Skip to content →

Category: desire

Barriers, Membranes and What We Agree to Keep Silent About…

There are certain animals that have survived, flourished even, through the use of camouflage (a form of crypsis). They blend into the background so well they become invisible. Predators haven’t cracked the code, camouflage works at the level of the species. Now and then it may fail in individual cases, but on the whole it’s been a successful strategy in the game of natural selection.

In the murky waters of the Network, the visibility is nil. It’s only through the hyperlink that a sense of visibility is created— although visibility is probably the wrong word. Following McLuhan, we should acknowledge the Network as an auditory/tactile space. The nodes of the Network are linked by touch. The hyperlink is activated by touch, it’s a flicking of a switch that opens a door to a hidden hallway. We feel our way through the dark until we emerge into the light on the other side. (This is another reason that the multi-touch interaction mode has spread so quickly).

Imagine a location on the Network that was completely devoid of hyperlinks to foreign sites. You’d have to imagine it, because unless you knew the precise incantation to call it into your browser, it would lay perfectly camouflaged within the darkness of the Network. Sometimes this is called security through obscurity—a kind of blending into the background.

This imaginary location might have an infinite number of internal hyperlinks between the locations within its interior. It could be a whole world, completely unknown to the rest of the Network, a veritable Shangri-La. Because this place is unknown and without hyperlinks, there would be no commerce, no trade of bits between this isolated location and the rest of the Network. Of course, if a single hyperlink was formed, this imaginary location would change forever. To stop outside influences from overwhelming this world, a barrier would have to be built and its integrity enforced.

If we adjust our angle a little bit, we’ve just described the state of the modern Corporate Enterprise with respect to the rest of the Network. The fabric of the external Network has been used as the material for the internal Network—the protocols are identical. Keeping these identical twins apart is called security. Of course, twins have a mode of communication, cryptophasia, not available to others.

Hedge funds are beginning to monitor Twitter to evaluate their portfolio holdings and trading opportunities. The public stream is analyzed in real time for sentiment and triggers to put into their trading algorithms. Enough value has accreted to the stream that there’s an advantage to be gained from taking it into account.

In addition to its presence in the public stream, the Corporate Enterprise has begun to launch private public streams meant to reside securely within the friendly confines of the firewall. The purpose of the private public stream is to create more visibility within the Enterprise—although the metaphors have become crossed again. Traditional corporate reporting provides visibility—a kind of linear numeric business intelligence. A real-time micro-message stream with hyperlinked citations transmits auditory and tactile signals. We hear what people are saying about how things are, and by following the hyperlink we can get a deeper feel.

If the public stream, outside the firewall, has enough juice to merit monitoring, the private public stream has even more. And there’s no skill or guile involved in finding it, it’s a busy public thoroughfare accessible to everyone on the inside.  If we adjust our angle a bit more, we can see the private public message stream as a series of diplomatic cables. The diplomatic corps of the United States uses these cables to update the status of the system to the Secretary of State. Private internal message streams can develop a value outside the barriers erected by the native tribe. When the value grows great enough there will be motivation to enable a leak. What at first appears to be a barrier, reveals itself as a membrane. The modern worker is a member of many tribes with many, and sometimes competing, allegiances.

Perhaps we might think it’s just a matter of stronger barriers, a matter of winning the arms race. But as Bruce Sterling notes in his assessment of the Wikileaks Affair, these kinds of cracks are going to get easier, not harder over time. Even the system that we might expect to be the strongest no longer operates on the basis that a war over barriers can be won. Here’s Deborah Plunkett, head of the NSA’s Information Assurance Directorate, on the state of their internal network:

“There’s no such thing as ‘secure’ any more,” she said to the attendees of a cyber security forum sponsored by the Atlantic and Government Executive media organizations, and confirmed that the NSA works under the assumption that various parts of their systems have already been compromised, and is adjusting its actions accordingly.

To preserve the availability and integrity of the systems it has the duty to protect, the NSA has turned to standardization, constant auditing, and the development and use of sensors that will be placed inside the network on specific points in hope of detecting threats as soon as they trigger them, reports Reuters.

In the end, we seem to be transported back to days of the tribe and our allegiance to it. In an age where the barriers around systems have become a Maginot Line, it’s down to what we agree to keep silent about— what we don’t share outside the circle. Our public and private faces will grow farther apart, and the innocent and authentic gestures we contributed to the public stream will now be a matter of show. The backchannel that was brought to the fore will require a backchannel of its own. Somewhere out of the glare, where we can have a private conversation— security through obscurity.

One Comment

A World of Infinite Info: Flattening the Curvature of the Earth

While infinity made appearances as early as Zeno, it was with Georg Cantor that the idea of many infinities of varying sizes began. In some ways this marked the taming of infinity. Its vastness, mystery, and inhuman scale no longer invoked terror or awe. Like the zero, it was something that could be represented with a symbol and manipulated in equations and algorithms.

Infinity recently made an appearance in a conversation between journalist, Om Malik and Evan Willams of Twitter:

Om Malik: Ev, when you look at the web of today, say compared to the days of Blogger, what do you see? You feel there is just too much stuff on the web these days?
Evan Williams: I totally agree. There’s too much stuff. It seems to me that almost all tools we rely on to manage information weren’t designed for a world of infinite info. They were designed as if you could consume whatever was out there that you were interested in.

Infinity takes the form of too much stuff. The web seems to have so much stuff, that finding your stuff amongst all the stuff is becoming a problem. The dilution of the web with stuff that’s not your stuff decreases the web’s value. Any random sample of the web will likely contain less and less of your stuff. This problem is expressed as an inadequacy in our tools. To effectively process infinity (big data), our tools will need to leap from the finite to the infinite. Om and Ev’s conversation continues:

Om: Do you think that the future of the Internet will involve machines thinking on our behalf

Ev: Yes, they’ll have to. But it’s a combination of machines and the crowd. Data collected from the crowd that is analyzed by machines. For us, at least, that’s the future. Facebook is already like that. YouTube is like that. Anything that has a lot of information has to be like that. People are obsessed with social but it’s not really “social.� It’s making better decisions because of decisions of other people. It’s algorithms based on other people to help direct your attention another way.

When considering human scales, the farthest point we can apprehend is the horizon. The line that separates earth from sky provides a limit within which a sense of human finitude is defined. When the earth was conceived as flat, the horizon defined a limit beyond which there was nothing. Once the curvature of a spherical earth entered our thinking, we understood there was something — more earth — beyond the horizon. When looking from the shore to the sea, the part of the sea closest to the horizon is called “the offing.”  It’s this area that would be scanned for ships, a ship in the offing would be expected to dock before the next tide. It’s in this way that we worked with things that crossed over to occupy the space just this side of the horizon.

What does it mean for an information space to leap from the finite to the infinite? There’s a sense in which this kind of infinity flattens the curvature of the earth. The horizon, as a line that separates earth from sky, disappears and the earth is transformed from world to planet. Contrary to Ev William’s formulation, there is no “world of infinite info.” Our figures become ungrounded, we see them as coordinates in an infinite grid, keywords in an infinite name space. The landscape loses its features and we become disoriented. There’s too much stuff, and I can’t seem to find mine in this universe of infinite info.

Are there tools that begin by working with the finite and evolve — step-by-step — to working with the infinite? In a sense, this is the problem of the desktop metaphor as an interface to computing. If a hard disk is of a finite size, its contents can be arranged in folders and put in drawers with various labels. Once the Network and the Cloud enter the equation, the desktop must make the leap from the finite to the infinite. Here we try to make a metaphorical transition from wooden desks in a workplace to a water world where everything is organized into streams, rivers and torrents. But in this vast ocean of information, we still aren’t equipped to find our stuff. We dip in to the stream and sample the flow from this moment to that. Our tools operate on finite segments, and the stuff we’re looking for still seems to be elsewhere.

The stuff we’re looking for is no longer contained within the human horizon. In the language of horizons, we leap from the perspective of humans to the viewpoint of the universe. Here we might talk about event, apparent and particle horizons:

The particle horizon of the observable universe is the boundary that represents the maximum distance at which events can currently be observed. For events beyond that distance, light has not had time to reach our location, even if it were emitted at the time the universe began. How the particle horizon changes with time depends on the nature of the expansion of the universe. If the expansion has certain characteristics, there are parts of the universe that will never be observable, no matter how long the observer waits for light from those regions to arrive. The boundary past which events cannot ever be observed is an event horizon, and it represents the maximum extent of the particle horizon.

There’s an interesting optimism at work in the idea that because we can create tools that work with the finite, we can create tools that work with the infinite— that somehow the principles involved would be similar. If we look at Evan William’s description of what such a tool might do, it jumps from the individual to the species. What successful adaptations have been adopted by other individuals of the species that I might mimic?  The dark side of this kind of mimicry is that a successful adaptation isn’t visible in the moment. A lemming, as it approaches the edge of a cliff, may view the cues it’s receiving from other lemmings as positive and successful. Rather than create the diversity that’s the engine of evolution, it may create conformity and a fragile monoculture.

The creation of infinite info seems to parallel what Timothy Morton calls a Hyperobject. He defines such objects as being massively distributed in time and space, existing far beyond the scale of an individual human, and making themselves known by intruding into human life. Morton calls climate change, global warming and the sixth mass extinction event examples of hyperobjects. Infinite info is created, not purposefully, but like the exhaust coming out of our tail pipes. It enters the environment of the Network in geometrically increasing levels with no sign of slowing or stopping. Will it expand forever without limit, or will it behave like a super nova, eventually collapsing into a black hole?

Timothy Morton on Hyperobjects: Timothy Morton: Hyperobjects 3.0: Physical Graffiti

Now we must ask: are we creating an information environment to which we are incapable of adapting? The techno-optimists among us see human evolving to cyborg. The finite tools we used to adapt will become infinite tools that will allow us to adapt again. As Om Malik puts it, the future of the Network may include “machines thinking on our behalf.” The other side of that coin is that we’re creating something more akin to global warming. It may be that even machines thinking on our behalf will not be enough to redraw the line between the sky and the earth, re-establish the ground beneath our figures and tame the overflowing character of infinity.

8 Comments

No Nature: Thinking About Gary Snyder

It’s a phrase that fascinated using only three words. “Ecology without nature.” It’s the title of a book by Timothy Morton, and refers to the romantic notion of nature that infuses much of our ecological thinking. It’s nature as it appeared before the fall, before the apple was bitten by reality. Not nature as it was formed in the crucible of Darwin’s natural selection, but rather as the dream of a machine spinning along in perfect balance. Human beings, somehow standing on the outside, have upset that balance.

I’m reminded of poet Robert Haas’s story about Nobel Laureate Czeslaw Milosz. Haas was organizing a benefit for some nature organization. He wanted Milosz to read and tried to play on what he thought was Milosz’s love of nature. Milosz starred blankly. “Nature? Nature terrifies me.” Confused Haas reels off a list of sunsets, forests, sparkling rivers, night skies and rolling hills. Milosz nodded. “Ah…you mean beauty. There’s a huge difference.”

For Morton, ecology must be thought through a democracy of objects. Humans, fish, plastic bags, trees, snow tires and bongos all live and work within the same flat ontology. At every scale, we’re all in this together, human being isn’t privileged, rather it is one being among many. Gary Snyder comes at the question from another direction. He engages in what he calls the practice of the wild. The poet tells us how nature calls nature:

“It would appear that the common conception of evolution is that of competing species running a sort of race through time on planet earth, all on the same running field, some dropping out, some flagging, some victoriously in front. If the background and foreground are reversed, and we look at it from the side of the ‘conditions’ and their creative possibilities, we can see these multitudes of interactions through hundreds of other eyes. We could say a food brings a form into existence. Huckleberries and salmon call for bears, the clouds of plankton of the North Pacific call for salmon, and salmon call for seals and thus orcas. The Sperm Whale is sucked into existence by the pulsing, fluctuating pastures of squid, and the open niches of the Galapagos Islands sucked a diversity of bird forms and function out of one line of finch.”

Sometimes it takes a while before we can hear a poet speak. This may be the decade that we hear Gary Snyder.

Ripples on the Surface

by Gary Snyder

“Ripples on the surface of the water—
were silver salmon passing under—different
from the ripples caused by breezes”

A scudding plume on the wave—
a humpback whale is
breaking out in air up
gulping herring
—Nature not a book, but a performance, a
high old culture

Ever-fresh events
scraped out, rubbed out, and used, again—
the braided channels of the rivers
hidden under fields of grass—

The vast wild
the house, alone
The little house in the wild,
the wild in the house
Both forgotten.

No nature

Both together, one big empty house.

One Comment

The Thing That The Copy Misses

The Network is, we are told, a landscape operating under an economy of abundance. Only the digital traverses the pathways of the Network, and the digital is infinitely copyable without any prior authorization. Kevin Kelly has called the Network a big copy machine. The copy of the digital thing is note for note, bit for bit. It’s a perfect copy. Except for the location of the bits and the timestamp, there’s no discernable difference between this copy and that one. The Network fills itself with some number of copies commensurate with the sum total of human desire for that thing.

One imagines that if you follow the path of timestamps back far enough, you’d find the earliest copy. The copy that is the origin of all subsequent copies. We might call this the master copy, and attribute some sense of originality to it. Yet, it has no practical difference from any of the copies that follow. Imperfect copies are unplayable, and are eventually deleted.

The economy of abundance is based on a modulation of the model of industrial production. The assembly line in a factory produces thousands upon thousands of new widgets with improved features at a lower cost. Everyone can now afford a widget. Once the floppy and compact disk became obsolete, the multiplication of digital product approached zero cost. The production of the next copy, within the context of the Network’s infrastructure, requires no skilled labor and hardly any capital. (This difference is at the heart of the economic turmoil in journalism and other print media. Newsprint is no longer the cheapest target medium for news writing.)

In the midst of this sea of abundant copies I began to wonder what escaped the capture of the copy. It was while reading an article by Alex Ross in The New Yorker on the composer Georg Friederich Haas that some of the missing pieces began to fall in to place. The article, called Darkness Audible, describes a performance of Haas’s music:

A September performance of Haas’s “In iij Noct.� by the JACK Quartet—a youthful group that routinely fills halls for performances of Haas’ Third String Quartet—took place in a blacked-out theatre. The effect was akin to bats using echolocation to navigate a lightless cave, sending out “invitations,� whereby the players sitting at opposite ends of the room signalled one another that they were ready to proceed from one passage to the next.

As in a number of contemporary musical compositions, the duration of some of Haas’s music is variable. The score contains a set of instructions, a recipe, but not a tick-by-tick requirement for their unfolding. In a footnote to his article on Haas, Ross relates a discussion with violinist, Ari Striesfelf, about performing the work:

We’ve played the piece seven times, with three more performances scheduled in January, at New Music New College in Sarasota, Florida. The first time we played it was in March, 2008, in Chicago, at a venue called the Renaissance Society, a contemporary art gallery at the University of Chicago. Nobody that I know of has had an adverse reaction to the piece or to the darkness. Most people are completely enthralled by the experience and don’t even realize that an hour or more has passed. Haas states that the performance needs to be at least thirty-five minutes but that it can be much longer. He was rather surprised that our performance went on for as long as it did! But the length was never something we discussed. It was merely the time we needed to fully realize his musical material.

The music coupled with the darkness has this incredible ability to make you completely lose track of time. We don’t even realize how much time has gone by. Our longest performance was eighty minutes, in Pasadena, and when we had finished I felt we had only begun to realize the possibilities embedded within the musical parameters. Every performance seems to invite new ideas and possibilities. In the performance you heard of ours back in September there were some moments that I couldn’t believe what we had accomplished. Moments where we were passing material around the ensemble in such a fluid fashion you would think we had planned it out, but it was totally improvised in the moment. The more we perform the piece, the more in tune with each other’s minds we become.

When we return to the question: what’s the thing that’s missing from the copy, we find that in the music of Georg Friederich Haas, almost everything is missing. The performance, by design, cannot be copied in the sense that the Network understands a copy. Its variation is part of its essence. A note for note recording misses the point.

So, while the Network can abundantly fill up with copies of a snapshot of a particular performance of Haas’s work, it misses the work entirely. The work, in its fullness, unfolds in front of an audience and disappears into memory just as quickly as each note sounds. Imagine in this day and age, a work that slips through the net of the digital. A new instance of the work requires a new performance by an ensemble of highly skilled artists. Without this assembly of artists, the work remains silent.

Tomorrow I’ll be attending a performance of Charpentier’s Midnight Mass by Magnificat Baroque in an old church in San Francisco. While variation isn’t built in to the structure of the piece, all performance exists to showcase variation. How will this piece sound, in this old church with these particular musicians on a Sunday afternoon? Even if I were to record the concert from my seat and release it to the Network, those bits would barely scratch the surface of the experience.

Comments closed