This is exciting…Idproxy.net enables users to use use Yahoo! login to create an OpenID.
Check it out (its kinda techie but cool)…
This is exciting…Idproxy.net enables users to use use Yahoo! login to create an OpenID.
Check it out (its kinda techie but cool)…
There have been some new identity verification services trying to bring some order to the wild world of Internet.

You can read my take over on the Read/WriteWeb (Thanks Richard, for the great job editing and laying out the piece!).
Charlene Li of Forrester has an interesting report in which she tries to calculate the ROI (return on investment) for business blogging. Unfortunately the report is only available to paying customers but she lays out the model in a blog post:
Based on the model she has a comprehensive formula (I could not see it as the link is broken) that calculates the ROI. Charlene cites the example below as the kind of calculations she has in mind:
Let’s take for example the FastLane blog. One of the key goals of that blog was “to share information about its products and to start a dialogue between GM leaders and customers”. So a key metric would be to see how many times customers wrote a comment. FastLane has about 100 people commenting on the blog each month, which is equivalent to gaining customer insight on products and brands from a traditional focus group. We estimated that the value of this was equivalent to running a focus group every month at the cost of $15,000 a month, or $180,000 a year. Voila – there’s the value of the blogging benefit laid out in black and white.
I think the model she presents is a very useful way to quantify potential benefits, although, I am not sure I buy or will be swayed by specific calculations like the one above. The reason is that blogging opens up a new channel for customer interaction, which has its own unique dynamic. Comparing it to existing business activities like focus groups is problematic. E.g. with focus groups each participant is carefully selected whereas blog commenters are self selected web-savvy individuals.
The bottom line is that a CEO has to see the value of engaging customers in a conversation. I am not sure such calculations can help sway them as there are so many ways to poke holes in any such calculation. Another, more easy to establish, thing here could be to try and establish the costs associated with blogging. If the costs associated with blogging are not very high (I don’t think they should be), then the c-level exec’s will be more willing to take the plunge. I bet, another issue holding business blogging back, is that a number of c-level execs don’t fancy themselves as writers. As such, easy tools for video/audio blogging would enable them to take the leap much more easily.
More coverage on the topic is here.
Citizendium, is the new Wiki project, started by Larry Sanger, one of the co-founders of Wikipedia. They define the project as follows:
The Citizendium (sit-ih-ZEN-dee-um), a “citizens’ compendium of everything,” is an experimental new wiki project. The project, started by a founder of Wikipedia, aims to improve on the Wikipedia model by adding “gentle expert oversight” and requiring contributors to use their real names. It has taken on a life of its own and will, perhaps, become the flagship of a new set of responsibly-managed free knowledge projects. We avoid calling it an “encyclopedia” until the project’s editors feel comfortable putting their reputations behind this description.
With the new rules about the editors having to use their real name and with “gentle oversight”, Citizendium is trying to ensure that the community members have the right incentives. I guess the hope is that if people identifying themselves with their real names, they are less likely to vandalize or edit content for short term gratifications. The goal is to avoid cases like the one Stephen Colbert caused, when he talked about Wikipedia in one of his shows.
This is a noble goal and these new policies will no doubt help create a better community environment. The question, though, still remains about how Citizendium will ensure that all editors indeed use their real name while editing content. Right now they seem to be asking for individuals to use their real name as a part of their user agreement, but what is somebody still uses a fake name? I am sure if the Citizendium generates enough credible content, there are going to be incentives for people to use fake identities to edit content. One way could be to heap shame and scorn on any user breaking the terms of service but again if somebody does break their terms of service, how are they going to know what the real identity of the person is? Also, if they get enough critical mass, I am sure they will be open to attacks from payperpost like services intent on modifying certain content for financial gain.
So overall, I think this is a step in the right direction, I am not sure this is going to be enough to generate a 100% reliable body of knowledge. Let’s see how it develops.
I have been thinking about the differences in teenage and adult behavior in the sphere or creating and managing identities.

You can read my take over on the Read/WriteWeb (Thanks Richard, for the great job editing and laying out the piece!).
(For those of you, who haven’t seen the “Matrix” movies, Agent Smith was one of the protagonists of Neo. His special ability, after a mutation, was that he could create as many copies of himself as he liked. Also, you really need to watch the Matrix movies…I promise they’ll blow your mind.)
Bill Thompson, the regular columnist at BBC had an interesting piece about how young people use identities in social media.
…young people who forget their MySpace logins are just as likely to make a new account as fret over their lost friends or painstakingly constructed homepage decorations.
Recent work by US-based social media researcher Danah Boyd, one of the more astute observers of network behaviour, indicates that it is a more general attitude.
Her observations of young net users have led her to believe that “many teens are content (if not happy) to start over with most of their accounts in most places”, and she has noted that for young people an online profile is “not seen as something to build an extensive identity around, but something to use to talk to friends in the moment”.
Now this is very different from what I do. I have had the same myYahoo account for 7 years and have only made minor tweaks to the layout over that period. I hate losing access to an account that I created, as I think I am losing a part of myself by abandoning an account. As such, I try and get the same login name and password for all my accounts, to ensure that I can remember and maintain access to them.
…but perhaps teenagers, experimenting with their identity in relationships, clothing styles and all other aspects of life are simply extending this playfulness to the virtual realm.
Not all young users are casual about their online identity, of course, and Boyd is at pains to point out that many young people invest heavily in aspects of their online activities. However, the willingness to abandon a profile as a work-in-progress and start over is definitely something I’ve observed in my children and their friends.
This approach to online identity has a number of implications for anyone trying to understand the way the internet is growing, and also carries an important lesson for those trying to build services or make money out of them.
One positive aspect is that it will make it harder to pin online activity onto a real person, since accounts that are created and quickly discarded will contain fewer identifying details.
…
More importantly, this casualness clearly renders any statistics about the number of signed-up users effectively meaningless, and this could be a big problem for the sites themselves as companies vie for investment and point to sign-ups as an indicator of popularity and future success.
Commentator Clay Shirky has been waging a campaign against the sloppy journalism of those who quote Linden Labs figures for Second Life “residents”. He points out that many happily accept the headline figure of two million users without considering that only 36,000 of those are paid-for accounts while a high but indeterminate proportion of the remainder are inactive, set up for free by people who tried out the service and then moved on.
It is the same with MySpace, Bebo or any of the other social sites, of course, and shows how poor we are at measuring what really goes on online.
Websites, having struggled for years to adapt to the idea of the pageview instead of the server request as the key measure of site activity, are now building interactive pages that occupy user attention and time but don’t generate hits or page views – and they don’t know how to measure this usage. Now it seems that the millions of signups on MySpace, Bebo and the other social network sites could be the same set of forgetful teenagers coming back again.
And again.
This is an interesting observation and adds another argument to the need for better metrics to measure the value of online interactions. We have provided some ideas on the topic here, here and here. Danah Boyd, a PhD student at UC Berkely, explains this phenomenon as follows:
Adults often worry about the amount of time that youth spend online, arguing that the digital does not replace the physical. Most teens would agree. It is not the technology that encourages youth to spend time online – it’s the lack of mobility and access to youth space where they can hang out uninterrupted.
…
Teens have increasingly less access to public space. Classic 1950s hang out locations like the roller rink and burger joint are disappearing while malls and 7/11s are banning teens unaccompanied by parents. Hanging out around the neighborhood or in the woods has been deemed unsafe for fear of predators, drug dealers and abductors. Teens who go home after school while their parents are still working are expected to stay home and teens are mostly allowed to only gather at friends’ homes when their parents are present.
Additionally, structured activities in controlled spaces are on the rise. After school activities, sports, and jobs are typical across all socio-economic classes and many teens are in controlled spaces from dawn till dusk. They are running ragged without any time to simply chill amongst friends.
By going virtual, digital technologies allow youth to (re)create private and public youth space while physically in controlled spaces. IM serves as a private space while MySpace provide a public component. Online, youth can build the environments that support youth socialization.
So multiple throw away identities is another manifestation of teenagers experimenting with new looks etc. Another question that comes to mind …Is the phenomenon of throwaway identities only limited to teenagers? One place to look for answer is the blogosphere. On serious blogs, commenters can leave comments under any name they like. Now I have always used my own name while leaving a comment. But does anybody have stats on how many people use fake or context sensitive names (like using a name ILOVEAPPLE while leaving a comment positive to Apple) ? My guess is that the use of fake identities is a lot less prevalent in serious blogosphere compared to other teenage oriented social media.
I would imagine that as these teenagers mature and settle on an identity, they are comfortable with, they will focus on building their reputation around that identity. Now, a lack of a mechanism by which users in blogosphere and other social media can build a reputation around their identities, might be contributing to proliferation of these throwaway identities. May be, all we are lacking are incentives to participants in online social media, to maintain the same identity. What do you think?
This Tuesday, I was at the NewTechMeetup, where I saw a presentation from Robert Chea, Founder and COO of PowerReviews.

You can read my review of the startup over on the Read/WriteWeb (Thanks, Richard MacManus, for the opportunity!).
After all the adventure setting up the network in Mysore, we moved on to Pilani – a small town in Rajasthan, where I grew up – to spend the last leg of our India trip. Needless to say, after the experience in Mysore, my expectations were a lot more modest.
As soon as we reached home, I powered up my dad’s computer and to my utter delight the connection was up and working (apparently the stolen cable had indeed been reinstalled). At home, my dad has created a nice setup for managing the spotty power situation, by installing an inverter and a generator. So all I needed to do was to connect the DSL modem to my laptop and I will be off and running. I quickly figured out the setup that required a username and password, created a broadband connection on my laptop, hooked up the Ethernet cable and I was online. That night, I slept a happy man.
In the morning, I setup up a conference call with my team and we started chatting via Skype. I was really excited as the connection was working great, and even the speed was a lot better than Mysore. Suddenly though, the whole thing came to a grinding halt. Upon further investigation, I noticed that the third light on the modem that indicates an active ADSL link with the telephone exchange was not lit anymore. After frantically trying to power cycle the modem, I was able to restore the connection and join back the conversation…Things were great but after another five minutes, no connection again. After going on and off 4 times, I decided to drop out and let the rest of the team carry on.
“Dad, what’s the story with the DSL connection?” I asked my Dad, as soon as I saw him.
“It used to work great before…I have never had this kind of issue.” Dad replied. “If you don’t believe me, talk to Rajesh ji, our neighbor.”
“Nope, never heard of any problems like you are seeing” Rajesh replied, when I called him up to check.
May be I was hitting a rare rough patch, or it might be a classic case of exaggeration, so typical in India. I looked into all sorts of possible reasons like the quality of the line, setup of the modem etc. to figure out what could be going on, but to no effect. The connection continued on and off for the next couple of days, until one morning when the ADSL link light did not turn on at all.
I called the SDOT (Superintendent of Telephone) to report the issue. Right of the bat he was upset, as I explained the situation to him:
“You should not fiddle around with the connection we setup for you”, he complained.
“Well, I needed to connect it to my laptop to get some work done…In any case, moving the Ethernet cable from our modem should not make a difference”, I retorted.
“It’s the government modem that we have leased to you…Don’t think that the modem is yours”, he countered.
After some back and froth, he agreed to investigate the issue and get back to us.
“Should I expect a response in a couple of hours?” I asked before hanging up.
“Look, these things are complicated…I can’t give you a timeline. We will get back to you”, he said and hung up.
I waited eagerly till the end of the day but got no response. The next day, again, I waited…we were told that the linesman was on his way, but again no one showed up. We called Banglore to connect to the head office but the toll free number listed for BSNL did not work. I decided to go over to the neighbor’s to at least catch up with the email. Rajesh had the DSL working so I hooked up but ran into the same on and off issue. I pointed it out to him.
“Oh, that’s what you meant…I guess we don’t browse as fast as you do, so we never have this issue”, he explained.
The next day I was getting desperate. Starting 11:00 AM (that is usually the time the government offices in Pilani start getting active), I and Dad got on the phone and started calling everybody in the exchange we could find. After a couple of hours, we got hold of the JEN (Junior Engineer).
“I checked your line and there is noting wrong with it. My guess is that your modem is shot. You need to take it to the SDOT sahib to get it checked” he said.
I and my Dad got on a scooter and went to the exchange. It was 3:00PM. SDOT sahib was nowhere to be found. We were told that he was out for lunch. Luckily, we found a JEN who hooked up our modem and splitter to test it out.
“The modem looks perfect”, he said. “These line engineers are not thorough. They must have made a mistake”.
He called the lines JEN and asked him to route our connection over to his office line, so that he could test our line. Again everything worked great. He asked the lines JEN to reconnect our line. He assured us that everything is fine, and it will work for us, when we reconnect the modem at home. We eagerly got home and hooked everything up, but again no ADSL link.
Around 6:30 PM, I decided to go over to the neighbor’s to get the emails. I was working when my Dad called me.
“The linesmen are here to check everything out. Why don’t you come back?” He said.
I sprinted back home. The linesmen were fiddling with a number of things but to no avail. Eventually, they came to the conclusion that something must be wrong at the exchange. We offered to drive them to the exchange rather than letting them bike back. When we got to the exchange, it was 7:30 PM and the power was out. The massive exchange was humming nicely in the dark. The linesman took out the torch (there is a backup power supply but for some reason it was not on) to locate our switch. They replaced our switch with the switch next to ours and we raced back. When we got back home, the most beautiful light in the world, the ADSL link light was on and the connection was working. We got the linesman to promise to replace our incoming cable with a better quality cable, the next day, in order to ensure good stable connection in the future.
This time the connection turned out to be a lot more stable. I worked till 1:00 AM but when I got up next morning again the connection was out. It turns out the switch that we have replaced the night before was the switch to the SDOT’s office, and he needed his connection back. Again we were without a connection.
In the evening, the linesman showed up and replaced the line, but again had no success establishing the connection. Eventually they called the JEN. He did something and eventually the ADSL lit up. Unfortunately, I had to leave for the US the next day so I didn’t get to enjoy the new connection. I hear, though, that the connection has been stable ever since :-).
I just finished reading Malcom Gladwell’s wonderful book – The Tipping Point. The book talks about how and why, word-of-mouth epidemics, spread. There are lot of interesting studies and data points, related to human behavior, referred to in the book. I wonder why business schools don’t teach this subject in more detail. This book is absolutely essential reading for any web 2.0 startup.
At its core, the book makes a very interesting and persuasive case for the inherent social and context dependent nature of human beings. One piece, I really found fascinating relates to the Rule of 150, which talks about the size of effective groups. For those of you who haven’t read the book, the Rule of 150 states that the size of an effective social network is limited to 150 members. It seems that the human mind is unable to maintain effective relationships with members in groups larger than 150 people. The interesting thing seems to be that if the number of people in a group increases beyond 150, the deterioration in group effectiveness is not gradual but sudden. Malcom Gladwell quotes S.l. Washburn for the rationale:
Most of human evolution took place before the advent of agriculture when men lived in small groups, on a face to face basis. As a result human biology has evolved as an adaptive mechanism to conditions that have largely ceased to exist. Man evolved to feel strongly about few people, short distances and relatively brief intervals of time; and these are still the dimensions of life that are important to him.
This is very interesting… I wonder how the rule of 150 applies to online communities. Does it mean, on-line communities, that free participants from the limitations of geography, are somehow contrary to inherent human nature? How can one apply the rule of 150 to on-line communities? My guess is that the rule of 150 very much applies to on-line communities. Still, there is an interesting tension between the technology that makes it really easy to communicate with a wider set of people, and the waning effectiveness of that communication, as one reaches a wider audience. Applying this concept to blogosphere, maybe what a blogger should do, is give up the ambition of greater reach in favor of improved richness with a few people.
Another important point in the book relates to the power of the context. Malcom Gladwell uses a number of interesting studies and examples to make a strong case that human behavior is dependent on context. This means that instead of individual behavior being predestined based on character, a change in context can make people behave differently. So, a change in context, can make can make a docile individual, violent, a non-smoker, smoke, or an angry person, commit suicide etc.
It follows, that any technology that can provide context and identity on individuals, has the potential to dramatically change the participation levels in online communities.
Interesting piece in the WSJ about a start-up in redwood city, called Attributor.
Attributor analyzes the content of clients, who could range from individuals to big media companies, using a technique known as “digital fingerprinting,” which determines unique and identifying characteristics of content. It uses these digital fingerprints to search its index of the Web for the content. The company claims to be able to spot a customer’s content based on the appearance of as little as a few sentences of text or a few seconds of audio or video. It will provide customers with alerts and a dashboard of identified uses of their content on the Web and the context in which it is used.
The company is looking to ensure that all content reproduction or other uses are properly attributed and paid for. This sounds fantastic…although a bit hard to believe. I guess the content fingerprint is based on analysis of each piece of content and match is based on matching unattributed pieces to the original pieces via a search. What happens if the somebody just modifies a verb in the unattributed content? Would Attributor be able to catch that? May be they just do a statistical analysis of the content? I am really curious to find out more.

Wouldn’t a writer fingerprint be a better and more workable idea? I can imagine a writer having a fingerprint in terms of favorite words, syntax etc. Such a system will be able to handle situation such as one being discussed by Valleywag and VentureBeat. Also such a system could be very useful in social media as a way to establish identity of a user.