Skip to content →

Category: tribes

Antagonyms, Social Circles and Chattering about VRM

Throwing all the pieces out on the table, we connect the dots to make pictures. It’s a child’s game, creating figures out what look like a random set of numbered points. We tend to visualize the network of our social graph as a series of connected points. The pictures that emerge from those connections tell a story about our lives and experiences.

One of the interesting things about random sets of dots is that we tend to group them based on proximity, similarity, closure and continuation. We project pictures on to the dots, and once we see a particular picture, sometimes it’s hard to realize that someone might put the same set of dots together into something entirely different. It could even be an image that has the exact opposite meaning as the picture we see.

There are a couple of words used to describe a word that can mean the opposite of itself. Here are some examples of Antagonyms (or Contranyms):

Overlook: to pay attention to, to inspect (“We had time to overlook the contract.”) vs. to ignore
Oversight: Watchful and responsible care vs. An omission or error due to carelessness

It’s the context that tilts the meaning of the word this way or that.

When you think about the set of people you may be connected to within a large company, you can overlay several kinds of connections. A person may be a colleague, they might be in the same division, have the same pay grade, be part of a project, be a friend, or even a relative. In fact, we make a virtue out of the idea that the people we work with could also be our friends. Many companies like to talk about their employees as being like a family.

Google tested their Buzz product inside the walls of their company. No doubt it was used for work, play and a whole range of unforeseen kinds of communication. After a while all those modes of communication began to blend together. The boundaries between them broke down. Just as email and IM are used for personal and business purposes, Buzz would naturally be used in the same way. From a business perspective, the dots were connected into a powerful image of collaboration and efficiency. Twitter/FriendFeed clearly worked great as an enterprise application.

The personal, public and business realms are overlapping images that can be mapped to the same set of dots. However, it’s the exclusive disjunction of these sets that defines the boundaries. In some cases, the boundaries need to be strong and impenetrable. These are the cases Google didn’t consider carefully enough in their launch scenario. Other times a co-worker becomes a friend, or someone you went to school with becomes a colleague. Or maybe you just decided to start following your company’s CEO on Twitter. The context of the interaction tilts the meaning of the connection. There’s not a bright line separating our private, public and business lives that can be applied as a definitive rule.

Google launched Buzz as a consumer product, but tested it as an enterprise product. Although they plan to quickly integrate it into their office application suite. But like all messaging tools it will have a public and a private mode. It will address and contain personal, public and business conversation threads. And by flowing data from a user’s social circle and the real-time flow of Buzz (effectively a ping server) into their search algorithm, results pages can be personalized by social graph in real time.

Meanwhile, SalesForce.com introduces Chatter to the enterprise and rolls it out at no extra charge to all employees on the internal network. And while it will start inside the enterprise, Chatter will quickly expand to the boundaries and begin to cross over. From a business perspective, it’ll be used to turbo-charge collaboration and create real-time communication for project teams and business units. But very quickly you’ll see friends sending messages to each other about meeting up for lunch, and a public-personal communications channel will be opened within the enterprise. And the circles will connect and widen from there.

Here are a couple more Contranyms:

clip (attach to)  – clip (cut off from)

cleave (to cut apart)  – cleave (to seal together)

Salesforce.com calls itself the leader in Customer Relationship Management and Cloud Computing. Chatter may just be the communication medium that ultimately contains both CRM and its opposite number, VRM. Vendor Relationship Management is a reaction to the data toolsets belonging to the enterprise and not to the individual customer.

In a narrow sense, VRM is the reciprocal — the customer side — of CRM (or Customer Relationship Management). VRM tools provide customers with the means to bear their side of the relationship burden. They relieve CRM of the perceived need to “capture,” “acquire,” “lock in,” “manage,” and otherwise employ the language and thinking of slave-owners when dealing with customers. With VRM operating on the customer’s side, CRM systems will no longer be alone in trying to improve the ways companies relate to customers. Customers will be also be involved, as fully empowered participants, rather than as captive followers.

If you were to think about what kind of infrastructure you’d want to run VRM on, Salesforce.com would be ideal. To run the mirror image of CRM, you need the same set of services and scale. The individual Chatter account could be the doorway to a set of VRM services. I can already see developers using the Force.com platform to populate a VRM app store.

Some corporations will attempt to maximize the business value of each individual worker, stripping out all the extraneous human factors. Chinese walls will be erected to keep the outside from the inside, the personal from the business, and the public from the private. But when you put messaging and communications tools into the hands of people they will find ways to talk to each other— about work, life, play, the project, and the joke they just heard at the water cooler.

4 Comments

Twitter Lists, Track and Broadcasting

I’ve been trying to understand what Twitter lists are good for. Both Twitter’s new retweet feature and the list feature are imports from FriendFeed. Even in its current state, FriendFeed continues to be the R&D department for social media.

The thing I find uninteresting about lists is the fact that they’re mostly static— they simply serve as a kind of personal taxonomy. These Twitter users belong in this category. This is where we begin to feel the loss of track + filters. The assembly of a network of connected micro-messages around a set of keywords and run through a filter does what lists do dynamically and in real time. With the release of Twitter’s streaming API, nicknamed birddog, it’s possible we’ll start to see track-like features return— at least for subsets of the firehose. Manually curated lists at the level of classification are just a replay of RSS readers.

There are those who will say that if you’re using Twitter in a one-to-many broadcast mode, you’re not doing it right. But I think it’s pretty well established that Twitter is ambiguous and flexible enough to accommodate many modes of use simultaneously. Twitter lists strike me as a particularly good tool for news organizations.

If the New York Times or CNN has a team of journalists, photographers, videographers and radio journalists covering a breaking story like the earthquake in Haiti, a Twitter list would be a compact way to deliver coverage. Hyperlinks within the tweets could send readers off to breaking news, in-depth backgrounders and ongoing live conversations. CNN’s list and the New York Times’s list would be differentiated by who was on each coverage team and the editorial approach of each news organization. The list would exist for the duration of the story.

Rather than serving as part of a taxonomy, or classification of Twitter users— the list would define individuals with a common purpose— covering the Haiti earthquake, or the Senate race in Massachusetts. Each news organization might have a set of active lists ongoing at any time. The more specific and real time the list, the more valuable it would be.

Of course, someone might create a list of all the news organizations covering a breaking story. But I think the effect of this would be to dilute the value of the stream rather than enhance it. You could also make the argument that the hashtag and the wisdom of the crowd would ultimately provide equal or better coverage. However, it’s not necessary to choose between one approach and the other. Each will ultimately include elements of the other.

The television medium is destabilizing and being absorbed into the real-time Network. While newspapers and television used to consider the Internet as a medium for the re-purposing and re-use of content, soon the reverse will be true. The real-time Network will be the primary publication vehicle with television and newspapers becoming containers for re-use.

And, of course, I use the word Twitter as a synecdoche. (A specific class name used to refer to a general set of associated things)

2 Comments

Feeding on a Collection of Channels (57 Channels and Nothin’ On)

vhf_tv_knob

It’s slipping into time out of mind, that knob with 13 positions that lined up with the VHF broadcast television channels. The first time I really understood it, there was only signal available at four of the dial positions. The other channels broadcast a static pattern that was called ‘snow.’ One had the sense that there could be signal coming through these channels and through the extended set of numbers available through the UHF dial as well. The reality was the vast majority of the channels provided only snow. In Sweden, Denmark and Hungary snow is called ‘the war of the ants.’

The channel is a very powerful metaphor. When cable-based replaced over-the-air broadcast as a means of delivering video signal to a television the number of channels carrying signal exploded. The increase in the number of channels fundamentally changed the distribution of programming. Where in the past, three or four channels bore the responsibility for the whole range of human endeavor from news and public affairs to sports, to comedy and drama— now each of these domains could have their own channel. And so we see a sports channel, a news channel, a cooking channel, a movie channel, a comedy channel, etc.

One effect of this expansion mirrors that of professional sports leagues. When a league goes from 12 teams to 24 teams, the talent pool is diluted. Now imagine the quality of play if Major League Baseball were to expand to 500 teams. On the one hand, we might talk about the economics of abundance and how in this new democratized environment, anyone can have a professional baseball team. But there would be a fundamental shift in how we valued viewing baseball games and the importance of baseball in general.

Baseball has a method of dealing with this problem. The teams and players are assigned to leagues, and the leagues roughly approximate levels of talent. League size is collared by the relationship between the availability of talent and the quality of the on-field product. There’s the major leagues, triple A, double A and single A. And then there are the various international leagues. Talent rises within a league until it moves to the next level. Vaudeville worked in the same way, there are many interconnected networks that have this kind of relationship. Economies of talent form within these pools, when talent reaches a certain level it is pulled up to the next level.

The proliferation of cable television channels has changed the value of a channel. When there are 500 channels to choose from, the channel itself ceases to be important. Even with 500 channels, it’s often the case that there’s nothing on. In the early days of cable televsion, 57 channels seemed like a huge number— this may have been the first time that we noticed that even with 57 distinct channels, there was rarely anything worth watching. René Giesbertz takes inspiration from Bruce Springsteen’s song ’57 Channels and Nothin’ On’ to explore what the experience of layering the sound of 57 television channels one on top of the other.

As cable television begins to migrate into the Network, the channel begins to merge into the feed. We move from having too many cable channels to an infinite number of data feeds. The dial is expanded to an infinite number of positions and the cost of broadcasting on one of these channels is minimal. The breakdown into finer and finer categories of broadcasting continues. Bathroom scales broadcast weighing events by user, shoes collect and broadcast running data, Twitter captures and broadcasts a whole range of miscellany. When the cost goes low enough, there’s no reason that everything that can emit state and event data shouldn’t be equipped to broadcast via a unique feed.

Just as the channel is meaningless when there are 500 of them, feeds are meaningless when there’s an infinite number of them. Aggregating data at the feed level doesn’t amount to much in an abundant feed economy. It’s the equivalent of aggregating cable television at the channel level. We don’t watch channels or read feeds, we’re interested in specific items. We surf from item to item, looking for signals along the way to tell us what’s important, what’s valuable. The channel, or feed, encasing the item in a sequence is a low-value clue in a rich information environment. The dial is no longer an adequate navigation interface where we have instant, direct random access to each and every item/program.

While the new metaphor hasn’t come completely into focus yet, the real-time web begins to point the way. There are two primary modes of interaction with items: now and later. We either interact now in real-time, or we defer until a later real-time. The third mode is elimination of an item from the consideration set. Rather than endlessly switching channels, we need an environment rich with signals and pointers to tell us whether or not something is going on. And perhaps even more important, we need to be able to tell when there’s nothing happening. Whether there are 4 channels, 57 channels, 500 channels or an infinite number of channels— it’s still quite possible that, in this real-time moment, there’s nothin’ on.

Comments closed

Shadows & Light: Privacy in the Panopticon

Searchlight

Before the turn of the millennium, Scott McNealy declared privacy dead:

The chief executive officer of Sun Microsystems said Monday that consumer privacy issues are a “red herring.”

“You have zero privacy anyway,” Scott McNealy told a group of reporters and analysts Monday night at an event to launch his company’s new Jini technology.

“Get over it.”

McNealy’s comments came only hours after competitor Intel (INTC) reversed course under pressure and disabled identification features in its forthcoming Pentium III chip.

At one time, privacy was a function of a general laziness and the unlinked quality of information. While there may have been lots of publicly available information about a person, it was rather difficult to track down and assemble. We’ve developed a whole mythology around the kind of person who can root out the details about a person and put the pieces together into a picture that makes some kind of sense.

humphrey-bogart

There was a kind of power in the invisibility we once had. Oddly, it was a kind of anonymity that was derived from the density of the urban environment. The city was a place you could go to get lost, to start over, to create a new identity. That’s why it took a detective to find the traces and clues that filled out the picture of a person. Today, that kind of invisibility has mostly vanished. If I want to know something about Sergey Brin, I can use any number of services that will scour the Network looking of publicly available information, and then I can pay for information that’s more obscure or privately held. Shoe leather is no longer a requirement.

Just as there’s a kind of ‘security through obscurity,’ there was a kind of privacy through obscurity. The methods by which information about a person used to be stored were enshrouded in shadow, even darkness. One piece of information wasn’t linked to the next. The trail was obscured, you had to stumble through the darkness to get from one piece of information to the next. Now information is linked into a web– it’s created, searched, and collated. In the UK, surveillance cameras are used to create a visual real-time mesh of video that can track you through your day. You are being recorded, it’s just a question of whether anyone is currently looking at the data or not.

…under a law enacted in 2000 to regulate surveillance powers, it is legal for localities to follow residents secretly. Local governments regularly use these surveillance powers — which they “self-authorize,â€? without oversight from judges or law enforcement officers — to investigate malfeasance like illegally dumping industrial waste, loan-sharking and falsely claiming welfare benefits.

The private moment, that little space between this and that, the in-between time when no one is looking— this invisible space is growing smaller and smaller, the more connected we become. Privacy through obscurity is no longer a dependable strategy. The things that were hidden in plain sight, are now easily found.

There is some data that remains private. Our medical records and financial records are two examples of personal data that is actively encrypted and kept private. Generally a court order is required to pry open these vaults of information. In some sense, that’s the new definition of privacy. It’s data that can be accessed by the individual, the data custodian, and, by court order, the government. In addition, should this data inadvertently leak out from the data custodian, the individual has a well-established legal recourse against the custodian.

In order for the private to remain truly secret, it would need to be unconnected. As the connections between us are made visible by our electronically networked environment, we begin to see that we have always inhabited networks of one kind or another. To be unconnected to all networks is to no longer be among the living. The private is something that we are prohibited from sharing based on a social or legal contract. Viewed as a system, the private requires more energy to maintain its contracts regarding the non-sharing of information. Linking private personal data among private systems of record while still honoring the non-sharing contract takes even more energy. The network itself doesn’t distinguish between private and public information packets.

Gregory (Scotland Yard detective): “Is there any other point to which you would wish to draw my attention?”
Holmes: “To the curious incident of the dog in the night-time.”
Gregory: “The dog did nothing in the night-time.”
Holmes: “That was the curious incident.”

And just as we can deduce the nature of hidden facts based on the dog who didn’t bark in the night, the private can often be deduced by correlating public gestures/connections to and through the locus of personal identity. But privacy isn’t dead, it’s just as it always was– an agreement among a group of people to enact useful boundaries on the sharing of information.

Comments closed