Skip to content →

Category: identity

The Twittering Machine: A Network of Accelerants & Silences

paulkleetwitteringmachine

In 1922, the Artist Paul Klee completed a work entitled Die Zwitscher-Maschine, which has been translated into English as The Twittering Machine. The work is part of the Museum of Modern Art’s collection. The catalog description delves beneath the surface interpretation of a machine for making pleasant bird sounds:

Upon closer inspection, however, an uneasy sensation of looming menace begins to manifest itself. Composed of a wiry, nervous line, these creatures bear a resemblance to birds only in their beaks and feathered silhouettes; they appear closer to deformations of nature. The hand crank conjures up the idea that this “machine” is a music box, where the birds function as bait to lure victims to the pit over which the machine hovers. We can imagine the fiendish cacophony made by the shrieking birds, their legs drawn thin and taut as they strain against the machine to which they are fused.

I’d like to take a moment to delve beneath the surface of the machinery that makes up the micro-messaging ecosystem. The micro-messaging service Twitter approaches a kind of frictionless channel for messaging. Everything about it seems to be built for growth and speed. After the substantial speed bump of signing up and orienting yourself in the system, both listening for, and creating messages are very simple. Select the other people (and pseudo-people) you’d like to follow, type fewer than 140 characters of hypertext into a text field and press update.

It’s been noted many times that the follow social structure – the directed social graph – allows for the rapid expansion of social linking. A participant is able to follow many others without the requirement of reciprocity. I follow you, you don’t have to follow me. And the retweet has emerged as a method of transmitting messages across multiple overlapping social graphs. Hash tags have become a conventional method of indicating a message tied to a particular event. All of these tools are dedicated to the acceleration of the growth of the Twitter network. Twitter’s trending topics and search functionality allow users to find high-velocity memes as they begin to achieve broad circulation through the social mesh.

Examples of the benefits of the speed of the Twitter network abound – news about the earthquake in China, the plane landing on the Hudson River, reports on wild fires in Southern California, etc. The news media, feeling somewhat usurped here, has also brought the negative aspects of this lack of friction in the system. Usually this kind of story is meant to point to the filtering role of their own editorial facility. The New York Times put a Twitter contretemps involving Stephen Fry in the first section of their newspaper.

…that little tweet set off a frenzy of vitriolic attacks and counterattacks on Twitter, drawing an untold number of people into an increasingly charged debate and thrusting brumplum — in reality a man from Birmingham, England, named Richard — unhappily into the public’s angry glare. It was an example once again of the extraordinary power of Twitter to distribute information and to sway the opinions of vast groups of people in tiny amounts of time.

While the frictionless micro-messaging environment can accelerate important, or amusing, messages (news, stories, jokes, musings), it can also assemble and ignite an angry mob at lightning speed. And if we look at the tool set we’re offered, everything is oriented toward accelerating people, memes and the growth of the Twitter network. In this frame, value is equated with high velocity and numbers of retweets, likes, mentions, @replies, followers and now, list memberships. We’re looking for what, or who, is going viral.

But if we examine the often banal items that achieve virality, we have to question the value = virality equation. Often the high numbers are a result of lowest-common denominator dynamics, it’s not the cream rising to the top. There are certain kinds of viral items that we’d prefer to be vaccinated against. We’d like a micro-messaging Center for Disease Control warning us about time-wasting viral memes spreading through the Network. Where are the tools to retard the spread of a meme? Where’s the don’t like, or the visible gesture of hiding something from your messaging stream. It’s as though we’ve put a poll in the field that only asks for a positive response and excludes all negative reaction. Feedback loops require both positive and negative inputs.

Feedback is a mechanism, process or signal that is looped back to control a system within itself. Such a loop is called a feedback loop. Intuitively many systems have an obvious input and output; feeding back part of the output so as to increase the input is positive feedback; feeding back part of the output in such a way as to partially oppose the input is negative feedback.

Negative feedback helps to maintain stability in a system in spite of external changes. It is related to homeostasis. For example, in a population of foxes (predators) and rabbits (prey), an increase in the number of foxes will cause a reduction in the number of rabbits; the smaller rabbit population will sustain fewer foxes, and the fox population will fall back. In an electronic amplifier feeding back a negative copy of the output to the input will tend to cancel distortion, making the output a more accurate replica of the input signal.

Positive feedback amplifies possibilities of divergences (evolution, change of goals); it is the condition to change, evolution, growth; it gives the system the ability to access new points of equilibrium.

One method of judging the relative merit of the memes circulating through the stream is to pay close attention to the silences, the negative gestures. While the wisdom of crowds may have crowned an item the real-time meme of the moment, there’s a simple way to filter for value. Using a small portfolio (lists, if you will) of people who’s opinion you respect – look to see if they remain silent on a topic. In the task of discovering value, this kind of silence is golden.

In the early stages of growth, accelerants are essential. As a Network matures, unless it develops a deeper tool set, it simply becomes a twittering machine. The value it appears to create is illusory, and so the commons begins its descent to knee-jerk reactions to the high numbers generated by the lowest common denominator. Perhaps the inevitable result is that overlapping publics contract and the social space becomes a much more private circulatory system. The crucible of dispute, debate and dialogue that produces real value may only emerge away from the public network of accelerants where the social contract allows such differences (both positive and negative feedback). One of the better statements of this kind of contract was for the Nettime mailing list:

Nettime was vector for experimenting with net critique that would confront it with the possibility of inventing new forms of discourse and dialogue in a new medium. Consensus is not the goal. There’s no governing fantasy according to which the differences within this ‘group’ will on some ever-deferred day be resolved. the differences are Nettime; they might be dialectical, implying each other, or they might be differential, making absolutely no reference whatsoever to each others’ terms. Net critique, if understood as a shared practice in and against a never pre-defined techno-local environment, contains many modes of possible participation.

In navigating the electrical storms and fires of the micro-messaging Network, we’d do well to have some tools in our kit in addition to that can of gasoline.

gas_can

4 Comments

Shadows & Light: Privacy in the Panopticon

Searchlight

Before the turn of the millennium, Scott McNealy declared privacy dead:

The chief executive officer of Sun Microsystems said Monday that consumer privacy issues are a “red herring.”

“You have zero privacy anyway,” Scott McNealy told a group of reporters and analysts Monday night at an event to launch his company’s new Jini technology.

“Get over it.”

McNealy’s comments came only hours after competitor Intel (INTC) reversed course under pressure and disabled identification features in its forthcoming Pentium III chip.

At one time, privacy was a function of a general laziness and the unlinked quality of information. While there may have been lots of publicly available information about a person, it was rather difficult to track down and assemble. We’ve developed a whole mythology around the kind of person who can root out the details about a person and put the pieces together into a picture that makes some kind of sense.

humphrey-bogart

There was a kind of power in the invisibility we once had. Oddly, it was a kind of anonymity that was derived from the density of the urban environment. The city was a place you could go to get lost, to start over, to create a new identity. That’s why it took a detective to find the traces and clues that filled out the picture of a person. Today, that kind of invisibility has mostly vanished. If I want to know something about Sergey Brin, I can use any number of services that will scour the Network looking of publicly available information, and then I can pay for information that’s more obscure or privately held. Shoe leather is no longer a requirement.

Just as there’s a kind of ‘security through obscurity,’ there was a kind of privacy through obscurity. The methods by which information about a person used to be stored were enshrouded in shadow, even darkness. One piece of information wasn’t linked to the next. The trail was obscured, you had to stumble through the darkness to get from one piece of information to the next. Now information is linked into a web– it’s created, searched, and collated. In the UK, surveillance cameras are used to create a visual real-time mesh of video that can track you through your day. You are being recorded, it’s just a question of whether anyone is currently looking at the data or not.

…under a law enacted in 2000 to regulate surveillance powers, it is legal for localities to follow residents secretly. Local governments regularly use these surveillance powers — which they “self-authorize,â€? without oversight from judges or law enforcement officers — to investigate malfeasance like illegally dumping industrial waste, loan-sharking and falsely claiming welfare benefits.

The private moment, that little space between this and that, the in-between time when no one is looking— this invisible space is growing smaller and smaller, the more connected we become. Privacy through obscurity is no longer a dependable strategy. The things that were hidden in plain sight, are now easily found.

There is some data that remains private. Our medical records and financial records are two examples of personal data that is actively encrypted and kept private. Generally a court order is required to pry open these vaults of information. In some sense, that’s the new definition of privacy. It’s data that can be accessed by the individual, the data custodian, and, by court order, the government. In addition, should this data inadvertently leak out from the data custodian, the individual has a well-established legal recourse against the custodian.

In order for the private to remain truly secret, it would need to be unconnected. As the connections between us are made visible by our electronically networked environment, we begin to see that we have always inhabited networks of one kind or another. To be unconnected to all networks is to no longer be among the living. The private is something that we are prohibited from sharing based on a social or legal contract. Viewed as a system, the private requires more energy to maintain its contracts regarding the non-sharing of information. Linking private personal data among private systems of record while still honoring the non-sharing contract takes even more energy. The network itself doesn’t distinguish between private and public information packets.

Gregory (Scotland Yard detective): “Is there any other point to which you would wish to draw my attention?”
Holmes: “To the curious incident of the dog in the night-time.”
Gregory: “The dog did nothing in the night-time.”
Holmes: “That was the curious incident.”

And just as we can deduce the nature of hidden facts based on the dog who didn’t bark in the night, the private can often be deduced by correlating public gestures/connections to and through the locus of personal identity. But privacy isn’t dead, it’s just as it always was– an agreement among a group of people to enact useful boundaries on the sharing of information.

Comments closed

Curation, Collections & Cabinets of Curiosity

JosephCornell

As we tread water in the flood of information being written into the Network through real-time interfaces, we see the word ‘curation‘ on the lips the VCs and the entrepreneurial classes. The problem was succinctly stated by Clay Shirky as: not one of information overload, but rather of filter failure. The filter of the moment is some form of curation. The firehose of information will be reduced to a rational and manageable collection through a semantic algorithm or a collaborative group filter. The search for the perfect curatorial tool is on– we want the thing that turns our infinite reading list into a prioritized, relevant, manageable collection of consumables.

butterfly collection

Collections can take a number of forms. For instance, varieties of butterflies can be put into a frame. Here we don’t look for a rational taxonomy, instead we desire beauty, rarity and narrative in each member of the collection.

collyer_bros1

Collections can be healthy or neurotic, the Collyer brothers obsessively collected the ordinary detritus of our culture and stacked it in their house. In the end, they accumulated 130 tons of stuff.

cabinet_of_curiosity

The cabinet of curiosity was an encyclopedic collection of items on the boundary of scientific classification systems. The criteria for inclusion included the rarity, the utterly foreign, and especially the example that broke the rules of classification.

Cornell_001

Joseph Cornell made an art form of creating collections that embodied contradiction and the irrational. Where scientists worked diligently in creating a rational taxonomy of the natural world, Cornell created an organized presentation of the unconscious.

Paper_Filters

That filtering tool that we’re searching for seems to produce a rational collection of items based on relevance and similarity. A firehose of items is categorized and prioritized, similar items are reduced to their exemplars, placed on a tray, and made ready for consumption as a collection of hors d’oeuvrers. The items in a cabinet of curiosity, as they are not easily categorized, would probably slip through the cracks of these collections.

The most common filtering tool is popularity. The best tools of this kind attempt to find popularity before it is too popular. Malcolm Gladwell exposed this pattern of meme acceleration through taste-making nodes of a social network. The tools currently available in online social networks, the retweet and the like are the most common accelerants. Discovery of early signs of velocity is the bread and butter of the news business. Once something is truly popular, we become like Yogi Berra, and quip that “nobody goes there anymore, because it’s too crowded.” In the financial world, this might be called selling on valuation. A stock that reaches its potential and now lacks upside, is sold in favor of a new stock showing signs of velocity to the upside.

Sometimes what you want to locate isn’t what’s the most popular, but rather the edge of the debate. The point where the categories break down and the subject of the discussion hasn’t been decided one way or the other. The purpose here isn’t to read what other people disagree about, it’s to be given an interface into the fray itself. Here we aren’t looking for content about some topic, instead we’re looking for a bi-directional connection to the organic thing itself.

The topology of the Network can be expressed in a variety of lexicons. Popularity follows a focused reading model. But as we begin to think of a real-time, read/write, two-way interface on to the Network, we look for a map of argument, the swarm of attention around an undecided direction, the political discourse of everyday life.

One Comment

The Context of the Search: Public and Private Identities

The widget is beginning to supercede the hyperlink as a proper response to a search query. You can start to see this with the deals Google and Bing are making, the search engine results page (SERP) can no longer satisfy as just a prioritized page of hyperlinks.

Search returns public social gestures in real time. But clicking a link isn’t necessarily what’s needed in this context, perhaps it’s a ‘like’ or a ‘retweet.’ Maybe it’s a reply. The SERP interface will extend the requisite affordances to enable these gestures.

Search returns videos that are playable inline. Perhaps they can be directed to a playlist which can be shared. Perhaps it finds the news clips and streams that relate to the healthcare debate or the Web conference that’s going on in real time or the public video streams from the protest march. Search returns that quote from a movie and cues the video up to exactly the right spot

Search returns music (Google’s deal with Lala.com) with an option to buy a web-only version or a file download. And, of course, you can listen to it one time for free just to get a sense of whether you really like it or not. Or perhaps it reminds you that you own a copy already and you can play it from your cloud-based record collection. Perhaps you want to add it to a playlist, or see what kind of genius list it generates. Perhaps you want to see who in your directed social graph also has this song in her playlist.

Search finds the debate around the news of the day. The journalism is pulled apart and acted out by the participants in the discussion. The discovery is not separated from the debate.

Search is becoming two-way, social and contextual. It’s not just a connector to a page— it is the connection itself, and it’s exposed through the response to the query. Search is no longer search. It’s a browsing activity, zig-zagging across the Network, it’s berry picking, it’s a bullshit session over a cup coffee, it’s researching and working through a problem, it’s finding out if anything worthwhile is going on right now. It’s not about the efficiency of the link, but the pleasure of the journey and the company we keep. It’s asking a question anonymously, but it’s also shifting modes and filtering the response based on personal identity and social graph. It’s asking in public, but it’s also asking in private.

We sometimes search for context among the things we index. But it’s not things that are semantic, it’s the people. As Wittgenstein notes, the meaning of a word is in its use. And the use of a word is in its social exchange, search begins to search for the real-time moment of exchange– and in that instant search is transformed.

Comments closed