September is a time that evokes contemplation.
It is a time of new beginnings; kids start school, college or their first jobs. September is the beginning of the critical 4th qtr business cycle. And in September the Jewish New Year process (all 8 weeks of it starting with Rosh Hashanah to Yom Kippor 10 days later to the final capstone of the New Year’s process with the 8-day holiday Sukkoth) occupies a fair amount of one’s waking time.
All this change and transition drives contemplation. Hence my silence for the last few weeks. But with contemplation comes inspiration and new potential to drive progress.
So what have I been thinking about?
I have been thinking about connections and how people connect in today’s super-hyped connected, digitized, info saturated world. I have been thinking about how Judy Consumer within a mere few years has had to absorb an astonishing amount “new” connection possibilities … from friends finding her (many of whom she would have rather not found her), to strangers claiming to be her friends to insta-info with Twitter and so on.
How does she think about all this connectivity? Who does she trust to start a connection with? Which connections are helpful or dangerous? When should Judy Consumer be visible to the open, social world and when should she guard her privacy?
It seems that communications innovation engine is coming at Judy Consumer at an accelerated rate – kinda like a mini version of Kurzweil’s “knee of the curve” principle outlined in the book, The Singularity is Near. In communications technology, we ain’t seen nothing yet. The new, mobile applications or the new expanding lifecasting capability from the social networking folks open a whole new horizon of connection capability for Judy Consumer.
New beginnings – you bet. But “fasten your seat belts – it’s going to be a bumpy ride”…
Filed under: Communications, Facebook, Mobile Communications, social media, social networks, viral marketing | Tagged: id theft, identity management, internetnews, Judy Consumer, judy shapiro, Lifecasting, Trusted Internet, Trusted Web, twitter | Leave a Comment »