Skip to content →

Category: identity

Banks, Walled Gardens And Metaphors of Place

It’s interesting to think of banks as walled gardens. For example, on the Network, we might call Facebook, or aspects of Apple or Microsoft, a walled garden. The original America Online was the classic example. While most of us prefer to have walls, of some sort, around our gardens; the term is generally used to criticize a company for denying users open access, a lack of data portability and for censorship (pulling weeds). However when we consider our finances, we prefer there be a secure wall and a strong hand in the cultivation and tending of the garden. Context is everything.

More generally, a walled garden refers to a closed or exclusive set of information services provided for users. This is in contrast to providing consumers open access to the applications and content.

The recent financial crisis has presented what appears to be an opportunity to attack the market share of the big banks. Trust in these institutions is lower than normal and the very thing that made them appealing, their size, is now a questionable asset. The bigness of a bank in some ways describes the size of their private Network. On the consumer side, it’s their physical footprint with branches, or stores as some like to call them, and the extension of that footprint through their proprietary ATM network plus affiliated ATM networks. On the institutional side, there’s a matching infrastructure that represents the arteries, veins and capillaries that circulate money and abstractions of money around the country. Network is the medium of distribution. Once the platform of a big bank’s private network is in place, they endeavor to deliver the widest possible variety of product and services through these pipes. Citibank led the way in the financial supermarket space, now all the major players describe themselves as diversified financial services firms.

Every so often, in the life of the Network, the question of centralized versus distributed financial services comes up. Rather than buying a bundle of services from a single financial services supermarket, we wonder whether it’s possible to assemble best of breed services through a single online front-end. This envisions financial services firms providing complete APIs to aggregators so they can provide more friendly user interfaces and better analytics. Intuit/Mint has been the most successful with this model. It’s interesting to note that since the financial supermarkets are generally built through acquisition, under the covers, their infrastructures and systems of record are completely incompatible. So while the sales materials tout synergy, the funds to actually integrate systems go begging. The financial services supermarket in practice is aggregated, not integrated.

We’re starting to see the community banks and credit unions get more aggressive in their advertising— using a variation on the “small is beautiful” theme. For consumers, the difference in products, services and reach has started to narrow. By leveraging the Network, the small financial institution can  be both small and big at the same time. In pre-Network history, being simultaneously small and big violated the laws of physics. In the era of the Network, any two points on the planet can be connected in near real time as long as Network infrastructure is present. An individual can have an international footprint. Of course, being both big and big allows a financial institution to take larger risks because, theoretically at least, it can absorb larger loses. We may see legislation from Congress that collars risk and puts limitations on the unlimited relationship between size and risk.

The Network seems to continually present opportunities for disintermediation of the dominant players in the financial services industry. Ten years ago, account aggregation via the Network seemed to be on the verge. But the model was never able to overcome its usability problems, which at bottom are really internet identity problems. We’re beginning to see a new wave of companies sprouting up to test whether a virtual distribution network through the internet can supplant the private physical networks of the established players. SmartyPig, Square and BankSimple present different takes on disintermediating the standard way we route and hold the bits that represent our money.

Once any Network endpoint can be transformed into a secure transaction environment, the advantage of the private network will have been largely neutralized. And while it hasn’t solved account aggregation’s internet identity problem yet, the mobile network device (some call it a telephone) has significantly changed the identity and network landscape. The walls around the garden represent security and engender trust. The traditional architecture of bank buildings reflect this concept. But the walled garden metaphor is built on top of the idea of carving out a private enclave from physical space. The latest round of disintermediation posits the idea that there’s a business in creating ad hoc secure transaction connections between any two Network endpoints. In this model, security and trust are earned by guaranteeing the transaction wherever it occurs.

There have always been alternative economies, transactions that occur outside of the walled gardens. In the world of leading-edge technology, we tend to look for disruption to break out in the rarefied enclaves of the early adopter. But when the margins of the urban environment grow larger than the traditional center, there’s a good chance that it’s in the improvisational economies of the favelas, shanty towns and slums that these new disruptive financial services will take root.

5 Comments

Bloomsday, The Coffee House and The Network

June 16th is known as Bloomsday; it’s the single day, in 1904, on which James Joyce’s novel Ulysses occurs. The day is commemorated around with the world with readings of the book and the hoisting of a pint or two.

Stately, plump Buck Mulligan came from the stairhead, bearing a bowl of lather on which a mirror and a razor lay crossed. A yellow dressinggown, ungirdled, was sustained gently behind him by the mild morning air. He held the bowl aloft and intoned:

Introibo ad altare Dei.

Halted, he peered down the dark winding stairs and called up coarsely:

— Come up Kinch. Come up , you fearful jesuit.

Solemnly he came forward and mounted the round gunrest. He faced about and blessed gravely thrice the tower, the surrounding country and the awakening mountains. Then, catching sight of Stephen Dedalus, he bent towards him and made rapid crosses in the air, gurgling in his throat and shaking his head. Stephen Dedalus, displeased and sleepy, leaned his arms on the top of the staircase and looked coldly at the shaking, gurgling face that blessed him, equine in its length, and at the light untonsured hair, grained and hued like pale oak.

Buck Mulligan peeped an instant under the mirror and then covered the bowl smartly.

Joyce’s book brought to popular notice the idea of stream of consciousness literature. The term “stream of consciousness” was coined by the philosopher William James in an attempt to describe the mind-world connection as it relates the concept of truth. As a literary technique, it involves writing as a kind of transcription of the inner thought process of a character. In Ulysses, we find that stream rife with puns, allusions and parodies. Joyce was trying to capture another aspect of truth.

What challenged the reader of the day as avant garde and daring has become a relatively normal part of our network-connected lives.

Twitter has become a part of my daystream
– Roger Ebert

The stream of tweets flowing out of Twitter could aptly be described as a stream of collective consciousness. And so today, we think a great deal about various real-time streams and how they wend their way through networks of social connection. The water metaphors we use to speak about these things have roots in our shared history; they describe another kind of network of connections.

Stephen B. Johnson, in his book The Invention of Air, makes the case for the London Coffee House as an early prototype for the internet:

With the university system languishing amid archaic traditions, and corporate R&D labs still on the distant horizon, the public space of the coffeehouse served as the central hub of innovation in British society. How much of the Enlightenment do we owe to coffee? Most of the epic developments in England between 1650 and 1800 that still warrant a mention in the history textbooks have a coffeehouse lurking at some crucial juncture in their story. The restoration of Charles II, Newton’s theory of gravity, the South Sea Bubble— they all came about, in part, because England had developed a taste for coffee, and a fondness for the kind of informal networking and shoptalk that the coffeehouses enabled. Lloyd’s of London was once just Edward Lloyd’s coffeehouse, until the shipowners and merchants started clustering there, and collectively invented the modern insurance company. …coffeehouse culture was cross-disciplinary by nature, the conversations freely roaming from electricity, to the abuses of Parliament, to the fate of dissenting churches.

But the coffeehouse as a nexus of debate was only half of the picture. Cultural practice at the time was to drink beer and wine, and maybe a little gin, at every opportunity. Water was not safe to drink, and so alcoholic alternatives were fondly embraced. The introduction of coffee and tea as popular beverages had a significant impact on the flow of valuable ideas. Again here’s Johnson:

The rise of coffeehouse culture influenced more than just the information networks of the Enlightenment; it also transformed the neurochemical networks in the brains of all those newfound coffee-drinkers. Coffee is a stimulant that has been clinically proven to improve cognitive function— particularly for memory related tasks— during the first cup or two. Increase the amount of “smart” drugs flowing through individual brains, and the collective intelligence of the culture will become smarter, if enough people get hooked.

In our day, the coffee house connected to a wifi network has been an accelerant to the businesses populating the Network. When Starbucks announced that they would be introducing free 1-click wifi in their stores, it reminded me of Stephen Johnson’s descriptions of the London coffeehouses. The coffeehouse provided a physical meeting place and the caffeine in the coffee provided a force multiplier for the ideas flowing through the people. There was a noticeable change in the rhythm of the age. By layering a virtual real-time social medium over a physical meeting place that serves legal stimulants, Starbucks replays a classic formula. Oddly, there’s a kind of collaborative energy that exists in the coffeehouse that has been completely expunged from the corporate workplace. Starbucks ups the ante by running a broadcast web service network through the connection. Here we see wifi emerging as the new backbone for narrowcasted television.

As we try to weave value-laden real-time message streams through the collaborative groupware surgically attached to the corporate balance sheet, we may do well to look back toward Bloomsday and also ask for a stream of unconsciousness. It’s in those empty moments between the times when we focus our attention that daydreams and poetic thought creep into the mix. Those “empty moments” are under attack as a kind of system latency. However it’s in those day dreams, poetic thoughts and napkin scribbles that we find the source of the non-linear jump. Without those moments in our waking life, we’re limited to only those things deemed “possible.”

Comments closed

Internet Identity: Speaking in the Third Person

It’s common to think of someone who refers to themselves in the third person as narcissistic. They’ve posited a third person outside of themselves, an entity who in some way is not fully identical with the one who is speaking. When we speak on a social network, we speak in the third person. We see our comment enter the stream not attributed to an “I”, but in the third person.

The name “narcissism” is derived from Greek mythologyNarcissus was a handsome Greek youth who had never seen his reflection, but because of a prediction by an Oracle, looked in a pool of water and saw his reflection for the first time. The nymph Echo–who had been punished by Hera for gossiping and cursed to forever have the last word–had seen Narcissus walking through the forest and wanted to talk to him, but, because of her curse, she wasn’t able to speak first. As Narcissus was walking along, he got thirsty and stopped to take a drink; it was then he saw his reflection for the first time, and, not knowing any better, started talking to it. Echo, who had been following him, then started repeating the last thing he said back. Not knowing about reflections, Narcissus thought his reflection was speaking to him. Unable to consummate his love, Narcissus pined away at the pool and changed into the flower that bears his name, the narcissus.

The problem of internet identity might easily be solved by having all people and systems use the third person. A Google identity would be referred to within Google in the third person, as though it came from outside of Google. Google’s authentication and authorization systems would be decentralized into an external hub, and Google would use them in the same way as a third party. Facebook, Twitter, Microsoft, Apple and Yahoo, of course, would follow suit. In this environment a single internet identity process could be used across every web property. Everyone is a stranger, everyone is from somewhere else.

When we think of our electronic identity on the Network, we point over there and say, “that’s me.” But “I” can’t claim sole authorship of the “me” at which I gesture. If you were to gather up and value all the threads across all the transaction streams, you’d see that self-asserted identity doesn’t hold a lot of water. It’s what other people say about you when you’re out of the room that really matters.

What does it matter who is speaking, someone said, what does it matter who is speaking?
Samuel Beckett, Texts for Nothing

Speaking in the third person depersonalizes speech. Identity is no longer my identity, instead it’s the set of qualities that can be used to describe a third person. And if you think about the world of commercial transactions, a business doesn’t care about who you are, they care if the conditions for a successful transaction are present. Although they may care about collecting metadata that allows them to predict the probability that the conditions for a transaction might recur.

When avatars speak to each other, the conversation is in the third person. Even when the personal pronoun “I” is invoked, we see it from the outside. We view the conversation just as anyone might.

Comments closed

Human Factors: Zero, One, Infinity

Software is often designed with three “numbers” in mind: zero, one and infinity. In this case, infinity tends to mean that a value can be any number. There’s no reason to put random or artificial limits on what a number might be. This idea that any number might do is at the bottom of what some people call information overload. For instance, we can very easily build a User Managed Access (UMA) system with infinite reach and granularity. Facebook, while trying to respond to a broad set of use cases, produced an access control / authorization system that answered these use cases with a complex control panel. Facebook users largely ignored it, choosing instead to wait until something smaller and more usable came along.

Allow none of foo, one of foo, or any number of foo.

Privacy is another way of saying access control or authorization. We tend to think about privacy as personal information that is unconnected, kept in a vault that we control. When information escapes across these boundaries without our knowledge, we call this a data breach. This model of thinking is suitable for secrets that are physically encoded on paper or the surface of some other physical object. Drama is injected into this model when a message is converted to a secret code and transmitted. The other dramatic model is played out in Alfred Hitchcock’s The 39 Steps, where a secret is committed to human memory.

Personal information encoded in electronic communications systems on the Network is always already outside of your personal control. This idea of vaults and breaching boundaries is a metaphor imported from a alien landscape. When we talk about privacy in the context of the Network, it’s more a matter of knowing who or what has access to your personal information; who or what can authorize access to your personal information; and how this leg is connected to the rest of the Network. Of course, one need only Google oneself, or take advantage of any of the numerous identity search engines to see how much of the cat is already out of the bag.

The question arises, how much control do we want over our electronic personal information residing on the Network? Each day we throw off streams of data as we watch cable television, buy things with credit cards, use our discount cards at the grocery, transfer money from one account to another, use Twitter, Facebook and Foursquare. The appliances in our homes have unique electrical energy-use signatures that can be recorded as we turn on the blender, the toaster or the lights in the hallway.

In some sense, we might be attempting to recreate a Total Information Awareness (TIA) system that correlates all data that can be linked to our identity. Can you imagine managing the access controls for all these streams of data? It would be rather like having to consciously manage all the biological systems of our body. A single person probably couldn’t manage the task, we’d need to bring on a staff to take care of all the millions of details.

Total Information Awareness would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social network analysis, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant. This information would then be analyzed to look for suspicious activities, connections between individuals, and “threats”. Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.

Here we need to begin thinking about human numbers, rather than abstract numbers. When we talk about human factors in a human-computer interaction, generally we’re wondering how flexible humans might be in adapting to the requirements of a computer system. The reason for this is that humans are more flexible and adapt much more quickly than computers. Tracing the adaptation of computers to humans shows that computers haven’t really made much progress.

Think about how humans process the visual information entering our system through our eyes. We ignore a very high percentage of it. We have to or we would be completely unable to focus on the tasks of survival. When you think about the things we can truly focus our attention on at any one time, they’re fewer than the fingers on one hand. We don’t want total consciousness of the ocean of data in which we swim. Much like the Total Information Awareness system, we really only care about threats and opportunities. And the reality, as Jeff Jonas notes, is that while we can record and store boundless amounts of data— we have very little ability to make sense of it.

Man continues to chase the notion that systems should be capable of digesting daunting volumes of data and making sufficient sense of this data such that novel, specific, and accurate insight can be derived without direct human involvement.  While there are many major breakthroughs in computation and storage, advances in sensemaking systems have not enjoyed the same significant gains.

When we admire simplicity in design, we enjoy finding a set of interactions with a human scale. We see an elegant proportion between the conscious and the unconscious elements of a system. The unconscious aspects of the system only surface at the right moment, in the right context. A newly surfaced aspect displaces another item to keep the size of focus roughly the same. Jeff Jonas advocates designing systems that engage in perpetual analytics, always observing the context to understand what’s changed, the unconscious cloud is always changing to reflect the possibilities of the conscious context.

We’re starting to see the beginnings of this model emerge in location-aware devices like the iPhone and iPad. Mobile computing applications are constantly asking about location context in order to find relevant information streams. Generally, an app provides a focused context in which to orchestrate unconscious clouds of data. It’s this balance between the conscious and the unconscious that will define the new era of applications. We’ll be drawn to applications and platforms, that are built with human dimensions— that mimic, in their structure, the way the human mind works.

Our lives are filled with infinities, but we can only live them because they are hidden.

2 Comments