Skip to content →

Author: cgerrish

Unemployed philosopher

The Thing That The Copy Misses

The Network is, we are told, a landscape operating under an economy of abundance. Only the digital traverses the pathways of the Network, and the digital is infinitely copyable without any prior authorization. Kevin Kelly has called the Network a big copy machine. The copy of the digital thing is note for note, bit for bit. It’s a perfect copy. Except for the location of the bits and the timestamp, there’s no discernable difference between this copy and that one. The Network fills itself with some number of copies commensurate with the sum total of human desire for that thing.

One imagines that if you follow the path of timestamps back far enough, you’d find the earliest copy. The copy that is the origin of all subsequent copies. We might call this the master copy, and attribute some sense of originality to it. Yet, it has no practical difference from any of the copies that follow. Imperfect copies are unplayable, and are eventually deleted.

The economy of abundance is based on a modulation of the model of industrial production. The assembly line in a factory produces thousands upon thousands of new widgets with improved features at a lower cost. Everyone can now afford a widget. Once the floppy and compact disk became obsolete, the multiplication of digital product approached zero cost. The production of the next copy, within the context of the Network’s infrastructure, requires no skilled labor and hardly any capital. (This difference is at the heart of the economic turmoil in journalism and other print media. Newsprint is no longer the cheapest target medium for news writing.)

In the midst of this sea of abundant copies I began to wonder what escaped the capture of the copy. It was while reading an article by Alex Ross in The New Yorker on the composer Georg Friederich Haas that some of the missing pieces began to fall in to place. The article, called Darkness Audible, describes a performance of Haas’s music:

A September performance of Haas’s “In iij Noct.� by the JACK Quartet—a youthful group that routinely fills halls for performances of Haas’ Third String Quartet—took place in a blacked-out theatre. The effect was akin to bats using echolocation to navigate a lightless cave, sending out “invitations,� whereby the players sitting at opposite ends of the room signalled one another that they were ready to proceed from one passage to the next.

As in a number of contemporary musical compositions, the duration of some of Haas’s music is variable. The score contains a set of instructions, a recipe, but not a tick-by-tick requirement for their unfolding. In a footnote to his article on Haas, Ross relates a discussion with violinist, Ari Striesfelf, about performing the work:

We’ve played the piece seven times, with three more performances scheduled in January, at New Music New College in Sarasota, Florida. The first time we played it was in March, 2008, in Chicago, at a venue called the Renaissance Society, a contemporary art gallery at the University of Chicago. Nobody that I know of has had an adverse reaction to the piece or to the darkness. Most people are completely enthralled by the experience and don’t even realize that an hour or more has passed. Haas states that the performance needs to be at least thirty-five minutes but that it can be much longer. He was rather surprised that our performance went on for as long as it did! But the length was never something we discussed. It was merely the time we needed to fully realize his musical material.

The music coupled with the darkness has this incredible ability to make you completely lose track of time. We don’t even realize how much time has gone by. Our longest performance was eighty minutes, in Pasadena, and when we had finished I felt we had only begun to realize the possibilities embedded within the musical parameters. Every performance seems to invite new ideas and possibilities. In the performance you heard of ours back in September there were some moments that I couldn’t believe what we had accomplished. Moments where we were passing material around the ensemble in such a fluid fashion you would think we had planned it out, but it was totally improvised in the moment. The more we perform the piece, the more in tune with each other’s minds we become.

When we return to the question: what’s the thing that’s missing from the copy, we find that in the music of Georg Friederich Haas, almost everything is missing. The performance, by design, cannot be copied in the sense that the Network understands a copy. Its variation is part of its essence. A note for note recording misses the point.

So, while the Network can abundantly fill up with copies of a snapshot of a particular performance of Haas’s work, it misses the work entirely. The work, in its fullness, unfolds in front of an audience and disappears into memory just as quickly as each note sounds. Imagine in this day and age, a work that slips through the net of the digital. A new instance of the work requires a new performance by an ensemble of highly skilled artists. Without this assembly of artists, the work remains silent.

Tomorrow I’ll be attending a performance of Charpentier’s Midnight Mass by Magnificat Baroque in an old church in San Francisco. While variation isn’t built in to the structure of the piece, all performance exists to showcase variation. How will this piece sound, in this old church with these particular musicians on a Sunday afternoon? Even if I were to record the concert from my seat and release it to the Network, those bits would barely scratch the surface of the experience.

Comments closed

Shirky, Jonas, Syndication and Search That Can Count

Word comes down from the Network, @cShirky foretells the death of syndication. Of course, it was not the first time those words were spoken. The economics of syndication require the distribution of physical product in physical space. Syndicators buy a territory in which to distribute a story whose origin is elsewhere.

Visibility on the Network is near nil. You can’t see the copy next to the copy next to the copy. You can’t see the original among the copies. Except when you search for a news story. Then you can see there are thousands of copies of the same story on every major news site on the Network. What looks like value in the context of a single news site, looks like a commodity space-filler when viewed from across the breadth of the Network.

What appears to be an economy of abundance, is actually an economy of redundancy. Original reporting is rare, copies of originals are common. Here’s where we need to listen to Jeff Jonas on counting.

If you think you have five customers moving slowly on an unremarkable vector when in fact these five customers are all the same person – you might be missing the fact this customer is moving on a specific vector with meaningful velocity (e.g., becoming a much better or worse customer).

Why do I speak of this?  Well, I get a chance to see some of the most advanced sensemaking systems being created and tested around the world.  And the way I determine (in about five minutes) whether they have half-a-chance of ever delivering high value is this quick and dirty assessment: Can they count discrete objects?

Imagine, if you will, a search appliance that can count discrete objects. And not just count discrete objects, but tracks their trajectory through time. Original reporting hits the Network in real time and becomes visible through a search (track). Syndication is weighted as a retweet; Syndicators are weighted by reputation; but the creativity of original reporting would weigh the most. The point of origin regains significance.

Imagine how our experience of the contours of the Network would change. The digital makes the copy almost free, counting with a sense of trajectory, revises our sense of the economics. The scarcity of originality suddenly comes into view.

One Comment

The Cloud Kingdoms of the Network

As the Network continues the process of condensing into discreet clouds, different environmental capabilities emerge and borderlines are drawn between the kingdoms. Sovereignty takes the form of providing a scalable computing infrastructure on which immigrants can homestead. The cloud kingdom must reliably provide arable land, keep the borders between the lands of neighbors and protect the cloud from external invaders. Clouds are not democracies, the Prince is not an elected position— his domain is seized and created out of the aether of the Network.

We seem to be entering the Hobbesian era of the Network, we seek the protection and benefits offered by the Sovereign clouds. As the hinterlands begin to fill up with brigands and pirates, safe transport cannot be guaranteed on the open roads of the Network. Within the borders of the cloud’s sovereign territory, the administrative privileges of the Prince allow for the removal of elements that may disturb the established order.

Once a kingdom has been firmly established, it begins to gather around it the accoutrement of culture. It engages a court architect, scientist, composer, scribe, and jester. It’s through the work of these artisans that the legacy of the kingdom will live in the hearts and minds of its subjects.

In a classical kingdom, the border is defined as the perimeter of the physical lands of the kingdom. As the size of the kingdom grows, the border becomes more difficult to defend. The recent incident with a leak of digital data puts the dilemma of the modern Prince into stark relief. As every node within the cloud potentially stands at the border, the allegiance of the sovereign’s subjects becomes an issue of the greatest importance.

Real-time computing enables the cloud kingdom to offer a privately public message stream that narrates the current state of the kingdom. The subjects of the kingdom tell the kingdom how it is in the present moment through permanent marks in a messaging system. This information is used to the benefit of the kingdom and its subjects. The real-time message stream also creates the possibility of a real-time streaming leak. The admonition to not put into an email any comments that you wouldn’t feel comfortable seeing printed in your morning newspaper, will put a damper on the value of a real-time conversation.

Some would contend that the border cannot be defended, and that only a form of absolutely public transparency is suitable for use within a Network-connected digital medium. This would imply that any broader, more expressive form of speech must occur outside of the digital context. To counter this, the Prince must argue that, within his cloud, the power of his security measures will guarantee the border and the private communications of his subjects.

We live in interesting times.

2 Comments

The Web’s Altamont

There’s little point in asking whether the leaks are pro or con: the bell has been rung, the horse is out of the barn, the cat is out of the bag. Once the bits in question have been linked to the Network they exist everywhere at once. The inside is out. Its effect is much like that of ice nine.

The event signals a change. The Network is now pressing up against every utterance, every written or encoded communication. The membrane between the Network and our conversations has become paper thin. Here we begin to have conversations as though we live in a surveillance state. We look for the remaining shadows, the out-of-the-way corner, the crevice where we’re out of earshot of the Network.

We had a sense that the Network was a neutral medium, open and free to all comers. No one knew you were a dog, and you didn’t need much at all to publish to the whole web of the world. But there’s a difference between the ability to publish and the absolute transparency implied by the leak. No doubt there’s someone somewhere who feels they have a right to secrets you’ve been keeping to yourself.

Some bits have been flipped, what was confidential within a trusted circle is now in general circulation. The opaque is now transparent. But something more than that happened. The disclosure was an exercise of power, it had a real impact in the world. It was a military exercise, a wall has been breached, a boundary overcome. The force of those bits being flipped was felt like a punch in the face. Power was awakened and has been loosed upon the Network. Active countermeasures are an effective means of defending a breached border. We have been ushered out of the garden, and now are filled with the knowledge of good and evil. Power travels along many paths, not all of them in the bright sunlight.

The concert at Yasgur’s farm near Woodstock was held from August 15 – 18, 1969. About 4 months later, the Altamont Speedway Free Concert was held on December 6th, 1969.

The theory is that the targeted system can be paralyzed by causing trusted internal message circulation to be severely limited. The power of the Network can be used to cause a hardening of the arteries. When no member of the system can trust any other, the system ceases to function unless it embraces absolute transparency. Of course any system that attacks another system with this method is subject to the same treatment. And although we might say this new method of disclosure is without a home in a nation state, that doesn’t mean it lives entirely in the ether of the Network— it has plenty of earthly bounds and connections. The structure of the Network will provide a limited amount of protection, or rather it provides camouflage for both armies. It should be remembered, there’s a substantial difference between winning an argument and winning.

The dilemma is that to preserve a ‘free and open’ Network, we must preserve the possibility of evil. And where we once thought the walled garden was an uncalled for limitation on our freedoms, we may soon be seeking its protection.

New Speedway Boogie
Robert Hunter and Jerry Garcia

Now I don’t know but I been told
it’s hard to run with the weight of gold
Other hand I heard it said
it’s just as hard with the weight of lead

Who can deny? Who can deny?
it’s not just a change in style
One step done and another begun
in I wonder how many miles?

Spent a little time on the mountain
Spent a little time on the hill
Things went down we don’t understand
but I think in time we will

Now I don’t know but I been told
in the heat of the sun a man died of cold
Do we keep on coming or stand and wait
with the sun so dark and the hour so late?

You can’t overlook the lack Jack
of any other highway to ride
It’s got no signs or dividing lines
and very few rules to guide

One Comment