Skip to content →

Category: collaboration

Contra Optimization: 4th Time Around

The whole train of thought started in the most unlikely spot. It’s a bit of a random walk, an attempt at moving in circles to get closer to a destination. I was listening to a podcast called ‘Sound Opinions‘ and Al Kooper was talking about the sessions in Nashville for Bob Dylan’s ‘Blonde on Blonde.’ They didn’t have a tape recorder, so Dylan would teach Kooper the changes and then Kooper would play them over and over again on a piano in Dylan’s hotel room. Dylan worked on the lyrics, Kooper played the changes and gradually, over many hours, the songs took shape.

Kristofferson described the scene: “I saw Dylan sitting out in the studio at the piano, writing all night long by himself. Dark glasses on,” and Bob Johnston recalled to the journalist Louis Black that Dylan did not even get up to go to the bathroom despite consuming so many Cokes, chocolate bars, and other sweets that Johnston began to think the artist was a junkie: “But he wasn’t; he wasn’t hooked on anything but time and space.”

Thinking about that process, I wondered if it would actually have been made better, more efficient, through the use of a tape recorder. Would the same or better songs have emerged from a process where a tape recorder mechanically reproduced the chord sequence as Dylan worked on the lyrics. Presumably, Kooper didn’t play like a robot, creating an identical sonic experience each time through. While Dylan and Kooper’s repetitive process eventually honed in on the song—narrowing the sonic field to things that seem to work—the resonances of the journey appear to be resident in the grooves. From this observation a question emerged: what is learned from a repetition that isn’t a mechanical reproduction, but rather a kind of performance? This kind of repetition seems to have the shape of a inward spiral.

We rush toward optimization and efficiency, those are the activities that increase the yield of value from our commerce engines. The optimal, by definition, means the best. Recently Nasism Taleb exposed the other side of optimization. When there’s a projected relative stability in an environment, as well as stable inputs and outputs for a system, optimization results in a higher, more efficient, production of value. In times of instability, change and uncertainty, optimization produces a brittle infrastructure that must use any excess value it generates to prop itself up in the face of unanticipated change. Unless there’s a reversion to the previous stable state, the system eventually suffers a catastrophic failure. Robustness in uncertain times has to be built from flexibility, agility and a managed portfolio of options. Any strategic analysis might first take note of whether one is living in interesting times or not.

Some paths of thought can’t be fully explored by using optimization techniques. We tend to run quickly toward what Tim Morton calls the “top object” or the “bottom object.” The top object is the most general systematic concept from whence comes everything (“anything you can do, I can do meta“). To create this kind of schema you need to find a place to stand that allows you to draw a circle around everything—except, of course, the spot on which you’re standing. The bottom object is the tiny fundamental bit of stuff—Democritus’s atom—from which all things are constructed. Although physics does seem to be having a tough time getting to the bottom of the bottom object—they keep finding false bottoms, non-local bottoms, anti-bottoms and all kinds of weird goings on. The idea that there may be ‘turtles all the way down’ no longer seems far fetched.

Moving in the opposite direction from a solid top or bottom, we run into Graham Harman’s presentation of Bruno Latour’s concept of irreducibility. Here’s Latour on the germ of the idea:

“I knew nothing, then, of what I am writing now but simply repeated to myself: ‘Nothing can be reduced to anything else, nothing can be deduced from anything else, everything may be allied to everything else. This was like an exorcism that defeated demons one by one. It was a wintry sky, and a very blue. I no longer needed to prop it up with a cosmology, put it in a picture, render it in writing, measure it in a meteorological article, or place it on a Titan to prevent it falling on my head […]. It and me, them and us, we mutually defined ourselves. And for the first time in my life I saw things unreduced and set free.”

In his book, Prince of Networks, Harman expands on Latour’s idea. No top object, no bottom object, just a encompassing field of objects that form a series of alliances:

“An entire philosophy is foreshadowed in this anecdote. every human and nonhuman object now stands by itself as a force to reckon with. No actor, however trivial, will be dismissed as mere noise in comparison with its essence, its context, its physical body, or its conditions of possibility. everything will be absolutely concrete; all objects and all modes of dealing with objects will now be on the same footing. In Latour’s new and unreduced cosmos, philosophy and physics both come to grips with forces in the world, but so do generals, surgeons, nannies, writers, chefs, biologists, aeronautical engineers, and seducers.”

The challenge of Latour’s and Harman’s thought is to think about objects without using the tool of reduction. It’s a strange sensation to think things through without automatically rising to the top, or sinking to the bottom.

Taking the principle in a slightly different direction we arrive at Jeff Jonas’s real-time sensemaking systems and a his view of merging and purging data versus an approach he calls entity resolution. Ask any IT worker about any corporate database and they’ll talk about how dirty the data is. It’s filled with errors, bad data, incompatibilities and it seems they can never get the budget to properly clean things up (disambiguation). The batch-based merge and purge system attempts to create a single correct version of the truth in an effort to establish the highest authority. Here’s Jonas:

“Outlier attribute suppression versus context accumulating: As merge purge systems rely on data survivorship processing they drop outlying attributes, for example, the name Marek might sometimes appear as Mark due to data entry error. Merge purge systems would keep Marek and drop Mark. Entity resolution systems keep all values whether they compete or not, as such, these systems accumulate context. By keeping both Marek and Mark, the semantic reconciliation algorithms can benefit by recognizing that sometimes Marek is recorded as Mark.”

Collecting the errors, versions and incompatibilities establishes a rich context for the data. The data isn’t always bright and shiny, looking its clear and unambiguous best—it has more life to it than that. It’s sorta like when you hear someone called by the wrong name, but you know who’s being talked about anyway. Maybe you don’t offer a correction, but simply continue the conversation.

And this brings us back to Al Kooper banging out the changes on a piano in a hotel room, while Dylan sits hunched over a typewriter, pounding out lyrics. Somehow out of this circling through the songs over and over again, the thin wild mercury sound of Blonde on Blonde eventually took hold in the studio and was captured on tape.

Plotting your route as the crow flies is one way to get to a destination. But I have to wonder if crows really do always fly as the crow flies.

2 Comments

Tyranny, Stealing Office Supplies and Arbitrage Among Networks

Tools give us leverage, they augment our human capabilities. In the corporate business environment, software tools continue to increase productivity at ever growing rates. In many occupations, the employee’s primary tools consist of some type of computer, an office software suite and network connection. Much of the existence of the corporate enterprise is now inscribed in software. And for the most part, the people who manage the enterprise have little or no idea how the software works. They see better productivity and increased visibility into business processes—and that’s sufficient. The hardware and software toolset is owned by the IT department. This group knows about hardware and software, but generally, not about running a business. But they have power over the toolset and its provisioning—in essence the vehicle of augmentation and therefore leveraged productivity.

When tools are working well they disappear, we don’t think about them. Software disappears into our working lives to the extent that it works well. When it breaks or frustrates us, we see the critical dependencies that have formed and how we’ve become embedded in a system of software. The leverage we gain from augmenting our productive capabilities is critical to satisfying the demand for ever more growth from our corporations. One can do what it took many to accomplish in the past, or as it’s sometimes called revenue per unit of headcount. It could be said that for many businesses it’s only by increased leverage through networked software that productivity gains will be achieved.

Before the iPhone opened a port to the Network from anywhere with public WiFi or cellular coverage, I often wanted a personal network overlaying the corporate network. I missed the ability to pivot from one network to the other. This isn’t multitasking, but rather fast switching among different networks, electronic and otherwise. Quarantine to a single network is an unnatural state of affairs—it’s the reduction of the human to gadget or prisoner. Because of the arrival of Network access through the cellular system, the personal network now overlays the professional network—and it’s resulted in an interesting change in the balance of power.

Scott Brinker, in his Marketing Technologist blog, pulled a quote by Dave Codack, vice president of employee technology at TD Bank, from a ComputerWorld story. Codack indicated that he’d coined the phrase “the tyranny of consumerization.”

He called the process a form a tyranny because “the enterprise is not dictating technology with these devices, the revolt is coming from the end user community

Codack’s comment refers to the launch of the iPad2 and the excitement that it caused within his department and in the enterprise in general. The feature set combined with its ease of use makes the very existence of the iPad a challenge to corporate IT departments. These devices provide workers with working leverage from outside of the standard issue corporate toolkit.

Sociology professor Mark Granovetter, in his paper The Impact of Social Structure on Economic Outcomes, talks about the idea of social embeddedness of the economy. This has to do with the fact that economic action lives within the mesh of social networks, culture, politics and religion.

The notion that people often deploy resources from outside the economy to enjoy cost advantages in producing goods and services raises important questions, usually sidestepped in social theory, about how the economy interacts with other social institutions. Such deployment resembles arbitrage in using resources acquired cheaply in one setting for profit in another. As with classic arbitrage, it need not create economic profits for any particular actor, since if all are able to make the same use of non-economic resources, none has any cost advantage over any other. Yet, overall efficiency may then be improved by reducing everyone’s costs and freeing some resources for other users.

… But despite intimate connections between social networks and the modern economy, the two have not merged or become identical. Indeed, norms often develop that limit the merger of sectors. For example, when economic actors buy and sell political influence, threatening to merge political and economic institutions, this is condemned as “corruption.” Such condemnation invokes the norm that political officials are responsible to their constituents rather than to the highest bidder, and that the goals and procedures of the polity are and should be different and separate from those of the economy.

Personal consumer networks now overlay professional business networks, and the arbitrage moves from the personal and public to the corporate. We now steal office supplies from home to use at work. We’re still looking for leverage, for new ways to augment our capabilities, to get more done with less effort. And just as in the example of the merging of political and economic networks, the corporate IT department sees this as an illegitimate exercise of power and an undermining of the chain of command.

Person-to-person video calls used to be the province of science fiction. When we imagined what it would be like, we assumed it would start in the halls of government and the biggest corporations and eventually make its way to the broad consumer markets. If you’ve ever tried to use a corporate video conferencing system you’ll understand that’s not what will happen. While it looks good on paper, it’s never delivered on the promise. Corporate video conferencing is the equivalent of an operator-assisted phone call. The parties must always be connected by a representative of the corporate IT department. Compare this to the simplicity of Apple’s FaceTime—mobile video conferencing built into the device. Select, connect, talk. More office supplies taken from home and leveraged to make business work better.

How can the corporate IT department respond to the Tyranny of Consumerization? It’s too late to lock the personal network out of the corporate network. The castle walls have already been breached. And while the iPad and real-time message streams can be adopted as corporate tools, that’s only part of the arbitrage taking place. If economic growth can only be achieved through increased augmentation and leverage, the power of the personal network will have to be legitimized. But this won’t be a case of the corporate IT fish eating the personal IT fish, something else has come along to eat them both.

Comments closed

Barriers, Membranes and What We Agree to Keep Silent About…

There are certain animals that have survived, flourished even, through the use of camouflage (a form of crypsis). They blend into the background so well they become invisible. Predators haven’t cracked the code, camouflage works at the level of the species. Now and then it may fail in individual cases, but on the whole it’s been a successful strategy in the game of natural selection.

In the murky waters of the Network, the visibility is nil. It’s only through the hyperlink that a sense of visibility is created— although visibility is probably the wrong word. Following McLuhan, we should acknowledge the Network as an auditory/tactile space. The nodes of the Network are linked by touch. The hyperlink is activated by touch, it’s a flicking of a switch that opens a door to a hidden hallway. We feel our way through the dark until we emerge into the light on the other side. (This is another reason that the multi-touch interaction mode has spread so quickly).

Imagine a location on the Network that was completely devoid of hyperlinks to foreign sites. You’d have to imagine it, because unless you knew the precise incantation to call it into your browser, it would lay perfectly camouflaged within the darkness of the Network. Sometimes this is called security through obscurity—a kind of blending into the background.

This imaginary location might have an infinite number of internal hyperlinks between the locations within its interior. It could be a whole world, completely unknown to the rest of the Network, a veritable Shangri-La. Because this place is unknown and without hyperlinks, there would be no commerce, no trade of bits between this isolated location and the rest of the Network. Of course, if a single hyperlink was formed, this imaginary location would change forever. To stop outside influences from overwhelming this world, a barrier would have to be built and its integrity enforced.

If we adjust our angle a little bit, we’ve just described the state of the modern Corporate Enterprise with respect to the rest of the Network. The fabric of the external Network has been used as the material for the internal Network—the protocols are identical. Keeping these identical twins apart is called security. Of course, twins have a mode of communication, cryptophasia, not available to others.

Hedge funds are beginning to monitor Twitter to evaluate their portfolio holdings and trading opportunities. The public stream is analyzed in real time for sentiment and triggers to put into their trading algorithms. Enough value has accreted to the stream that there’s an advantage to be gained from taking it into account.

In addition to its presence in the public stream, the Corporate Enterprise has begun to launch private public streams meant to reside securely within the friendly confines of the firewall. The purpose of the private public stream is to create more visibility within the Enterprise—although the metaphors have become crossed again. Traditional corporate reporting provides visibility—a kind of linear numeric business intelligence. A real-time micro-message stream with hyperlinked citations transmits auditory and tactile signals. We hear what people are saying about how things are, and by following the hyperlink we can get a deeper feel.

If the public stream, outside the firewall, has enough juice to merit monitoring, the private public stream has even more. And there’s no skill or guile involved in finding it, it’s a busy public thoroughfare accessible to everyone on the inside.  If we adjust our angle a bit more, we can see the private public message stream as a series of diplomatic cables. The diplomatic corps of the United States uses these cables to update the status of the system to the Secretary of State. Private internal message streams can develop a value outside the barriers erected by the native tribe. When the value grows great enough there will be motivation to enable a leak. What at first appears to be a barrier, reveals itself as a membrane. The modern worker is a member of many tribes with many, and sometimes competing, allegiances.

Perhaps we might think it’s just a matter of stronger barriers, a matter of winning the arms race. But as Bruce Sterling notes in his assessment of the Wikileaks Affair, these kinds of cracks are going to get easier, not harder over time. Even the system that we might expect to be the strongest no longer operates on the basis that a war over barriers can be won. Here’s Deborah Plunkett, head of the NSA’s Information Assurance Directorate, on the state of their internal network:

“There’s no such thing as ‘secure’ any more,” she said to the attendees of a cyber security forum sponsored by the Atlantic and Government Executive media organizations, and confirmed that the NSA works under the assumption that various parts of their systems have already been compromised, and is adjusting its actions accordingly.

To preserve the availability and integrity of the systems it has the duty to protect, the NSA has turned to standardization, constant auditing, and the development and use of sensors that will be placed inside the network on specific points in hope of detecting threats as soon as they trigger them, reports Reuters.

In the end, we seem to be transported back to days of the tribe and our allegiance to it. In an age where the barriers around systems have become a Maginot Line, it’s down to what we agree to keep silent about— what we don’t share outside the circle. Our public and private faces will grow farther apart, and the innocent and authentic gestures we contributed to the public stream will now be a matter of show. The backchannel that was brought to the fore will require a backchannel of its own. Somewhere out of the glare, where we can have a private conversation— security through obscurity.

One Comment

Standing On The Corner: Reality Bites

It’s right on the crease that the thoughts began to emerge. Like standing on the corner of a city block and looking down one side and then the other. Seeing old friends from different times in your life, paths that never crossed—now connected by the happenstance of standing on this particular node in the grid-work of the metropolis. The term standing at this crossroads is ‘realism.’

The initial rehabilitation of the word, for me, came with the discovery of John Brockman’s Edge.org. Within this oasis, Brockman unleashed the congregations of the Third Culture and The Reality Club. These closed circles of the best and the brightest engage in a correspondence on topics at the edge of technology and science. In particular, Brockman was seeking to provide an escape from the swirl of ‘commentary on commentary’ that seemed to be gobbling up much of the intellectual world as it struggled to digest the marks and traces left by Jacques Derrida. Here, conversations could gain traction because the medium was the “real” and the language was the process of science. Even the artists and philosophers included within the circle had a certain scientific bent.

However, recently I’ve begun to feel that the conversations have drifted from scientific to the scientistic. Standing at the edge of scientific discovery is a heady experience. The swirl of the unknown is trapped in the scientist’s nets, sorted out into bits of data, classified and tested. Edge.org serves as a sort of cross-scientific discipline peer review process. The shaky ground of the barely known is given its best chance to gain traction through an unstinting faith in the real. At this far outpost, anything seems to be fair game for the process. Standing on the firm ground of the scientific real, the conversations begin to stray into explanations and reconstructions of morality, thinking, consciousness and religion. Edifices are not deconstructed, they are bulldozed and rebuilt on the terra firma of scientific reality.

Even within Edge.org, the question about the ground on which they stand are starting to be asked. Jaron Lanier focuses on why there’s an assumption that computer science is the central metaphor for everything:

One of the striking things about being a computer scientist in this age is that all sorts of other people are happy to tell us that what we do is the central metaphor of everything, which is very ego-gratifying. We hear from various quarters that our work can serve as the best way of understanding – if not in the present but any minute now because of Moore’s law – of everything from biology to the economy to aesthetics, child-rearing, sex, you name it. I have found myself being critical of what I view as this overuse as the computational metaphor. My initial motivation was because I thought there was naive and poorly constructed philosophy at work. It’s as if these people had never read philosophy at all and there was no sense of epistemological or other problems.

And it’s here that faith in the scientistic ground begins to develop fissures. A signal event for me was the appropriation of the word ‘ontology‘ by the practitioners of the semantic web. The word is taken up and used in a nostalgic sense, as though plucked from a dead and long-ago superseded form of thought. The history of the word is bulldozed and its meaning reconstructed within the project of creating a query-able web of structured data.

It was the word ontology that linked me back to realism. And here we are back at the crease, looking down the other side of the block. It’s here that the fast charging world of Speculative Realism enters the fray. The scientistic thinkers on the Edge have begun to notice a certain mushiness of the ground as they reach out to gain traction in some new territories. Indeed, some may stop and ask how the ground could be mushy in some spots, but not in others?

The brand Speculative Realism was founded in April of 2007, at a conference at Goldsmiths College, University of London. The primary players were Graham Harman, Ray Brassier, Iain Hamilton Grant, and Quentin Meillassoux. While not a cohesive school of thought, these philosophers have certain common concerns, in particular ideas about realism and a critique of correlationism. The branch of the tree of particular interest to me contains the group exploring Object-Oriented Ontology, which includes Graham Harman, Timothy Morton, Ian Bogost and Levi Bryant among others.

Ontology is the philosophical study of existence. Object-oriented ontology (“OOO” for short) puts things at the center of this study. Its proponents contend that nothing has special status, but that everything exists equally—plumbers, cotton, bonobos, DVD players, and sandstone, for example. In contemporary thought, things are usually taken either as the aggregation of ever smaller bits (scientific naturalism) or as constructions of human behavior and society (social relativism). OOO steers a path between the two, drawing attention to things at all scales (from atoms to alpacas, bits to blinis), and pondering their nature and relations with one another as much with ourselves.

My formal introduction to the literature was through Graham Harman’s book Prince of Networks, Bruno Latour and Metaphysics. But to get a sense of the pace of thought, you need only look to the blog posts, tweets, YouTube posts, uStream broadcasts of conferences and OpenAccess publications the group seems to produce on a daily basis. The recent compendium of essays, The Speculative Turn, is available in book form through the usual channels, or as a free PDF download. The first day it was made available as download, the publisher’s web servers were overwhelmed by the demand. The velocity of these philosophical works, and the progress of thought, seems to be directly attributable to its dissemination through the capillaries of the Network.

In working with ontology, these thinkers have given the ground on which scientists—and the rest of us (objects included) stand, quite a bit of thought. This is not an extension of the swirl of commentaries on commentaries, but rather a move toward realism. And it’s when you arrive at this point that the border erected around the scientistic thought and conversations of the Edge.org begins to lose its luster. There are clearly questions of foundation that go begging within its walls. At the beginning of such a conversation, the ground they’ve taken for granted may seem to fall away and leave them suspended in air, but as they continue, a new ground will emerge. And the conversation will be fascinating.

3 Comments