Skip to content →

Category: digital

2-Way Asymmetric Networks: Robots Call Me All The Time, Yet I Never Call Them

lobster_phone

There are a number of stories that have been running through my playlist recently. The theme, the question, has to do with what I call spammable identity endpoints. With the growth of dual one-way asymmetric follow networks, I wonder if we are creating new communications channels that will make the phone number and email address obsolete?

Here are the stories:

Avital Ronell’s “book” called The Telephone Book: Technology, Schizophrenia, Electric Speech, opens with a description of our relationship with the node of the Network that the telephone represents:

…And yet, you’re saying yes, almost automatically, suddenly, sometimes irreversibly. Your picking it up means the call has come through. It means more: you’re its beneficiary, rising to meet its demand, to pay a debt. You don’t know who’s calling or what you are going to be called upon to do, and still, you are lending your ear, giving something up, receiving an order. It is a question of answerability. Who answers the call of the telephone, the call of duty, and accounts for the taxes it appears to impose?

Bruce Sterling may have said something resembling the following at the recent SXSW:

Connectivity will be an indicator of poverty rather than an indicator of wealth.

There’s a story about how cultural norms are solidified and passed to the next generation:

A room contains a researcher and a small stool. Hanging over the stool is a banana on a string. The researcher wears a white lab-coat and holds a fully pressurized fire-hose. An arbitrary number of monkeys is released into the room.

Sooner or later one of them will make for the stool to try and grab the banana. Yet as soon as that monkey climbs the stool and approaches his prize, the researcher lets him have it with the hose. And not only does that monkey get it, but all monkeys in the room (whether they touched the banana or not) get sprayed. After soaking them roughly for a few moments, the researcher turns off the hose.

Perhaps another monkey gets brave or hungry. When he climbs the stool and touches the banana, the researcher lets him have it. And as before, all the monkeys also get doused, whether they moved towards the banana or not. Repeat this process enough and, after the group has suffered enough soakings, the following effect should be noticed: Should any monkey make for the stool, the rest can be counted on to beat him silly before he reaches either it or the banana, sparing themselves. After awhile, the group avoids the banana even as their bellies growl.

Now say the researcher removes a monkey and brings in a new one to replace him. No big surprise, one of his first actions might be to make directly for the banana. And of course the others won’t allow this, for if he should make it they all get sprayed again. They administer a beating to the confused newcomer, until he learns not to near the stool.

Should the experiment continue, perhaps after replacing every monkey in the original generation, one can even remove the researcher. The descendants enforce the social order even though they may never been sprayed or even know about the researcher. By now no monkeys have directly experienced the hose, and in fact no white-coated danger exists, yet still their options are self-curtailed. There is no risk in the banana. Yet they avoid it, none quite certain why.

I’ve heard this story from Clay Shirky, although I can’t seem to find a reference to it (either on my book shelf or on the Network). So I’m going to make something up that Clay might have said:

Marconi invented radio as a means to enable ship-to-shore communication. The intention was to create a one-to-one communications network. It turned out that anyone with a radio listening device could hear the broadcast. In a network with only two radios, transmissions were scoped correctly as one-to-one. On a network with a broadcast radio and many radio receivers– just add some commercials selling soap, and you’ve got modern broadcast radio.

The network transmission characteristics of a technology make an imprint on our cultural practice. We all know that we couldn’t survive without the telephone and email. Going back to the telegraph and the telegram is not an option. We have a unique phone number and email address so that we can reached through the network. We make these identity endpoints findable, so that if it’s important, you can call us. The relation is two-way asymmetric — if my identity endpoint is known, it can be called. For instance, robots call me all the time, and yet I have very little desire to call robots. Although, I suppose I could.

If Twitter had a presence status indicator and full-duplex voice transmission enabled through the direct message channel, how quickly would it replace the telephone? Skype is already the largest international telecom provider in the world. Could a dual one-way asymmetric pub/sub communications network supercede the current network where robots can call me any time they are directed to do so? Or has this already happened, and are we just scrambling to put together the documentation of how it works…

Comments closed

Identity in China: Square Pegs, Round Holes

square_peg_round_hole

This morning over a cup of tea and the NY Times, I discovered a major new Identity System. On the edges we argue about user-centered identity, aggregated/fragmented identity across social networks, or the meaning of custodial identity and its role in commercial or financial transactions. Sharon LaFraniere, of the NY Times, writes about bestowing names, the written Chinese language and databases — and a new identity system for China’s 1.3 Billion citizens.

square_watermelon

By law, every Chinese citizen must carry an identity card– the legacy system is a handwritten card. The government is transitioning to a computer-readable card that will feature a color photo and an embedded microchip containing data including: home address, work history, background, ethnicity, religion and medical insurance. Within this transition we can observe what is lost as we move from the handwritten to the computer-readable.

Let’s start with some numbers:

  • There are roughly 55,000 written Chinese characters
  • China’s Public Security Bureau database is programmed to read 32,252 Chinese characters
  • A government linguistics official has suggested that the new standardized list will only include 8,000 characters
  • About 3,500 characters are in everyday use

Although China has a large population, it has very few surnames:

  • 100 surnames cover 85% of China’s population
  • 70,000 surnames cover 90% of the U.S.’s population

Because many people have identical surnames, it has become common to bestow an unusual given name to create a unique identity.

“Government officials suggest that names have gotten out of hand, with too many parents picking the most obscure characters they can find or even making up characters, like linguistic fashion accessories. But many Chinese couples take pride in searching the rich archives of classical Chinese to find a distinctive, pleasing name, partly to help their children stand out in a society with strikingly few surnames.”

While the Chinese writing system may be one of the most difficult in which to manage data, it is also the oldest system of writing in continuous use. Since these new identity databases can’t read unusual characters, the government will be asking people to change their names to something machine readable. Given a logographic written language, a handwritten identity card could accommodate an infinite variety. Alphabetic writing systems don’t have this problem as they attempt to convey phonemes rather than morphemes.

This story surfaces a number of issues with regard to technology and identity. The first and most obvious is what personal data should be contained on a government-issued identity card– who controls that data and who has access to it. A more subtle issue is: what is possible with language (written and spoken) as humans use it, and what is possible within the subset of “language” that machines can “understand.” If your name can’t be parsed by the Government’s identity database do you exist? And further, should you change your name to suit the system? Should the landscape change its features to accomodate the limited technology of map making? And if you’re creating an Internet Identity system, should it be in English? Should it be national or global? How should it relate to writing systems, the marks we make to suggest things or states of the world?

What does the technology of identity reveal about the identity of technology?

Comments closed

Continuous Orientation in the Land of the Midnight Sun

nbc_test_pattern

I remember there times when I was younger that I could stay up very late watching television. Everyone else had gone to bed, and I was by myself, bathed in the blue glow surrounded by darkness. It was a guilty pleasure. Usually it was some late night movie from the 1940s. I consider these experiences as part of my visual and cultural education.

When the movie was over, the broadcast day ended. To cap things off there were some announcements and then the ceremonial showing of the film “High Flight.” I remember the images of a jet plane flying, dancing through the clouds, while an overwrought poem was read in an earnest, solemn voice. It was the marker, the ceremony at the end of night. Then perhaps, a brief test pattern– and the oblivion of snow blending with my oncoming dreams.

Static on your television is random emissions of electrons from the cathode of your CRT onto the phosphor screen. Cosmic rays, (not really rays but protons or alpha particles), penetrate our atmosphere with extreme uniformity and the density is fairly well known. There is a statistical probability, then, that some of the dots on your screen are caused by them. But you can never know which ones.

That sort of ending has been pushed to the edges. In the center, the city never sleeps, the eye is unblinking, the sun shines brightly at midnight. Consciousness, or a form of it, no longer flashes its wakefulness as dawn breaks across the spinning time zones, receding as the night grows dark. The waking life and dreaming life blend in a Network that is always lit up– sleeping with the lights on.

“sanity is a madness put to good uses; waking life is a dream controlled”
-George Santayana

While you slept, the storytellers continued unwinding their threads. The story continued to unfold– and as you awake you find yourself walking into a program already in progress. But is it really any different than any other day? Didn’t the world always already spin millions of different stories outside of your earshot? It’s the points of connection, the spots where your story connects with the stories of others– that’s the bit that matters. That’s the web of connections now visible in real time.

3 Comments

1953: Real Time, Real People

The other night I was watching a Turner Classic Movies tribute to the photographer and filmmaker Morris Engel. They showed his New York Trilogy: Little Fugitive, Lovers and Lollipops and Weddings and Babies. The opening sequence of Weddings and Babies influenced a generation of filmmakers. It’s utter magic. Engel and his wife, Ruth Orkin, specialized in capturing real life in both their documentary photographs and the three fictional films they made together.

Engel’s films are both an art and a technology story. He wanted to get close to people, he wanted to shoot from inside the crowd on location. So he built a custom 35mm movie camera that would allow him to do just that– capture real people in real time while moving among them. The technical advances, if you can call them advances, inspired both D.A. Pennebaker and the Maysles Brothers to create custom 16mm cameras for their film documentaries. John Cassavetes, Truffaut and the French New Wave owe their existence to the techniques and the economics of production pioneered by Engel.

Engel’s less expensive filmmaking technology retained all the beauty and richness of black and white photography. His ability to frame a shot, tell a story, capture the real essence of a person, edit a sequence could partake of all the richness of the medium. Today’s digital technology has reduced costs even more, where is the richness of the medium retained? Where is our Morris Engel?

3 Comments