Youth Mode: A Report on Freedom | K-Hole, Box 1824

Report #4

Youth Mode: A Report on Freedom

Who
When
  • 2013-10
What
  • 40 pages (35 of content).
Previously

Promotion

Framing

Somewhat theoretical …

Concepts

  • The Death of Age
    • The assertion of individuality is a rite of passage., but generational branding strips youth of its agency.
    • Boomerang kids
    • Empty Nests
    • Using technological aptitude to divide the olds from the youngs.
    • Generational linearity is gone.
      An ageless youth demands emancipation.
  • Youth Mode
    • Say in Youth Mode, as an operating paradigm, as with a doctrine.
    • Youthfully present at any age.
    • Not about re-acting youth.
    • Something about Kevin Spacey in American Beauty, smoking pot, muscle hunk and a breakdown; he was doing it wrong.
    • Youth != Age
    • Youth == Freedom
    • Youth isn’t freedom in any political sense. It’s an emancipation
      from boredom, from prescription, from tradition.
    • There is a toolkit of Youth Mode.
  • Attributes
    • Engaged with Newness
    • Experimental
    • Critical of the Past
    • Changeable
    • Down with Groups
    • Rebellious
    • Free
  • Cultures
    • Mass Indie
    • Alternative
    • soft grunge
    • pastel goth
  • Portrayal
  • Being Special vs Being Free

Intermission & Interlude

Image Credit:

Image Credit:

Problem Taxonomy

A lot about Mass Indie in here; these are the Mass Indie problems.

<quote>But just because Mass Indie is pro-diversity, doesn’t mean it’s post-scarcity. There’s a limited amount of difference in the world, and the mainstreaming of its pursuit has only made difference all the scarcer.</quote>

      • Problem 1: Seeming Like A Clone
        The details that distinguish you are so small that nobodycan tell you’re actually different.

        • Exhibition (not sure this is actually illustrative of the point)
          • feast.ly (eatfeastly), is a dinner party circuit social network
          • fast.ly, is a CDN for video and web caching based on varnish
          • vid.ly, is a video CDN
          • vend.ly, a marketplace, a mobile marketplace
          • ming.ly, personal relationship management, contacts management
          • mob.ly, formerly Goodrec, recommendation engine, iOS only, purchased by Groupon 2010-05
      • Problem 2: Isolation
        You’re so special nobody knows what you’re talking about

        • The parable of the extreme dietary restrictions.
        • The parable of the exclusive party: no one showed up.
        • Ph.D.-level specialization
          And the sneer that all one gets out of this is a job at Subway

          • unemployable in the trade of training
          • under employed in a trade of unskilled labor.
      • Problem 3: Maxing Out
        The markers of individuality are so plentiful and regenerate so quickly that it’s impossible to keep up.

        • Internet famous
        • Fear of Missing Out (FOMO)
        • Don’t Give A Fuck (DGAF)
        • Reality TV
        • Urban Dictionary
        • <quote>Only idiot savants are in the right place at the right time without even knowing it.</quote>

Solution Taxonomy

Acting Basic

      • Proposal: Think Different
      • Having mastered difference, the truly cool attempt to master sameness.
        • Something about Steve Jobs == Doug Funnie (probably about wearing the same clothes all the time).

Critique

      • Acting Basic is not a solution to Mass Indie problems because it’s still based on
        difference.
      • Sameness is not mastered, only approached.
      • … therefore

Normcore

      • Say in Normcore, as with a body of theory, as with a doctrine
      • Mass Indie creates cliques of people In The Know (ITK)
      • Normcore
        • something-something<quote>the process of differentiation from a nonlinear perspective.</quote>
        • toolkit of Youth Mode.
        • <quote>produces microscopic catch-alls that allow for strategic misinterpretation.</quote>
        • <quote>capitalizes on the possibility of misinterpretation as an opportunity for connection — not as a threat to authenticity.</quote>
        • <quote>knows your consumer choices aren’t irrelevant, they’re just temporary</quote>
        • <quote>is a path to a more peaceful life</quote>
      • In Normcore (as a body of theory)
        • <quote>one does not pretend to be above the indignity of belonging.</quote>
        • <quote>you need to understand that there’s no such thing
          as normal.</quote>
      • Attributes
        • Situational
        • Non-Deterministic
        • Adaptable
        • Unconcerned with authenticity
        • Empathy over tolerance
        • Post-aspirational

The Device

The Device

      • Diamond
        • Alternative
        • Acting Basic
        • Mass Indie
        • Normcore
      • Square
        • Evasion
        • Difference
        • Celebration
        • Sameness
      • Axes
        • Rebellion
        • Indifference
        • Tolerance
        • Empathy

Previous Work


; We All Want To Be Young; on Vimeo; circa 2011; 9:47

The K-Hole Brand Anxiety Matrix

Report #3

The K-Hole Brand Anxiety Matrix

Who

When

  • 2013-01

What

  • 49 pages (43 of content).

Previously

Concepts

  • Statements
    • Consumer experiences have always made people anxious.
    • Activity tracking devices tell us what we’re “actually” doing.
    • The data they provide exists to make us less nervous <snip/>.
    • The job of the advanced consumer is managing anxiety, period.
  • Terms
    • Performance anxiety
    • Frictionless ease
    • Consumer response to information.
    • Being calculated

The Parable

  • 2012
  • Storm A (Hurricane Sandy)
  • Storm B (that noreaster afterwards)
  • Facts, Factoids, Rumors
    • Goldman Sachs
    • CNN
    • Twitter
  • Storms cause anxiety, and buying.

The Device

Dimensions

  • X => Chaos contra Order
  • Y => Legible contra Illegible

Quadrants

  • Legible Order
  • Legible Chaos
  • Illegible Order
  • Illegible Chaos

Deconstructions

These are fairly abstract, but there’s more than a Dungeons & Dragons Alignment System conceptuality in here.  You have to work it.

Legible Order

  • a control variable
  • a standard, with reason
  • unnoticeable
  • comfort
  • ability discriminate & manage known threats
    while maintaining distance
  • depressive realism
  • it is unexciting
    the unknown can be exciting but dangerous
  • Not a path to self-discovery
  • Surveillance
  • Ubiquity
  • Absence does not amount to nonparticipation

Brands

Metaphors

  • Supermodel wearing clothes

Legible Chaos

  • Reflexive & uncertain.
  • Everything may turn out well.

Mitigations

  • We have tools to make sense
  • We have each other.
  • <quote>We might be totally fucked, but at least it’ll be interesting.</quote>

Brands

“persistently random brands”(?)

  • Costco, big box retail.
  • Zara, a fashion shop, Spain

Metaphors

  • Your (sic) gynecologist
  • Jerry Seinfeld
  • Louis CK
  • <quote>Anyone who believes that crazy shit happens all the time, but at the end of the day we can at least talk about it.</quote>

The use of the word shit, rather than to indicate fæces, here is used in lieu of the more pedestrian noun event

Illegible Order

  • Hard to maintain credibility
  • Latent discipline (of brands) implies anxiety management capablity
  • Some logic prevails in the universe
  • Best verison of normal.
  • Completely unhackable
  • A master plan exists, the details are “currently offline.”
  • Breaks down into dreary legibility

Concepts

  • sexy and auratic => fashion
  • enticingly naive => tech IPO

Brands

Metaphors

  • Parents <quote>Like parents, whether these secrets attract or repel you depends on how well they keep their acts together. Illegible Order is in constant danger of letting its simplistic veneer break down into dreary legibility, or becoming undisciplined and revealing that its master plan was just wishful thinking all along.</quote>
  • George W. Bush, as emperor (see picture)

Illegible Chaos

  • Incomprehensible
  • A search for patterns in aggressively uncomplicated situations.
  • A pointless search for hidden complexities
  • False patterns mapped to chaos
  • Positive feedback loop.
  • <quote>The content retrofits itself into a pre-existing structure without conforming to its logic.</quote>

Brands

  • Blue Man Group
  • Lindsay Lohan (LiLo)
  • The Hangover

Metaphors

  • Staring at a compost heap

Intermission & Interlude

Image: Zara
Noted: feed the models

Image: Girls Generation, from: the report, page 28; not clear how they are relevant to the Illegible Order concept.

Case Studies

The exercise is to taxonomize these into the four quadrants.  Compare & contrast.  Show your work.

Isabel Marant

  • Internal wedge sneakers
  • Isabel Marant
    • a fashion shop
    • commenced operations 1994

Positioning

  • You can’t buy Isabel Marant on the Internet.
  • All brands are luxury brands
  • Concepts
    • Working class
    • Leisure class
  • Nearby

Globster

  • Cryptic & vague story
    • Company Q tracks everything except purchases
    • Company R tracks purchase histories
      Company R cross-references to Company Q profiles.
  • Something about “The anti-Yelp”
  • The reference is unclear
    • globster versus glogster versus …
    • Maybe a hypothetical scenario (Companies Q, R)

Positioning

  • <quote>New friends, lovers, and one-night stands are connected based on who’s using the same contact solution. In short, Company R takes the social out of social media. Every purchase leads to a new person.</quote>

Disambiguation

  • Glogster and Glogster.EDU
    Locations

    • Boston, MA
    • Prague, CR
  • <quote>A globster, or blob, is an unidentified organic mass that washes up on the shoreline of an ocean or other body of water. The term was coined by Ivan T. Sanderson in 1962[1] to describe the Tasmanian carcass of 1960, which was said to have “no visible eyes, no defined head, and no apparent bone structure”. A globster is distinguished from a normal beached carcass by being hard to identify, at least by initial untrained observers, and by creating controversy as to its identity.</quote> ref

Teen Spirit

Assessment

  • Spritz perfume
  • Smells like Raspberry

Something about concepts from

  • Hermès’ Garden on the Nile (Un Jardin Sur Le Nil Hermès)
  • participation, from a place of resistance
  • New Yorkers wear black to be less noticeable
  • Go rogue in the aisles of Whole Foods
  • Botox (arm-)pits.

Mirena

Positioning

  • <quote><quote?Unlike condoms, NuvaRings, or careful timing, the IUD-hardware-system can actually improve your sex life because there’s less to do. You don’t feel like you’re sacrificing control; it’s about streamlining. You make one decision and stick with it.</quote>
  • <quote>The IUD doesn’t affect our bodies the same way because it’s more like an accessory – a protective amulet or charm. It’s not magic (despite the fact that nobody totally understands how it works); it’s just metal.</quote>
  • <quote>You’ll have your Barbour jacket and your IUD longer than you’ll have your next laptop. What other purchases of this scale, commitment, and longevity are made by young women who aren’t trying to get pregnant?</quote>

OK, point taken.

Kristin Stewart & Robert Pattinson

Image: Kristen Stewart & Robert Pattinson sitting in a field, Twilight: Breaking Dawn 2, from the report, page 44; apropos love made manfiest by deliberate action, supported by the device technology at hand.

Lapka

Concept

  • Four sensors
    1. Radioactivity
    2. EMF
    3. Humidity
    4. Nitrates
  • Modem-based wireline coupling into the audio jack.
  • Packaging:
    • Synthetic ivory (a plastic)
    • Uncoated Brazilian Sapele
  • Culture
    • iOS (only)

Positioning

  • <quote>It’s not augmented reality, it’s reality.</quote>
  • <quote>Most of the time, when specialists describe these forces, it’s a binary conversation: either you’re safe or you’re fucked.</quote>
  • <quote>“Everything I’m wearing is exactly what I want to be wearing.” Lapka differentiates the everyday, turning anxiety into opportunity. It’s what fashion, in the best case scenario, can do: make you more capable of addressing the world.</quote>

The use of the word fuck is a nice touch, shows authenticity & cred; probably not a great characterization for the science project term paper tho.

Ad Block Plus for Facebook

facebook.adblockplus.me

Method

Subscriptions

Activities

Runs ytimg pixels, a promotional video from YouTube (1:07)

Promotions

Via: backfill

FragMOREtation: A Report on Visibility | K-Hole

Report #1

FragMOREtation: A Report on Visibility

Who

When

  • 2011-04

What

  • 38 pages (34 of content).

Previously

Concepts

  • FragMOREtate
  • lifestyle brands
  • luxury brands
  • extreme sub-branding

The Parable

  • Something about a past project (their work, or maybe not)
  • Concepts
    • A corporate makeover
    • An advertising campaign announcing the breakup
    • Metaphors: “parts combined”
  • Principals
    • Company A (being broken up)
    • Company A -> Companies A-Z
    • Each subsidiary licenses a single “luxury good”
  • Outcome
    • Company A still exists.
    • Company B sells boots.
    • Company C licenses branded cappuccinos into restaurants
      Maybe: sit-down, no reservations, cash only.
    • Company E sells <quote>only eye moisturizer made from foreskin</quote>
      Maybe: SkinMedica’s TNS (tissue nutrient system) Recovery Complex (first of all “ewww”, second: check 2004-10-21; counterpoint 2007-01-30).
    • Company H runs 3 hotels (New York, LA, Berlin)

The oppositional metaphors

(their contribution)

FragMOREtation FLATmentation
Secrecy Disclosure
Somewhere Everywhere
Dispersion Conglomeration
Discretion Ostentation
Opacity Transparency
Longing Satisfaction
Delay Immediacy
Segmentation Continuity
Indifference Ambivalence
Isolation Connection

Ideas In Application

  • The Company Man
    • individuality by niche brand adornment
  • We Don’t Want To Know
    • message of the (young) generation to the (old) elders
  • Hot Mass
    • the mass market has clustered, there is no variation

Observations & Exemplars

Daffy’s Underground Puzzle

Actualities




It has to be said: she may be enjoying herself in full on fun, the more fun because you’re watching, but the guy looks like he’d rather be anywhere else but right there, right then.

Venmo

  • Mobile app to send money person-to-person
    • SMS phones
    • Linked to a verified bank account
    • Social Network of Money
    • Sync
      • phone
      • contacts
      • social platform
      • bank account
    • Something about a “trust account” with multiple users & pre-approved drawing rights.
  • Background
    • Cultures
    • Competitors
      • Square Cash
      • PayPal(?) Braintree
    • CrunchBase
    • Press Cycles
      • 2013-Q1
      • 2013-Q2
  • Concepts
    • New Millennial (misspelled as Millenial in the original)
    • Replace pocket change, between friends, pay for lunch
    • Bites of Sound
      • (ew!) “As if your phone and your wallet had a beautiful baby”
      • “Did you ever think you’d be able to pay for drugs with a credit card?” (um, that’s a precrime admission of guilt isn’t it?)
    • The New Polite
    • Vassal/Liege Relationships from “I don’t have any cash”
    • Veiled Economies: Drugs & Prostitution
      • <quote>Since the purpose of a Venmo payment is input by the users, a bag of MDMA can be a Seitan salad.</quote>
        • This framing doesn’t seem helpful to the company’s mission.
      • Something about Grindrfor gay hook-ups. <quote>With the advent of Venmo, you can now use Grindr to find a john, make an appointment, receive directions, and have him prepay enough money for your cab, all while hanging out with your friends in a bar.</quote>
        • Ibidem.
    • Something about Gifiaddon
      • <quote>The add-on GIBI syncs Venmo to Foursquare. With GIBI, you can plant sums of money in certain places for your friends to redeem — you can pay for a friend’s latte from across town with just your phone.</quote> (misspelling of GIFI as GIBI from the original)
      • Sync with Fouresquare
      • Leave money
        • pre-approved
        • for a person
        • at a place
      • Gifi closed down 2012-03-09.
  • Criticisms
    • Too “earnest” for Millennials
    • Too “comfortable” for Millennials
    • Assumes the user wants a “balance sheet even” (even balance sheet).

Stone Island

  • Jackets
  • Background
    • Commenced operations 1982
      • 1983 Ostis’s Raso Ray fabric
        • rubberized cotton satteen
      • 1991 Reflective Jacket
        • coating of “glass microspheres”
      • 1993 Thermojoint
        • “resistant to nuclear radiation”
  • Concepts
    • Overengineered consumer products.
    • Adoption of “military grade” products as signalling.
    • immanent vs imminent
    • <quote>At the root of these fabrics lies an immanent threat. They are paranoid jackets of illusion and defense.</quote>
    • Something about “the opposite” of the jacket being Uniqlo’s Heattech clothing line.

The Cone

  • A vibrator
  • Background
  • Concepts
    • <quote>If you were to walk into a room containing the Cone Vibrator, odds are that you wouldn’t know what to think. It’s definitely noticeable: a 5” tall cone with an 8” diameter base, molded in a soft pink or black plastic. Given a casual glance, the Cone passes off as a vaporizer, a mood lamp, or a MoMA salt/pepper shaker.</quote>
      • That’s a stretch, actually.
      • Stack that assertion against the social fallout of detection on a visit from
        • County Social Services,
        • The Ladies’ Auxiliary,
        • PTA Chapter President & Auction Committee,
        • Mom, Dad & the younger brother at one’s dorm room open house (since the demographic here is Millennials after all).
    • Something about
      • ambiguous
      • gendered body
      • not a body at all
      • necessitates interpretive use.
    • <quote>The Cone’s consumer innovates in the dark. You can use it and still do other things (make coffee! take a personal phone call!). It isn’t handheld. You put it down and turn it on. There’s no wrong way to use it, so you can fool around and get off</quote>
      • Again, it’s a vibrator.
      • Vibrators cause sex whose teleology is the orgasm which is liberatory.
      • Vibrators are a prosthesis that gives sexual agency to women who aren’t otherwise complete.
      • Got it.
  • Criticisms
    • Not clear why this product is here.
    • There was already one overtly sex-themed trope in the mix (the young lady in the Daffy’s #undergroundpuzzle campaign)

Actualities

K-Hole, trend reports 2011-2013

K-Hole

Reports

Via: backfill

tl;dr

  • Very high concept.
  • They’re fun, and you’ll have fun reading them.
  • There’s a pony in there somewhere.  Work it.

Etymology

  • K-hole” is a slang term for the subjective state of dissociation from the body commonly experienced after sufficiently high doses of the dissociative anesthetic ketamine (75-125 mg IM). This state may mimic the phenomenology of catatonic schizophrenia.
    Jimi Wales’ Wiki
  • The state of mind caused by taking large amounts of ketamine. the user becomes trapped in state of detatchment from their physical presence; the user can think about moving their arm, and will then see an arm moving in front of them, but the link between the thought and the moving arm does not register.
    The senses also become distorted, objects appear to move closer or further away resulting in the user’s sight becoming fixed to one point, fearing looking away from that point as the distortions are disorientating and in the worst cases can cause nausea.
    The combination of these effects leave the user feeling trapped in a frozen state, as if stuck in a hole peering out; hence the expression ‘k-hole’
    The party animal ingested enough ketamine to tranquilize a family of large bagders, it was all going fine until he found himself in the k-hole, staring at a tile on the floor for 2 hours, unable to move.

    Urban Dictionary

  • Drugs Inc.: The K-Hole; National Geographic Channel; 2012-01-10; next airing: 2013-11-10 @ 04:00 EDT.
    Teaser: After injecting ketamine, users can sink into a “k-hole,” a state often described as an out-of-body experience.

Review

  • Take the reports apart, following up on the referenced products & events.
    • 2011-05 through 2013-10.
  • Several references to products & companies which are now closed.
  • Misspellings
  • It’s not clear if these are “trend reports” of others’ work as exemplars “leading the way forward” or if this is their work that they were involved in & around.
  • They are “trend forecasting reports”
    • voiced,
    • off the cuff,
    • spec work, real work,
    • cultural lifestyle observations,
    • promotional,
    • fun stuff.
  • Less tall for the test of time; a little less trenchant than at first glance; two years later.

Lightbeam for Firefox

Lightbeam

Concept

  • Visualizations
    1. Graph
    2. Clock
    3. List
  • Sharing
    • Data stored locally

Background

Previously

Promotions

Via: backfill

Actualities

CoreOS

CoreOS

Concept

  • Based on Google’s ChromeOS
  • Reconfigured for the server
  • Built with/on/around Docker of dotCloud
  • Was Core Boot

Who

  • Alex Polvi
  • Greg Kroah-Hartman, Linux Foundation
    • advisor
  • Michael Marineau, Google
  • Brandon Philips
  • Lew Moorman
    • funding
    • Rackspace president and board member

Characteristics

  • Somehow CoreOS “is optimized for” Docker (or something like that)

Promotions

  • Cade Metz; Linux Hackers Rebuild Internet From Silicon Valley Garage; In Wired; 2013-08-21.
    Mentions

    • analogic syllogism of “the garage”
      • Hewlett-Packard was developed in a garage
      • Hewlett-Packard became great
      • CoreOS is developed in a Palo Alto garage.
    • Adam Jacob
      • quoted for color
      • co-founder, OpsCode, products: Chef, Puppet
  • Cade Metz; The Chef, the Puppet, and the Sexy IT Admin; In Wired; 2011-10-26.
    Mentions

    • See DevOps
    • CoreOS is somehow suited to a DevOps world vision; CoreOS uses Docker; of which Chef & Puppet are exemplars, or something like that.
  • Cade Metz; Chromebook: ‘Father of Google Apps’ Raises Second Child; In Wired; 2011-10-07.
    Mentions

    • Throat clearing with a story: John Wilkes leaves HP, joines Google; Google is Very Big.
    • Google
      • Borg
      • Omega
        • John Wilkes; Omega; At Google Faculty Summit, on YouTube; 2011-07-21; 30:36
      • Charles Reiss
        • Intern of John Wilkes
        • Quoted for color & veracity
    • Mesos
      • now at Apache
      • History
        • origin at University of California, Berkeley (UCB), Computer Science Department
          • Ben Hindman, founder, Twitter, ex UCB.
          • Andy Konwinski
          • Matei Zaharia
        • developed further at Twitter
          • John Sirois
          • Travis Crawford
          • Bill Farner
      • Reference Customers
        • AirBNB
        • Conviva
    • (Oracle) Sun Grid Engine

Is Ad Avoidance a Problem? | Wu, New Yorker

Tim Wu; Is Ad Avoidance a Problem?; In The New Yorker; 2013-10-23.

tl;dr → no.

<quote>As consumers, we should understand ad-avoidance as a way of setting a price on our time and attention. For the past century, we’ve arguably been selling it too cheap, trading it all for a few decent sitcoms and sports programming. The rise of ad-avoidance is a way of putting a higher price on the privilege of doing what ads do—make brands more valuable and convince us to spend money. Just as we don’t let every salesman into our home, there’re no reason to let every advertisement into our life.</quote>

And: Betteridge’s Law

Referenced

  • Simon P. Anderson, Joshua S. Gans; TiVoed: The Effects of Ad-Avoidance Technologies on Broadcaster Behaviour; available at SSRN; 2008-11-05; 39 pages.
    Abstract: The business model of commercial (free-to-air) television relies on advertisers to pay for programming. Viewers ‘inadvertently’ watch advertisements that are bundled with programming. Advertisers have no reason to pay to have their ads embedded if the viewers succeed in unbundling the advertisements from the entertainment content (advertising bypass). TiVo (Digital Video Recorder) machines, remote controls, and pop-up ad blockers are all examples of ad-avoidance technologies whose deployment detracts from the willingness to pay of advertisers for audience since a smaller audience is actually exposed to the ads. However, viewer purchases of devices to avoid ads may cause a disproportionate share of the ad nuisance to fall on the remaining audience. As these are views less adverse to ads, this causes broadcasters to increase advertising levels. This result is in line with observed facts. The bypass option may cause total welfare to fall. We demonstrate that higher penetration of such technologies may cause program content to be of lower quality as well as to appeal to a broader range of viewers (rather than niches). In addition, we cast doubt on the profitability of using subscriptions to counter the impact of ad-avoidance.
  • Peter Callius (Research International Sweden); Advertising Avoidance: The Quiet Consumer Revolt; SIFO Research International, Stockholm, SE; 2008-12; 11 pages (8 of content); landing
    Mentions

    • Five types of media
    • Three types of Ad Avoidance Behavior
      1. Ad Avoiders
      2. Tradition & Control
      3. Laid Back & Available
    • Positive- vs Negative- to advertising
    • Broadcast vs Narrowcast
    • Virality
  • Torben Stühmeier, Tobias Wenzel; Getting beer during commercials: adverse effects of ad-avoidance; DICE Discussion Paper Number 2; Düsseldorf Institute for Competition Economics (DICE); Leibniz Information Centre for Economics; ISBN 978-3-86304-001-7; 2010; 30 pages.
    Abstract: This paper studies the impact of ad-avoidance behavior in media markets. We consider a situation where viewers can avoid advertisement messages. As the media market is a two-sided market, increased ad-avoidance reduces advertisers’ value of placing an ad. We contrast two financing regimes, free-to-air and pay-TV. We find that a higher viewer responsiveness to advertising decreases revenues and entry in the free-to-air regime. In contrast, in the pay-TV regime, lower income from advertisements is compensated by higher subscription income leaving revenues and the number of channels una ffected for a fi xed total viewership.
  • Jeff Boeheme (Kantar Media), Mitzi Lorentzen (Millward Brown); How advertisers can minimise Ad Avoidance; Session entitled Key Issue Forum – Improving Creative Impact: “Measuring Acceptance and Avoidance of TV Advertising to Maximize ROI”; performed at Audience Measurement 6.0: Measuring Complexity (ARF 6.0); 2011-06-13; landing.
    Jeff Boehme is Chief Reearch Officer, Kantar Media Audiences, North America; is based in New York City.
    Mitzi Lorentzen is Vice President, Client Solutions, Millward Brown; is based in Lisle, IL, USA.
  • Newton N. Minow; Vast Wasteland Speech; a speech; Delivered at the meeting of the National Association of Broadcasters, Washington, DC; 1961-05-09; landing.
    <quote>But when television is bad, nothing is worse. I invite each of you to sit down in front of your television set when your station goes on the air and stay there, for a day, without a book, without a magazine, without a newspaper, without a profit and loss sheet or a rating book to distract you. Keep your eyes glued to that set until the station signs off. I can assure you that what you will observe is a vast wasteland.
    You will see a procession of game shows, formula comedies about totally unbelievable families, blood and thunder, mayhem, violence, sadism, murder, western bad men, western good men, private eyes, gangsters, more violence, and cartoons. And endlessly, commercials — many screaming, cajoling, and offending. And most of all, boredom. True, you’ll see a few things you will enjoy. But they will be very, very few. And if you think I exaggerate, I only ask you to try it.</quote>

Via: backfill

Why Our Privacy Problem is a Democracy Problem in Disguise | Evgeny Morozov, MIT Technology Review

Evgeny Morozov; Evgeny Morozov on Why Our Privacy Problem is a Democracy Problem in Disguise; In MIT Technology Review; 2013-10-21.

Referenced

Via: backfill

Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is Not Robust | Dodis, Pointcheval, Ruhault, Vergnaud, Wichs

Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs; Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is Not Robust; In Proceedings of ACM Conference on Computer and Communications Security (CCS); 2013-11-4; 31 pages.

Abstract

A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers whose distribution is indistinguishable from uniform. A formal security model for PRNGs with input was proposed in 2005 by Barak and Halevi (BH). This model involves an internal state that is refreshed with a (potentially biased) external random source, and a cryptographic function that outputs random numbers from the continually internal state. In this work we extend the BH model to also include a new security property capturing how it should accumulate the entropy of the input data into the internal state after state compromise. This property states that a good PRNG should be able to eventually recover from compromise even if the entropy is injected into the system at a very slow pace, and expresses the real-life expected behavior of existing PRNG designs. Unfortunately, we show that neither the model nor the specific PRNG construction proposed by Barak and Halevi meet this new property, despite meeting a weaker robustness notion introduced by BH. From a practical side, we also give a precise assessment of the security of the two Linux PRNGs, /dev/random and /dev/urandom. In particular, we show several attacks proving that these PRNGs are not robust according to our definition, and do not accumulate entropy properly. These attacks are due to the vulnerabilities of the entropy estimator and the internal mixing function of the Linux PRNGs. These attacks against the Linux PRNG show that it does not satisfy the “robustness” notion of security, but it remains unclear if these attacks lead to actual exploitable vulnerabilities in practice. Finally, we propose a simple and very efficient PRNG construction that is provably robust in our new and stronger adversarial model. We present benchmarks between this construction and the Linux PRNG that show that this construction is on average more efficient when recovering from a compromised internal state and when generating cryptographic keys. We therefore recommend to use this construction whenever a PRNG with input is used for cryptography.

Response

Theodore Ts’o

Referenced

Intel

Related

Promotions

Via: backfill

Smart Store Privacy

 Program

Title: Future of Privacy Foundation (FPF)’s Mobile Location Analytics (MLA) Working Group

Related

Intellectual Property Claims

  • Patent 8,335,174, promotional site (redirects to the patent claims at the USPTO, here)
  • U.S. Patent 8,335,174 System and method for registering network information strings; Stillman Bradish, Scott A. Smith; Radius Networks; Granted: 2012-12-18; Filed: 2011-11-15.
  • U.S. Patent 8,335,174, noted.
  • Abstract: A system and method for registering network information strings. An information string server device receives a request to register a network information string from a computing device. The network information string may be included in a message broadcast by a string broadcast station. The information string server device determines whether the network information string has been previously registered with the information string server device. The information string server device stores the network information string in a record of an information string datastore when the network information string has not been previously registered with the information string server device. A registration acceptance message may be sent by the information string server device to the computing device when the network information string has not been previously registered with the information string server device.

Outreach

Collateral

  • Mobile Location Analytics Code of Conduct; 6 pages
    Outline

    • Preamble
    • Who is Covered
    • Principle One: Notice
    • Principle Two: Limited Collection
    • Principle Three: Choice
    • Principle Four: Limitation on Collection and Use
    • Principle Five: Onward Transfer
    • Principle Six: Limited Retention
    • Principle Seven: Consumer Education
    • Exceptions ot the Principles
    • Definitions
  • Sample MLA Reports, 7 images
    1. Slide 1
    2. Slide 2
    3. Slide 3
    4. Slide 4
    5. Slide 5
    6. Slide 6
    7. Slide 7
  • Mobile Location Analytics (MLA), an overview; undated (2013-10-23); 5 slides (4 of content).
    1. Problem Statement (technology scope: WiFi, Bluetooth, MAC)
    2. Logging Practices (operational overview)
    3. Principles for a Code
    4. Opt-Out
Blessings
  • Jessica Rich (FTC); Director of the FTC Bureau of Consumer Protection Comments on MLA Code; 2013-10-23.
    Jessica Rich is Director of Consumer Protection. Federal Trade commission (FTC).

    • A quote, inline, 70 words.
    • Bites
      • <quote>It’s great that industry <snip/> has taken a positive step forward in developing a self-regulatory code of conduct</quote>
      • <quote>Our staff appreciated the opportunity to provide feedback in the process of creating the code.</quote>
    • via Politico Morning Tech.

Warinesses

  • Mallory Duncan, Senior Vice President and General Counsel, National Retail Federation ref
    • <quote>Very few companies have had any involvement with this process.</quote>
    • <quote>Our members are still examining it.</quote>
    • <quote>It strikes us at first glance that we’re not sure you want to regulate technology that is designed to provide customer benefit before even they get off the ground.</quote>

Participants

Who

(alphabetical)

  • Liz Eversoll, CEO, SOLOMO.
  • Steve Jeffery, CEO, Brickstream.
  • Jules Polonetsky, Executive Director, Future of Privacy Forum (FPF).
  • Jim Riesenbach, CEO, iInside Inc.
  • Charles E. Schumer, United States Senator (NY D)
  • Will Smith, CEO, Euclid.
  • Glenn Tinley, President & Founder, Mexia Interactive.
  • Marc Wallace, Co-Founder & CEO, Radius Networks, Inc.
  • Devon Wright, Co-Founder, Turnstyle Solutions.
  • Christopher Wolf, TITLE, Future of Privacy Forum (FPF).

Promotions

(owned, earned, purchased)

Self

Trade

Via: backfill

Precision Moments Targeting | Kiip

Precision Moments Targeting (PMT), Kiip

Kiip Picture

Mentions

  • Who
  • San Francisco
  • CrunchBase
  • Products/Services/Platforms
  • Availability
    • Android
    • iOS
  • Engines
  • Localizations
    • Japan (language)
  • Features & Functions
    • Demographics
      • age
      • gender
    • Verticals, Categories, Channels
    • Neural Net <buzzz>machine learning</buzzz>
      Something about

      • propensity profiling
      • lookalike modeling
      • first party data (survey data)
    • Location
    • Mindset & Sentiment
    • Historical Redemption (patterns)
    • Dayparting
      Hinted at from the “day circle” motif
  • Partners (recent)
    • Yahoo! Japan
    • comScore

Promotions

Self

Trade

Via: backfill

Microsoft AdvertisingManager & AdvertisingId in Windows 8.1

Steve Guggenheimer (Microsoft); New advertising platform SDKs improve monetization for Windows 8.1 Store developers; In Their Blog; 2013-10-23.
Steve Guggenheimer is corporate VP and chief evangelist, Microsoft

Mentions

  • AdvertisingManager Class
    • AdvertisingId <quote>Retrieves a unique ID used to provide more relevant advertising by understanding which apps are used by the user and how they are used, and to improve quality of service by determining the frequency and effectiveness of ads and to detect fraud and security issues. This ID is per-user, per-device; all of the apps for a single user on a device have the same advertising ID. If the advertising ID feature is turned off, no ID is retrieved.</quote>
    • Language Bindings
      • JavaScript
      • C#
      • C++
      • Visual Basic
  • Terms & Conditions (Windows 8.1 app certification requirements for ads)
    See Section 4

    1. Privacy
      1. Your app must have a privacy statement if it is network-capable<snip>details</snip>

      2. Your app must obtain opt-in or equivalent consent to share personal information<snip>details</snip>
      3. Your app must respect user choices regarding the advertising ID<snip>details</snip>
    2. User Controls
      • Your app must respect system settings for notifications and remain functional when they are disabled<snip>details</snip>
  • Availability within Microsoft Advertising
  • Partners
    • MediaBrix, Breakthrough Moments™ (BTMs)
      • a cross-platform technology,
      • <quote>reaches game players at natural, critical points in gameplay where people are most receptive to brand messages.</quote>
    • LeadBolt
      • mobile app discovery,
      • advertising,
      • monetization
      • AppFireworks
        • actionable analytics
        • a cross promotion platform.

Promotions

Via: backfill

The Wireless Registry, the “Do Not Track” registry of MAC addresses

Mentioned

  • The Wireless Registry(seems non-operational)
  • Radius Networks
  • Who
    • Stillman Bradish
      • co-founder
      • ex-
        • Bizdev Lightsquared.
        • CMO, Amobee,
        • BOD, Shazam Entertainment.
    • Patrick Parodi
      • co-founder
      • ex-
        • Oracle finance consulting
  • Product
    • A “Do Not Call” list for MAC addresses.
    • Proximity As A Service™
    • Proximal API
      • Wireless registration SDK
      • Wireless detection SDK
      • Wireless content association SDK
  • Intellectual Property
    • Patent 8,335,174, promotional site (redirects to the patent claims at the USPTO, here)
    • U.S. Patent 8,335,174 System and method for registering network information strings; Stillman Bradish, Scott A. Smith; Radius Networks; Granted: 2012-12-18; Filed: 2011-11-15.
      Abstract: A system and method for registering network information strings. An information string server device receives a request to register a network information string from a computing device. The network information string may be included in a message broadcast by a string broadcast station. The information string server device determines whether the network information string has been previously registered with the information string server device. The information string server device stores the network information string in a record of an information string datastore when the network information string has not been previously registered with the information string server device. A registration acceptance message may be sent by the information string server device to the computing device when the network information string has not been previously registered with the information string server device.

Adoption

Promotions

Related

Via: backfill

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia | Anthony Townsend

Anthony M. Townsend; Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia; W. W. Norton & Company; 2013-10-07; 400 pages; kindle: $15.

Anthony Townsend

Table of Contents

  1. The $100 Billion Jackpot
  2. Cybernetics Redux
  3. Cities of tomorrow
  4. The Open-Source Metropolis
  5. Tinkering Toward Utopia
  6. Have Nots
  7. Reinventing City Hall
  8. A Planet of Civic Laboratories
  9. Buggy, Brittle and Bugged
  10. A New Civics for a smart Century

Promotions

At least

Via: backfill

Inferring Trip Destinations From Driving Habits Data | Dewri, Annadata, Eltarjaman, Thurimella

Rinku Dewri, Prasad Annadata, Wisam Eltarjaman, Ramakrishna Thurimella; Inferring Trip Destinations From Driving Habits Data; In Proceedings of Workshop on Privacy in the Electronic Society (WPES); 2013; 9 pages.

Abstract

The collection of driving habits data is gaining momentum as vehicle telematics based solutions become popular in consumer markets such as auto-insurance and driver assistance services. These solutions rely on driving features such as time of travel, speed, and braking to assess accident risk and driver safety. Given the privacy issues surrounding the geographic tracking of individuals, many solutions explicitly claim that the customer’s GPS coordinates are not recorded. Although revealing driving habits can give us access to a number of innovative products, we believe that the disclosure of this data only offers a false sense of privacy. Using speed and time data from real world driving trips, we show that the destinations of trips may also be determined without having to record GPS coordinates. Based on this, we argue that customer privacy expectations in non-tracking telematics applications need to be reset, and new policies need to be implemented to inform customers of possible risks.

Mentions

  • Products
    • Progressive’sSnapshot,
    • AllState’s Drivewise,
    • State Farm’s In-Drive,
    • National General Insurance’s Low-Mileage Discount,
    • Travelers’ Intellidrive,
    • Esurance’s Drivesense,
    • Safeco’s Rewind,
    • Aviva’s Drive,
    • Amaguiz PAYD,
    • Insure The Box,
    • Cover-box,
    • Ingenie,
    • MyDrive.
  • Quasi-identifiers
  • Telematics
  • OnStar
  • OBD-II
  • LandAirSea GPS Tracking Key
  • OpenStreetMap
  • Stop Points
  • Depth-First Search (DFS)

Via: backfill, backfill

DevOps, the concept

Cade Metz; Return of the Borg: How Twitter Rebuilt Google’s Secret Weapon; In Wired; 2013-03-05.
Mentions

  • Throat clearing with a story: John Wilkes leaves HP, joins Google; Google is Very Big.
  • Google
    • Borg
    • Omega
    • Charles Reiss
      • Intern of John Wilkes
      • Quoted for color & veracity
  • Mesos
    • Incubating at Apache
    • History
      • origin at University of California, Berkeley (UCB), Computer Science Department
        • Ben Hindman, founder, Twitter, ex UCB.
        • Andy Konwinski
        • Matei Zaharia
      • developed further at Twitter
        • Interface renamed Aurora
        • John Sirois
        • Travis Crawford
        • Bill Farner
    • Reference Customers
      • AirBNB
      • Conviva
  • (Oracle) Sun Grid Engine

Cade Metz; The Chef, the Puppet, and the Sexy IT Admin; In Wired; 2011-10-26.
Mentions

  • Opscode
    • Chef
    • requires Ruby
    • Jesse Robbins
      • founder
      • ex-Amazon, nickname “Master of Disaster.”
  • Puppet Labs
    • Puppet
    • Luke Kanies, founder
    • Portland OR
  • DevOps, the concept
  • Quoted for color & veracity