Skip to content →

Category: real time web

The Undead and the Trailing Edge

Steampunk-laptop_2

The “meta” formation of the old saw of technology journalism is to say that “calling technology ‘X’ dead, is dead.” In its most entertaining usages, the “is dead” formulation refers to a disruptive change in the infrastructure of computer technology. It’s a way to tell the story of changing fortunes in the feudal kingdoms that have come to dominate our technology landscape. There’s a fierce battle for the tip of the spear. These kingdoms have variously been called platforms or technology ecosystems. And rather than the use of force, we see our personal stories rewritten such that it’s impossible to imagine living without the devices and services delivered, like clockwork, each day to the leading edge.

moocimage

Technologist and hands-on thinker, Jon Udell recently wrote about MOOCs on his blog. MOOCs attempt to impose a digital industrial model of production onto university education. An infinite number of uneducated young adults are dumped into a chute, a crank is turned, and some smaller, but still significant number, of educated adults are spewed into society through the other end. It’s a model where technology is used on students — Udell prefers his thinking to be hands on, he wants to see technology used by students. In support of this effort he’s made a key strategic decision, he’s retreated from the fierce battle for the leading edge. Here’s Udell on the value of the trailing edge:

And while I was often seen as an innovator, the truth is that much of my work happened on the trailing edge, not the leading edge. The Network News Transfer Protocol (NNTP) was already ancient when I was experimenting with ways to adapt it for intranet collaboration. Videos of software in action had been possible long before I demonstrated the power of what we now call screencasting. And iCalendar, the venerable standard at the heart of my current effort to bootstrap a calendar web, has been around forever too.

There’s a reason I keep finding novel uses for these trailing-edge technologies. I see them not as closed products and services, but rather as toolkits that invite their users to adapt and extend them. In Democratizing Innovation, Eric von Hippel calls such things “user innovation toolkits” — products or services that, while being used for their intended purposes, also enable their users to express unanticipated intents and find ways to realize them.

No one is fighting for dominance of trailing edge technology. Yet the landscape is strewn with valuable technologies left behind by the big technology silos battling each other for monopoly position at the top of the hill. Modern digital computer technology moves so quickly that it’s often forgotten how slowly societies comprehend and incorporate new technologies. The telephone and the television have not been fully understood and digested by society. The VCR became obsolete well before the average person could program it to record a television show at an appointed time.

vcr

RSS is famously, dead. It’s been shouted from the mountaintops of every snarky technology blog around the valley. Clearly the RSS syndication format is no longer a potent weapon in the battle for the leading edge. But along with some of the other technologies Udell mentions, RSS has joined the undead. This makes it an excellent candidate for a “user innovation toolkit.” Undead technologies continue to function and roam the landscape despite being casualties of the war for technological dominance. The trailing edge of the undead is the most fertile ground for finding and creating non-violent technological solutions to the problems faced by ordinary people in their daily lives. More importantly, they are the means by which ordinary people can fashion their own solutions.

Technology is a kind of thinking with your hands. It’s something each of us does everyday. And despite what we read on our screens, most of it isn’t digital.

Comments closed

Escape from the Factory of Life

listening-couple

It’s as though we just looked up and noticed that someone is watching us. It’s that creepy feeling. You know that someone or something sees you, but you can’t see them. The Internet seemed like a place where no one knew whether you were a dog or not. Identity didn’t matter and that’s what created a level playing field, a kind of equality. But then it turned out that you could be identified, that you identified yourself on social networks for fun and profit, that your identity information and preferences could be aggregated and sold without your knowledge. Rather than a casual conversation, the Internet turned into an indexed and searchable permanent record. It’s the equivalent of having everything you type into your network-connected keyboard published to the front page of USA Today in real time. And that’s a very strange context in which to speak.

conversation11

Doc Searls recently weighed in on the issue of Privacy in the age of connected digital networks. It’s an issue that he’s been deeply involved with for many years. Much of our current dilemma could be seen coming from a mile away. But here’s why Doc sees this as a pivotal moment:

I see two reasons why privacy is now under extreme threat in the digital world — and the physical one too, as surveillance cameras bloom like flowers in public spaces, and as marketers and spooks together look toward the “Internet of Things” for ways to harvest an infinitude of personal data.

There’s a joke that Marc Maron tells: “Big Brother is watching us. That’s what we pay him for.” Maron gets to the conflict at the heart of our complaint about surveillance. In a sense, this is what we’ve asked for. We want maximum safety and so we authorize and pay for unlimited surveillance in the hopes of preventing catastrophic events. Now that we see how our wishes are being carried out, we’re troubled — isn’t total information awareness just for the bad guys? Be careful of what you wish for…

conversation7

Marshal McLuhan called advertising our cave art. It expresses our most basic desires. Some would say that it creates them, but the truth is that the desire needs to be there to start with. Advertising calls that deep desire to the surface. There’s a television ad that’s running now that says a great deal about who and what we’re thinking right now. It’s for a car called the Infiniti Q50.

We see a “Factory of Life”. Men and women, young white professionals are being assembled and outfitted in a factory. A disembodied voice narrates the stages of the process. Industrial robots apply lipstick to the women’s lips. The men’s suit coats and ties are fitted with precision. All the personal style is very high end — but it’s all identical. Industrial capitalism has raised the standard of living to a level of luxury. There are no workers in the factory, there are only the people on the assembly line getting a commodified wealthy lifestyle. Either the people of color are being hidden behind the walls of the factory or the factory has remanufactured their ethnicity to conform to a pre-established standard.

As our hero moves down the assembly line, it becomes clear that this isn’t a socialist utopia where everyone can enjoy the benefits of wealth. It’s a surveillance state where conformity is strictly enforced. Everyone accepts what’s happening to them with a blank stare. There are no emotions — merely impeccably-dressed cogs in the machine. No one loves the artifacts of their wealth, no one enjoys the luxury.

A robot arm puts our protagonist’s necktie into place and he experiences a sudden spark of consciousness. He turns and sees his reflection in some glass. He smiles, thinks “I look pretty good.” As he looks around, suddenly he’s able to see the Matrix. He moves farther down the assembly line to where car keys are being distributed. The keys are to identical C-class cars by Mercedes Benz. Each figure takes a key without complaint. We can see that our hero has begun to question what’s going on. A woman’s face appears on a small screen that only he can see. She’s a human like him and she’s hacked into the Matrix to help get him out. She tells him to check his pants pocket for a set of keys. These are the keys to the Q50 and escape from commodification and conformity. He takes the keys and makes a run for it.

The surveillance system detects his his break from the assembly line and dispatches robots to capture or possibly kill him. He’s not pursued by humans, it’s only technology that enforces its own mechanistic repetition. Making a different choice is clearly a dangerous act. The mechanical forces of commodity chase him as he makes his way to the Q50. He gets in, starts it up and drives out of the factory. The robots engage in the chase, but are left in the dust. The Q50’s acceleration is fantastic and quickly the factory recedes in the distance. The road opens in front of him as he drives out of the darkness and into the light. Freedom.

We easily forget that a commodity with special sauce provides our hero with the means to escape the boring commodities that everyone else accepts. A commodity provides the escape from commodity. It’s an open question how he will make a living outside the machine. No doubt he will live by his wits. The “Factory of Life” that opens the commercial is a good representation of what we’re asking of technology. It’s an expression of our wishes and desires. The machine will supply us with the good life as long as we accept the conformity and don’t get out of line. “Assimilation is beauty.” Individual desires can’t be tolerated. There’s great wealth for everyone in the envelope of a surveillance state. Not unlike the way we trade our personal data for a wealth of free online services.

And predictably, we want to view ourselves as the individual who breaks out of the mold. We’re not part of the machine, we have free will and a need to express our individuality. We wake from a dream anchored to one set of commodities and a mechanized life into another dream level where a revolutionary set of commodities anchor a new and improved fantasy with 30% more freedom. You and I wake up to see that we’re in a surveillance state of cloud computing and the NSA. We see our reflection in the glass and enter Lacan’s mirror stage. We perceive the image of our body and form a mental image of our individual identity. We make a run for it. We’ll live by our wits.

The idea of the “mirror stage” is an important early component in Lacan’s critical reinterpretation of the work of Freud. Drawing on work in physiology and animal psychology, Lacan proposes that human infants pass through a stage in which an external image of the body (reflected in a mirror, or represented to the infant through the mother or primary caregiver) produces a psychic response that gives rise to the mental representation of an “I”. The infant identifies with the image, which serves as a gestalt of the infant’s emerging perceptions of selfhood, but because the image of a unified body does not correspond with the underdeveloped infant’s physical vulnerability and weakness, this imago is established as an Ideal-I toward which the subject will perpetually strive throughout his or her life.

There’s a common political move that allows the complainant to achieve a state of blameless innocence. “Since I completely disagree with what the government is doing; I therefore bear no responsibility for its actions. It’s those people, not me who are doing this terrible surveillance. I am innocent; they are guilty. Me good, world bad. My purity remains as pure as it ever was.”

When things are going well, we’re quite proud of the idea of government by the people, for the people and of the people. In the experiment called the United States, the actions of the government are the actions of the people. The President is President of all of the people, not just those who voted for him or her. Instead of declaring our absolute innocence with regard to the bad acts committed by our government, what if we took personal responsibility for them. Those are our dreams and desires manifesting in the real world. Yes, those bad acts were committed in my name. And that defines my morality and the morality of my fellow citizens. We do that. We asked for, and paid for, a surveillance state. It’s only by owning it that it can be changed.

Comments closed

Zombie Microsoft Must Die

Zombie-title

These days so much of the world is seen through the lens of the horror movie. Even thinking about software seems to have that character. RSS is declared dead, but lives on. Software eats the world. Microsoft is declared dead by the cloud vendors, but continues to live on in zombie form. When the fundamental computing environment changes to such a degree that a particular software solution would no longer be generated from the new set of assumptions, it’s the beginning of the end. While zombie software still operates, its roots are in the previous computing environment. Uprooted, it continues to live, but lacks purchase for continued organic growth in the new soils of computing. In a zombie apocalypse, the undead triumph over the living.

I will knock down the Gates of the Netherworld,
I will smash the door posts, and leave the doors flat down,
and will let the dead go up to eat the living!
And the dead will outnumber the living!

Ishtar in the Epic of Gilgamesh

While the Stacks have settled into small group of feudal kingdoms, the raison d’etre of each of them is to be the One. A single platform would be so much more efficient, surely it’s the most rational way to proceed. At this level, platform software has the character of an extra-terrestrial virus that when mixed with earth’s biosphere rampantly multiplies killing all other life forms and replacing them with a version of itself. But in a nice way, with more efficiency and productivity. Imagine being undead as a positive thing. In the movies this fantasy plays out in a number of ways. The Andromeda Strain, The Thing, Invasion of the Body Snatchers, and my favorite, Five Million Years to Earth, all address our fear of being consumed and turned into alien beings. The malevolence we feel is not so much evil as the amoral neutrality of an algorithm executing until completion. In Kurt Vonnegut’s “Cat’s Cradle” it’s called “Ice Nine”, a substance that turns all water it touches into more ice nine.

From the Wikipedia entry on Ice Nine:

Ice-nine is a fictional material appearing in Kurt Vonnegut’s novel Cat’s Cradle. Ice-nine is supposedly a polymorph of water more stable than common ice (Ice Ih); instead of melting at 0 °C (32 °F), it melts at 45.8 °C (114.4 °F). When ice-nine comes into contact with liquid water below 45.8 °C (thus effectively becoming supercooled), it acts as a seed crystal and causes the solidification of the entire body of water, which quickly crystallizes as more ice-nine. As people are mostly water, ice-nine kills nearly instantly when ingested or brought into contact with soft tissues exposed to the bloodstream, such as the eyes.

In the story, it is developed by the Manhattan Project for use as a weapon, but abandoned when it becomes clear that any quantity of it would have the power to destroy all life on earth. A global catastrophe involving freezing the world’s oceans with ice-nine is used as a plot device in Vonnegut’s novel.

Many feared that Microsoft was on the verge of achieving 100% domination of computing before the consent decree from the justice department breaking up the monopoly. For many in the technology community that was the climax of the horror film, the invading virus was finally defeated by the United States Government. A space was opened up for other platforms to grow and prosper. But the seeds of a sequel were planted. As a practical matter, Microsoft was prevented from securing world domination, but the attitude that desired world domination remained dominant. In the new post-consent decree world the nascent platforms saw this as their chance at world domination. They took aim at Microsoft.

software-update-icon

Time passes and a key element in the computing environment changes. The mechanism and speed of software upgrades is fundamentally altered through network-connected computing. More recently cloud services offer that same speed for the most software infrastructure. Just as mobile devices disrupted desktop computing, the speed of network-based software updates have made the shrink wrapped software business obsolete. In a sense software itself becomes mobile, it has a speed and trajectory. The large installed base of enterprise software has remained locked into the slow upgrade cycle of the last era of computing. We now see the personal technology of the worker far outstripping the technology of the corporation.

The real innovation in software was creating the environment where updating, refactoring and completely revising software programs isn’t a painful event. In fact, it isn’t an event at all — just an everyday activity. The capacity to implement real-time upgrades and lower the cost of change is much more important than whatever software is currently in use. Because next week or next month, the software will be improved with a seamless incremental upgrade. It’s one reason that software version numbers don’t really make sense any more. The major version numbers used to signal to users and administrators the cost and level of pain involved in adopting the new version.

pirate_flag

As speed became important, Microsoft got faster too. So much so that the most current set of Microsoft products are qualitatively different than the previous generation. Microsoft has pulled so far ahead of Microsoft that a large gap has been created. Microsoft can now look back and see Microsoft in the distance. This is the moment in the horror movie where the monster is split in two. And while all the other technology platforms are fighting Zombie Microsoft, there’s a new piece of Microsoft that’s also fighting against the Zombie. Something similar happened at Apple when a separate team flying a pirate flag was broken off to work on the Macintosh. Microsoft has joined the field of companies competing against Microsoft. They find themselves in a strange situation — in order for Microsoft to live, Microsoft must die at the hands of Microsoft.

Comments closed

The Mind’s Eye: Black Boxes and Time Machines

The-Time-Machine

There was a moment in time when the internal cinema of the mind opened its doors for business and began selling tickets. It might have been in 1798 when “Lyrical Ballads, with a Few Other Poems” by William Wordsworth and Samuel Taylor Coleridge was published. This cinema of the mind was invoked through the use of unrhymed iambic pentameter, or blank verse. Squiggles of black ink sequenced in a particular rhythm were put down across rows on a sheet of paper. They were designed to induce hallucinations, to operate like a time machine that brought you back to a moment of powerful feeling — pried open your eyes and allowed you to witness that scene as it actually comes to exist in your mind.

wordsworth-manuscript

From the Preface to the “Lyrical Ballads” by William Wordsworth:

I have said that poetry is the spontaneous overflow of powerful feelings: it takes its origin from emotion recollected in tranquillity: the emotion is contemplated till, by a species of reaction, the tranquillity gradually disappears, and an emotion, kindred to that which was before the subject of contemplation, is gradually produced, and does itself actually exist in the mind.

“Spots of time” was the phrase Wordsworth used to describe these powerful feelings that welled up spontaneously, overflowing any effort of reason to contain or define them. Contemplated from a tranquil distance, these are the springs the feed the continuing power of poetry. Defying entropy, these moments don’t strike and fade to nothingness. As Freud would later note, they become constitutive of our identity — in both our joy and our madness. They are the personal identity that persists through time and one source of poetry.

From William Wordsworth’s “The Prelude” (1805 edition):

There are in our existence spots of time,
That with distinct pre-eminence retain
A renovating virtue, whence–depressed
By false opinion and contentious thought,
Or aught of heavier or more deadly weight,
In trivial occupations, and the round
Of ordinary intercourse–our minds
Are nourished and invisibly repaired;
A virtue, by which pleasure is enhanced,
That penetrates, enables us to mount,
When high, more high, and lifts us up when fallen.

prime-suspect

One of the pleasures of the murder mystery genre is this quality of inducing an internal vision of a past moment of intense passion. The detective surveys the scene of the murder and attempts to reconstruct the events. Witnesses are interviewed, asked to tell what happened. As the witness recounts her memory of the event her eyes shift their focus inward. The internal cinema fills her mind’s eye; she sees those moments around the crime as though they are occurring right now. She puts the vision on a loop and attempts to put it into words. In her face we can see the emotions evoked by remembrance and a reflection of the power of emotions from the event itself. The witness’s words evoke a vision in the mind’s eye — for both us and the detective. As each witness tells some piece of the story, we replay the vision, adding details, attempting to piece together a coherent narrative to replace the mystery.

humphrey-bogart-fedora

In film versions of murder mysteries, the eyes of the detective are the key to understanding the kind of thing that will have to be imagined to solve the crime. The world-weary detective in a film noir has seen it all. The character of his eyes gives us a sense of what he could imagine. As he loads the witness’s stories into the projector of his mind’s eye, he must let them induce whatever visions may come. Often we can see how this process of envisioning has taken its toll on the face and eyes of the detective. In others, say the Miss Marple mysteries, we see an incongruous contrast between the seemingly normal countenance of the detective and the eyes that can imagine horrific events of violence. The internal capacity of a dark and powerful imagination doesn’t always correspond with the external physique of an action hero.

marple-hickson

There’s a moment when everything clicks. Often it’s a moment that seems to be a break in the story. The detective, exhausted from gazing at the movie he’s constructed, turns off the projector and re-enters the world. An off-hand remark, a simple gesture, a common object seen in a new light offers the analogy that the provides the key. The puzzle pieces of the internal vision sliding around the detective’s head suddenly form a pattern with the ring of truth. This marks the beginning of the end of the story. Often at this point all the suspects and witnesses are gathered together in a room for a recitation of the detective’s vision. “Now you’re probably all wondering why I brought you here today.” Validation takes the form of the murderer making a break for the door.

minority-reportish

In the future in which we currently reside, this method of scraping a valid account out of the internal memories of unreliable witnesses begins to seem horribly inefficient. Imagine, if you will, how it might go. The detective arrives on the scene of the murder. The victim is positively identified and the paperwork is filed.

sergey-glass

The panel reviews the particulars of the crime and determines whether or not the victim’s black box should be released to the detective and which time machine privileges should be granted. The black box is the victim’s personal network cloud, along with all it’s corporate, medical and government cloud counterparts. This includes a stream of all commercial and financial transactions, social media transactions, voice and text mobile communications, location and personal quantification data. A unique identifier is generated to tie all the person’s data streams together into a single life stream. When loaded into the black box player, the detective can replay the victim’s life from any arbitrary point in time prior to the murder up until the time of death and after. Some data streams don’t require a living subject. The victim’s social graph and location data is used to aggregate all still and video photography relevant to the time in question. A list of additional persons of interest is generated through a strong tie / weak tie analysis of the people the victim came into contact with.

thematrixcouncil

The persons-of-interest list is submitted to the panel for approval. Once approved, this gives the detective the ability to more fully explore what happened along multiple vectors. When the additional black boxes are loaded into the time machine, the detective can travel through multiple vectors and get a real 360 view of the event. The additional data really increases the resolution of the time travel experience. For murder investigations the data also includes all digital communications with built-in auto-erase functions and any sort of strong encryption.

A-Clockwork-Orange-1971

With the data set constructed, the detective initiates the search algorithm. Based on analysis of motive, opportunity and other risk factors the top three suspects with the highest probability are identified. The paperwork is filed to allow the detective to show the prime suspects the highest probability version playback of what occurred. Each suspect is hooked up to biometric measuring machines and shown the playback. Through an automated analysis of the biofeedback the most probable murderer is identified and charged with the crime. The detective then converts the data set to an evidence set for the district attorney. The evidence set includes provenances and audit trails for all the data included.

time-travel-wormhole

Physicists disagree about whether time travel is possible. Given the speed of light and the size of the universe, it’s certainly possible to view ancient events as though they are happening in the current moment. Just go out on a clear night and look at the stars. But seeing old light isn’t the same as traveling to the time in which the image in that light was created. Whether or not time travel is possible in the physical universe, it’s now possible through the large repositories of time stamped stream data that we’re collecting — these so-called haystacks.

minds-eye

On the other hand, these are just words on a page. They’re designed to cause you to imagine a particular future, to view a movie on your internal cinema screen. They may just be a thought experiment — mere ephemera of the moment. You know, the stuff that dreams are made of.

Comments closed