Microformats in Drupal group formed

Drupal + Microformats (by factoryjoe)In a very promising step, it looks like that venerable CMF Drupal is beginning to take on the process of becoming microformatted with the creation of the Microformats in Drupal group.

The original use of microformats came in the Upcoming.org module (I believe) but now it seems clear that there are many more places throughout Drupal that could benefit from microformats, including on the content creation side.

With word that OpenID support will be added to Drupal Core in version 6 (a module is already available for 4.7), if we see the addition of hcard for profiles and XFN for representing social relationships in Drupal, we may finally be moving towards a more decentralized, open-source network of socially adept web properties.

Skype + eBay + Google Local, Base and Payments, oh my!

Silo By Dirk Sabbe

Had a meeting with our advisor Don Thorson today (who’s currently at Jajah) and found it interesting to see that Google is strongly moving to make good on the deal they inked with eBay in August into the voice communications area.

First, they started talking about giving away ad-supported cell phones, then they added Skype to the Google Pack and now they’ve gone and made the most obvious play by adding click-to-call dialing to Google Local, executing on part of the original agreement.

With Skype adding SMS capabilities it’s curious to watch Google and Skype fight a pitched battle into telephony systems while the rest seem to be waiting and watching.

I mean, doesn’t this have an obvious end point?

I mean, take eBay listings, take Google Base, take Adwords as it spins out into radio and print, take Skype and take free click-to-calls where Google aka Skype foots the bill… add free cell phones… free wifi. And now give Google the tools to monetize the whole lot of the transactions flowing over its servers, airwaves and cell towers… and the ability to know who you are, what you’re up to, what you like, and how much you’re worth to advertisers.

If I were a farming man, I’d be a tad concerned about these Google silos cropping up along the horizon. But that’s just me.

Pieces of me: disintegrating online micro-presence

Jaiku

Jaiku logo…Just came upon Jaiku, the latest in micro-presence aggregation apps, thanks to ex-roommate Andy Smith, who’s now working with them — in one of his first gigs post Flock.

They recently went through a redesign and I have to admit, it looks pretty good.

It makes you wonder though, just because you can pull in the pieces of your multi-faceted identity into one place, should you? (With more variants of this idea popping up regularly, there’s clearly a trend here.)

I mean, in theory, horizontal integration may lead to a fuller picture of you, but the reality is that folks might only be interested in certain verticals of your life, and not the whole kaboodle.

And even when I was sketching out Rhyzomatic to solve my own problem of decentralized identity, my thinking was along the lines of bringing together links to the original sources, and letting people choose which pieces interest them most. Admittedly, I’ve merged in a few Flickr updates here and there with daily Ma.gnolia updates, but that’s as far as I’ve gone (even then I asked permission and some folks derided my choice — though I can’t find the post now).

So I’ve got Twitter, I’ve got Plazes, I’ve got my blog (more than one), Flickr, YouTube, and on and on. I should be better about maintaining it, but I’ve got ClaimID pointing to these and other sources as well. Along comes Jaiku and allows me to bring these things all together into one river, and well, I like it, but without the original context, how does it represent me? This may be a case where the sum is not greater than the parts — and that, for online identities to work, you have to allow people to break off the pieces of people that actually interest them most.

This is curious to me, and perhaps to other side of single sign-on and unified identity. Maybe you like my screenshots but find my blog boring. Should I force you to consume all of it just because I think it’s interesting? Somehow that flies contrary to the best aspects (pun intended) of this, the modern web.

Welcome to the Neighborhood 2.0

VOX header

Surely you’ve heard by now that Six Apart’s new neighborhood platform VOX has launched.

I really like it. In fact, it’s the first online “place” that my mom’s signed up with, who was shortly followed by my brother (who found me initially on Facebook and I cajoled him into joining VOX).

Now that they’re both on it, I actually feel pretty comfortable about them giving it a go without me chaperoning them along.

Don’t get me wrong… I mean, there’s a bit of complexity in VOX, but I kind of feel like, if they play around a little — with the teasers that incite you to actually contribute and connect (suggest a neighbor feature on the invite page is genius) — they might just get into all this “Web 2.0” stuff I’ve been yammering on to them about for ages.

So now, imagine going home for Thanksgiving and rather than having to explain “feeds” or “Flickr”, we can just follow up on posts that they read but never commented on… or photos of my neighbor’s that they liked… Imagine using VOX, with its facile design and attention to detail, to finally connect with folks who normally could care less about this stuff.

Yes, finally.

It’s funny, but lots of people talk about “designing for Grandma” or “soccer moms” or other supposedly technically inept audiences (though, who in reality are often just as — if not moreso — savvy than the folks making such comments). But I think VOX has gone further than many who have come before and have successfully built a product and a community that I wouldn’t mind introducing my mom to (in fact, I did just that) and who I wouldn’t mind taking her through so that I knew it made sense and so that she could get the most out of her time spent on it.

In fact — and this is critical — once she’s set up and off on her own, I trust VOX to not get in her way or insult her intelligence. Perhaps I’m belaboring the point, but there are just so many nuances that make VOX feel friendly and worth working with that it’s important to point out that VOX is, above all, an excellent example of applied restraint and the execution of clear intention.

The one geeky thing I’ll add is that I’m eagerly awaiting OpenID integration so that we can start pushing forward with making the experience of grassroots identity consolidation as easy and good looking as VOX.

Symantec/Norton on OpenID/Cardspace train

For posterity (emphasis added):

Users, and not Symantec, will control their identity information, Salem said, addressing the main criticism that led to the demise of a similar effort from Microsoft called Passport. Also, Symantec will not create new technology standards, but plans to use Microsoft’s CardSpace and the open-source OpenID technology, Salem said.

Civil libertarians should get hip to personal data harvesting

Despite my tonqe-in-cheek title, I wanted to take a moment to respond to this article, because, though it is likely well-intentioned and in fact rather truthful, it glosses over a more important discussion that should be going on.

Despite my tonqe-in-cheek title, I wanted to take a moment to respond to this article, because, though it is likely well-intentioned and in fact rather truthful, it glosses over a more important discussion that should be going on.

Whether anonymous Internet usage will ever exist is not important. What is important is that companies become aware that Internet activity is easy to monitor from a variety of locations, even when data encryption is in use.

In context:

There are several jokes and cartoons out there that play on the idea of the “anonymous” Web, an Internet where you can be whatever and whoever you want. Most mainstream computer users willingly buy into this concept, deceived by the ability to adopt cryptic usernames and e-mail addresses.

Anonymous Internet usage is an appealing concept to many people, but whether it’s actually possible is a different matter. Generally speaking, it’s relatively simple to intercept–and at the least, monitor–the transmission of digital information.

Every time you transmit data from a computer to or from somewhere else using the Internet, literally dozens of places can exist that are monitoring the transmission. Clear-text protocols offer no built-in protection from eavesdropping. In addition, the transmission leaves traces of “evidence” on your computer–regardless of if you use data encryption or one of those software “evidence eliminator” packages.

An anonymous Internet, if such a thing existed, would be immune to eavesdropping entirely, and it would have no record of a communication ever existing. Anonymous Internet usage is like a “cash” form of communication: It would leave no traceable evidence.

In certain countries, the government restricts and/or controls Internet use. For example, China has one of the most extensive Web proxy server and monitoring capabilities in the world, aptly dubbed the “Great Firewall of China.”

The Chinese government controls, monitors, and censors Internet access at will. Dissidents and those opposed to the Chinese government, including other governments, constantly try to bypass the censors, but the Great Firewall soon discovers and blocks these noncensored “anonymous” proxy servers.

So it’s understandable why some people see the benefits in leaving no traces of any communication, especially when there’s a fear of reprisal from a government or other organizations. It would be as if the transmission never happened. There’s no record of it ever occurring, and therefore it doesn’t exist.

But, however appealing this concept may be to some, the fact remains that it isn’t realistic. Companies and individuals alike need to be aware that there really is no such thing as anonymous Internet usage. If someone wants to determine what a computer is doing on the Internet, there’s always a trail to follow.

Computer users leave traces of information with almost every data transmission. In fact, an entire computer subindustry has evolved to deal with removing these traces of information, but these companies can only remove what’s on a computer. There are so many other points that can record the “digital footprints” of Internet activity that it’s impossible to completely guarantee anonymity.

Whether anonymous Internet usage will ever exist is not important. What is important is that companies become aware that Internet activity is easy to monitor from a variety of locations, even when data encryption is in use.

Jonathan Yarden is the senior UNIX system administrator, network security manager, and senior software architect for a regional ISP.

If we take the author’s premise as a given (that anonymous internet usage will never ever exist), then the important discussion to have is what information should be collected about you, and if collected, who has control over it and what can you, as the source of that information, do to control its use, administration and distribution?

If one persists with a blanket notion that personal information collected about one’s behavior on the internet is bad, the future will be very difficult to cope with. The fact is that more and more companies, big and small, are amassing huge databases of information about people. Frankly, if you’re really concerned about this kind of thing, you should stop using your ATM and credit cards because as it is now, it’s easier to track your behavior through your purchases than through your web browser.

But that is going to change. And the dangers are such that, unless a cogent counter-argument is made that fairly deals with the benefits that come with the harvesting of this data, it will be increasingly difficult to take back control or change corporate policies once they’re instated (as with a civil liberty lost is nearly impossible to get back).

So what am I driving at? Well, I think that a more realistic and proactive attitude is needed from the civil libertarian camp that shows its understanding of the value in this kind of data. I also think that a more nuanced attitude towards privacy is desperately needed because all or nothing is not going to cut it as technology gets simpler and better at collecting information about you. I also believe that civil libertarians can benefit from this kind of data collection in ways that I don’t think have been realized. Once we start to see data collection as a strategic tool rather than as an invasion of our private space, we may indeed become powerful enough to take back control over our data.