DEV Community

Yodit Weldegeorgise
Yodit Weldegeorgise

Posted on

What is vCon and Why Should We Care?

This week, I came across something at Spring vCon 2026 that completely changed how I think about conversations in the digital world. It didnโ€™t just stay theoretical for me: I actually experienced a version of this shift myself.

Recently, I went through two AI-driven interview sessions:

  • A 25-minute video interview

  • A 15-minute voice interview

At first, it felt unusual to speak to an AI in such a structured, recorded way. But over time, it started to feel normal, almost like a regular part of the hiring process. It even became fun when the AI asked for clarifications and follow-up questions.

Later, when I shared this experience in a tech Discord server, the conversation immediately shifted to a critical concern: ๐๐ž๐ซ๐ฌ๐จ๐ง๐š๐ฅ ๐ƒ๐š๐ญ๐š.

"Iโ€™m not sure what their terms and conditions are. There is no disclaimer whatsoever, and Iโ€™m not sure if they are regulated or not."

That discussion made everything click. Because I had just lived through exactly what vCon is trying to solve.

๐‚๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ซ๐ž ๐›๐ž๐œ๐จ๐ฆ๐ข๐ง๐  ๐๐š๐ญ๐š

Iโ€™ve always thought of conversations as temporary, like calls, meetings, or chats that happen and then get stored somewhere as recordings or transcripts.

But between AI interviews and this discussion, I started seeing something different:

๐‚๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ซ๐ž ๐ง๐จ๐ญ ๐ฃ๐ฎ๐ฌ๐ญ ๐ฆ๐จ๐ฆ๐ž๐ง๐ญ๐ฌ. ๐“๐ก๐ž๐ฒ ๐š๐ซ๐ž ๐๐š๐ญ๐š ๐š๐ฌ๐ฌ๐ž๐ญ๐ฌ.

And we are generating more of them than we can properly organize or reuse.

๐’๐จ ๐ฐ๐ก๐š๐ญ ๐ž๐ฑ๐š๐œ๐ญ๐ฅ๐ฒ ๐ข๐ฌ ๐ฏ๐‚๐จ๐ง?

๐ฏ๐‚๐จ๐ง (๐•๐จ๐ข๐œ๐ž ๐š๐ง๐ ๐‚๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง ๐จ๐ง ๐ญ๐ก๐ž ๐๐ž๐ญ) is an emerging open standard designed to represent conversations in a structured, machine-readable format.

At its core, vCon defines a way to package everything that makes up a conversation into one portable container. Think of it as a standardized ๐œ๐จ๐ง๐ญ๐š๐ข๐ง๐ž๐ซ ๐Ÿ๐จ๐ซ๐ฆ๐š๐ญ ๐Ÿ๐จ๐ซ ๐œ๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง๐ฌ, similar to how PDF standardized documents or how MP4 standardized video.

Instead of scattered pieces, vCon brings it all together:

  • ๐Œ๐ž๐๐ข๐š: Audio and video recordings

  • ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ: Full transcripts and AI-generated summaries

  • ๐‚๐จ๐ง๐ญ๐ž๐ฑ๐ญ: Participants, identities, and timestamps

  • ๐Œ๐ž๐ญ๐š๐๐š๐ญ๐š: Action items, tags, and behavioral signals

๐•๐ข๐ฌ๐ฎ๐š๐ฅ๐ข๐ณ๐ข๐ง๐  ๐ญ๐ก๐ž ๐ฏ๐‚๐จ๐ง ๐ž๐œ๐จ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ

Image taken from Jill Blankenship

A technical diagram titled vCon: The Trusted Source, showing customer interactions like Voice and Chat flowing into a central purple vCon container, which then feeds into AI, Automation, and Compliance consumers.
To really understand how this works, itโ€™s helpful to look at the flow of data. The "Trusted Source" model illustrates how these interactions move through a secure pipeline:

  • ๐“๐ก๐ž ๐’๐จ๐ฎ๐ซ๐œ๐ž (๐‚๐ฎ๐ฌ๐ญ๐จ๐ฆ๐ž๐ซ ๐ˆ๐ง๐ญ๐ž๐ซ๐š๐œ๐ญ๐ข๐จ๐ง๐ฌ): On the left, we see the input phase where Voice Calls, Chat, Email, Messaging, and Video are captured.

  • ๐ฏ๐‚๐จ๐ง: ๐“๐ก๐ž ๐“๐ซ๐ฎ๐ฌ๐ญ๐ž๐ ๐’๐จ๐ฎ๐ซ๐œ๐ž (๐‚๐ž๐ง๐ญ๐ซ๐š๐ฅ ๐๐ฅ๐จ๐œ๐ค): This purple box in the middle is the vCon Container. It acts as the "Single source of truth" by ensuring every conversation is Complete & Accurate, recorded in a Standardized Format, and kept Secure & Governed.

  • ๐“๐ก๐ž ๐‚๐จ๐ง๐ฌ๐ฎ๐ฆ๐ž๐ซ๐ฌ (๐”๐ฌ๐ž๐ & ๐“๐ซ๐ฎ๐ฌ๐ญ๐ž๐ ๐๐ฒ): On the right, the green arrows show how this trusted data flows into AI & Analytics, Automation, Quality & Compliance, Business Intelligence, and Customer Experience tools.

๐“๐ก๐ž ๐‘๐ข๐ฌ๐ž ๐จ๐Ÿ ๐‚๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐ˆ๐ง๐Ÿ๐ซ๐š๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž

At Spring vCon 2026, one theme kept coming up repeatedly:
๐–๐ž ๐š๐ซ๐ž ๐ ๐ž๐ง๐ž๐ซ๐š๐ญ๐ข๐ง๐  ๐ฆ๐จ๐ซ๐ž ๐œ๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐๐š๐ญ๐š ๐ญ๐ก๐š๐ง ๐ž๐ฏ๐ž๐ซ ๐›๐ž๐Ÿ๐จ๐ซ๐ž, ๐›๐ฎ๐ญ ๐ฐ๐ž ๐œ๐š๐ง๐ง๐จ๐ญ ๐ฉ๐ซ๐จ๐ฉ๐ž๐ซ๐ฅ๐ฒ ๐ฎ๐ฌ๐ž ๐ข๐ญ.

According to industry research from ๐†๐š๐ซ๐ญ๐ง๐ž๐ซ, over 80% ๐จ๐Ÿ ๐ž๐ง๐ญ๐ž๐ซ๐ฉ๐ซ๐ข๐ฌ๐ž ๐๐š๐ญ๐š ๐ข๐ฌ ๐ฎ๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐, and conversations are the ๐ฉ๐ซ๐ข๐ฆ๐š๐ซ๐ฒ ๐ฌ๐จ๐ฎ๐ซ๐œ๐ž of this information. Yet most of this data is:

  • Hard to search
  • Hard to reuse
  • Locked inside ๐ข๐ฌ๐จ๐ฅ๐š๐ญ๐ž๐ ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ
  • Difficult to analyze consistently at scale

๐๐ซ๐ข๐ฏ๐š๐œ๐ฒ ๐›๐ฒ ๐ƒ๐ž๐ฌ๐ข๐ ๐ง: ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐ง๐  ๐ญ๐ก๐ž ๐๐ž๐ซ๐ฌ๐จ๐ง

When the discussion on Discord turned to privacy, it highlighted a major gap. ๐’๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž ๐ฐ๐ข๐ญ๐ก๐จ๐ฎ๐ญ ๐ญ๐ซ๐š๐ง๐ฌ๐ฉ๐š๐ซ๐ž๐ง๐œ๐ฒ ๐ข๐ฌ ๐ง๐จ๐ญ ๐ž๐ง๐จ๐ฎ๐ ๐ก. By standardizing the format, we can also standardize the ๐ ๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž.

This means that privacy controls and data retention policies are baked into the file itself. Crucially, a vCon container is designed to be ๐ฌ๐ญ๐จ๐ซ๐ž๐ ๐ข๐ง ๐š ๐ฐ๐š๐ฒ ๐ญ๐ก๐š๐ญ ๐š๐ฏ๐จ๐ข๐๐ฌ ๐ž๐ฑ๐ฉ๐จ๐ฌ๐ข๐ง๐  ๐ฉ๐ž๐จ๐ฉ๐ฅ๐ž'๐ฌ ๐ฉ๐ซ๐ข๐ฏ๐š๐œ๐ฒ. It allows systems to analyze the context of a conversation for business intelligence while keeping the identity of the person secure.

This architecture ensures that permissions travel with the data, rather than being ๐ฅ๐จ๐ฌ๐ญ ๐ข๐ง ๐ญ๐ก๐ž ๐Ÿ๐ข๐ง๐ž ๐ฉ๐ซ๐ข๐ง๐ญ ๐จ๐Ÿ ๐š ๐ฆ๐š๐ฌ๐ฌ๐ข๐ฏ๐ž ๐ฅ๐ž๐ ๐š๐ฅ ๐š๐ ๐ซ๐ž๐ž๐ฆ๐ž๐ง๐ญ.

๐–๐ก๐ฒ ๐ญ๐ก๐ข๐ฌ ๐ฆ๐š๐ญ๐ญ๐ž๐ซ๐ฌ

Right now, conversations are trapped. A sales call lives in a CRM, a support call lives in a contact center tool, and a meeting lives in a video platform. They donโ€™t connect.

vCon introduces a shared language for all of this. It turns conversations into something you can:

  1. Store consistently

  2. Search intelligently

  3. Analyze at scale

  4. Move across platforms

We are moving from "๐‹๐ž๐ญ'๐ฌ ๐ซ๐ž๐œ๐จ๐ซ๐ ๐œ๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง๐ฌ" to "๐‹๐ž๐ญ'๐ฌ ๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž ๐œ๐จ๐ง๐ฏ๐ž๐ซ๐ฌ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐ฌ๐จ ๐ญ๐ก๐ž๐ฒ ๐œ๐š๐ง ๐›๐ž ๐ซ๐ž๐ฎ๐ฌ๐ž๐, ๐š๐ง๐š๐ฅ๐ฒ๐ณ๐ž๐, ๐š๐ง๐ ๐ฎ๐ง๐๐ž๐ซ๐ฌ๐ญ๐จ๐จ๐." That shift is powerful because once conversations become structured data, they stop being temporary: they become infrastructure.

๐‘๐ž๐ฌ๐ž๐š๐ซ๐œ๐ก & ๐“๐ž๐œ๐ก๐ง๐ข๐œ๐š๐ฅ ๐‹๐ข๐ง๐ค๐ฌ

๐†๐š๐ซ๐ญ๐ง๐ž๐ซ ๐‘๐ž๐ฌ๐ž๐š๐ซ๐œ๐ก ๐จ๐ง ๐”๐ง๐ฌ๐ญ๐ซ๐ฎ๐œ๐ญ๐ฎ๐ซ๐ž๐ ๐ƒ๐š๐ญ๐š: https://www.forcepoint.com/blog/insights/gartner-2024-world-class-security-unstructured-data-report

๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ข๐š๐ฅ ๐ˆ๐„๐“๐… ๐ฏ๐‚๐จ๐ง ๐Ž๐ฏ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ: https://datatracker.ietf.org/doc/html/draft-ietf-vcon-overview-01

Top comments (0)