Computer History Museum
Mountain View, CA
The agenda will be created live each day by attendees present at the opening of the day.
Tuesday Day 1 will begin at 9am with introduction/orientation followed by Agenda Creation. There will be 5 working sessions
Wednesday Day 2 will have agenda creation beginning at 9:00. There will be 5 working sessions and a demo hour after lunch.
Thursday Day 3 will have agenda creation begin at 9:00. There will be 5 working sessions and we will end by 4pm.
The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. We also work on trying to address social and legal issues that arise with these new tools. This conference we are going to also focus some attention on business models that can make this ecology of web services thrive.
Something New: IIW + Yukon: One of the longtime themes of IIW is how identity and personal data intersect. Many important discussions about Vendor Relationship Management (VRM) have also taken place at IIW. In recognition of how personal data and identity are intertwined, the third day of the IIW, May 5, will be designated “IIW + Yukon” and will stress the emerging personal data economy. The primary theme will be personal data control and leverage, where the individual controls and drives the use of their own data, and data about them held by other parties.
This isn’t social. It’s personal. This day you can expext open-space style discussions of personal data stores (PDS), PDS ecosystems, and VRM. One purpose of Yukon is to start to focus on business models and value propositions, so we will specifically be reaching out to angels and VC’s who are intersted in personal data economy plays and inviting them to attend.
IIW is the place where everyone from a diverse range of projects doing the real work of making this vision happen gathers and works intensively for three days. It is the best place to meet and participate with all the key people and projects! As a community we have been exploring these kinds of questions:
- How are social networking sites and social media tools applying user-centric identity?
- What are the open standards to make it work? (identity and semantic)
- What are technical implementations of those standards?
- How do different standards and technical implementations interoperate?
- What are the new social norms and legal constructs needed to make it work?
- What tools are needed to make it usably secure for end-users?
- What are the businesses cases / models that drive all this?
You can see the list of proposed topics for this IIW on our wiki. It grows as attendees register .
How does it work?
After the brief introduction on the first day there are no formal presentations, no keynotes, no panels. We make the schedule when we are face to face the first day of the conference. We do this in part because the field is moving so rapidly that we your organizing team are in no position to know what needs to be talked about. We do know great people who will be there and it is the attendees who have a passion to learn and contribute to the event that will make it.
Hotels
The Hotel Avante has given IIW as special rate and offers free shuttle service to the Computer History Museum where IIW is held.