Link: The Math Wizards Who Rule Murky World of Programmatic Buying | Digital – Advertising Age

The future of advertising — one where terms like “automation” and “big data” are more than jargon sprinkled into PowerPoints — may be in the hands of 20-somethings like Mr. Banilevi. Just 23 years old, the Northwestern economics graduate uses eight software programs to buy millions of digital ads each week, plucking them from a pool of trillions without ever speaking to an actual person. If harnessed effectively, that kind of power can deliver smarter, more efficient media buys. If not, it can lead to million-dollar screwups.

Imagine the efficiencies to be gained if the ‘targets’ of those ads (individuals) were active participants in this marketplace.

Source: The Math Wizards Who Rule Murky World of Programmatic Buying | Digital – Advertising Age

H/T: Found in my tweet stream, but I can’t remember who tweeted it.

 

Photo by Paweł Czerwiński on Unsplash

The internet remembers too much…

Excellent talk (transcript) by Maciej Ceglowski. This is just a brief extract:

I’ve come to believe that a lot of what’s wrong with the Internet has to do with memory. The Internet somehow contrives to remember too much and too little at the same time, and it maps poorly on our concepts of how memory should work.

via The Internet With A Human Face – Beyond Tellerrand 2014 Conference Talk.

Read the whole thing.

♦ Marketing to a digital butler: Customer engagement in a VRM empowered world

In my previous post, I referenced Paul Greenberg’s brain dump of technologies, concepts, and theories that are pulling the CRM community toward a larger market of customer engagement.  CRM innovation is shifting from delivery of technology [footnote] By that I mean taking decade old CRM technology from on-premises to the cloud, with little customer oriented innovation. [/footnote], to building intelligent, behavior oriented systems for complex customer interactions.  With a core concept of customer engagement, companies are looking to build ‘shared value’ with their customers.  For shared value to be created, however, the equation requires reciprocating engagement from customers.  An underlying assumption of shared value creation is that customers will eagerly, and directly, engage.  What if customers incorporate their own technology layer as a buffer to all of this engagement activity?  What if the customer has a digital butler, a VRM layer [footnote] background on VRM [/footnote], to filter out the noise?

Marketers, and marketing technologists, will likely be on the vanguard of understanding how this will impact brands.  Toby Gunton, of OMD UK, writing for The Guardian:

[The movie “Her”] suggests a world where an automated guardian manages our lives, taking away the awkward detail; the boring tasks of daily existence, leaving us with the bits we enjoy, or where we make a contribution. In this world our virtual assistants would quite naturally act as barriers between us and some brands and services.

Great swathes of brand relationships could become automated. Your energy bills and contracts, water, gas, car insurance, home insurance, bank, pension, life assurance, supermarket, home maintenance, transport solutions, IT and entertainment packages; all of these relationships could be managed by your beautiful personal OS.

Brands in these categories could find themselves dealing with the digital butler (unless we, the consumer, step in and press the override button), in which case marketing in these sectors could become programmatic in the truest sense.

It’s entirely possible that the influence of our virtual minders could reach far further. What if we tell our OS that we’ll only ever buy products that meet certain ethical standards; hit certain carbon emission targets or treat their employees in a certain way? Our computer may say no to brands for many different reasons. [footnote] via Computer says no – why brands might end up marketing to algorithms | Guardian Professional. [/footnote]

 

To summarize, Gunton’s piece reflects a future where algorithms market to algorithms.  The implications for CRM technologies, and their buyers, are significant.  We are already seeing a glimpse of this future with enhancements to Google’s Gmail.

Last year, Gmail added a ‘Promotions’ tab, a feature that effectively redirects mass marketing emails out of the customer’s view [footnote] Businessweek article on how the Promotions tab might affect email marketing [/footnote], programmatically reducing  the noise that Gmail users see.  I haven’t read specifics, but reflecting on my own experience, I’ve seen roughly 60% of my email routed away from my direct attention since I activated the promotions tab.  While this is not exactly Her [footnote] or an intelligent Siri or Cortana [/footnote],  parts of that VRM future have already arrived [footnote] “The future is already here, it’s just not every evenly distributed”  – William Gibson link [/footnote].  As this future is more evenly distributed,  engagement will require different models of engaging.  A more sophisticated digital butler can be seen in the Glome project [footnote] Hat-tip to Sean Bohan for reminding me of Glome [/footnote].

Creating genuine shared value will require meaningful rethinking of what customer engagement means, and, at the same time, require a significant rearchitecting of siloed CRM interests [footnote] Traditional CRM = Salesforce Automation, Marketing Automation, Service Automation [/footnote].  Successfully building technology for the Customer Engagement market will also necessitate a radical shift in how this technology is sold and delivered.  We’re in the early stages of this tectonic shift, but there is no doubt that change is coming.  Like I said in the previous post, the next eighteen months or so will be an interesting time for all the players in the CRM world.

 

Target’s massive security breach exposes security process failures

…And although there are companies that blatantly violate the standards, security is a constantly changing condition, not a static one. Every time a company installs new programs, changes servers or alters its architecture, new vulnerabilities can be introduced. A company that is certified compliant one month can quickly become non-compliant the next month if administrators install and configure a new firewall incorrectly or if systems that were once carefully segregated become connected because an employee didn’t adhere to access restrictions. Companies that conduct audits also have to rely on their clients to be honest about disclosing what they have on their network — such as stored data.

To answer the question posed by the title of the Wired.com post – No.  Therein lies the problem. [footnote] The nature of audits, in most professions, is that their usefulness is a function of the competency of those conducting them [/footnote]
Wired link: Will Target’s Lawsuit Finally Expose the Failings of Security Audits?

Creepy data collection in the modern workplace

Another pioneering outfit is Sociometric Solutions, which puts sensors in name badges to discover social dynamics at work. The badges monitor how employees move around the workplace, who they talk to and in what tone of voice.
One client, Bank of America, discovered that its more productive workers were those allowed to take their breaks together, in which they let off steam and shared tips about dealing with frustrated customers.

The bank took heed and switched to collective breaks, after which performance improved 23 per cent and the amount of stress in workers’ voices fell 19 per cent.

Data pioneers watching us work – FT.com

It seems that last century’s Taylorism has, for some employers, morphed into more invasive forms of employee surveillance.

Jeff Atwood’s rant on the sad state of Apps is worth a read

Nothing terrifies me more than an app with no moral conscience in the desperate pursuit of revenue that has full access to everything on my phone: contacts, address book, pictures, email, auth tokens, you name it. I’m not excited by the prospect of installing an app on my phone these days. It’s more like a vague sense of impending dread, with my finger shakily hovering over the uninstall button the whole time. All I can think is what shitty thing is this “free” app going to do to me so they can satisfy their investors?

Read the rest: App-pocalypse Now

Cautionary thoughts on the Internet of Things

The level of hype around the “Internet of Things” (IoT) is getting a bit out of control. It may be the technology that crashes into Gartner’s trough of disillusionment faster than any other. But that doesn’t mean we can’t figure things out. Quite the contrary — as the trade press collectively loses its mind over the IoT, I’m spurred on further to try and figure this out. In my mind, the biggest barrier we have to making the IoT work comes from us. We are being naive as our overly simplistic understanding of how we control the IoT is likely going to fail and generate a huge consumer backlash.

The home automation paradox – O’Reilly Radar

The corroding value of the internet cookie, and an opportunity to shape a new market

Several years ago, I first heard Doc Searls make an amusing comment about one of the basic elements of the internet universe, the browser cookie.  With full credit to Phil Windley, Doc’s historical summary of ecommerce (and much of the modern internet) went like this:

A brief history of ecommerce can be summarized as this- 1995: The invention of the cookie. The end.

The browser cookie has reigned supreme for nearly two decades.  It has given rise to marketing empires like Double-Click (Google), Omniture, and nearly every imaginable advertising network of the modern web.  Cookies also provide context beyond ecommerce, since they help sites fine-tune the user experience and reduce friction for end users.

Cookies have become so pervasive that a contextualized web with out them would not be possible.  They’ve also extended well beyond context, as most cookies now actively track internet users, often without explicit permission.  With that backdrop, it’s hard to imagine that this atomic element of today’s web may soon fade away.

Perhaps because of how pervasive it is, and how invasive it is to personal privacy, the browser cookie is now under assault on many fronts.  The Europeans have taken to legislation as the primary vehicle to act against personal tracking technologies like cookies, Microsoft has gone as far as to ‘default‘ a do-not-track feature with their latest version of Internet Explorer, and there are at least a dozen such plugins for Firefox and Chrome.  Some ad-tech experts are actually predicting the complete collapse of the browser cookie in five years:

Five years at the most.

At my former company, my peers were the people who created cookies. We didn’t create them for this. It’s a very weak computing mechanism. It’s flawed, invasive, it’s got privacy issues, it’s going to go.

I think it will take five years to kill it. At that point, it’ll be like birds chirping and flowers blooming because we’ll find some kind of value proposition that allows consumers to trust us and opt into personalization. I term it, tailor don’t target.

via – The cookie has five years left says Merkle’s Paul Cimino | Ad Exchanger

It’s no surprise that ad-tech professionals see a paradigm shift away from cookies, but that shift isn’t being driven by a direct attack on the technology.  I can’t imagine that the ‘average’ internet user is proactively installing browser plugins to block cookies, so there has to be another reason why cookie usage has dropped precipitously.  At a prior point in the same blog post, Cimino reveals:

The second main reason is that non-cookieable devices – phones and iPads, Kindles and the like – are generating traffic somewhere between 35% and 40% of our overall traffic. So 35-40% of traffic is not from computers.

Consumer behavior has shifted away, which is forcing a shift away from cookies.  Although this might seem as a ‘win’ for privacy,  the ad-tech world has figured out even more invasive ways to target consumers:

I can’t cookie your iPhone or your Android phone. If you are at home or you go to the same place every day, I can see the IP and part of the user agent – enough information to reasonably identify you over and over and keep that good sync between the data – the first- and third-party data and the targeting opportunity that’s out there.

The takeaway here is that, as we see the value of cookies corroding, the technological fabric that has woven the modern web has produced even more invasive methods to track individual behavior.  At the same time, legislation and technology to counteract tracking technology is focused on the old cookie paradigm.  While the new tracking systems are relatively new, perhaps there is a window of opportunity for consumers to help shape a more balanced framework.

It is this balanced framework, that we are focusing on developing at Customer Commons:

Customer Commons holds a vision of the customer as an independent actor who retains autonomous control over his or her personal data, desires and intentions.  In this vision, each of us will act as the optimal point of integration and origination for data about us. Customers must be able to share their data and intentions selectively and voluntarily. Individuals must also be able to know exactly what information is being held about them by those who gather it, by whatever means. To achieve this, customers must be able to assert their own terms of engagement, in ways that are both practical and easy to understand for all sides.

I encourage you to join the conversation at Customer Commons.  Additionally, I will be devoting more time writing about how customer engagement in a modern marketplace will be significantly different, and how we call all help to shape that future, and more free, market.

If you are in the bay area during the week of May 6th, 2013, please consider joining the Customer Commons Salon that Monday evening.

Phil Windley on understanding the architecture of Personal Clouds

Just under the radar, there’s been a lot of activity in the ProjectVRM space of late.  Various clusters of work are underway in the VRM space, including identity research and personal data store development.  On the latter, Phil Windley has an excellent post explaining the framework in which personal clouds should operate by referencing the tried, trusted and true technologies around the IMAP protocol:

In short, email was designed with the architecture of the Internet in mind. Email is decentralized and protocol-mediated. Email is open—not necessarily open-source—but open in that anyone can build clients and servers that speak IMAP and SMTP. As a result, email maximizes freedom and control for the user and minimizes the chance of disruption. The features and benefits that email provides are exactly the same as those we want for personal clouds. Designed right, any application built on a personal cloud would provide similar functionality.

Web 2.0 has given us a model that is exactly the opposite of email. The model encourages user data to be stored in separate silos. You cannot easily migrate from one service provider to another. And when a service provider goes away, you are abandoned and marooned. You are not in control. Of course, it doesn’t help that this is all in the service provider’s best interest. They make money from the fact that the predominant model for building online applications leaves their users powerless.

via IMAP as the Proto Personal Cloud.

There’s lots of activity underway in this space.  I’ll have my own thoughts in several subsequent posts.