Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
>300 subscribers
>300 subscribers
Share Dialog
Share Dialog
We are spending a lot of time thinking about how identity will play itself out on the Internet. We are constantly running into the limitations of the existing arrangements even when companies from our portfolio are trying to collaborate. While there is definitely movement afoot with Facebook, Google and others extending their authentication to third parties and possibly moving the OpenID standard along (see previous posts on this).
But there is also another candidate for identity at least in some situations and that is the mobile phone number. I was reminded of that several times yesterday. First, I met with someone who has been living in San Francisco for quite some time but still has her 917 cell number. That made me realize that I have had my cell number for over 10 years and can’t imagine changing it voluntarily going forward. Then I spent some time with Jeff Lawson from Twilio, which makes it super easy for web developers to add voice interaction to their services. We talked about how IVR is often a pain, but generally that’s the case because the call starts out knowing nothing about you. Since mobile phone numbers change so rarely, that does not have to be the case! When I call say an airline, it should know who I am and immediately offer information directly relevant to me, such as whether my flight is on time. A good example (surprisingly) is the New York Times, which when I call from my home phone pulls up all my information and makes reordering a missed weekend delivery a cinch.
I know that phone numbers can be spoofed via IP telephony hacks, so I am not suggesting that the mobile phone number can easily be turned into a reliable form of identity for security critical applications, but it could be used much more extensively than it is today. This is especially true when you look at some type of multi-modal integration, such as calling in, being recognized and then being able to receive information back via SMS.
![Reblog this post [with Zemanta]](https://img.paragraph.com/cdn-cgi/image/format=auto,width=3840,quality=85/http://img.zemanta.com/reblog_e.png?x-id=e9f9d9f8-d21d-4d1c-a73f-b17e1defa539)
We are spending a lot of time thinking about how identity will play itself out on the Internet. We are constantly running into the limitations of the existing arrangements even when companies from our portfolio are trying to collaborate. While there is definitely movement afoot with Facebook, Google and others extending their authentication to third parties and possibly moving the OpenID standard along (see previous posts on this).
But there is also another candidate for identity at least in some situations and that is the mobile phone number. I was reminded of that several times yesterday. First, I met with someone who has been living in San Francisco for quite some time but still has her 917 cell number. That made me realize that I have had my cell number for over 10 years and can’t imagine changing it voluntarily going forward. Then I spent some time with Jeff Lawson from Twilio, which makes it super easy for web developers to add voice interaction to their services. We talked about how IVR is often a pain, but generally that’s the case because the call starts out knowing nothing about you. Since mobile phone numbers change so rarely, that does not have to be the case! When I call say an airline, it should know who I am and immediately offer information directly relevant to me, such as whether my flight is on time. A good example (surprisingly) is the New York Times, which when I call from my home phone pulls up all my information and makes reordering a missed weekend delivery a cinch.
I know that phone numbers can be spoofed via IP telephony hacks, so I am not suggesting that the mobile phone number can easily be turned into a reliable form of identity for security critical applications, but it could be used much more extensively than it is today. This is especially true when you look at some type of multi-modal integration, such as calling in, being recognized and then being able to receive information back via SMS.
![Reblog this post [with Zemanta]](https://img.paragraph.com/cdn-cgi/image/format=auto,width=3840,quality=85/http://img.zemanta.com/reblog_e.png?x-id=e9f9d9f8-d21d-4d1c-a73f-b17e1defa539)
No comments yet