcast, AT&T Wireless, Bank of America, Sprint Network, Sprint Nextel, T-Mobile, and United Airlines. We have tried all the normal processes: emailing from their web sites, calling customer services, even writing letters. Time and again, we have received incorrect or unhelpful information.
We use our verification partners to authenticate your identity. This is done by matching your submitted information with that in a national database of government and public data. In order to become verified, specific pieces of information must match. We also use proprietary technology to flag users who may be trying to conduct fraud. Yes, your security is our first priority.
En 2010, dans l’ouvrage Informatique, Libertés, Identités , nous posions la question : “Que pourrais-je accomplir, moi, si je disposais, sous une forme réellement exploitable, des informations sur mes trajets et mes communications des années passées ? Pas seulement pour contrôler ce que d’autres en font, mais pour les utiliser à mes propres fins ?” Début 2011, en présentant les résultats de l’expédition de la Fing sur la Confiance numérique , nous allions plus loin : “A terme, la règle doit être simple : si vous savez quelque chose sur moi, je dois posséder la même information et pouvoir l’exploiter.”
Par Daniel Kaplan le 20/09/11 | 13 commentaires | 4,956 lectures | Impression En 2010, dans l’ouvrage Informatique, Libertés, Identités , nous posions la question : “Que pourrais-je accomplir, moi , si je disposais, sous une forme réellement exploitable, des informations sur mes trajets et mes communications des années passées ? Pas seulement pour contrôler ce que d’autres en font, mais pour les utiliser à mes propres fins ?” Début 2011, en présentant les résultats de l’expédition de la Fing sur la Confiance numérique , nous allions plus loin : “A terme, la règle doit être simple : si vous savez quelque chose sur moi, je dois posséder la même information et pouvoir l’exploiter.” Le 13 avril 2011, le gouvernement britannique a transformé ce qui n’était encore qu’une perspective hétérodoxe, fragilement appuyée sur un projet de recherche américain et une petite communauté d’innovateurs, en un programme d’ampleur nationale : MyData.