A brief note on two planes of the Network landscape that have recently caught my attention. They are the terrains of interruption and silence. Each of these areas is going through a transition. Each signals changes that are starting to bubble up in other areas of the Network.
The terrain of silence, for the purposes of this discussion, will be defined as unvisited web page locations. Web servers are not purposefully asked to send these pages to waiting browsers, their activity is indistinguishable from background noise. An unvisited page published by an individual is a perfectly acceptable event; here I’m more specially addressing the corporate CMS (content management system) driven behemoth web sites. The enterprise CMS brings the cost of brochure-ware publication down to almost zero. Marketing departments, assembled and calcified in the Web 1.0 era, churn out copy that is sent out to occupy the hard-won turf of their little section of the company’s web site. The products battle for shelf space in a self-defined, self-limited topography of web 1.0 information architecture— home page, tabs, pages, categories, sub-catagories. The navigation scheme based on the hyperlink and the outline implies an almost infinite number of potential pages that can occupy the space below the tip of the iceberg.
Many are learning that if you build it, it doesn’t mean they will come. More often than not this multitude of pages is met with silence. The analytics show that there just aren’t any clicks there. Generally companies retool to get clicks to those pages, because clearly “they” should be coming, there’s simply some adjustment that needs to be made. “User-centeredness” is bolted on so that users will understand that the pages they don’t want to look at are “needs based.” All kinds of lipstick is applied, but in the end, it might just be that the user just isn’t that in to you. The conversation is one-sided in an empty room, the analytics show it. It turns out that automated publishing of linked hypertext documents isn’t the same thing as interactive marketing. The growing silence will eventually change the character of the interaction. The old 1% response rate for junk mail is transferred to the web when direct marketing model is employed without alteration on the Network. The web is just a way of lowering production costs, it’s a notch above the economics of spam. Think of it as the negative space of the page view model.
At the other end of this candle that burns at both ends, is the terrain of the interruption. For the purposes of this discussion, the this terrain will be defined as the the set of Network-attached devices you’ve given permission to ping you when something important occurs. The classic examples are the doorbell and the telephone. Each was originally anchored to a specific location and would signal you with a bell when they required your attention. The telephone went mobile, and then was subsumed into the iPhone as a function of a personal computing device. The bell that signals a telephone call is still there, so is the alert that tells you a text message has arrived. But now there are a whole series of applications that will send you an interruption signal when something has occurred. A stock hits a certain price, a baseball team scores a run, you’re near a store with a sale on an item on your wishlist, or someone just commented on an item in your Facebook newsfeed.
The terrain of interruption used to be limited to a few applications that signaled a request for a real-time communication from another person. The interruption is still event-driven and unfolds in real time, but it’s no longer only an individual signaling for your attention. Now it might just be a state of the world that you’d like to keep tabs on. If any of these things happen, feel free to interrupt me. If I really don’t want to be interrupted, I’ll turn off that channel— so ping me, I’ll pick it up in real time, or as soon as I’m able. What was a sparse and barren landscape is quickly filling with apps that want the privilege of interruption. Multi-tasking becomes simply waiting for the next interruption: interruption interrupting the last interruption— or as T.S. Eliot put it in his poem Burnt Norton, “distracted from distraction by distraction.” The economics and equilibrium of the interruption have yet to find their balance. These interruptions threaten to become an always-on real-time backchannel to daily life. Constant interruption is no interruption at all.
It’s interesting to think of banks as walled gardens. For example, on the Network, we might call Facebook, or aspects of Apple or Microsoft, a walled garden. The original America Online was the classic example. While most of us prefer to have walls, of some sort, around our gardens; the term is generally used to criticize a company for denying users open access, a lack of data portability and for censorship (pulling weeds). However when we consider our finances, we prefer there be a secure wall and a strong hand in the cultivation and tending of the garden. Context is everything.
More generally, a walled garden refers to a closed or exclusive set of information services provided for users. This is in contrast to providing consumers open access to the applications and content.
The recent financial crisis has presented what appears to be an opportunity to attack the market share of the big banks. Trust in these institutions is lower than normal and the very thing that made them appealing, their size, is now a questionable asset. The bigness of a bank in some ways describes the size of their private Network. On the consumer side, it’s their physical footprint with branches, or stores as some like to call them, and the extension of that footprint through their proprietary ATM network plus affiliated ATM networks. On the institutional side, there’s a matching infrastructure that represents the arteries, veins and capillaries that circulate money and abstractions of money around the country. Network is the medium of distribution. Once the platform of a big bank’s private network is in place, they endeavor to deliver the widest possible variety of product and services through these pipes. Citibank led the way in the financial supermarket space, now all the major players describe themselves as diversified financial services firms.
Every so often, in the life of the Network, the question of centralized versus distributed financial services comes up. Rather than buying a bundle of services from a single financial services supermarket, we wonder whether it’s possible to assemble best of breed services through a single online front-end. This envisions financial services firms providing complete APIs to aggregators so they can provide more friendly user interfaces and better analytics. Intuit/Mint has been the most successful with this model. It’s interesting to note that since the financial supermarkets are generally built through acquisition, under the covers, their infrastructures and systems of record are completely incompatible. So while the sales materials tout synergy, the funds to actually integrate systems go begging. The financial services supermarket in practice is aggregated, not integrated.
We’re starting to see the community banks and credit unions get more aggressive in their advertising— using a variation on the “small is beautiful” theme. For consumers, the difference in products, services and reach has started to narrow. By leveraging the Network, the small financial institution can be both small and big at the same time. In pre-Network history, being simultaneously small and big violated the laws of physics. In the era of the Network, any two points on the planet can be connected in near real time as long as Network infrastructure is present. An individual can have an international footprint. Of course, being both big and big allows a financial institution to take larger risks because, theoretically at least, it can absorb larger loses. We may see legislation from Congress that collars risk and puts limitations on the unlimited relationship between size and risk.
The Network seems to continually present opportunities for disintermediation of the dominant players in the financial services industry. Ten years ago, account aggregation via the Network seemed to be on the verge. But the model was never able to overcome its usability problems, which at bottom are really internet identity problems. We’re beginning to see a new wave of companies sprouting up to test whether a virtual distribution network through the internet can supplant the private physical networks of the established players. SmartyPig, Square and BankSimple present different takes on disintermediating the standard way we route and hold the bits that represent our money.
Once any Network endpoint can be transformed into a secure transaction environment, the advantage of the private network will have been largely neutralized. And while it hasn’t solved account aggregation’s internet identity problem yet, the mobile network device (some call it a telephone) has significantly changed the identity and network landscape. The walls around the garden represent security and engender trust. The traditional architecture of bank buildings reflect this concept. But the walled garden metaphor is built on top of the idea of carving out a private enclave from physical space. The latest round of disintermediation posits the idea that there’s a business in creating ad hoc secure transaction connections between any two Network endpoints. In this model, security and trust are earned by guaranteeing the transaction wherever it occurs.
There have always been alternative economies, transactions that occur outside of the walled gardens. In the world of leading-edge technology, we tend to look for disruption to break out in the rarefied enclaves of the early adopter. But when the margins of the urban environment grow larger than the traditional center, there’s a good chance that it’s in the improvisational economies of the favelas, shanty towns and slums that these new disruptive financial services will take root.
Google and Twitter have filed a amicus brief with the appeals court on TheFlyOnTheWall.com case. Briefly, at issue is FlyOnTheWall’s near real-time redistribution of investment bank research ratings. Investment bank research departments spend time, money and resources creating stock ratings and price targets. The purpose of this effort is to create an information asymmetry in the market to the advantage of the i-bank’s clients. FlyOnTheWall does not employ analysts and has no research capability, it discovers stock ratings, aggregates and redistributes them in near real time. Since their cost of production only includes real-time redistribution infrastructure, and therefore they can offer their high-value information feeds at a lower cost than investment banks. Subscribers to FlyOnTheWall pay for these aggregated news feeds, they aren’t free. In their testimony, FlyOnTheWall claimed they only gathered information from publicly available sources and only published tweet-sized snippets summarizing the reports.
Google and Twitter make the following argument in their brief:
News reporting always has been a complex ecosystem, where what is ‘news’ is often driven by certain influential news organizations, with others republishing or broadcasting those facts — all to the benefit of the public,
and further
How, for example, would a court pick a time period during which facts about the recent Times Square bombing attempt would be non-reportable by others?”
At issue is the re-emergence of the hot news doctrine, which was originally put in place in 1918 to stop William Randolf Hearst’s International News Service from taking Associated Press wire news stories and redistributing them as their own. The court set forth five criteria to determine whether ‘hot news’ has been misappropriated:
(i) a plaintiff generates or gathers information at a cost;
(ii) the information is time-sensitive;
(iii) a defendant’s use of the information constitutes free riding on the plaintiff’s efforts;
(iv) the defendant is in direct competition with a product or service offered by the plaintiffs;
(v) the ability of other parties to free-ride on the efforts of the plaintiff or others would so reduce the incentive to produce the product or service that its existence or quality would be substantially threatened.
In the case of TheFlyOnTheWall.com the court ruled for the plaintiffs, Barclays, Merrill Lynch and Morgan Stanley, and decided that a 2 hour embargo was a reasonable amount of latency to build into the Network. In the fast-paced world of equity trading, two hours is an eternity. These days trades are often executed in a matter of milliseconds. The enforcement of this kind of rule, however, is problematic. In the brave new world of social media, both individuals and news organizations have interconnected real-time distribution networks. Once bits of information touch this public social network they can spread with breathtaking speed. Twitter, Google and Facebook are currently the media through which this information is dispersed. And each of them can be said to profit by the circulation of high-value information through their networks.
Over the last few days we’ve seen the drama of General Stanley A. McChrystal play out. The events were put into play by a story written by Michael Hastings, a freelancer for Rolling Stone Magazine. The story about McChrystal’s comments began leaking out Monday night. Both Politico and Time magazine posted a PDF of the Rolling Stone article to their web sites before Rolling Stone. Rolling Stone asked the sites to remove the PDF. The New York Times reports:
Will Dana, the magazine’s managing editor, said that the magazine did not always post articles online because it could make more money at the newsstand and that when it did, the articles were typically not posted until Wednesday. But other news organizations made that decision for him.
The McChrystal story is an interesting example of the ‘hot news’ doctrine. Rolling Stone magazine puts out 26 issues of its print magazine per year. Even before the issue hit the newsstands, it dominated cable news, has been fully reported in the New York Times and resulted in McChrystal’s resignation and replacement by General David Petraeus. One could argue that Rolling Stone should have a business model that allows them to benefit from these kind of real-time events. And it’s quite possible that the broad dissemination of this story will lead to a significant increase in newsstand sales and web site traffic.
In this case the ‘hot news’ was so hot that the story itself became a story. Major government policies regarding the conduct of the war in Afghanistan had to be decided in real time. There was no hesitation, no waiting for Rolling Stone’s newsstand business model to play out. By the time we finally see the printed magazine it will have become an artifact of history. With the advantage of hindsight, we may even wonder why the headline writer put McChrystal’s story third after Lady Gaga’s tell all and the final days of Dennis Hopper.
The question about the ‘hot news’ doctrine isn’t going away; and the decision of the appeals court will be closely watched. In the meanwhile, the marketplace is searching for a solution to the fact of real-time aggregation and relay of digitally-copied work product. The return of the pay wall is an attempt by producers of stories about the news to create a firewall around their work product. Most corporations employ a firewall to keep their valuable internal discussion from reaching the public networks. Limiting access of your product to paying customers isn’t a new idea. However, when your work product is a story about news events or ideas encoded in digital media, creating reliable access controls is problematic. Where in the early days of the Network the focus was on direct access and disintermediation of the middle man; now the economics favor the man-in-the-middle. Meta-data can be sold at a fraction of the price of the data to which it points. The complex ecosystem of ‘the news’ is looking for a new equilibrium in which both data and meta-data can flourish.
The Network has been infused with humanity, with every aspect of human character— the bright possibilities and the tragic flaws.
On May 29, 1919, Arthur Stanley Eddington took some photographs of a total eclipse of the sun. Eddington had gone to Africa to conduct an experiment that might determine whether Newton’s or Einstein’s model was closer to physical reality.
During the eclipse, he took pictures of the stars in the region around the Sun. According to the theory of general relativity, stars with light rays that passed near the Sun would appear to have been slightly shifted because their light had been curved by its gravitational field. This effect is noticeable only during eclipses, since otherwise the Sun’s brightness obscures the affected stars. Eddington showed that Newtonian gravitation could be interpreted to predict half the shift predicted by Einstein.
My understanding of the physics is rather shallow, my interest is more in the metaphorics— in how the word-pictures we use to describe and think about the universe changed based on a photograph. Where the universe lined up nicely on a grid before the photograph, afterwards, space became curvaceous. Mass and gravity bent the space that light passed through. Assumed constants moved into the category of relativity.
The Network also appears to be composed of a neutral grid, its name space, through which passes what we generically call payloads of “content.” Each location has a unique identifier; the only requirement for adding a location is that its name not already be in use. You can’t stand where someone is already standing unless you displace them. No central authority examines the suitability of the node’s payload prior to its addition to the Network.
The universe of these location names is expanding at an accelerating rate. The number of addresses on the Network quickly outstripped our ability to both put them into a curated index and use, or even understand, that index. Search engines put as much of the Network as they can spider into the index and then use software algorithms to a determine a priority order of the contents of the index based on keyword queries. The search engine itself attempts to be a neutral medium through with the nodes of the Network are prioritized based on user query input.
Regardless of the query asked, the method of deriving the list of prioritized results is the same. The method and production cost for each query is identical. This kind of equal handling of Network nodes with regard to user queries is the search engine equivalent of freedom, opportunity and meritocracy for those adding and updating nodes on the Network. The algorithms operate without prejudice.
The differential value of the queries and prioritized link lists is derived through an auction process. The cost of producing each query/result set is the same—it is a commodity—but the price of buying advertising is determined by the intensity of the advertiser’s desire. The economics of the Network requires that we develop strategies for versioning digital commodities and enable pricing systems linked to desire rather than cost of production. Our discussions about “Free” have to do with cost-based pricing for digital information goods. However, it’s by overlaying a map of our desires on to the digital commodity that we start to see the contours, the curvaceousness of this space, the segments where versioning can occur.
We’ve posited that the search algorithm treats all nodes on the Network equally. And more and more, we take the Network to be a medium that can fully represent human life. In fact, through various augmented reality applications, human reality and the Network are sometimes combined into a synthetic blend (medium and message). Implicitly we also seem to be asserting a kind of isomorphism between human life and the Network. For instance, sometimes we’ll say that on the Network, we “publish everything, and filter later.” The gist of this aphorism is that where there are economics of low-or-no-cost production, there’s no need to filter for quality in advance of production and transfer to the Network. Everything can be re-produced on the Network and then sorted out later. But when we use the word “everything,” do we really mean everything?
The neutral medium of the Network allows us to disregard the payload of contents. Everything is equivalent. A comparison could be made to the medium of language— anything can be expressed. But as the Network becomes more social, we begin to see the shape of our society emerge within the graph of nodes. Sigmund Freud, in his 1913 book entitled Totem and Taboo, looks at the markers that we place on the border of what is considered socially acceptable behavior. Ostensibly, the book examines the resemblances between the mental life of savages and neurotics. (You’ll need to disregard the archaic attitudes regarding non-European cultures)
We should certainly not expect that the sexual life of these poor, naked cannibals would be moral in our sense or that their sexual instincts would be subjected to any great degree of restriction. Yet we find that they set before themselves with the most scrupulous care and the most painful severity the aim of avoiding incestuous sexual relations. Indeed, their whole social organization seems to serve that purpose or to have been brought into relation with its attainment.
Freud is pointing to the idea that social organization, while certainly containing positive gestures, reserves its use of laws, restrictions and mores for the negative gesture. The structure of societal organization to a large extent rests on what is excluded, what is not allowed. He finds this common characteristic in otherwise very diverse socio-cultural groups. Totems and taboos bend and structure the space that our culture passes through.
In the safesearch filters employed by search engines we can see the ego, id and superego play out their roles. When we search for transgressive content, we remove all filtering. But presumably, we do, as a member of a society, filter everything before we re-produce it on the Network. Our “unfiltered” content payloads are pre-filtered through our social contract. Part of the uncomfortableness we have with the Network is that once transgressive material is embodied in the Network, the algorithms disregard any difference between the social and the anti-social. A boundary that is plainly visible to the human— and is in fact a structural component of its identity and society, is invisible to the machine. Every node on the Network is processed identically through the algorithm.
This issue has also been raised in discussions about the possibility of artificial intelligence. In his book Mirror Worlds, David Gelernter discusses a key difference between human memory and machine memory:
Well for one thing, certain memories make you feel good. The original experience included a “feeling good” sensation, and so the tape has “feel good” recorded on it, and when you recall the memory— you feel good. And likewise, one reason you choose (or unconsciously decide) not to recall certain memories is that they have “feel bad” recorded on them, and so remembering them makes you feel bad.
But obviously, the software version of remembering has no emotional compass. To some extent, that’s good: Software won’t suppress, repress or forget some illuminating case because (say) it made a complete fool of itself when the case was first presented. Objectivity is powerful.
Objectivity is very powerful. Part of that power lies in not being subject to personal foibles and follies with regard to the handling, sorting, connecting and prioritizing of data. The dark side of that power is that the objectivity of the algorithm is not subject to social prohibitions either. They simply don’t register. To some extent technology views society and culture as a form of exception processing, a hack grafted on to the system. As the Network is enculturated, we are faced with the stark visibility of terrorism, perversity, criminality, and prejudice. On the Network, everything is just one click away. Transgression isn’t hidden in the darkness. On the Network, the light has not yet been divided from the darkness. In its neutrality there is a sort of flatness, a lack of dimensionality and perspective. There’s no chiaroscuro to provide a sense of volume, emotion, limit and mystery.
And finally here’s the link back to the starting point of this exploration. A kind of libertarian connection has been made between the neutral quality of the medium of the Network and our experience of freedom in a democratic republic. The machine-like disregard for human mores and cultural practices is held up as virtue and example for human behavior. No limits can be imposed on the payloads attached to any node of the Network. The libertarian view might be stated that the fewest number of limitations should be applied to payloads while still maintaining some semblance of society. Freud is instructive here: our society is fundamentally defined by what we exclude, by what we leave out, and by what we push out. While our society is more and more inclusive, everything is not included. Mass and gravity bend the space that light passes through.
The major debates on the Network seem to line up with the contours of this pattern. China excludes Google and Google excludes China. Pornographic applications are banished from Apple’s AppStore. Android excludes nothing. Closed is excluded by Open, Open is included by Closed. Spam wants to be included, users want to exclude spam. Anonymous commenters and trolls should be excluded. Facebook must decide what the limits of speech are within the confines of its domain. The open internet excludes nothing. Facebook has excluded the wrong thing. The open internet has a right to make your trade secrets visible. As any node on the Network becomes a potential node in Facebook’s social/semantic graph, are there nodes that should be taboo? How do we build a civil society within the neutral medium of the Network? Can a society exist in which nothing is excluded?
In the early days of the Network, it was owned and occupied by technologists and scientists. The rest of humanity was excluded. As the Network absorbs new tribes and a broader array of participants, its character and its social contract has changed. It’s a signal of a power shift, a dramatic change in the landscape. And if you happen to be standing at the crossroads of technology and the humanities, you might have a pretty good view of where we’re going.