Ahead of schedule, the first trusted web page was delivered today on the Trusted Digital Web – end-to-end – from a Trusted Digital Web – Data Registry service to a Trusted Digital Assistant client application – using didttp: (DID Trusted Transport Protocol).
The Trusted Digital Web Communication Protocols (include ddttp:) are described in Appendix E of the Trusted Digital Web: Whitepaper.
NOTE: The Trusted Digital Web is built on top of and relies on trusted, everyday Internet protocols, services, and specifications such as DNS (Domain Name Service). If you’re unfamiliar with DNS at a technical level, checkout DNS (Domain Name Service): A Detailed, High-level Overview.
For a deeper understanding of Universal Digital Identifiers, Universal Digital Identities, and the Trusted Digital Web, checkout the Trusted Digital Web: Whitepaper.
Universal Digital Identifiers and Universal Digital Identities have varying, discernible Trust Levels, and
Data Notarization
For a deeper understanding of Universal Digital Identifiers, Universal Digital Identities, and the Trusted Digital Web, checkout the Trusted Digital Web: Whitepaper.
Version 0.52 – minor revisions, new definitions for Workflow and Business Process
Version 0.56 – new definitions: Levels of Universal Trust, Controllers (including Self-Controller), added XML Notepad as an additional open source project
Version 0.57 – new definitions: Trust Levels, Data Registry, and Data Notary.
Version 0.58 – new definitions: DID Credential and DID Document
Version 0.60 – new Appendix E – Trusted Digital Web Communication Protocols (including the addition of didttp: (DID Trusted Transport Protocol))
Version 0.61 – clarification of didttp: (DID Trusted Transport Protocol) wire format
Version 0.62 – clarification of the didttp: Data Registry
Version 0.63 – addition of didttps: (Secure DID Trusted Transport Protocol)
Version 0.64 – clarification/correction: A (minimal) Credential has a Claim named id
Version 0.66 – minor updates and reorganization of the glossaries
[Original Title: Technology Adoption Models: A Comprehensive Guide]
This article documents more than 20 technology adoption models that the author has encountered over his 45+ year career …some models that he didn’t even realize he knew about ;-). Here they there are, in no particular order.
NOTE: Each model progresses from left-to-right along an unspecified timeline. The implication is that it is possible to superimpose two or more models on top of each other for deeper understanding and for creating more tangible, more illustrative, depictions of your corporate, product, and project strategies.
An example is: Model 10. Technology Adoption Lifecycle illuminated by the Gartner Hype Cycle.
Technology Adoption Models
NOTE: Click on any of the figures to enlarge them.
Model 1. Crossing the Chasm: Technology Adoption Lifecycle
Model 2a. Social Evolution: Creation of Nation State
A #wanderer is someone who leaves their tribe to share their knowledge and wisdom with others; to later form a party of explorers to explore and conquer a common set of goals; and, even further on, create a clan, a band, a tribe, and a tribal society, a group of people who live and work together – a group of tribes organized around kinships.
Model 2b. Social Evolution: Defining Principles
A #wanderer is someone who leaves their tribe to share their knowledge and wisdom with others; to later form a party of explorers to explore and conquer a common set of goals; and, even further on, create a clan, a band, a tribe, and a tribal society, a group of people who live and work together – a group of tribes organized around kinships.
Model 2c. Social Evolution: Self-Sovereignty Political Spectrum
Model 2d. Social Evolution: Driving Change (ADKAR)
Model 3. Phases of Foundational Technology Adoption
Model 4. Phases of Desire and Action
Model 5. Phases of Understanding
Model 6. Classic Enterprise Solution Sales and Adoption Lifecycle
Model 7. ICRVA (I CRaVe A) Process
Model 8. Three-letter Words
Model 9. Gartner Hype Cycle
Model 10. Technology Adoption Lifecycle illuminated by the Gartner Hype Cycle
Model 11. World Wide Web Consortium (W3C): Tenth Anniversary
Model 12. Systems Co-existence and Migration
Model 13. Embrace, Extend, and Extinguish
Model 14. Take-off Velocity (v2)
Model 15. From Mainframe to Blockchain
Model 16. Progressive Improvement through Continuous Transformation
Model 17. Liedtka-Ogilvie Design Thinking ModelModel 18. CB-Insights NExTT Framework
Model 19. O’Donnell Exponential Growth Model
Model 20. O’Donnell-Gartner Exponential Hype Cycle
Model 21. Technical Intensity (video)
Model 22. Technology Adoption Curve plus Social Evolution Model
Model 23: Overton Window
Model 24: Overton Window and Technology Adoption Lifecycle
Model 25: The Technology Adoption Lifecycle and ADKAR
Model 26: Overton Window: Treviño’s 6 Degrees of Acceptance vs. ADKAR
Daniel, regarding our discussion about the multi-process structuring of the Indy Ledger Node and how Anthropomorphic Design might be able to help, checkout the attached conference paper that describes a Paint application created by Eugene Fiume, a cohort of mine while we were in grad school together at the University of Waterloo. [Eugene is now Dean of Applied Sciences at Simon Fraser University.]
It’s an easy read …focus on page 279 and onwards: the concepts of Administrator, Overseer, Worker, Secretary, and Listener processes.
NOTE: The paper starts on page 277 of the proceedings. The paper is a total of 11 pages.
2. Business and Service Choreography Discussion – Twitter
#Composition speaks to the #concentration or #centralization of value, assets, and processes. #Choreography is about the interplay that takes place #naturally between #decentralized value, assets, and processes. #TrustedDigitalWeb #iDIDit
#Service #Choreography: the idea underlying the notion of service choreography can be summarized as follows:
“Dancers dance following a global scenario without a single point of control”
Supporting the development and/or existence of a clique (see above)
The tendency to associate in cliques; the spirit of cliques
#CliqueSpeak: Definition
Degrading, derogatory, and/or any type of speech that seeks to limit conversations to a select group of insiders and/or exclude outsiders from entering into existing conversations or from forming new conversations
Credentials Community Group 2018 Survey Results (March 2019 Report)
These real-life examples are provided as educational training resources with the intent that we can have less #CliqueSpeak across CCG in the future.
“…it’s not like we’re considering any of those topics for the first time.”
“We may want to limit discussion if people that are new to the work, such as yourself, insist on rehashing things that we’ve already discussed.”
“I know it will take time for you to trust that we’re trying to do the right thing for the community, Web, and Internet in general.”
“Unfortunately, trust of that level takes months to years to develop and regular interaction and demonstrating over time that we have the best interests of the community at heart is all we can do to make you believe that we’re trying to do the right thing here.”
“There are things that have strong consensus, such as dereferencing a DID gives you a DID Document.”
“It’s incredibly difficult to navigate all of that if you haven’t been a part of the community since it’s beginning…”
“There are discussions that keep coming up repeatedly that many in the community have explored multiple times and so rehashing those discussions is not useful if there is consensus on the topic.”
“We’ve been having these topical discussions for a few years now and we’re probably through most of them.”
“We need to be careful to not retread territory that we’ve already covered.”
“You are also potentially re-opening discussions that we have consensus on, so we need to be careful not to do that because if we do that, lots of decisions that were finalized end up being reopened and we’ll waste a tremendous amount of time coming back to the same conclusion we came to many months/years ago.”
A #wanderer is someone who leaves their tribe to share their knowledge and wisdom with others; and, later, assemble teams of explorers to seek out new frontiers, form new clans, a band, a tribe, and a tribal society. …groups of people who live and work together – a group of tribes organized around kinships. [Kevin Hunter, July 5, 2018 during a discussion of the book “Who We Are And How We Got There”]
Social Evolution
Figure 1. Social Evolution of Policies, Procedures, Processes, and Technologies
Social Evolution and The Technology Adoption Life Cycle
Figure 2. Social Evolution and The Technology Adoption Life Cycle