Category: data

The Media Monetization Cycle

The media monetization cycle (MMC) is something that I’ve come to observe, experientially, from more than 30 years of working in information and communications technology.

In short, as the chart shows, experience has shown that new media go through three cycles of value creation: content, community, commerce.

bbv - MMC hand-drawnAnd, while all three are essential at some level, to the medium’s success, the quest for media companies and those that build on top of the medium (like the web) is to see how quickly they can reach the commerce curve.

Knowing that all new media go through the MMC, your strategy should be to anticipate the commerce curve and build a platform for facilitating the transition from content and community as easily as possible.

For applications development and infrastructure planning, this has broad implications for everything from user ID management, to client- and server-wide applications payloads, to schema development and database distribution, and more.

Ideally, you want to build all of those things, knowing that the medium will eventually get a place where commerce is a principle driver of activity across it, if the THE principle driver.

Understanding the MMC is more important than ever, because the pace of technology adoption has become faster than ever, as reflected by the chart from

bbv - tech adoptionIf you are in a profession, like I am, where you are in the business of seeking to launch innovative new ventures that leapfrog or even transcend (a nicer way of saying “disrupt”) incumbent technologies, then the more that you build – from the very beginning – towards the inevitable maturation point of the MMC, the better positioned you will be.

Personal Visualizations

Due to no particular plan, I’ve come across a number of different personal visualization tools recently.

Most of these tools are internet-related; in particular, social media related.  However, some visualize data that they obtain from me directly and indirectly.

IMG_4873An example of a visualization where I provide the data directly is the personal survivorship assessment that is produced by the AYA mobile app.  (Learn more about AYA, which my company Appconomy developed, at the producer’s website.)

In addition to the likelihood of cancer survivorship, there are many other categories one could imagine, beyond an array of just the other possible health-related visualizations.  For example: continuing education, personal finance, household energy use, on and on.

Another visualization example, produced from data that I provide, is the Wordle.

The particular Wordle shown was produced by copying-and-pasting in all of the content from my two-page professional resume’.  The result is a word cloud, displaying the most commonly used words larger, and the less-used words, smaller.

my-worlde-july 2013Wordle is cool for a couple of reasons. First, the creator is always tinkering with it, providing new kinds of layout options, font types, etc.  Second, it can be applied in so many ways. A favorite of mine is to use it in a messaging audit with a team.

Step 1 of the audit is asking the team to write down and give me the messages that are most important to them.  Step 2 is to ask them for the current, definitive source for their key messages, for example, their website or some other promotional tool, like their main sales brochure.

Step 3 is to copy-and-paste the content from steps 1 and 2 into two different Wordles and compare them visually.  It is amazing what frequently pops out, highlighting the stark differences between desired and actual messaging.  From there, work with the team begins, forming a strategy and creating a plan to achieve the desired messaging.

For the remainder of this post, I’ll stick with a few of the social media/internet-related visualizations I’ve stumbled across.

But, I’d love to hear your favorites.  Especially, if you find them truly useful or just satisfying to your curiosity, without any specific actionable purpose.

my-social-network-july-2013The first one is from Vizify.  I mention it because I’ve found it to be the most useful, because it provides a kind of visual biography.

In addition to the visualization itself, the Vizify makers provide a handy excerpt of code that you can include as a signature block graphic in your email that piques the interest of recipients.

my-linkedin-network-july-2013The next one is from LinkedIn, called Inmaps.  Since this one traces the connections between your various links, it takes a bit of time to process.

But once complete, it’s worth it.  Not only is it an intriguing spiderweb of your connections, key implicit clusters, and their relations.

But, it is also a dense, rich, delicate arrangement of the human, professional network that you have created, in association with all of those first-connection contacts who have linked with you over the days, months, and years.

my-gmail-network-july-2013Next one is from MIT, called Immersion, based on Gmail.  It’s pretty fascinating, for a couple of reasons.  First, it draws connections between your various Gmail correspondence partners, which in itself is illuminating.

Second and I suspect more surprising to most, as it was for me, Immersion ranks the people with whom you collaborate the most.  When I saw my rank ordered list of top collaborators, it was definitely a wake-up call.

Most noticeably, it served as a reminder of the people who have been important to me over time, even if they aren’t necessarily people with whom I’m corresponding heavily now.

my-interwebs-network-august-2009Finally, I’ll highlight a tool called Personas, from the MIT Media lab.  It’s about five years old and, in fact, wasn’t operating when I tried to run it recently.  But, I mention it because of my admiration for the elegant output it sought to produce, given the complexity of the algorithm at its core.

To my mind, if you have ever taken a Myers-Briggs type assessment or a DISC profile, then you can think of Personas achieving a similar assessment, but based principally on the content discoverable about you on the worldwide web.  Pretty neat idea.

Again, if you have a personal visualization that you’d like to share, I’d love to hear about it!

A 15 Day Walk to Mordor from The Shire

There was a time when I didn’t “get” Twitter.  It wasn’t that long ago.

Now, I can’t conceive of a business day without Twitter or some microblog replacement – it’s that valuable a newsfeed.

But along with the news, I enjoy the occasional sidebar comment, article, or vid that someone I’m Following posts.

This is an example, courtesy @Greg2dot0, who simply tweeted: “Google Maps Has Walking Directions into Mordor.”

I had to investigate.  The best part?  The end destination is my hometown!!  See for your yourself🙂

A Sampler of My Favorite Lists

Back as the dot-com boom was getting underway, around 1998-1999, I was briefly in conversation with the team about joining Jamin Patrick in the new Austin office.

Jamin had a distinguished career as an entrepreneur including as one of the first leaders of the Austin Technology Incubator. We’d also become friendly from living in the same neighborhood and seeing each other at our kids’ swim meets.

The process got as far as me going to Palo Alto to spend a day with the Garage team there, including Guy Kawasaki. A really great group, all around; but, I got cold feet and we went our different ways.

During the process, though, I vividly remember one of the deals that we were looking at seriously, at the time, was a dot-com play that was all about collecting lists of information and then making those lists available for sale. I can’t remember the name of the deal, but I remember that one of the principals was Jim Seymour of PC Magazine fame.

Anyhow, the deal never got off of the ground and now, looking back of course, it all seems a bit far-fetched. But, at the time, being a perpetual list collector myself, it naturally caught my fancy.

As time went on, Delicious and other list keeping and sharing websites arose. And, now, anything I don’t bookmark goes into a link and gets tweeted out so that I more-or-less have an eternal set of lists and other unstructured data.

I was just going through some of them the other day and thought I’d share a few of my favorites.

If you are looking for a job, here are a couple of good ones:

If you are seeking lists of business & tech influencers and what they have to say, here are a few to consider:

If data is what you seek, here are a couple of my favorites:

Then, for a few interesting but odd-ball lists, these caught my eye:

Lastly, here’s a bonus list that is really more of a gift to the music curious: every month, Spin magazine provides from 10 to 14 songs for download, free of charge, for your iDevice.  That’s a list anyone can enjoy!

Fish and data

Data is cool. First, its very name is both singular and plural, like sheep or fish. (And don’t get all grammatical on me, you datum-is-singular apologists.) Second, it’s so definitive – something is 57% or it isn’t. Pi is 3.14159-etc. Sure, you can argue about the data gathering, integrity, interpretation and the like. But, at least you are arguing about the objective, rather than the subjective.

But, what I really like about data is what it reveals about all things measured. It’s in that vein that I’ve been picking up a few interesting recent developments about data, measurement, and the public sector.

First, I read a really good write-up about website measurement in the Google Public sector blog. It’s a really nice case example of data analytics 101 for a website. And, just like the writer, I have had that same giddy feeling when reviewing data from a website’s traffic and other stats.

Second, there was a good write-up about the social media side of data gathering and measurement in InformationWeek. It discusses the CIA’s investment in the social media monitoring from Visible Technologies. Good stuff, but not especially unique – you can get listeners, monitoring, and semantic trending built into nGenera’s collaboration server right now.

Third, we just published our 2010 research agenda for nGenera’s Government Insight program and are excited about some of the research vectors we intend to explore. In the major topic area of “Leading in the age of unbounded data,” we expect to cover into listening, massively customized analytics, orchestrating, and methods for reaching beyond stereotypes.

Content may be king, but data is the kingmaker. If you haven’t done so in a while, I recommend you brush up on the latest in data analytics, visualization and simulation. In a world awash in data, the ability to interpret and apply it in real-time will be increasingly a critical success factor differentiating between market leaders and followers, whether they be public or private sector.

Whose file is it anyway?

One of the things that starting out as a computer science major does for you is give you a finer appreciation for just how buggy software is. While massive storage, middleware and caching, ever more sophisticated microprocessors, service-oriented architecture, and the like make things appear a little more reliable, the fact is it’s a miracle all of this stuff works half of the time.
The truth is, when it comes to security, rather than a than a Swiss bank, your average application more closely resembles Swiss cheese in terms of the number of holes by which it may be compromised. Frequently, the path to poking through the holes and compromising an app’s security is through user-level controls (or the lack thereof).
There have been a number of recent examples of these types of security holes in situations as innocuous as document and file management. For example, here’s a good example involving Facebook as documented in an InformationWeek article earlier this year entitled “25 Things Facebook Couldn’t Keep Secret in Court.”


As a senior product manager for Adobe surmised in the article: “At some point in the document’s workflow, it appears that someone added a white rectangle over white text in order to cover it. And that’s what they thought was sufficient to make that content undiscoverable. That’s not the right way to redact content.” No duh, as my teenage son would say.
Clever, but that’s nothing compared to some of the other PDF security holes plugged by Adobe this year. How about having an attacker take over complete control of your computer? In March, CNET wrote about the zero-day Reader vulnerability that Adobe was scrambling to patch. Overall, document and file attacks have become a ripe area for bad guys, with twice as many PDF attacks in July as in all of the first half of 2008.
It’s no surprise. If anyone like me can remember working with Microsoft Office in the mid-1990s, then you probably remember the Concept (sometimes called the macro) virus which was all about exploiting Microsoft Word and Excel files. That was the first time I remember cleaning my PC and installing security software, Norton at the time.
But, our ignorance with what’s in our files and the information they carry is beyond technical. For example, when was the last time you looked at or consciously modified the Properties of your MS-Office file? (Do you even know what or where file properties are?)
Well, the next time you have a moment, take a look at them. If you are running the last version of MS-Office, you can follow the sequence shown in the Scrib’d figures.

One of the things I’ve done for years is to add information to my summary file properties, to designate authorship, copyright, user permissions, and other important elements. Just in case a form document or thought piece for a company of mine somehow gets involved in a dispute.

In the reverse, a mild form of entertainment of mine is to occasionally browse the File Properties of documents that I receive from others – especially when they are from 3rd party service providers.

It’s amazing the little tidbits you can discover, related to document origination, travel history, etc. It’s especially humorous to get a form document from one law firm that the File Properties shows was created at another law firm – it’s happened!

As usual, the answer to whose file is it anyway is: “it’s yours.” That is, if you care about what happens to it and its contents. Therefore, just keep in mind that knowing a little more about files and applications and where they come from can make a difference in protecting your investment in the ideas and information that you share with others.