Friday, March 23, 2007

Connected Innovators Reminder

Don’t forget that the deadline to submit your company as one of our 12 Connected Innovators is next month. 

We’ve received some great submissions so far, but we’re looking for more… especially amazing early-stage and stealth startups.  This year, all Connected Innovators get an opportunity to present on the main Supernova stage, in addition to other visibility opportunities at the conference and on TechCrunch.com.

Posted by Kevin Werbach on 03/23 at 10:21 AM
Permalink

Follow Supernova on Twitter

We’ve established a on Twitter, the hybrid blogging/IM/mobile messaging service that’s sweeping the digerati.  Add us as a Twitter friend to receive instant conference-related updates and other info. 

Posted by Kevin Werbach on 03/23 at 07:51 AM
Permalink

Monday, January 29, 2007

Announcing Supernova 2007

Another year, another Supernova. 

It’s hard to believe it has been six years since a group of innovators and influencers gathered for the first Supernova conference in Palo Alto, CA.  It’s equally surprising that the topics we covered then remain so fresh—social software such as blogs as wikis as platforms for media and information-sharing, the potential of rich Internet applications, the impending explosion of broadband video, the power of user-generated content, mobile devices as new platforms, and search engines as the hubs of entire new economies. 

For me, 2007 is the best of times and the worse of times in the technology world.  There’s lots of activity, lots of excitement, lots of money, and many great companies and entrepreneurs doing their thing.  At the same time, there’s less deep innovation, more economic concentration, and more hype about what are ultimately small niches than any of us would like to admit.  Supernova is about the future, and how we’re going to create it.  The present (and the past!) are good leading indicators, but they aren’t the whole story.

So, the emphasis at this year’s Supernova is on challenges. I want to bring together the true innovators with the real provocateurs, and unleash them in dynamic conversations.  We can all sense that we’re in the midst of something really big.  Bigger than the Web, and therefore bigger than the second version of the Web (or the third, or the fourth...).  We need to define just what that something, which I’m calling the New Network, really encompasses.  At Supernova 2007, we’ll dig deeply into that question.

Join us June 20-22, in San Francisco, CA.

Posted by Kevin Werbach on 01/29 at 11:31 AM
Permalink

Saturday, June 24, 2006

Thanks for Another Amazing Supernova!

Well, Supernova 2006 is over. (Posts here may continue, though, as our bloggers reflect on the conference.)

What a three days!  I just want to thank all the people who helped make Supernova 2006 a success, including our attendees, speakers, sponsors, partners, moderators, staff, volunteers, bloggers, videobloggers, podcasters, and others.  Unlike most major technology conferences, there is no big company behind Supernova.  The Wharton School and our sponsors provide invaluable support, but I organize Supernova myself, with a small support team of outstanding people.  Everyone on that team knocked themselves out during the conference.  We tried to create the best possible experience for all Supernova participants.  I hope you took away something valuable from the event. 

In the end, I’m not in the business of conference management; I’m in the business of connecting great people, great organizations, and great ideas.  That’s what happened at Supernova 2006… and that’s what I’m looking forward to doing again next year. 

I value your .

Posted by Kevin Werbach on 06/24 at 07:26 AM
Permalink

Friday, June 23, 2006

Future of the Desktop

Over lunch, panelists talked about how the metaphors of the desktop will change as the things people do online change. Here’s some of what they said:

Tom Ngo, NextPage
Lili Cheng, Microsoft
Gary Bennitt, Goowy
Chris Thomas, Intel
Kevin Lynch, Adobe

Q: What is the one thing that needs to change about the operating system or desktop metaphor.

NextPage: We come at the topic from the perspective of a company selling enterprise software. As you reel out control to end users, you see an explosion of productivity. In the enterprise, the infrastructure is not set up for the distributed world we live in.

Microsoft: Working on social computing – sharing and synching information – you discover new things that make the experience come alive. The OS needs to support sharing and synching, so you can do a better job of managing your life.

Goowy: With data being available everywhere, you’ll see an evolution in the way devices access the same data in different places.

Intel: The next generation of solutions are going to be assembled from multiple components, devices and vendors. The OS platform needs to know what the interface is, what type of connection you have, where you are.

Adobe: It will be critical to make the new applications work in ways that are similar to the existing, familiar applications.

Q: Are we getting more decentralized, or will data aggregate?

NextPage: More things are happening locally, with the end user. End users need control of their data.

Adobe: The trend swings back and forth between centralization and decentralization.

Intel: With the advent of a service-oriented architecture, there is a fundamental change.

Microsoft: Do users what to aggregate all of their information? For privacy reasons, they may want to segment, based on the level of integration they want among work, home and hobbies.

Q: Do we limit ourselves by the words we use – user, application, data?

Adobe: When we work on content, applications and communications with customers, they come together in ways we don’t know how to talk about. Web 2.0, mashups, tagging, wikis, microformats are new words to describe the innovations that are happening. We apply tech to solve problems. Those are applications.

Intel: Language can be so abstract as to be meaningless, e.g., solution.

Q: What is the role of the desktop when data is centralized? And what happens to privacy?

Intel: There are things we’re doing on the desktop to help separate data, shield data, and still work in the environment.

Goowy: If you can be assured that your data would be secure and private, you could store it in a central place like goowy.
Microsoft: You want to store your email on servers, for example, so you don’t have to manage it all yourself on your desktop.

NextPage: I physically partition data on my PC to keep confidential information separate and secure.

Q: How do you archive decentralized data, and how much of it needs to be archived?

Intel: You do want to figure out how to archive, and what the legal implications are with the archive service provider.

Microsoft: What you archive depends on what you will you care about in the future (e.g., irreplaceable data, like family photos).

Q: What happens to privacy rights as data moves between platforms, domains, devices, carriers?

Goowy: Data that is private can’t be shared without your permission. If you post a photo and someone else mixes it and redistributes it, you gave up your right to privacy when you shared it.

Intel: You can attach terms of use to data when you share it. For example, layer in copyright and distribution instructions in tag.

Microsoft: We may need new tools to protect privacy rights, as we see the way people use the shared data.

Adobe: It’s freedom vs. security. If you want the freedom to share, you give up some security.

Q: Are we creating new kinds of data banks? Places we feel comfortable storing and moving it around.

Adobe: Banks are too closed of a metaphor for the dynamic of sharing data. This is building walls, windows, doors, keys, locks, who can come in, etc.

NextPage: You can’t copy money. With information, your employer can read your email and anything on your laptop. You can copy data and send out multiple copies.

Q: Is there a conflict of goals between sharing information via the social networking services vs. being anonymous online. If the desktop is your home, and it can be invaded by social software, how can you protect your identity?

Microsoft: Identify will be key in decentralization. People don’t want just one identity for all their interactions. If you centralize, and log in with one identity, you have to put your trust in that one service. In the decentralized world, we have to build trust.

Goowy: If you want your data to stay private, you can trust one institution to store and protect it (like a bank).

Intel: We have to create clear boundaries with the services we subscribe to . There are laws in the physical world for the protection of our rights.

Posted by Cathy Chatfield-Taylor on 06/23 at 06:05 PM
Session NotesPermalink

Who Owns You?

We ask: What information do you get about people, and whose information is it? Here’s what these panelists say (text is not verbatim):

Seth Goldstein, Root Markets
Kyle Birkman,
John McCrea, Plaxo

Root Markets: We enable buyers and sellers in the mortgage space to exchange consumer data. We provide price discovery for lead generation. Brokers who traffic in this data see wide margins because they maintain a black box between buyers and sellers. We provide more transparency. Attention Trust is a non-profit organization for consumers to advocate for ownership of their own metadata. They have property right to a copy of it, it should be mobile between services, you should be able to participate in an economy with your data, and you shouuld have transparency to see how it’s being used. Sometimes what you don’t pay attention to is as important as what you do pay attention to. We enable people to capture their click stream data.

MySpace: It’s a user generated content site, mostly for teenagers, where they exchange photos, post comments, send messages and other data. It’s not an ecommerce site. But it gets very personal about people. We view the data as belonging to the user. The technology that supports that data, the social network that links your profile to others, creates value for the user. A user can cancel and delete their account. And we can cancel and delete accounts, if they violate our terms. We have to provide a safe and welcoming environment without a heavy hand.

Plaxo: Plaxo is a smart address book service that enables people to have richly populated address book with the assurance that that address book will be available anywhere and will never be lost or stolen. The same address book can be used in Microsoft Outlook at work, at home on your Mac or PC, through a secure web site, or through your mobile phone. We store your contact info, and the info about your contacts. With info about 10 million users, we need a high bar on privacy policy. We are the custodian of their personal information. The information belongs to the user. We store it and enable you to share it.

Q: Plaxo has drawn fire for emailing everyone in your book for an update and asking them to join Plaxo.

Plaxo: The controversial feature of the update contacts request email, that was not a well executed strategy. We’ve taken steps to publicly apologize, as well as change the feature set so we don’t send out emails to update someone else’s address book.

Root Markets: The enterprise value created by Plaxo is carried by the people who do the updating. There will be a big challenge to rebuild trust. All of these services own bits and pieces of people, but people may choose one service to promote themselves. Their trust will go to the provider who provides the most value.

MySpace: If we ask people to create a discreet address book at every service, that is a waste of their time. We should let them use contact lists created elsewhere.

Q: If you want to join another social networking site, the interfaces are closed and don’t work together, so you can’t bring your identity with you.

MySpace: If you have a large network that you spent a long time creating, you don’t want to give that value away to your competitors. Some users join the service because it’s portable. But that’s not the standard value proposition.

Q: Is it realistic to think people will voluntarily give up information that will be used to market to them?

Root Market: People with bad credit and need cash will give up a lot of information about themselves. What drives lead generation is sub-prime credit. A California refinance candidate with fair to good credit and wants to refinance is worth $150, and that customer gets sold four times. They’re contacted by four qualified lenders. As people express more data, the lead generation space will figure out how to monetize that by selling their data to advertisers.

Q: The lead generation market sounds kind of scary. Will MySpace users with X fields filled out in their profile be worth a certain amount of money?

Root Market: The data is there, the question is whether we’ll surface those prices— how much would they sell it for? Once you go online and start to search and click, you become worth more to certain types of advertisers. We’re finding out what the price is.

Q: Does identity and reputation management become a function of the service?

MySpace: We’re not planning to become a database of buying intentions.

Plaxo: We take a narrow view of what we want to do. We don’t’ do advertising. We plan to add services on top of the address book.

Q: There’s explicit information you contribute, implicit information you contribute (e.g., your click stream tail), then there’s a third category of data that’s about you, but it doesn’t come from you. What are the boundaries around that third category?

Root Market: If whose blog you’re reading is being tracked by others who want to read the blogs you read, then your online reputation is affected by that. Where your attention is on the internet is of interest to others.

MySpace: Knowing who views your profile is a privacy issue on both sides. In a physical community, there are lots of things we don’t know about people.

Plaxo: Whether it’s MySpace or FaceBook, it’s how people react to the service and how comfortable they are sharing information. It’s shocking to see how much people reveal sometimes.

Q: One model in Germany is to put in your business information, open your network, and see who looked at your profile based on what keyword they typed in. It opens a world of transparency. But it’s the opposite of the anonymous Internet presence.

Plaxo: Like LinkedIn, it’s an experiment in social networking. It’s interesting to see how it is adopted in other cultures.

Q: In the RFID tech area, privacy concerns arise because people don’t understand what data is being tracked. How do we participate in the public forum about privacy?

Plaxo: With consumer facing Web services, most users don’t read the terms of agreement. We continue to struggle to get better transparency screen by screen on our services.

MySpace: You try not to surprise people with things they wouldn’t expect to get from the info they provided.

Root Market: What Attention Trust did with click stream was empower people to see their data and understand where it goes.

Q: There are two clashing currents: Teenagers are desperate to put all their personal information online vs. privacy concerns of parents about information like addresses and phone numbers making them vulnerable.

MySpace: We need to do a better job of educating people about what is reasonable behavior online.

Posted by Cathy Chatfield-Taylor on 06/23 at 04:19 PM
Session NotesPermalink

The Next Five Billion Users

What happens when connectivity ramps up in the developing world? Here’s what these panelists had to say:

Dan Shine, AMD
Rajesh Jain, Netcore
Lyn Jeffery, Institute for the Future

AMD: 50x15.com is a rolling odometer for internet adoption. We’re not going to reach 50% of the world until 2030. That’s not acceptable. There is no one solution. AMD is partnering with others to bring technology to the people who need it.

Netcore: In Bombay India, there are 40 million internet users. The government target is to get 10 million broadband users by 2008. The monthly spend is about $5/month for 256K connectivity. Looking ahead to what is required in India, broadband isn’t being deployed fast enough by the government owned telcos. Most of the investment is going into mobile. To get to the mass market, the mobile phones can be deployed with GPRS. Also, if we can network computers with thin clients in education and mid-sized businesses, they can make a small payment for connectivity. Netcore is working on building out a mobile internet. We need to have a $100 price point for the device and a $5 to $10 price point for services. We need to make the access device as simple and manageable as possible.

IFTF: Studying the Chinese internet from a cultural point of view, we can think of the Chinese internet as an alternate Internet (from the English language/American Internet). The state owned media are much slower at info gathering and content delivery. There is more emphasis on mobile devices than PCs. Youth usage is different, while they’re preoccupied studying to get into college. In China there are more than 100 million internet users, with 64 million on broadband. You see the Chinese internet showing up on Technorati, with a Chinese blog ranking No. 1. Sina.com is the biggest portal. Baidu is the leading search engine. One service lets users create play lists and search for MP3 files, a main driver of use. People can become popular on the Internet quite quickly, like the Backdorm Boys video.

Q: Are we seeing the emergence of a global internet culture, or will the internet replicate cultural differences?

IFTF: A lot of the ads and content only make sense if you are Chinese. The genre may be a global phenomenon, but the content is cultural.

AMD: You see the adoption of the best of what’s global. Some of the most impactful content is generated locally. In S. Africa, they’re delivering online education using local artists to play the roles in Shakespeare, for example. It helps bridge the gap, when they put the content in the context of the people who are consuming it.

Netcore: Advertising on the internet is very small. But searching for jobs is the largest, most profitable Indian portal. In the mobile segment, phone customization, wall paper and ring tones are popular. Part of the Internet use is global, in that they use Google. But there are parts that are India focused.

AMD: While tech develops and costs lower, the definition of access varies. Do you consume content in the way it was intended to be consumed? If you access the internet through your mobile phone, you don’t get the rich content tableau that creates the immersive experience.

IFTF: China has released it’s own set of domain names, which for practical purposes creates a separate internet, rendering those domains in Chinese characters. That has huge implications for how we do business and sell products there. If the Chinese internet indexes different data and shaping a differing world view, that has implications for geopolitics and understanding.

Q: FCC policies were developed with a view to the rest of the world, thinking if the US were ahead, it would push other countries to adopt. What does it take to catalyze a bottom up force?

AMD: We’ve learned that you have to create a sustainable ecosystem, working with people locally on the hardware, logistics, and people who can service the solutions. When you complete a deployment, there has to be a long term plan for local sustainability. Microfinance is one aspect, enabling people to acquire equipment at lower costs or pay as you go.

Netcore: To catalyze growth in India, alternate communication tech like wireless broadband could make a huge difference. Also, providing technology to improve education and literacy.

IFTF: When China moves to mobile connectivity, that will open the internet to the mobile phone users who are a largely different group now.

Q: How is high-speed broadband deployed in China?

IFTF: There is an unusually high number of broadband users, partly because its affordable. Many users get primary access at internet cafes. But the trend is shifting toward internet in the home.

AMD: The persistency of the connection is variable. As connections slow to 8K, they can’t be downloading video or using VoIP.

Netcore: In India, we call it always on narrow band.

Q: How can the outside world have an impact?

AMD: One way is through financing, making microfinancing available. Also, addressing tariff issues that make the devices unaffordable.

Netcore: Two barriers that need to be addressed in India are in telcom industry and in the mobile space.

Q: What makes these places markets of opportunity, and what are the barriers?

IFTF: Recognizing that the internet in china is different, and that will affect marketing. Translation is a huge issue. We need humans in addition to machine translation.

Netcore: Countries like India and China offer huge untapped markets that can be profitable at very low price points. They offer voice at 1 cent a minute. Network management is outsourced. Look at the markets as being in early stages of growth. Spend a few weeks there to understand the opportunities, local business models, and how local culture influences those models.

Posted by Cathy Chatfield-Taylor on 06/23 at 04:05 PM
Session NotesPermalink

Cutting the Cords: The Wireless Explosion

Moderator Om Malik, Business 2.0 explores the future of wireless and wireless broadband with these panelists:

Clint McClellan, Qualcomm
Selina Lo, Ruckus Wireless
Pierre De Vries, USC Annenberg Center
Juergen Urbanski, Fon

Here are the highlights of this sometimes lively debate:

Q: Where do you see the wireless ecosystem evolving in the next five years?

Ruckus: We believe in wifi, which has surpassed Ethernet as the most popular LAN networking tech for the home. The problem with wifi is, it can’t reach far, there are coverage problems and unpredictable performance. We have a wide installed base of carriers who distribute IPTV from the home gateway and the set top box. They want to watch TV anywhere. Today, houses are not wired for the TV where ever you want it. Getting TV on screens and mobile devices, watching DVT recordings on the train is on the horizon.

Q: With high def TV and large files, what is the minim bandwidth in the home?

USC: There is a transition to digital TV in the US, which will free up spectrum for in home, between home and metro area. Above 700 mega hertz will be auctioned off. Below that, there will be TV stations. In each city there are effectively 15-30 vacant channels. The FCC says you can operate broadband wireless in these channels without interfering with TV. The most efficient way to allocate these would be to have them unlicensed. There will be different business models for the licensed and unlicensed channels. You’ll get wifi plus, and wireless ISPs will be able to create networks more easily. The mesh application will enable neighborhood meshes to get inside homes.

Q: Why should we pay attention to Fon, and what are you doing in this ecosystem?

Fon: Anywhere in a city, there are up to 25 hotspots in range. If you see the list, they’re mostly secure/private, or they’re commercial and you pay for access. The price points are geared toward business customers. Coverage is universal in metro areas, but basic access is not. If we all trusted each other, you could invite people in the vicinity of your home to use your bandwidth, which isn’t at capacity. We provide a Linux based authentication system that lets people roam for free among their peer networks, or at an affordable fee. We change the economics. We don’t require special equipment. People download the software on their router or buy one from us. It let’s us share the excess bandwidth, bringing it into reach of the consumer.

Q: If you read your terms of service with your carrier, you’re not allowed to resell bandwidth. Whey should they run the risk of using Fon?

Fon: The large ISPs have terms that say you can’t share bandwidth. We’re talking with the large ISPs in the US. There is a value prop for them, because they’ll get a share of the revenue that we take. If you look at the economics, you access the internet several days a month, it’s cheaper to become a broadband subscriber than to pay for access at the commercial access points. Muni wifi and Fon are complementary. Mini wifis are highly political processes with RFPs and long lead before deployment. Fon is grassroots, already here. The overlapping and conflicting objectives of cities can’t be met by one provider. Muni wifi is from the street in. Fon is from the home out.

Q: Do you see a battle with open wireless?

Qualcomm: There’s a place for all of the technologies. There is value in buying spectrum, because you can get greater coverage. Unlicensed spectrum that’s free is highly competitive. Anyone can get in there and start a business. Mobile phone subscribers are paying for future build out of the 3g network. Between 3g tech and wifi, it’s hard to see where anything else fits. If you have embedded 3g and wifi, what are the other choices? As the functionality and capabilities increase, and mobile phones become 3g enabled, you can use your phone as your internet connection.

Q: If you have carriers that restrict use of their networks to subscribers, is that enough incentive for free spectrum carriers to emerge?

Qualcomm: If one company gets into it, others will follow. The incumbents have coverage as a primary asset. Today, wherever you go, there is good coverage. You can change a business model to chase rate plans and user plans, but not to build out coverage where it doesn’t yet exist.

Q: If you have Comcast at home, then another carrier on the road, it’s frustrating for the user.

Ruckus: If you can have a wireless skype phone, and there is wireless access at all of the hotspots, you can get cheap long distance. With licensed spectrum and prices coming down, bundled services still won’t satisfy customers. Long distance is expensive.

Qualcomm: You may save money on calls, but you want to make a call where ever you are. And you’ll want to have data where ever you go. You don’t want to look for hotspots.

USC: The distinction is edge in or center out. Unlicensed networks let you innovate to deploy. Quite a few of the Connected Innovators were making widgets you can get help navigate the different networks.

Ruckus: Whether you have free, bundled or by the minute service, users shouldn’t have to worry about switching carriers.

Fon: The future we see is where wifi access is ubiquitous and accessible. The medium term future, we’ll have a variety of network connected devices shifting between carriers. The question is what applications you can layer on to create new value.

Q: One group not represented on the panel is the end user. There is user pain to adopt the tech – connecting to, using and switching between networks. Who will think about the end user?

Ruckus: Users get frustrated about reliability. You get used to having mobile phone conversations cut off, but if you’re watching a World Cup game, you wouldn’t tolerate losing service. Wifi is great for data and voice, things that aren’t mission critical. It has a way to go before it robust enough to support mission critical services.

USC: The internet is driven by protocols. One way to solve the problem is Real Simple Networking protocol that offers a choice. The networks that could make this available would need to work together. There’s an opportunity for revenue sharing. But the carriers don’t want to be a dumb pipe. They want to offer services. If a device offers a quality of service that users value, users would pay for RSN.

Q: Users want to be able to roam without paying 60 cents minute. How do you get a happy customer who is happy to pay?

Qualcomm: The carrier business model is to charge roaming charges. We try to add applications that give you extra services, such as song downloads or TV downloads.

USC: Competition within a given regulatory regime and between those regimes will create an ecosystem where we can test different assumptions. Diversity will solve the problem, but it will take time.

Q: What Web 2.0 applications will drive users to use the wireless connectivity?

Ruckus: One of our customers is a carrier that offers services that distinguishes them from pipe providers. They offer IPTV over DSL network. Now, they’re moving on to allowing people to watch IPTV from a hotspot using a laptop or handheld devices, and offering services that lets subscribers place wifi cams in areas of the home they want to monitor. These require reliable wifi access. They provide the devices that enable these services, and they’re monetizing the services.

Fon: From VoIP to IPTV, to more community based approaches where you can tell if your buddies are in your proximity, to gaming where they can become mobile.

USC: If you step back and look at the phases of communication: from the cloud to the user, then user to user, to devices communicating with each other. That will be come a source of applications.

Qualcomm: Your phone knows where you are and who you are. Soon it will have wifi and Bluetooth. We can then build push services, like alerts about events or presence or coupons.

Posted by Cathy Chatfield-Taylor on 06/23 at 03:08 PM
Session NotesPermalink

Spotlight Talk: Bradley Horowitz, Yahoo!

Some thoughts on innovation from Bradley Horowitz, head of the Technology Development Group of & Marketplace (text is not verbatim):

Yahoo! Search vision is FUSE: Find, Use, Share and Expand. It’s different from the competition, because people are part of our vision. It’s better search through people.

There’s a natural order breakdown of the online community. You have active creators, the small percentage that will start a Yahoo! Group. There are people who will proactively participate in that group. Then there is the 90% of people who will always lurk.

When you think about community based products, this pyramid preserves the integrity of content through natural gate keeping. The people who have the privilege of making Hollywood movies have reputation, budget, etc. that enables them to do what they do.

At Yahoo we’re breaking down the barriers between people who create, people who remix, and people who download.

If you look at what’s available on Flickr, you can see a list of the most interesting photos on the site. You can create an algorithm that finds the most popular images and looks at the relationships between he people who made them popular, and the result is a truly outstanding selection of images with emotional resonance.

Yahoo search has evolved from human editorial through mass automation to topological analysis (thanks to Google). But there are other authorities of trust to consider. Social search uses the past advances, refactoring in human participation. We invite the world to participate in My Web, Yahoo Answers and other services.

At Yahoo research, we’re the “roadies”: We build the stage, work the soundboard, etc. One project is “Hack Yahoo!” We have to hack the protocols and procedures to release pent-up creativity. We have a speaker series, weekly hack lunches, and hack day – mash up or shut up.

We take the spirit of hack and, through the Yahoo Developer Network, we expose what we’ve created in the last decade. We know we don’t have all the good ideas and innovation. We want people to create viable businesses on our platform. It’s creating an ecosystem.

Innovation takes the courage to be wrong and make mistakes.

Posted by Cathy Chatfield-Taylor on 06/23 at 02:53 PM
Session NotesPermalink

Who's information is that?

Seth - Root Markets
John McCrea - Plaxo
Kyle Brinkman - MySpace
Who owns that - the information that is constructed about you. Reputation that has come from what other people say about you.

Who’s information is that? and what are the limits on what you can do with it?

Seth -
Attention Trust - principles
1) Property Right to copy
2) Mobile - movable
3) Participate in an economy
4) Maintain transparency

Lots of people don’t realize the value of the information you create when you don’t know you are creating attention

Kyle - The structure that creates that data - I supervise the social network - liking to different peoples profile. 

John - address available everywhere

Q: Is it going to change?
If you build a large network - you are being asked the doors to smaller or larger competitors and essentially give away some of that value...where does the exchange take place.  Some users join because they can take it away. Demand must rise so that we just must have to do it. 

IM is not interoperable.

There was a very interesting back channel conversation about identity as this panel happened....

There was a conversation about Plaxo and whether one could trust them. People pointed to their privacy policies:

* Control over your information,
* Freedom from unwanted communications, and
* Trust that your information will not be shared or sold.

Others talked about Plaxo spam and how they didn’t like it.

People asked about whether the development of identity systems will create a demand by vendors - and governments - that you identify yourself or your not allowed to play.  I highlighed that in the idnetity community there is strong awarness that anonymity is a right that must be maintained.

One guy kept saying we need sxip...I highlighed the emerging open standard - OpenID 2.0 and the great annoucements this week in that space. logins soon (at minute 52 he mentions it).

Posted by Kaliya Hamlin on 06/23 at 02:41 PM
Permalink

The Secret to Happiness

At the end of Werner Vogels, CTO of Amazon.com, talk he posts this Glasbergen.com cartoon of a hiker that reaches the summit of mountain (could be Nepal) facing the archetypal wise mountain sage parked there with the long beard. Interestingly enough, the sage has a laptop (the view might beat my garden’s where I like to haul my own laptop). The caption reads: “The secret to happiness is: Always get as much RAM as you can possibly afford.”

Funny that it concludes with happiness and technology, it’s what I wrote about on my blog today.  In there I write:

It’s not exactly that I’m a Luddite. I have a BSEE and been a CTO. Yet I totally understood the woman (and there’s not that many women here) who snuck out of the dark conference room on a beautiful yesterday in downtown San Francisco to stroll into an art gallery.

I also wrote: “I want my technology to enrich my life, not complexify it nor drag me away from life. And if not, I simply cannot get excited about gadgetry and bytes anymore.” I’ve more common ground with ‘regular’ people (those that think Java is a drink, Ruby a gem) than much of the audience at Supernova so you can expect an ‘outsider’ view (not necessarily contrarian, not necessarily echo chamber either) of the Supernova topics in my musings even though my background makes me an ‘insider’. (So that means that cramming more RAM for its own sake - for what purpose? - is not mydefinition of happiness.)

I’m also more of a big-picture synthesist writer, so you can expect no more posts today. I typically need about a day of distance to allow the patterns and perspective among the themes to weave into something greater than individual sessions live-blogged. So the digestion and incubation begins in a few hours, emerging in posts this weekend.

Enjoy the rest of the afternoon sessions! Enjoy your weekend! 

Posted by Evelyn Rodriguez on 06/23 at 01:33 PM
Permalink

Perspective: Werner Vogels, Amazon

Werner Vogels, , shows us the Amazon enterprise. Here are the highlights:

Look at the NBA Store. This is running on the Amazon.com platform. When you go through checkout, you can use your Amazon ID. Not every story that runs on the Amazon uses the Amazon ID. There is a lot of mishing and mashing going on.

If you need to build a new application, you want to drive traffic there, you need to make sure it always stays up, and it needs to survive a complete data center outage without any impact to the customer.

Whether you’re building Web 2.0 or traditional website, you first need to build a robust infrastructure. No piece of the infrastructure is unbreakable. You need to be able to deal with it when it cracks.

The Amazon business model starts with selection. If it’s good for the customer, you can get traffic, lower your cost structure, lower your prices, have more sellers, get more customers.

In 1995 Amazon had 1 million books in store. That was the selection part. Now, there are other merchants who sell on the Amazon platform. In fairness, if their prices are lower than Amazon’s, they get preferred space on the page. Discovery of their products is also improved because of Amazon’s long tail.

Amazon’s continuous growth is fueled by ultra-scalable technology. Every year, we scale the technology. Internally, it is now a service-oriented architecture. That is the platform we built our applications on.

What does scalability really mean? It means that if you add resources to the system, performance needs to increase proportionately. It also means being able to handle larger data sets. If you have to add nodes to the system, the performance of the system should not suffer.

If new nodes are faster and bigger, you should be able to exploit that. The more nodes you add, the less people you should need to maintain them.

Amazon went through stages where all of these things were not true.

Target was the first customer of the enterprise services. Our interaction with Target made us realize Amazon could be a platform, not just an application. Now we have content generation and discovery; identity management; order processing, payments and fraud protection; fulfillment and customer service; and product offers and management.

Amazon enterprise is always on, scalable, cost-effective.

The traditional Amazon web services were built using Amazon data. Other applications have been built on top, e.g., backup manager, that use data belonging to others.

Posted by Cathy Chatfield-Taylor on 06/23 at 01:32 PM
Session NotesPermalink

Military Networking

John Garstka - Office of Transformation, US Dept. of Defense.

Kevin introduced him highlighting the Dense connectivity - Convergence happening and how the military enterprise that is huge and defines concept of mission critical.

Here is my summary based on his talk.  Innovations in Networked Organization
We spend 20 billion a year on IT stuff (wow that is a lot of money).

Tech on large scale...has a lot of people and process issues....who is in Charge? How do you choreograph all these.  My organization is working on trying to get the technology.

My organization is trying to get to the technology and networks but has industrial organizational incentives

Network Centric Warfare

Information Advantage is a Warfighting advantage - when networked - you can do business better

Use information to generate and advantage. Not just substituting
Factor in cognitive and social domains - subtle relationships.

There is a big difference between the Low end and high end.
People are learning languages - like Farssi now.

There was a a really complex diagram that basically went like this:
Robustly Networked Force -> Information Sharing ->Quality of information -> (Common Picture ) -> Individual Situational Awareness -> Shared Situational Awareness and Collaboration -> Self Synchronization (New processes) -> Mission effectiveness

Gulf War - we could see where the tanks were.
Where are the Bad Guys? Where are the good guys?

HOW DOES THE NETWORK ORGANIZATION BEHAVE?
If you know that answer you can be more effective.

Create experiments where the value proposition is putting 10,000 of people on the network doing things in new ways.

Technology process and The Technology Tenants.  How do I use the technology and link to outcome process Organizational people component is really hard? Collaboration is a group activity and you need the incentive infrastructure right so that it happens. Technology enables new process.  Try to understand these relationships...powerful competitive advantage.

Innovation is not a one dimensional thing.

Revolutions in Military Affairs
WW1 Tank shows up but the process didn’t change
WW2 The process innovation happened

Looks simple in PPT really hard to do in big organizations
Who is in charge?

Question: Large Centralized organizations the technology extend contributions to a broader range is there tension between top down and bottom up? 

A good example is Company Commander.com Captains Major
Enemy was innovating - put up website to share insights in real time. Army said really good - pulled innovation in and made it secure.  We have today - virtual staff.

Bottom end of the spectrum innovation working well - I want to survive.  Top...bureaucratic knife fights.  Future combat system - things vs. technology. Investments in Billions of dollars very top down - these investments allow bottom up. The network is there it but the incentives are not there to collaborate. 

We have found that nobody owns all this. Lots of people who say they own lots of

Conclusions

Getting the Theory Right
- IMportant to long term sustained investment in IT

Making the Business Case
- improve co-evolution of TEchnology. Organizations, Processes, and People in conducting REturn on Investment analysis

Deploying IT Infrastructure
- How good does the networked infrastructure need to be?
It depends

Operating Networked Organizations
- need to co-evolve TEchnology, Organization, Processes and People to achieve full benefits of Networking.

Posted by Kaliya Hamlin on 06/23 at 12:24 PM
Permalink

Perspective: John Garstka, USDoD

John Garstka, Office of Force Transformation, U.S. Dept. of Defense, offers A Perspective in Innovation in Networked Organizations. (Text is not verbatim.)

I contributed to Network Centric Warfare, a book that attempted to find out if networking mattered in the military. We looked at the trade-offs between investing in applications or infrastructure. We asked, why should we spend money on networking?

When you’re networked, you can do things in the info domain much better and faster. That impacts how you organize, train and deploy your forces. Generals talk about advantages in the physical domain – position and force advantage. The information advantage is less well understood.

We’re finding you have to factor in cognitive and social domains when you interpret information. At the service academies, for example, they’re learning the languages of the places where they’ll operate.

To make sense of complex relationships, we developed a value chain. It starts with the relationship between networking and information sharing. As you move across the value chain, you hit a chasm between those who understand the tech and those who don’t. When innovation happens at the intersection of these two domains, there’s a problem.

We try to understand what really matters. Military operations are a team event, doing things collectively. Shared situational awareness can be enabled by blue force tracking, which reveals where forces are deployed. It was enabled by networking apps on tanks, helicopters and commercial satcom. That affected the speed and tempo of combat.

If you’re in maneuvers, you want to look at what everyone can see at the same time. It’s not about deploying tech, but changing how an organization collaborates and assigns info and decision rights. The discussion is about how the networked organization behaves.

We don’t have good simulations to answer these questions. To figure out where the value proposition is, we put people on the network and watched. In general, we learned:

People use the tech because they want to do something. If you don’t have the right incentives in place for collaboration, it doesn’t happen.

There is tight coupling between the tech and the process. Often, the tech enables new processes. You need to understand the relationship between the processes, and how people interact during the process.

Sometimes tech leads the way. But you need a process innovation to reap the award of the tech. If the innovation is disruptive, there’s an impediment to adoption. In really big organizations, there’s a tension between top down and bottom up innovation.

At the top of the ecosystem, there are bureaucratic disputes. At the bottom, people just want to survive. When you talk about investing billions of dollars in infrastructure, you have to think through the adoption curve. You can have the network, but people may not be motivated to collaborate on it.

None of these technologies are independent. People who own the tech innovation have to figure out how to work together, so their tech can interoperate.

Given a fixed budget, the challenge is to figure out what technology will impact your core competency. Whether you’re in commerce, defense or government, you may not get as much tech as you need. Figure out whose job it is to synchronize tech evolution.

Posted by Cathy Chatfield-Taylor on 06/23 at 11:31 AM
Session NotesPermalink

Rise of the Videonet

Starting with a Mentos and Diet Coke videos by eepybird.com, moderator JD Lasica of Ourmedia talks about the future of consumer generated video content on the Web with panelists:

Jeremy Allaire, Brightcove
Jonathan Taplin, USC Annenberg Center
Mary Hodder, Dabble
Robert Levitan, Pando

Here are a few highlights of the conversation:

Q: What does the current IPTV universe look like?

Brightcove: The UGC sites aren’t generating meaningful revenue yet. Media are experimenting with video ads. Any organization that wants to communicate on the web will have to have some sort of video presence. Traditional media are launching TV networks on the web.

Q: How big a role will Hollywood play in the IPTV landscape?

USC: As founder of the first video on demand service in 1996, we had subscribers paying for content until the producers stopped licensing content to us and launched their own site. In the long term, people will want to watch the Hollywood movies. Until we get video stores online, Hollywood will play a blocking role. With Steve Jobs getting closer to Disney management, we’re getting closer to advertiser supported content.

Q: How are companies differentiating themselves in the online video space?

Dabble: There are sites where users can upload content and sites that are only for downloading. Users have flocked to YouTube, where 35,000 videos a day are uploaded. YouTube has 42 percent of traffic. MySpace is second with 24 percent. The activity that happens bottom up is different than top down. Top down production has a budget, unions and top-down controls. When users make something, they just shoot. There’s a lot of garbage, but non-professionals also make some incredible stuff. A number of hosts offer a free site for uploading, then generate revenue on the backend by hosting commercial video sites like the National Hockey League video site.

Q: With high def video starting to hit, will we be talking about P2P next year?

Pando: The Internet can’t be the distribution platform for the very large files like TV shows and Hollywood movies. On the other side is the UGC. Not everyone wants to publicly share all their videos. P2P, from desktop to desktop, will be all about the bandwidth.

Q: Social norms around rich media are shifting. What are the implications for copyright holders?

Dabble: If you look through the videos that have been made around mentos and coke, there were an number made before the ones that got the publicity. One producer put videos on Revver, which does a revenue split. If a referring site sends traffic, they share revenue with that affiliate. The video got them a chunk of revenue. But then the video file was spread around to other sites. The producer loves that others are watching it, but they’re not making any money.

Q: In the question of Hollywood or UGC, where will the most activity be? Will anyone care about UGC in 10 years?

USC: Hollywood will start to use mashups in interesting ways, and let people post them for free. They shouldn’t fight them. In two years, will anyone care about mentos and coke? I don’t think so.

Brightcove: Copyright holders want to empower consumers to use that content, but drive revenue through that use. The challenge distributors have is, they’re held hostage by the upstream groups – screen actors guild, directors guild, etc. They don’t want the art destroyed. The legal and business conundrum needs to be solved so creators, talent and consumers and all generate revenue. Creative pirating will continue until then.

Dabble: Friends watch video productions by their friends. They’re not concerned about production values. The askaninja video about net neutrality has been viewed by about 5 million people. But you need to separate the good stuff from the bad with better filters.

Q: Will we see remix phase out or take off?

Dabble: Most of remix culture now is parody. The issue is control. People want to be compensated for their contributions. The harder issue is attribution. Do you let someone chop up something and remake it, and thereby assume ownership of it? The younger generation has a different media literacy than the older generation. They may be OK with loss of control and care more about attribution. Other types of videos we see are genre, indie film makers and documentaries, interviewers and anime music videos. Each genre is strong, but they don’t get play at the top down media. It’s highly watched.

As production costs come down, every web site will become a video producer and distributor and allow consumer participation in that by having them contribute training films, etc. The creative marketers are asking people to take their brands and do something with it to generation excitement.

Posted by Cathy Chatfield-Taylor on 06/23 at 09:46 AM
Session NotesPermalink
Page 2 of 5 pages  <  1 2 3 4 >  Last »



For sponsorship information, please email us at .


General inquiries may be directed to .