The Search for Meaning… from the Square Peg Blog

Arianna Huffington was the morning Keynote Speaker at the Craigslist Foundation Boot Camp for Non-Profit, Saturday in Berkeley, CA. I was looking forward to her speech. I enjoy Arianna on KCRW’s Left, Right, and Center and usually agree with her editorials in The Huffington Post. I knew it would be a good speech – an inspiring and thought-provoking speech. it was a lot more.

P1020327

[More at Square Peg Blog]

How to use Twitter in tech support

Twitter is getting another big wave of adoption and many people are asking again what it’s for. How could short broadcasted text messages limited to 140 characters be useful? What utility could it possible have?

For tech support organizations I think it’s very useful, in two primary ways:

  1. for “eavesdropping” on people who are talking about your company or product, and starting a conversation with them
  2. as a signaling mechanism – a way to get a short, simple status message or announcements to an interested group.
    Continue reading “How to use Twitter in tech support”

Service feedback, done right.

Check out the post by Jon Mountjoy on the feedback request from Apple after getting his Macbook Pro serviced at the Apple Store. The folks at Apple have done a very nice job on this process. Compare it to what you do. How does your feedback process make your customers feel?

An interesting example is the feedback process for in-store support at the Apple Store:

… There was no logging in, no tedious filling in of silly details. I’m a community member (okay, a customer) – they have all that recorded and integrated with this web property. Awesome. Now I want to fill it in – after all I just had to push one button to get here. Nice touch in having the Genius name there too.

[From Get better at soliciting explicit customer feedback — Jon Mountjoy]

Commercial email, or even tweets, aren’t necessarily spam

  Spam in Twitter is becoming a problem. Full 75% of my new followers yesterday were some kind of crass commercial, “I’ll show you how to twitter for money” or “check out my new multi-level marketing scheme.”

But some folks are using twitter for their business in some useful and interesting way. The latest I’ve learned about is a bunch of food twitters, including @chezspencergo, just profiled on sfgate.com:
Continue reading “Commercial email, or even tweets, aren’t necessarily spam”

Managing ROI for Community Managers | TheLetterTwo.com

My friend Ken wrote a nice piece a couple days ago about ROI and the role of the community manager. In particular, I liked this observation:

… The community is not a structured presence. You cannot simply pen in the community as they’re a wild herd of virtual voices. The skill of the community manager is their expert knowledge in finding these “voices” and listening to them.

[From Managing ROI for Community Managers | TheLetterTwo.com]

Darius says “Go read the whole thing…”

Hanging at the intersection of Where and I.D.

I spent the day hanging out at WhereCamp09, enjoying the geekdom and learning about great new projects. These folks are really doing amazing stuff.

But it surprised me how little the geo-geeks have done to embrace the social web.

The folks hanging at WhereCamp definitely need to be plugging in to the ID/Privacy/InfoCard/VRM effort. Too much of the cool stuff they are talking about is just creepy without robust controls on private data.

It’s also clear that the Identity folks need to somehow do better at getting the word out about their solutions to some of these problems.

I don’t know if this missing connection is a bigger problem for the WhereCamp folks or for the IIW folks. Is it a symptom of myopia for the mappping crowd, or lack of visibility for the identity nerds? Which effort is hurt worse when they are slow to cross-pollinate their ideas?

Identity basics – The Identity Quartet

Last week I attended the VRM West Coast Workshop and one of the many impressive folks I met there was Joe Andrieu of Switchbook. In a recent blog post, Joe describes the The Identity Quartet – the key services that allow user to express their identity in online services. It’s one of the most clear descriptions of the identifier issues I’ve read. Joe even makes the point:

The Identity Quartet pattern isn’t rocket science. In fact, it makes things simpler when it comes to security, maintenance, and user control. The Quartet makes systems more flexible and more secure while giving users more freedom to manage how they interact and present themselves online. It is one way to turn user-centric Identity services of OpenID and Information Cards into truly user-driven Identity.

[From The Identity Quartet]

His post is recommended for anyone wanting to start understanding the issues of identity and security in internet applications and services. Check it out!

Facebook Developers | Facebook Developers News

Congratulations to my friends at Seesmic for being at the front of the Facebook Open Stream…

To get things started we’ve worked alongside a few beta partners to test the Facebook Open Stream API. For example, Seesmic Desktop is now a full-featured client for the stream and Adobe has created a simple stream Notifier using the AIR development framework.

[From Facebook Developers | Facebook Developers News]

I’ve been using Seesmic Desktop since it’s launch, and loving it. It doesn’t support all the services I’d like, and maybe could have a few other features, but what they have implemented has been done well. Keep it up!

ProjectVRM Blog » VRM and the Four Party System

I’m not sure I like “4th party” as a description. We spent way too much time at the VRM West Coast Workshop wrangling over the naming of firs, second and third. But when you get past all that, this key idea is really something big:

VRM is about enabling the first party. It is also about building fourth-party user-driven (and within that, customer-driven) services, which make use of first-party enablement.

Fourth parties will provide many services for first parties. In fact, VRM should grow large new fourth party businesses, and give new work to large old businesses in the same categories. (Banks, brokers and insurance companies come to mind.) Native enablements, however, need to live with first parties alone, even if fourth parties provide hosting services for those enablements.

Fourth parties also need to be substitutable. They need service portability, just as the customer needs data portability between fourth (and other) party services. That way whatever they can provide can be swapped out by the user, if need be.

[From ProjectVRM Blog » VRM and the Four Party System]

The combination of service portability and data portability doesn’t just put the user in charge, it also makes the data better. Companies should be very interested in that.

Stereotypes…

Stereotyping is easy for all of us. Our brains are categorizing machines, shoving every thing we see and do into tidy little boxes within boxes. A stereotype that conjures fear is even more powerful, because nothing gets our attention faster than danger – this also is built-in our wiring.

So it’s great to see more diverse presentation of Muslims in the media.

For an excellent point-of-view on this, check out Time’s Mona Eltahawy on video,

[From Latest Videos from TIME.com]