NASA 2.0

Yuri's Night 2007

If you haven’t been wondering what’s up with NASA lately, you’re probably not alone. Though once a bastion for the advancement of humankind, in recent years the space agency has seemingly vanished into a well of bureaucracy and lack of coherent, public-supported vision.

Now, thanks to a number of young, forward-thinking upstarts within the organization, that might all start to change, starting tomorrow night at NASA’s Ames Research Facility in Mountain View, California with the kick off of the World Space Party (aka Yuri’s Night).

With 4,000 expected attendees, this is probably one of the first if not largest raves ever held on government property (you can only imagine the red tape that they had to go through to get this approved!). The space is perfectly suited for this kind of thing — and represents the new thinking and outward focus surging within the organization.

On top of that, there is growing interest in open source (notable given the restrictiveness of the NASA Open Source Agreement), in Second Life, and in coworking, as witnessed by NASA’s tenant status at Citizen Space and in their CoLab project.

I’m certainly excited to see these changes coming to NASA — and if it’s any indicator of what changes might be wrought in the government with the addition of a little 2.0 fever and open source, there’s hope for us yet.

Problems with OpenID on Highrise

Trouble with OpenID

Turns out that 37 Signals’ implementation of OpenID could use some… getting real.

Let me go over these issues and provide either resources or remedies.

Normalization of OpenIDs URLs

Look at these three URLs and make a note to yourself about any differences you see:

To a lay person (or even your average geek), these URLs all represent the same thing — especially if you type any of them into the address bar, they’ll land you on my out-of-date homepage.

But, in the land of OpenID and URI evaluation, these differences can be very significant, especially when you get into the differences between OpenID v1.1 and the forthcoming v2.0 (which adds support for inames).

To the contrary of some discussion on the OpenID list, the way in which you normalize an identity URL very quickly becomes a usability issue if the cause of OpenID login failures are not immediately obvious.

Remedy: Given some of the issues folks have had with OpenID at Highrise, DHH decided to make usability the priority:

I’m going to fix the trailing slash issue on URL-based OpenIDs. We’ll be more liberal in what we take.

This should mean that folks logging in with OpenID shouldn’t have to guess at what their appropriate identity URL looks like, instead only substantively know what the important parts are (i.e. the domain and any sub-domain or path(s)).

Outstanding issues: Of course, 37 Signals can do this, but what happens when the identity URL that someone uses on Highrise doesn’t work elsewhere because other consumers aren’t as liberal with what they accept?

Lack of support for i-names

One of the issues (features?) that OpenID v2.0 brings is the support for i-names, a controversial schema for representing people, businesses and groups using non-familiar formatting codes.

I’ve heard that there’s somewhere in the ballpark of 20,000 i-names users in the wild (I happen to have =chris.messina but never use it), but compared with the over 70 million (and growing) URL-based OpenID users, this is an incredibly small minority of the overall OpenID landscape.

Nevertheless, one potential point of frustration for these users is in the lack of standardization in implementing or indicating support for i-names, as Rod Begbie pointed out in the Highrise forum, to which DHH replied, . We don’t support iname OpenIDs for now, though. We’re just supporting OpenID 1.1.

And this, I imagine, is going to be a common issue, for both OpenID implementors (dealing with support requests for support of i-names) and for i-names users, such that I question, as others have, the wisdom of offering support for i-names identifiers, when issues still clearly remain in the usability of basic URLs.

Remedy: Once the OpenID v2.0 spec has been finalized, there will need to be a new logo to indicate which version of OpenID a consuming site supports; this will hopefully work to set expectations for i-names users.

Outstanding issues: At the same time, the addition of i-names to OpenID v2.0 has caused a lot of concern for folks, many of whom have simply decided to stick with v1.1.

Personally, I don’t see the long term value in fragmenting the OpenID protocol away from more familiar URL-based identifiers. I want something simple, straightforward and obvious. Otherwise, v2.0 is going to be a headache to advocate, to implement and to support that a lot of folks with just stick with v1.1.

Double delegation aka the Sean Coon Problem

My buddy Sean Coon pinged me the other day to see if I could help him debug the problems he was having signing into Highrise with his OpenID account. When he had signed up, he had used seancoon.org as his OpenID URL. He’d started playing with it, but then left it, only to return later, unable to login.

His problem was three-fold, but I’ll first address a basic issue with delegation that some folks might not be familiar with.

As it turned out, Sean had delegated seancoon.org to resolve to ClaimID as his identity provider. The problem was that he used http://claimid.com/spcoon as his identity URL instead of http://openid.claimid.com/spcoon, which is where his OpenID was actually stored.

Typically when people use claimid.com/[username] as their OpenID identity URL to login to sites, this transformation takes place invisibly. This is because ClaimID delegates to themselves.

The problem lies in that Sean delegated seancoon.org to his ClaimID profile, which in turn was delegated to ClaimID’s OpenID server. If this sounds confusing, it is, and that’s why it’s not allowed in OpenID.

As I understand it, delegation can only be done once, or else you might end up in an infinite chain of delegations that may end in some grandious infinite loop. By restricting your delegation hops to one, a lot of problems are avoided.

Remedy: In this case, Sean only needs to re-delegate to openid.claimid.com/spcoon, and fortunately, there’s a handy WordPress plugin that can handle this for him.

Outstanding issues: Delegation is probably one of the coolest aspects of OpenID, since it allows you to use any URL of your choosing as your OpenID and then let someone else deal with the harder part of actually talking to all your services. Furthermore, you can delegate any number of services and set up fallbacks in case your primary identity provider is taking a nap. Communicating how this works and how to resolve and communicate errors when things go wrong is one of the biggest holes in the OpenID offering, and with user experience experts like 37 Signals joining up, I hope that these issues get the amount of due diligence and attention that they deserve.

Untested assumptions

Finally, I discovered a serious mistaken assumption in the Highrise sign-up process. To test out this issue, I created a test account, using http://google.com as my OpenID:

Sign up for Highrise

Now, here’s the problem: they didn’t force me to login to that OpenID when I signed up; instead they just assumed that I knew what I was doing and that I was using a valid OpenID.

So here’s the email that I got confirming my account. Note my username:
Gmail - Welcome to Highrise

Of course when I go to login, I can’t, and I’m locked out of my account — since I can’t login and prove that I own google.com — which, notably, is the same result as if I’d mistyped my OpenID. Fortunately, 37 Signals gave me a backdoor, but it kind of defeats the whole purpose of using OpenID and suggests that you shouldn’t let folks arbitrary set their OpenIDs without having them prove that they really have control of their stated identifier.

Remedy: For implementors, you must get proof that someone controls or owns an OpenID if you’re going to rely on it as their primary identifier. You can’t assume that they’ve typed it correctly or even that they’ve even used a proper OpenID. And, most importantly, you’ve got to stress test such a new system to make sure issues like this are avoided.

Oh, and it does appear that MyOpenID.com OpenIDs are totally not working at this time; I’ve put Scott Kveton and Jason Fried in touch, so hopefully they can resolve the matter. Interestingly, if you’ve delegated to more than one identity provider and you’re using your own OpenID URL to login to Highrise, you should be able to get in.

Conclusion

It’s still promising to see folks like 37 Signals get on board with OpenID, but we clearly have a long way to go.

I hope I’ve clarified a few of the current issues that people might be seeing, or that are generally confusing about OpenID, and I admit that while I’m trying to clarify these things, a lot of this will still sound like Greek to most folks.

Given that, if you’re having issues getting OpenID, feel free to drop me a note and I’ll see if I can’t help resolve it.

Netscape will add support for OpenID

Alex Rudloff from Emurse just pinged me that Netscape will formally launch their support for OpenID on Monday:

One of the most consistent pieces of feedback that we have received thus far is that we should look into allowing people to log in using their AOL accounts that are currently used for Netscape/AOL mail, were once used for the previous My.Netscape site, and are used throughout the AOL network.

You sent this feedback, and we have been listening. In conjunction with AOL announcing its role as an OpenID provider, and spurred by the rapid pace by which OpenID is being adopted on the Web, on Monday, March 26th, Netscape will not only support signing in with your current AOL screen name, but also OpenID as a way of accessing Netscape.com and My.Netscape.

This comes as no surprise given that Netscape’s parent company, AOL, is an OpenID identity provider and is building out places where you can use your AIM screenname to login.

Reporting on OpenID implementations lately has become akin to reporting that companies have discovered and are now starting to use HTML… there’s still a long way to go, but clearly this is the future foundation of identity-based services.

What news feels like

Bush Announces Iraq Exit Strategy

I was walking down the street today when I glanced sidelong at a newspaper box and caught the words “Bush Announces Iraq Exit Strategy”.

A fleeting moment of relief came over me and I thought to myself, “Finally.”

But sometimes we believe into existence that which we want to see. And sometimes that belief, though powerful, proves false.

Upon further investigation I suffered the let-down of all time: just like always, the Onion was not reporting real news, but merely made up fantasies that were too good to be true.

What’s interesting about this has nothing to do with The Onion, though. Instead it has to do with the medium and with the message.

For one thing, the fact that what I thought I saw was in newsprint still carried with it a certain kind of psychological weight or trustworthiness… it wasn’t like reading Tailrank about some spoofed headline… if it was in print and on the street in one of hundreds of thousands of newsstands around the world, surely there must be some truth to it. Alas, the medium betrayed me.

As for the message — it is revealing to me how sharp the sudden sense of relief was at that the thought that “the war is over”. I mean, facing fact, this is the largest war that my generation has ever seen. We’ve now seen more soldiers and coalition forces killed than went to my high school. More than ten times that have been injured or wounded. And yet the thing keeps dragging on, to no certain end.

Y’know, I’ve always liked war movies — especially ones about World War II. If there was ever such a thing, history has recorded this affair as the feel-good war of the century — where boys were turned into men, women filled the factories and smoking and Coca Cola became icons of the American psyche. The same can nary be said for the current war.

And, whatever the reality of earlier wars, this one seems even further away from reality — even more impossible — and even less certain about its ultimate goal than the previous black-and-white conflicts.

…which I suppose is why the faux-headline in the Onion caught my attention and gave me a sense of, well, hope. Because that’s what this war seems to lack — there is no real villain anymore, no hero, there is no sure outcome, there is no obvious way to end this black hole that’s been unleashed. My dad and my grandfather were both enlisted men and if either were involved in active duty today, I’m not sure that I could really understand what they were after.

Oh sure, protecting freedom; certainly, saving face after removing Saddam without a plan for winning the peace; planting democracy in the Middle East? Um, okay? Saving the world from terrorism? Making the world a better place? How does making war make things better?

Y’know — I live a very privileged life. I’m so grateful to have the things I have: to live in a fantastic city with a fantastic woman; I help run an amazing upstart business situated in a terrific space with some incredible individuals. I work on things that I love and that I’m passionate about. I’m pretty much in touch with my family and I have the most fabulous friends all over the world.

So when it comes to this four-year-old war — with all the good things that I have in my life — I guess I’m just stuck wishing for a headline that indicates something other than that it’s just got to keep going for sake of… keeping going.

Journler 2.5 is out and worth a look

Journler 2.5

Last year during MacWorld, a Mac developer by the name of Philip Dow came to stay with us after he found us on Can I Crash. It was a rather happenstance occasion, one not lacking in a certain serendipity given that I’d just discovered his application — a nice little gem called Journler.

Well, it’s just about a year later and Phil’s come out with a new version — that is blazingly fast and does everything the previous version did but better.

On top of being a really exciting release, Phil has also developed his own license — one that will hopefully support his work as an independent Mac software developer. The terms are pretty simple: if you use Journler for personal use, pay whatever you’re able; if you use it in a more professional or shared context, you’re obligated to pay $24.95. Phil explains:

The basic idea behind changes to the license is fairness. There’s none of that thirty days nonsense, annoying reminders, superimposed warnings or greyed out menus. You are not a child. Simultaneously, if you are capable of purchasing the program or donating, do so. With these changes I’m working hard to stay true to my original intentions as the creator of Journler while also ensuring that I can continue working on the program under the conditions I am now.

I really respect this approach to development and charging, though I know it’s a harder path to take. In any event, if you’re looking for a journal, note-taking, GTD, media-collecting, personal-snap-shot-taking, podcasting or blogging tool (yes, it really does all those things), do give Journler a look.

Highrise follows trend with OpenID signups at 9%

Opening door to OpenIDIn announcing a number of welcome changes to their pricing plans on Highrise, their new CRM tool, 37 Signals also provides some welcome figures on the uptake of OpenID:

Another interesting stat is that 9% of the people signed up are using OpenID. Lots of early adopters on board!

This is more or less consistent with Ma.gnolia’s rate of uptake:

So far, over 15% of new Ma.gnolia members are seeing the advantage and getting their OpenID when they join Ma.gnolia. Considering how new OpenID is, and that it takes a bit of un-learning of old sign-in habits, we’re really delighted to see this adoption rate.

Jason Fried has also suggested that OpenID will be making its way to their other products soon:

We’re still learning about OpenID and OpenID implementations with Highrise. There are still some bugs to work out. Once we feel we’ve really nailed that we’ll look into spreading it across the rest of the product line.

As we see more mainstream coverage, like the USA Today article suggesting that OpenID “cuts down on Web registrations”, it’s likely that we’ll easily surpass 100 million OpenIDs by the end of the year as more and more small businesses reap the benefits of the advance of this technology in how it reduces the greatest barrier to attracting and retaining new customers: signing up for yet another account!

All in all, good news for OpenID and for 37 Signals customers.

ClaimID adds social networking

claimID.com XFN creator

In spite of previous disavowals of having social networking aspirations, identity link aggregator ClaimID has now added the ability to add other ClaimID members to your profile as contacts.

Interestingly, they restrict you to adding friends who have OpenIDs (since every ClaimID profile URL is an OpenID) and use the to define your relationship.

This is a significant decision because, presumably, every OpenID has an owner. As such, adding one of these “verified” OpenID URLs as a contact to your verified OpenID URL could represent a higher trust level — a stronger “claim” as the lingo goes — than simply using the XFN rel-me attribute to create a “weak” relationship claim. Or so goes the theory.

Meanwhile, I’ve recently been reordering my Flickr screenshot collections and have created a set devoted to adding friends interfaces. If you have examples of similar interfaces, leave me a link to the source and I’ll get them added!

37 Signals’ new app Highrise launches

Login to Highrise with OpenID

With narry a word on the 37 Signals’ blog SvN, the veil has been lifted on their long awaited CRM tool called Highrise.

There are a number of posts that capture some of the many features of Highrise on the SvN blog and are worth a look:

In the meantime, I’ve collected a bunch of screenshots (nice catch Allen) — in addition to their great tour — that will give you a sense of what the app is all about.

I’m totally excited about their adoption of OpenID, but I have to admit, their implementation — especially in the forum — is a little odd. I love the auto-adapting interface for inputing your OpenID, but the fact that I can’t sign in to the forum with the OpenID that I created my Highrise account with kind of misses the point.

And still no sign of microformats either, but a guy can hope right?

Anyway, it is exciting to take a look at all the interface greatness in this app — definitely some fine work. Whether I’ll become a paying customer is up in the air, especially as open source solutions like CiviCRM exist (though without the interface trappings that make 37 Signals products so attractive). I do like what I see so far, though — and if I can find a way to fit it into my workflow, I’ll likely end up a pretty satisfied user.

Apollo Alpha is out, the WOW comes later

TechMeme in 3DWeb

There’s a ton of buzz being tossed on the alpha release of Adobe’s new . And reasonably so, as ZDNet blogger Ryan Stewart points out, in a world of Web 2.0 internet-goodness, this is the desktop rearing its head again in the form powerful RIAs.

I’ll leave the coverage to other folks, but in the meantime, I installed the runtime libraries and ran the sample apps included — grabbing a bunch of screenshots along the way that you should take a look at.

I also set up a Flickr group for other screenshots and a Ma.gnolia group for collecting news and other Apollo-related links.

I’m particularly excited about Apollo given its advance of the state of web tech… and the best is yet to come (though Finetune gives a taste of where we’re starting from). At the same time, I’d prefer a slightly lest costly and more open — but equally intuitive and capable — solution. OpenLaszlo, where y’at?