Skip to content →

Category: media

Real-Time Networks, Man-In-The-Middle, And The Misappropriation Of ‘Hot News’

Google and Twitter have filed a amicus brief with the appeals court on TheFlyOnTheWall.com case. Briefly, at issue is FlyOnTheWall’s near real-time redistribution of investment bank research ratings. Investment bank research departments spend time, money and resources creating stock ratings and price targets. The purpose of this effort is to create an information asymmetry in the market to the advantage of the i-bank’s clients. FlyOnTheWall does not employ analysts and has no research capability, it discovers stock ratings, aggregates and redistributes them in near real time. Since their cost of production only includes real-time redistribution infrastructure, and therefore they can offer their high-value information feeds at a lower cost than investment banks. Subscribers to FlyOnTheWall pay for these aggregated news feeds, they aren’t free. In their testimony, FlyOnTheWall claimed they only gathered information from publicly available sources and only published tweet-sized snippets summarizing the reports.

Google and Twitter make the following argument in their brief:

News reporting always has been a complex ecosystem, where what is ‘news’ is often driven by certain influential news organizations, with others republishing or broadcasting those facts — all to the benefit of the public,

and further

How, for example, would a court pick a time period during which facts about the recent Times Square bombing attempt would be non-reportable by others?”

At issue is the re-emergence of the hot news doctrine, which was originally put in place in 1918 to stop William Randolf Hearst’s International News Service from taking Associated Press wire news stories and redistributing them as their own. The court set forth five criteria to determine whether ‘hot news’ has been misappropriated:

(i) a plaintiff generates or gathers information at a cost;

(ii) the information is time-sensitive;

(iii) a defendant’s use of the information constitutes free riding on the plaintiff’s efforts;

(iv) the defendant is in direct competition with a product or service offered by the plaintiffs;

(v) the ability of other parties to free-ride on the efforts of the plaintiff or others would so reduce the incentive to produce the product or service that its existence or quality would be substantially threatened.

In the case of TheFlyOnTheWall.com the court ruled for the plaintiffs, Barclays, Merrill Lynch and Morgan Stanley, and decided that a 2 hour embargo was a reasonable amount of latency to build into the Network. In the fast-paced world of equity trading, two hours is an eternity. These days trades are often executed in a matter of milliseconds. The enforcement of this kind of rule, however, is problematic. In the brave new world of social media, both individuals and news organizations have interconnected real-time distribution networks. Once bits of information touch this public social network they can spread with breathtaking speed. Twitter, Google and Facebook are currently the media through which this information is dispersed. And each of them can be said to profit by the circulation of high-value information through their networks.

Over the last few days we’ve seen the drama of General Stanley A. McChrystal play out. The events were put into play by a story written by Michael Hastings, a freelancer for Rolling Stone Magazine. The story about McChrystal’s comments began leaking out Monday night. Both Politico and Time magazine posted a PDF of the Rolling Stone article to their web sites before Rolling Stone. Rolling Stone asked the sites to remove the PDF. The New York Times reports:

Will Dana, the magazine’s managing editor, said that the magazine did not always post articles online because it could make more money at the newsstand and that when it did, the articles were typically not posted until Wednesday. But other news organizations made that decision for him.

The McChrystal story is an interesting example of the ‘hot news’ doctrine. Rolling Stone magazine puts out 26 issues of its print magazine per year. Even before the issue hit the newsstands, it dominated cable news, has been fully reported in the New York Times and resulted in McChrystal’s resignation and replacement by General David Petraeus. One could argue that Rolling Stone should have a business model that allows them to benefit from these kind of real-time events. And it’s quite possible that the broad dissemination of this story will lead to a significant increase in newsstand sales and web site traffic.

In this case the ‘hot news’ was so hot that the story itself became a story. Major government policies regarding the conduct of the war in Afghanistan had to be decided in real time. There was no hesitation, no waiting for Rolling Stone’s newsstand business model to play out. By the time we finally see the printed magazine it will have become an artifact of history. With the advantage of hindsight, we may even wonder why the headline writer put McChrystal’s story third after Lady Gaga’s tell all and the final days of Dennis Hopper.

The question about the ‘hot news’ doctrine isn’t going away; and the decision of the appeals court will be closely watched. In the meanwhile, the marketplace is searching for a solution to the fact of real-time aggregation and relay of digitally-copied work product. The return of the pay wall is an attempt by producers of stories about the news to create a firewall around their work product. Most corporations employ a firewall to keep their valuable internal discussion from reaching the public networks. Limiting access of your product to paying customers isn’t a new idea. However, when your work product is a story about news events or ideas encoded in digital media, creating reliable access controls is problematic. Where in the early days of the Network the focus was on direct access and disintermediation of the middle man; now the economics favor the man-in-the-middle. Meta-data can be sold at a fraction of the price of the data to which it points. The complex ecosystem of ‘the news’ is looking for a new equilibrium in which both data and meta-data can flourish.

2 Comments

Apple’s UX Strategy: I Want To Hold Your Hand

A few thoughts about the iPhone 4 and why technology does or doesn’t catch on. I’ve yet to hold one in my hand, but like everyone else I’ve got opinions. The typical gadget review takes the device’s feature list and compares using technical measures to other devices deemed competitive. Using this methodology, it would be fairly simple to dismiss the iPhone as introducing no new features. The other lines of attack involve dropped calls on the AT&T network and the App Store approval process. For some people these two items trump any feature or user experience.

Google talks about their mission as organizing the world’s information. When I think of Apple’s mission, at least their mission for the last five years or so, it revolves around getting closer to the user in real time. The technology they build flows from that principle.

I’d like to focus on just two new iPhone 4 features. The first is the new display, here’s John Gruber’s description:

It’s mentioned briefly in Apple’s promotional video about the design of the iPhone 4, but they’re using a new production process that effectively fuses the LCD and touchscreen — there is no longer any air between the two. One result of this is that the iPhone 4 should be impervious to this dust-under-the-glass issue. More importantly, though, is that it looks better. The effect is that the pixels appear to be painted on the surface of the phone; instead of looking at pixels under glass, it’s like looking at pixels on glass. Combined with the incredibly high pixel density, the overall effect is like “live print�.

The phrase that jumped out at me was “the pixels appear to be painted on the surface of the phone; instead of looking at pixels under glass.” While it seems like a small distance, a minor detail, it’s of the utmost importance. It’s the difference between touching something and touching the glass that stands in front of something. Putting the user physically in touch with the interaction surface is a major breakthrough in the emotional value of the user experience. Of course the engineering that made this kind of display is important, but it’s the design decision to get the device ever closer to the user that drove the creation of the technology. Touch creates an emotional relationship with the device, and that makes it more than just a telephone.

In a 2007 interview at the D5 conference, Steve Jobs said:

And, you know, I think of most things in life as either a Bob Dylan or a Beatles song, but there’s that one line in that one Beatles song, “you and I have memories longer than the road that stretches out ahead.

You could say that Apple’s strategy is encapsulated in the Beatles song: I Want To Hold Your Hand.

The lines that describe the feeling Jobs wants the iPhone and iPad to create are:

And when I touch you i feel happy, inside
It´s such a feeling
That my love
I can’t hide
I can’t hide
I can’t hide

The other new feature is FaceTime. Since the launch of the iPhone 3GS it’s been possible to shoot a video of something and then email it to someone, or post it to a network location that friends and family could access. Other phones had this same capability. That’s a real nice feature in an asynchronous sort of way. One of the problems with it is it has too many steps and it doesn’t work the way telephones work. Except when things are highly dysfunctional, we don’t send each other recorded audio messages to be retrieved later at a convenient time. We want to talk in real time. FaceTime allows talk + visuals in real time.

FaceTime uses phone numbers as the identity layer and works over WiFi with iPhone 4 devices only. That makes it perfectly clear under what circumstances these kind of video calls will work. Device model and kind of connectivity are only things a user needs to know. These constraints sound very limiting, but they dispel any ambiguity around the question of whether the user will be able to get video calls to work or not.

We often look to the network effect to explain the success of a product or a new platform. Has the product reached critical mass, where by virtue of its size and connectedness it continues to expand because new users gain immediate value from its scale. The network must absolutely be in place, but as we look at this window into our new virtual world, the question is: does the product put us in touch, in high definition, in real time? The more FaceTime calls that are made, the more FaceTime calls will be made. But the system will provide full value at the point when a few family members can talk to each other. Critical mass occurs at two.

Comments closed

The Enculturation of the Network: Totem and Taboo

Thinking about what it might mean to stand at the intersection of technology and the humanities has resulted in an exploration with a very circuitous route.

The Network has been infused with humanity, with every aspect of human character— the bright possibilities and the tragic flaws.

On May 29, 1919, Arthur Stanley Eddington took some photographs of a total eclipse of the sun. Eddington had gone to Africa to conduct an experiment that might determine whether Newton’s or Einstein’s model was closer to physical reality.

During the eclipse, he took pictures of the stars in the region around the Sun. According to the theory of general relativity, stars with light rays that passed near the Sun would appear to have been slightly shifted because their light had been curved by its gravitational field. This effect is noticeable only during eclipses, since otherwise the Sun’s brightness obscures the affected stars. Eddington showed that Newtonian gravitation could be interpreted to predict half the shift predicted by Einstein.

My understanding of the physics is rather shallow, my interest is more in the metaphorics— in how the word-pictures we use to describe and think about the universe changed based on a photograph. Where the universe lined up nicely on a grid before the photograph, afterwards, space became curvaceous. Mass and gravity bent the space that light passed through. Assumed constants moved into the category of relativity.

The Network also appears to be composed of a neutral grid, its name space, through which passes what we generically call payloads of “content.” Each location has a unique identifier; the only requirement for adding a location is that its name not already be in use. You can’t stand where someone is already standing unless you displace them. No central authority examines the suitability of the node’s payload prior to its addition to the Network.

The universe of these location names is expanding at an accelerating rate. The number of addresses on the Network quickly outstripped our ability to both put them into a curated index and use, or even understand, that index. Search engines put as much of the Network as they can spider into the index and then use software algorithms to a determine a priority order of the contents of the index based on keyword queries. The search engine itself attempts to be a neutral medium through with the nodes of the Network are prioritized based on user query input.

Regardless of the query asked, the method of deriving the list of prioritized results is the same. The method and production cost for each query is identical. This kind of equal handling of Network nodes with regard to user queries is the search engine equivalent of freedom, opportunity and meritocracy for those adding and updating nodes on the Network. The algorithms operate without prejudice.

The differential value of the queries and prioritized link lists is derived through an auction process. The cost of producing each query/result set is the same—it is a commodity—but the price of buying advertising is determined by the intensity of the advertiser’s desire. The economics of the Network requires that we develop strategies for versioning digital commodities and enable pricing systems linked to desire rather than cost of production. Our discussions about “Free” have to do with cost-based pricing for digital information goods. However, it’s by overlaying a map of our desires on to the digital commodity that we start to see the contours, the curvaceousness of this space, the segments where versioning can occur.

We’ve posited that the search algorithm treats all nodes on the Network equally. And more and more, we take the Network to be a medium that can fully represent human life. In fact, through various augmented reality applications, human reality and the Network are sometimes combined into a synthetic blend (medium and message). Implicitly we also seem to be asserting a kind of isomorphism between human life and the Network. For instance, sometimes we’ll say that on the Network, we “publish everything, and filter later.” The gist of this aphorism is that where there are economics of low-or-no-cost production, there’s no need to filter for quality in advance of production and transfer to the Network. Everything can be re-produced on the Network and then sorted out later. But when we use the word “everything,” do we really mean everything?

The neutral medium of the Network allows us to disregard the payload of contents. Everything is equivalent. A comparison could be made to the medium of language— anything can be expressed. But as the Network becomes more social, we begin to see the shape of our society emerge within the graph of nodes. Sigmund Freud, in his 1913 book entitled Totem and Taboo, looks at the markers that we place on the border of what is considered socially acceptable behavior. Ostensibly, the book examines the resemblances between the mental life of savages and neurotics. (You’ll need to disregard the archaic attitudes regarding non-European cultures)

We should certainly not expect that the sexual life of these poor, naked cannibals would be moral in our sense or that their sexual instincts would be subjected to any great degree of restriction. Yet we find that they set before themselves with the most scrupulous care and the most painful severity the aim of avoiding incestuous sexual relations. Indeed, their whole social organization seems to serve that purpose or to have been brought into relation with its attainment.

Freud is pointing to the idea that social organization, while certainly containing positive gestures, reserves its use of laws, restrictions and mores for the negative gesture. The structure of societal organization to a large extent rests on what is excluded, what is not allowed. He finds this common characteristic in otherwise very diverse socio-cultural groups. Totems and taboos bend and structure the space that our culture passes through.

In the safesearch filters employed by search engines we can see the ego, id and superego play out their roles. When we search for transgressive content, we remove all filtering. But presumably, we do, as a member of a society, filter everything before we re-produce it on the Network. Our “unfiltered” content payloads are pre-filtered through our social contract. Part of the uncomfortableness we have with the Network is that once transgressive material is embodied in the Network, the algorithms disregard any difference between the social and the anti-social. A boundary that is plainly visible to the human— and is in fact a structural component of its identity and society, is invisible to the machine. Every node on the Network is processed identically through the algorithm.

This issue has also been raised in discussions about the possibility of artificial intelligence. In his book Mirror Worlds, David Gelernter discusses a key difference between human memory and machine memory:

Well for one thing, certain memories make you feel good. The original experience included a “feeling good” sensation, and so the tape has “feel good” recorded on it, and when you recall the memory— you feel good. And likewise, one reason you choose (or unconsciously decide) not to recall certain memories is that they have “feel bad” recorded on them, and so remembering them makes you feel bad.

But obviously, the software version of remembering has no emotional compass. To some extent, that’s good: Software won’t suppress, repress or forget some illuminating case because (say) it made a complete fool of itself when the case was first presented. Objectivity is powerful.

Objectivity is very powerful. Part of that power lies in not being subject to personal foibles and follies with regard to the handling, sorting, connecting and prioritizing of data. The dark side of that power is that the objectivity of the algorithm is not subject to social prohibitions either. They simply don’t register. To some extent technology views society and culture as a form of exception processing, a hack grafted on to the system. As the Network is enculturated, we are faced with the stark visibility of terrorism, perversity, criminality, and prejudice. On the Network, everything is just one click away. Transgression isn’t hidden in the darkness. On the Network, the light has not yet been divided from the darkness. In its neutrality there is a sort of flatness, a lack of dimensionality and perspective. There’s no chiaroscuro to provide a sense of volume, emotion, limit and mystery.

And finally here’s the link back to the starting point of this exploration. A kind of libertarian connection has been made between the neutral quality of the medium of the Network and our experience of freedom in a democratic republic. The machine-like disregard for human mores and cultural practices is held up as virtue and example for human behavior. No limits can be imposed on the payloads attached to any node of the Network. The libertarian view might be stated that the fewest number of limitations should be applied to payloads while still maintaining some semblance of society. Freud is instructive here: our society is fundamentally defined by what we exclude, by what we leave out, and by what we push out. While our society is more and more inclusive, everything is not included. Mass and gravity bend the space that light passes through.

The major debates on the Network seem to line up with the contours of this pattern. China excludes Google and Google excludes China. Pornographic applications are banished from Apple’s AppStore. Android excludes nothing. Closed is excluded by Open, Open is included by Closed. Spam wants to be included, users want to exclude spam. Anonymous commenters and trolls should be excluded. Facebook must decide what the limits of speech are within the confines of its domain. The open internet excludes nothing. Facebook has excluded the wrong thing. The open internet has a right to make your trade secrets visible. As any node on the Network becomes a potential node in Facebook’s social/semantic graph, are there nodes that should be taboo? How do we build a civil society within the neutral medium of the Network? Can a society exist in which nothing is excluded?

In the early days of the Network, it was owned and occupied by technologists and scientists. The rest of humanity was excluded. As the Network absorbs new tribes and a broader array of participants, its character and its social contract has changed. It’s a signal of a power shift, a dramatic change in the landscape. And if you happen to be standing at the crossroads of technology and the humanities, you might have a pretty good view of where we’re going.

One Comment

Tailgating Apple

The philosopher George Santayana’s aphorism: “Those who cannot remember the past are condemned to repeat it” seems to underlie many of the stories bubbling up around the leap from fixed computing to mobile computing. Especially with regard to Apple’s role in forming the ecosystem, the market and some of the decisions they’ve taken about what to leave behind. Santayana’s aphorism has been restated in a number of ways, another popular formulation is: “Those who cannot learn from history are doomed to repeat it.” At any rate, there’s an implication that history, the past, should never be repeated— doing so is the occupation of the doomed. There’s also a sense of coming upon a node, as we move through time, that contains the possibility of looping back to a previously experienced stretch of history. Although we don’t replay it note for note, the chord changes seem follow the same pattern.

There are two stories that run through the minds of observers:

1. The Apple and Microsoft story. An integrated computing system that pushed the boundaries of human-computer interaction into the realm of usefulness, and the lower-cost modular computing system (DOS paired with any manufacturer) that provided a ‘good enough’ experience and a solid return on investment. In the end, Microsoft’s Windows became the dominant personal and business computing platform.

2. The Monopoly and Anti-Trust story. From its position of market dominance, Microsoft used its position to maintain power. The law is fine with the use of soft power (you choose it because it’s best, whatever best means to you); but steps in when hard power is exercised (you choose it because it’s the only choice). A settlement was reached: Microsoft’s brand suffered damage, some APIs were opened up and market dominance was largely maintained. The second act of this story has developers starting to route around Microsoft by creating cloud-based applications of ever-increasing sophistication.

And so, as the mobile computing space comes into focus we see:

1. Apple and iPhone/iPad Touch/iPad as an integrated platform and device

2. Google and Android/Chrome across multiple manufacturers

3. Microsoft and Silverlight/Windows Phone across multiple manufacturers

Tech pundits expect an exact replay of The Apple and Microsoft story. Although, Google has been cast in the role of Microsoft this time. Steve Jobs, they say, has not learned from history. Apple will eventually be overtaken by a more “open” and commodified horizontal platform. On the other hand, both Google and Microsoft have learned from Apple and have bought in to integrated design practices while maintaining a multiple-manufacturer production model. And while Apple is thought to be repeating its mistakes on the one hand, on the other, they’ve been cast in the role of Microsoft based on their dominance and control of the new mobile market. On a recent Gillmor Gang, Blaine Cook suggested that Apple is courting an anti-trust action based on their recent behavior. The implication being that there is no choice but the iPhone/iPad, and that competition is hindered by Apple controlling their own device platform.

Google and Microsoft have understood that more control and tighter design integration will be required to compete with Apple. Google has started down that road with the Nexus One. Microsoft, with their Windows Phone 7 announcements, have shown that they’ll be moving in the same direction. They’re very fast followers, some might even say they’re tailgating Apple. As in any race, drafting into the slipstream of the leader provides many advantages.

The term “slipstreaming” describes an object traveling inside the slipstream of another object (most often objects moving through the air though not necessarily flying). If an object is inside the slipstream behind another object, moving at the same speed, the rear object will require less power to maintain its speed than if it were moving independently. In addition, the leading object will be able to move faster than it could independently because the rear object reduces the effect of the low-pressure region on the leading object.

A fast follower wants to put himself into the position to execute a slingshot pass. By drafting in behind the market leader, the follower can exert less energy while keeping pace. The slingshot allows the follower to generate passing speed by optimizing the aerodynamics of their relative positions. The leader wants to adjust position to block this kind of move. The analysis and play-by-play has been based entirely on the assumption the lessons of history have been locked in, and this new race will play out with exactly the same dynamics. The lesson Apple may have learned is that a post-PC approach and strong portfolio of patents could change the outcome of some key points of the narrative.

A subplot to the main story involves Adobe and its Flash runtime. Adobe’s Flash is playing the role of Netscape in the current transition. Although Hal Varian was referring to Netscape in his 1999 book Information Rules, the thought applies equally well to Adobe. They face a classic problem of interconnection. Their competitors control the operating environment in which they are but one component. Adobe owes its current level of success in the fixed computing environment to Microsoft’s dominance.

At a key point, Microsoft had no competitive product and agreed to distribute the Flash runtime along with its operating system and browser. This put Flash on a high percentage of the installed personal computing user base. This kind of market penetration probably could not have been achieved if users had been required to download and install the plugin on their own. Once the Flash player was in place, apps could be pushed over the wire, and there was a high likelihood that they would operate. The Flash runtime could even update itself once it was established on the local Windows machine. The Macintosh and Linux platforms were filled in by Adobe, but were given a much lower priority based on market share.

Adobe has two problems in this transitional environment. The first is that their competitors control both their operating environment— and the distribution channel. Secondly, where they once had a willing partner, Microsoft now has Silverlight which competes directly. Because Adobe has had a high penetration percentage, they claim as much a 99%, they feel entitled to ship with any new operating environment. It used to be that way, but things have changed. The problem that Adobe’s Flash solved now has other solutions in each of the mobile stacks.

In the post-PC mobile computing world all of the original assumptions and agreements are being reassessed. This new environment isn’t an extension or an evolution of the fixed desktop environment– the blackboard has been erased and the project has been built up from scratch. That means you don’t assume Adobe’s Flash runtime, you don’t even assume copy and paste, multi-tasking or a file system.  The first couple of things you might put on the blackboard are 10 hour battery life and always-on wireless network connectivity— that’s what makes the device usable in a mobile context. From there we can add location and streaming services, real-time responsiveness and the rest. But it’s battery life that’s the limiting factor. It’s the invisible tether that eventually draws us back to the power source to recharge. Where silicon once ruled, we now look to lithium.

The assumption that history will repeat itself relieves us of the burden of figuring out what’s going on, of understanding out the differences that make a difference. No doubt some threads of history will repeat themselves, but they may not be the ones we expect. When we come upon a node, as we move through time, a moment that contains the possibility of looping back to a previously experienced stretch of history. We also have the opportunity to take a familiar melody and go off and explore unexpected directions.

One Comment