Skip to content →

Category: network

The Twittering Machine: A Network of Accelerants & Silences

paulkleetwitteringmachine

In 1922, the Artist Paul Klee completed a work entitled Die Zwitscher-Maschine, which has been translated into English as The Twittering Machine. The work is part of the Museum of Modern Art’s collection. The catalog description delves beneath the surface interpretation of a machine for making pleasant bird sounds:

Upon closer inspection, however, an uneasy sensation of looming menace begins to manifest itself. Composed of a wiry, nervous line, these creatures bear a resemblance to birds only in their beaks and feathered silhouettes; they appear closer to deformations of nature. The hand crank conjures up the idea that this “machine” is a music box, where the birds function as bait to lure victims to the pit over which the machine hovers. We can imagine the fiendish cacophony made by the shrieking birds, their legs drawn thin and taut as they strain against the machine to which they are fused.

I’d like to take a moment to delve beneath the surface of the machinery that makes up the micro-messaging ecosystem. The micro-messaging service Twitter approaches a kind of frictionless channel for messaging. Everything about it seems to be built for growth and speed. After the substantial speed bump of signing up and orienting yourself in the system, both listening for, and creating messages are very simple. Select the other people (and pseudo-people) you’d like to follow, type fewer than 140 characters of hypertext into a text field and press update.

It’s been noted many times that the follow social structure – the directed social graph – allows for the rapid expansion of social linking. A participant is able to follow many others without the requirement of reciprocity. I follow you, you don’t have to follow me. And the retweet has emerged as a method of transmitting messages across multiple overlapping social graphs. Hash tags have become a conventional method of indicating a message tied to a particular event. All of these tools are dedicated to the acceleration of the growth of the Twitter network. Twitter’s trending topics and search functionality allow users to find high-velocity memes as they begin to achieve broad circulation through the social mesh.

Examples of the benefits of the speed of the Twitter network abound – news about the earthquake in China, the plane landing on the Hudson River, reports on wild fires in Southern California, etc. The news media, feeling somewhat usurped here, has also brought the negative aspects of this lack of friction in the system. Usually this kind of story is meant to point to the filtering role of their own editorial facility. The New York Times put a Twitter contretemps involving Stephen Fry in the first section of their newspaper.

…that little tweet set off a frenzy of vitriolic attacks and counterattacks on Twitter, drawing an untold number of people into an increasingly charged debate and thrusting brumplum — in reality a man from Birmingham, England, named Richard — unhappily into the public’s angry glare. It was an example once again of the extraordinary power of Twitter to distribute information and to sway the opinions of vast groups of people in tiny amounts of time.

While the frictionless micro-messaging environment can accelerate important, or amusing, messages (news, stories, jokes, musings), it can also assemble and ignite an angry mob at lightning speed. And if we look at the tool set we’re offered, everything is oriented toward accelerating people, memes and the growth of the Twitter network. In this frame, value is equated with high velocity and numbers of retweets, likes, mentions, @replies, followers and now, list memberships. We’re looking for what, or who, is going viral.

But if we examine the often banal items that achieve virality, we have to question the value = virality equation. Often the high numbers are a result of lowest-common denominator dynamics, it’s not the cream rising to the top. There are certain kinds of viral items that we’d prefer to be vaccinated against. We’d like a micro-messaging Center for Disease Control warning us about time-wasting viral memes spreading through the Network. Where are the tools to retard the spread of a meme? Where’s the don’t like, or the visible gesture of hiding something from your messaging stream. It’s as though we’ve put a poll in the field that only asks for a positive response and excludes all negative reaction. Feedback loops require both positive and negative inputs.

Feedback is a mechanism, process or signal that is looped back to control a system within itself. Such a loop is called a feedback loop. Intuitively many systems have an obvious input and output; feeding back part of the output so as to increase the input is positive feedback; feeding back part of the output in such a way as to partially oppose the input is negative feedback.

Negative feedback helps to maintain stability in a system in spite of external changes. It is related to homeostasis. For example, in a population of foxes (predators) and rabbits (prey), an increase in the number of foxes will cause a reduction in the number of rabbits; the smaller rabbit population will sustain fewer foxes, and the fox population will fall back. In an electronic amplifier feeding back a negative copy of the output to the input will tend to cancel distortion, making the output a more accurate replica of the input signal.

Positive feedback amplifies possibilities of divergences (evolution, change of goals); it is the condition to change, evolution, growth; it gives the system the ability to access new points of equilibrium.

One method of judging the relative merit of the memes circulating through the stream is to pay close attention to the silences, the negative gestures. While the wisdom of crowds may have crowned an item the real-time meme of the moment, there’s a simple way to filter for value. Using a small portfolio (lists, if you will) of people who’s opinion you respect – look to see if they remain silent on a topic. In the task of discovering value, this kind of silence is golden.

In the early stages of growth, accelerants are essential. As a Network matures, unless it develops a deeper tool set, it simply becomes a twittering machine. The value it appears to create is illusory, and so the commons begins its descent to knee-jerk reactions to the high numbers generated by the lowest common denominator. Perhaps the inevitable result is that overlapping publics contract and the social space becomes a much more private circulatory system. The crucible of dispute, debate and dialogue that produces real value may only emerge away from the public network of accelerants where the social contract allows such differences (both positive and negative feedback). One of the better statements of this kind of contract was for the Nettime mailing list:

Nettime was vector for experimenting with net critique that would confront it with the possibility of inventing new forms of discourse and dialogue in a new medium. Consensus is not the goal. There’s no governing fantasy according to which the differences within this ‘group’ will on some ever-deferred day be resolved. the differences are Nettime; they might be dialectical, implying each other, or they might be differential, making absolutely no reference whatsoever to each others’ terms. Net critique, if understood as a shared practice in and against a never pre-defined techno-local environment, contains many modes of possible participation.

In navigating the electrical storms and fires of the micro-messaging Network, we’d do well to have some tools in our kit in addition to that can of gasoline.

gas_can

4 Comments

Shadows & Light: Privacy in the Panopticon

Searchlight

Before the turn of the millennium, Scott McNealy declared privacy dead:

The chief executive officer of Sun Microsystems said Monday that consumer privacy issues are a “red herring.”

“You have zero privacy anyway,” Scott McNealy told a group of reporters and analysts Monday night at an event to launch his company’s new Jini technology.

“Get over it.”

McNealy’s comments came only hours after competitor Intel (INTC) reversed course under pressure and disabled identification features in its forthcoming Pentium III chip.

At one time, privacy was a function of a general laziness and the unlinked quality of information. While there may have been lots of publicly available information about a person, it was rather difficult to track down and assemble. We’ve developed a whole mythology around the kind of person who can root out the details about a person and put the pieces together into a picture that makes some kind of sense.

humphrey-bogart

There was a kind of power in the invisibility we once had. Oddly, it was a kind of anonymity that was derived from the density of the urban environment. The city was a place you could go to get lost, to start over, to create a new identity. That’s why it took a detective to find the traces and clues that filled out the picture of a person. Today, that kind of invisibility has mostly vanished. If I want to know something about Sergey Brin, I can use any number of services that will scour the Network looking of publicly available information, and then I can pay for information that’s more obscure or privately held. Shoe leather is no longer a requirement.

Just as there’s a kind of ‘security through obscurity,’ there was a kind of privacy through obscurity. The methods by which information about a person used to be stored were enshrouded in shadow, even darkness. One piece of information wasn’t linked to the next. The trail was obscured, you had to stumble through the darkness to get from one piece of information to the next. Now information is linked into a web– it’s created, searched, and collated. In the UK, surveillance cameras are used to create a visual real-time mesh of video that can track you through your day. You are being recorded, it’s just a question of whether anyone is currently looking at the data or not.

…under a law enacted in 2000 to regulate surveillance powers, it is legal for localities to follow residents secretly. Local governments regularly use these surveillance powers — which they “self-authorize,â€? without oversight from judges or law enforcement officers — to investigate malfeasance like illegally dumping industrial waste, loan-sharking and falsely claiming welfare benefits.

The private moment, that little space between this and that, the in-between time when no one is looking— this invisible space is growing smaller and smaller, the more connected we become. Privacy through obscurity is no longer a dependable strategy. The things that were hidden in plain sight, are now easily found.

There is some data that remains private. Our medical records and financial records are two examples of personal data that is actively encrypted and kept private. Generally a court order is required to pry open these vaults of information. In some sense, that’s the new definition of privacy. It’s data that can be accessed by the individual, the data custodian, and, by court order, the government. In addition, should this data inadvertently leak out from the data custodian, the individual has a well-established legal recourse against the custodian.

In order for the private to remain truly secret, it would need to be unconnected. As the connections between us are made visible by our electronically networked environment, we begin to see that we have always inhabited networks of one kind or another. To be unconnected to all networks is to no longer be among the living. The private is something that we are prohibited from sharing based on a social or legal contract. Viewed as a system, the private requires more energy to maintain its contracts regarding the non-sharing of information. Linking private personal data among private systems of record while still honoring the non-sharing contract takes even more energy. The network itself doesn’t distinguish between private and public information packets.

Gregory (Scotland Yard detective): “Is there any other point to which you would wish to draw my attention?”
Holmes: “To the curious incident of the dog in the night-time.”
Gregory: “The dog did nothing in the night-time.”
Holmes: “That was the curious incident.”

And just as we can deduce the nature of hidden facts based on the dog who didn’t bark in the night, the private can often be deduced by correlating public gestures/connections to and through the locus of personal identity. But privacy isn’t dead, it’s just as it always was– an agreement among a group of people to enact useful boundaries on the sharing of information.

Comments closed

Real-Time Collaboration, Serious Play and the Enterprise

dali-clock

With the advent of Windows 7 and the upgrades to the MS Office franchise, the talk is that there’ll be a big round of corporate upgrades. Many corporations are still running Windows XP, Internet Explorer 6.x and Office 2003 (or lower). Vista didn’t tempt them, but the good press for Windows 7 is supposed to do the trick. After all, they have to upgrade at some point, right?

If corporate America takes the plunge, one has to wonder if this will be the last upgrade cycle of this kind. The distribution and installation of software on to desktop and laptop computers is a messy business. Businesses require a very compelling reason to upgrade given the current model.

Google has put forward the model of the browser as operating system by working backwards from the Chrome browser to the Chrome OS. The integration of the Office Suite into the hardware starts in the cloud and moves to the local machine. When Microsoft tried a similar move in the other direction, the government stepped in.

Both Google and Microsoft have developed cloud-based Office Suite offerings moving from opposite directions. Looking down the road a bit, we can see that the next upgrade cycle will be “software + services” for Microsoft, and “services + software” for Google. The obvious motivation will be cloud-based software’s cost savings over the current model of distribution, installation, compatibility, upgrade and service of software installed on a local system. The sheer cost and pain of a firm-wide software upgrade is so frightening that most corporations defer it as long as possible. It’s entirely possible that some firms will skip the last installation and jump directly to the cloud.

Collaboration within the enterprise takes place via email, attached documents and shared network drives. The productivity software footprint defines the boundaries of the modes of collaboration. The big real-time innovation was the introduction of mobile push email via the Blackberry. This innovation reduced latency in the work process by detaching email from the desktop and allowing it to accompany a person wherever she might go. The introduction of Sharepoint and network-stored group editable documents is slowly seeping into the work process. But most corporate workers don’t know how to collaborate outside of the existing models of Microsoft’s Office products. Generally, this just an acceleration of the switch from production of hard copies to soft copies (typewriters to word processors). When confronted with Sharepoint, they view it as a new front-end to shared network drives, a different kind of filing cabinet.

Meanwhile in the so-called consumer space, Facebook, Twitter and a host of real-time social media services have radically reduced the latency of group communication and collaboration. In addition to text– photos, audio and video have begun to play an important role in this collaboration stream. For the most part the corporate computing environment has been left behind. This is due to two factors, the desire to maintain a certain kind of command and control of information construction and distribution within the walls of the corporation; and the desire of IT departments to avoid risk by maintaining a legacy architecture. The real-time productivity of the Blackberry has been working its way down from the top of organizations; but the tool set remains the word processor, powerpoint and excel. The only accelerant in the mix is faster mobile email of soft copies of documents.

Ray Ozzie discusses the “3 screens and a cloud” model as the pattern for the development of human-computer interactions across both the consumer and enterprise computing spaces. The missing element from this model is the input device, screens are no longer simply an interface for reading. Bits are moving in both directions, and email is being de-centered as the primary message carrier.

As we look at innovations like Yammer and Google Wave, the question becomes how will the corporate worker learn how to collaborate in real time? Accelerating network-stored documents and their transmittal via email moves the current model to near maximum efficiency. Further productivity gains will need to expand and change the model. Generally these kinds of innovations enter through the back door, or through a skunk works project, within small autonomous teams. But at some point, the bottom up innovation needs top down acceptance and support.

Luke Hohman of Enthiosys works with the concept of serious games in the management and development of software products. The collaboration processes he describes in his presentation to BayCHI may be the foundation for real-time collaboration throughout the enterprise.

The lessons that we can take from Twitter and Facebook are that the leap to real-time collaboration is not one that requires a 4-year college degree and specialized training. It’s not an elite mode of interaction that needs to work its way down from the executive leadership team. It’s an increasingly ordinary mode of interaction that simply needs to be unleashed within the enterprise. But for that to happen, the enterprise will need to learn how to incorporate self-organizing activity. (Oh, and let employees use the video camera and microphone built in to their hardware) This will be a difficult move because the very foundation of the corporation itself is the creation and optimization of managed hierarchical organizational structures. It’s only when the activity of serious play can be reconciled with return on investment that the enterprise will come to terms with real-time collaboration.

One Comment

The Loopiness of Identity

mobius_strip

We’ve perhaps thought of our lives as a story with a beginning, a middle and an end. We’ve thought of our identity as the vessel that traces that path from the starting point to the endpoint. From Descartes we import the idea that our identity can be reduced to single point and be put in opposition to the world. All of an individual’s connections to the world can be snipped, one by one, through the use of radical doubt and skepticism. The doubting, questioning voice is the remainder– by process of elimination, it is human identity. But it is identity without context, without world. It’s nowhere.

This idea continues to play out in the story of the rugged individualist. The person to whom no connection cannot be cut, and no connection is essential. Culture, society and government have no hold on this person, he does as he chooses regardless of the ties that bind. It’s in the film genre of the Western that this story is most completely explored. The man at the edge of society, called on to save society, nonetheless he’s not part of the network of connections that make up society. In John Ford’s The Searchers, Ethan Edwards (as portrayed by John Wayne), his mission complete, doesn’t join the family circle, but instead walks out into the deserted plain alone.

Another formulation was provided by Groucho Marx in a telegram he sent to the Friar’s Club of Beverly Hills:

“PLEASE ACCEPT MY RESIGNATION. I DON’T WANT TO BELONG TO ANY CLUB THAT WILL ACCEPT PEOPLE LIKE ME AS A MEMBER”

In this narrative, our identity is not defined by our difference, but by our capacity for disconnection. However, as we begin to surface in the Network, we find ourselves in a landscape composed entirely of connections. While some connections are private and some public, unconnected nodes are a contradiction in terms. In some sense, we view it as problematic that our identity is splintered across so many containers. We’d like to connect up all the pieces to create some whole that we might call our internet identity. We look at all those things scattered about and say: those are mine, or those are me.

fruit-loops-posters

And here’s where we come to the loopiness of identity. We often talk of internet identity as the assignment, and use, of a unique identifier for individual agency. Some fixed token that can serve to differentiate an individual from all other individuals in a name space. But there’s a different sense of identity emerging in the Network. In any number of different online services we see an image of ourselves beginning to come into focus. Social networks provide an obvious example, but these data images also are forming based on our financial data, our medical records, and our purchase histories. There are traces of us everywhere.

We might use an iPod and a special Nike sneaker to establish and update a data loop that models our exercise activity. Our investment portfolio or 401k models our financial state. Perhaps we use a bathroom scale that sends data to a system that tracks the fluctuations in our weight. Or we collect data on how well we sleep at night and transmit it to a system that puts it into the context of other sleepers. In the public sphere, we might contribute to blogs, microblogs and comment systems. The identity we take part in creating unfolds over time, it’s a feedback loop that grows and deepens.

This is where identity and digital product begin to merge. This idea occurred to me while listening to a recording of Adam Bosworth talk about his new health maintenance company Keas. More and more companies are seeking customers who will participate in the creation of an identity loop. As someone who as spent a fair amount of time trying to interest employees in participating in their 401ks, I understand that some loops are very attractive and others are like eating your vegetables. And while this looks like an evolution of the idea of  CRM, perhaps a system where customers also have an account; it might well take the form of VRM or Purpose-Centric web browsing. The core requirement is that data has to come from both sides of the glass with a sense of joint ownership of the loop.

And that’s where we loop back to the identity of the rugged individual. This kind of “connecting” behavior seems to run counter to cultural patterns. Rather than seeking to deepen loops of engagement, we tend to define our identity by what we can disconnect ourselves from (privacy). And the loops we’re most familiar with are the neurotic ones — addiction, compulsion, binging and purging. As our material digital identities begin to emerge in the Network around us, it will be interesting to see whether we will establish ecosystems and engage them in healthy feedback loops, or whether we will reverse course entirely and outlaw them as an invasion of privacy and as inconsistent with our cultural mores.

One Comment