Digital publics, Conversations and Twitter

Posted by Unknown Selasa, 29 April 2008 0 komentar
Last week, I left the Web 2.0 conference to listen to Mimi Ito, danah boyd and their colleagues talk about their research on Digital Publics.

Now if you haven't been paying attention, that plural of 'public' there may throw you. Surely things are either 'public' or 'private'? As danah explains:

Just as context is destabilized through networked publics, so is the meaning of public and private. What I learned from talked to teens is that they are living in a world where things are "public by default, private when necessary." Teens see public acts amongst peers as being key to status. Writing a public message to someone on their wall is a way of validating them amongst their peers. Likewise, teens make choices to go private to avoid humiliating one of their friends.

Yet, their idea of public is not about all people across all space and all time. They want publics of peers, not publics where creeps and parents lurk.

Bly Lauritano-Werner (17, Maine):

My mom always uses the excuse about the internet being 'public' when she defends herself. It's not like I do anything to be ashamed of, but a girl needs her privacy. I do online journals so I can communicate with my friends. Not so my mother could catch up on the latest gossip of my life.

Properties of technology have complicated what it means to be in public. We are all used to being in publics that don't include all people across all space and all time. Many of us grew up gossiping with friends out in public and stopping the moment that an adult walks over. This isn't possible when things are persistent. And it's really hard to be public to all peers and just keep certain people out. So teens are learning how to negotiate a world where the very meaning of public and private have changed. Again, this is a good thing. They're going to need these skills in the future.

The day before, at Web2Open, I had heard something similar in the Troll Whispering session. Christy Canida explained that when someone posts something trollish or otherwise dubious on her site, they get put in a state where only they can see their posts, but no-one else can (except Christy and the other conversation monitors). This damps down the flame responses until Christy and co have time to review, and maybe release them, but in their view the post is on the site, but no-one is responding.

This varying view of the web, depending on who you are, seems odd at first, but it is in fact a recognition in code of what actually exists in human attention. We don't all read the same web, we see our own reflections in what we seek through searches or filtered by our homophily-led reading.

Which is where Twitter comes in. Like Jeff, I've been twittering more than blogging recently, and while immediacy is part of it, a far stronger thing is that I have a sense of public there - a public of people I choose to follow and who chose to follow me. Everyone who uses Twitter sees a different, semi-overlapping public, which maps closer to our individual idea of the digital public we are speaking to, and listening to; one that maps more closely what the socialogist and theorists have been describing for a while.


Baca Selengkapnya ....

Comcast's Bialystock and Bloom Business Model?

Posted by Unknown Rabu, 16 April 2008 0 komentar
Tomorrow, the FCC is holding a public hearing at Stanford on Broadband network management practices. With striking timing, Comcast today managed to announce a 'Internet Bill of Rights' without inviting any users, and simultaneously cut off Dave Winer's net connection for exceeding their secret usage limits. I can't link to Comcast's policy because their website mungs the text in via javascript - here's what they say:
Excessive use means data usage that is not characteristic of a typical residential user of the service as determined by Comcast.[...]Comcast currently identifies well less than 1% of Comcast High-Speed Internet customers as excessive users each month. [...]Many excessive users consume more data than a business-class T1 line running at full capacity in a month. [T1 is 1.5 Mbit/sec - Comcast claims to offer 12 Mbit/sec for PowerBoost, and 6/8 Mbit/sec standard] [...] Currently, each month Comcast identifies the top bandwidth users of its High-Speed Internet service by determining aggregate data usage across its entire customer base nationwide.

What they are saying is that they use a crude averaging model, and penalize you if you don't fit, for example by using the connection capacity they promise more than 10% of the time. Now, this could be called Procrustean, but it reminds me of The Producers, where Bialystock and Bloom sold a hundred people 10% shares of the show, assuming it would fail. Sadly for Comcast, people like Dave are finding new uses for the net's bandwidth, and not just checking email sporadically any more.

Conventional internet service user models are based on users downloading more then they upload, from common big media sites that can be easily cached. However, as Odlyzko pointed out, citing Lesk's now decade-old work, the dominant form of data creation is photographs. Now all these photographs are actually digital, and we want to share them so others can see them. Because we aren't allowed to run our own servers by the likes of Comcast, we have to upload them to Flickr or Photobucket or Picasa to share them. This gives us an 'upload more than you download' network flow, as we send them up at full multi-megapixel resolution, but browse a few of each others' at thumbnail or reduced size. And that's before we even consider video uploading (which I've noticed Comcast throttles at 0.4 Mbit/sec for me).

Comcast hit the news before by sabotaging Bittorrent transfers by faking reset packets, but what Bittorrent is really doing is arbitraging around the asymmetric network bandwidth delivered by these outdated user models.

Bob Briscoe recently wrote an interesting proposal on handling congestion by TCP signalling to reveal the costs of congestion. This was spun by George Ou as an attack on P2P protocols, but the underlying principle of penalising those who cause congestion is an interesting one. The question I'd like answered is that if I have a gigabit network at home, and the internet backbone is multi-terabit, when Comcast throttles my uploads to 400 kilobits, aren't they the ones causing the congestion?


Baca Selengkapnya ....

Be Organic, not Viral

Posted by Unknown Selasa, 19 Februari 2008 0 komentar
I just got back from the VLAB Multi-platform Social Networking event, which I thought was very interesting overall. Jeremiah Owyang did a great moderating job, and Jia Shen, Sourabh Niyogi, Ken Gullicksen and Steve Cohen brought lots of different viewpoints to the discussion. Growing and deriving value from Apps within Social Networks is still full of lots of unknowns, but it was good to hear some basic shared principles come through - my summary of one point was 'before you think about a Business Model, make sure you have a Pleasure Model'.

Another point well made by Steve Cohen of Bebo was something I've been thinking for a while too - the hunger for 'Viral' growth is a mistake - what you really need is 'Organic' growth. Just as we distinguish between Organic search results and bought or spammed ones, social network sites and their users are distinguishing between the viral apps that are essentially parasitic, using their hosts as a means to their propagation, and the ones that organically become part of the social ecology, making both the site and the users richer by their presence.
I spent the last weekend fighting off a flu virus, partly by eating lots of organic fruit. I expect social networks and their users will continue to do the same.


Baca Selengkapnya ....

The Social Cloud

Posted by Unknown Senin, 11 Februari 2008 0 komentar
My talk from LIFT is here for you to watch below (20mins, needs flash):


The others are up at the LIFT Video site

Baca Selengkapnya ....

LIFT Conference starts

Posted by Unknown Kamis, 07 Februari 2008 0 komentar

Geneva Sunrise
Originally uploaded by Kevin Marks
I'm in Geneva for the LIFT conference, watching Bruce Sterling riff on Carla Sarkozy as a black swan. The photo is what the sunrise looked like over the Alps at breakfast.

Baca Selengkapnya ....

Sheet music redux

Posted by Unknown Sabtu, 26 Januari 2008 0 komentar
I've long been involved with amateur theater and music performance (my boys are performing in a Schumann recital tomorrow with the rest of their piano teacher's pupils), and I grew up seeing double bass cases plastered with Musicians' Union "Keep Music Live" stickers around the place, but I always thought this was a luddite rearguard action against the tide of recorded media that began flowing about a century ago.
But this week, the news was that Rock Band  had sold 2.5 million downloaded songs for you to play along with (it comes with 58). 
Having researched this thoroughly with my boys, the fun of this game is more in the playing than the listening — the 'guitar' playing is clearly simplified, though the drumming is pretty close to reality, and the less said about my 'singing' the better.
Looking at this in the longer view, it can be seen as the return of sheet music in a new form; before recordings took over, sheet music sold for amateur performers was the dominant form. Here's Douglas Adams again:
during this century we have for the first time been dominated by non-interactive forms of entertainment: cinema, radio, recorded music and television. Before they came along all entertainment was interactive: theatre, music, sport – the performers and audience were there together, and even a respectfully silent audience exerted a powerful shaping presence on the unfolding of whatever drama they were there for. We didn’t need a special word for interactivity in the same way that we don’t (yet) need a special word for people with only one head.

I expect that history will show ‘normal’ mainstream twentieth century media to be the aberration in all this. ‘Please, miss, you mean they could only just sit there and watch? They couldn’t do anything? Didn’t everybody feel terribly isolated or alienated or ignored?’

‘Yes, child, that’s why they all went mad. Before the Restoration.’

‘What was the Restoration again, please, miss?’

‘The end of the twentieth century, child. When we started to get interactivity back.’

Baca Selengkapnya ....

Fear of the new - the Internet, Tea, and MapReduce

Posted by Unknown Jumat, 18 Januari 2008 0 komentar
Sir Richard Dearlove, former head of MI6 said:

“Al-Qa’eda has prospered and as it were regrouped largely because of the energy and effort it has put into its propaganda, largely through the internet.”

Sir Richard added that the internet had become the main channel for “radicalisation” and coordination between al-Qa’eda cells. He said: “In dealing with this problem, there is no alternative to imposing significant controls over the internet.”


This is what I call the "cup of tea" problem, after Douglas Adams:

Newsreaders still feel it is worth a special and rather worrying mention if, for instance, a crime was planned by people 'over the Internet.' They don't bother to mention when criminals use the telephone or the M4, or discuss their dastardly plans 'over a cup of tea,' though each of these was new and controversial in their day.

Some people have been surprised that tea was controversial, but William Cobbett's 1822 'The evils of tea (and the virtues of beer)' had this to say:

It must be evident to everyone, that the practice of tea drinking, must rended the frame feeble and unfit to encounter hard labour or severe weather, while, as I have shown, it deducts from the means of replenishing the belly and covering the back. Hence, succeeds a softness, an effeminacy, a seeking for the fireside, a lurking in the bed, and in short, all the characteristics of idleness, for which, in this case, real want of strength furnishes an apology. The tea drinking fills the public-houses, makes the frequenting of it habitual, corrupts boys as soon they are able to move from home, and does little less for the girls, to whom the gossip of the tea-table is no bad preparatory school for the brothel. At the very least, it teaches them idleness.

Which brings me to the attack on MapReduce today, which spectacularly misses the point by attacking a programming technique for not being a database and contains the striking line:

Given the experimental evaluations to date, we have serious doubts about how well MapReduce applications can scale.

(MapReduce is what Google uses to run complex data-manipulation problems on lots of computers in parallel to do things that databases fail at, like building an index for all the webpages it has found, or rendering map tiles for everywhere on earth in Google maps).

Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of apk zenonia 5.