Monday, November 30, 2009

14.1 The End

After reading the opening criticisms of PCs I was almost certain for a moment there that Justin Long was going to burst through my window and desperately try to convince me that the brick in my office is a figment of my imagination and that his advertisements are funny. Thankfully, I did not have to replace a window tonight, though by admitting this I think I may have committed some sort of sacrilege in the eyes of the EMAC gods.

In all seriousness, I appreciated that after commenting on the flaws with security inherent in the PC that Zittrain addressed the usefulness of the system. While there are aspects of PCs being distributed to new mediums, there are still plenty of opportunities on PCs. Like Zittrain mentions on 59:

"Eliminate the PC from many dens or living rooms, and we eliminate the test bed and distribution point of new, useful software from any corner of the globe."



The devices meant to focus on certain PC functions, whether it is gaming for an Xbox 360 or videos for the "Telmex Internet Box", drastically reduce the options available to the user. I can access the internet and play games on my Xbox 360, but I would hate to type anything to anyone through that console.

What we are seeing to some extent is the level of innovation through applications made for PCs with the security of consoles and other similar systems. New features are still being added for Xbox users, though they certainly are not being created at the same rate or on the same scale as PCs.

Security can be a very fascinating topic in regards to PCs. Depending on the means for protecting a computer, there is just as much a chance of preventing your own applications from working properly as there is for preventing attempts to compromise the computer. Norton products and Windows Vista are fantastic examples. While bringing more protection to the table, personally I have no interest in affirming my intent to open a program every single time I try to access it. When firewalls cannot be modified to allow your own programs to pass through short of disabling the entire firewall, there might be a problem. Yet many choose to grin and bear it and may be better off for it.

I must admit I appreciate von Hippel's graph. Especially the prime example of Wile E. Coyote. R&D can research possible advances in their technology, but they are nowhere near as motivated as an individual who needs to make their workplace more efficient. The payoff for these individuals is in the work and the personal effect it has on them is more significant than the work of researchers that may have no direct experience with the individual's issues.

By far, my favorite section of the book is the one boldly labeled "Solutions". I could have really used this section in The Exploit, though it most certainly would have read differently. Being able to revert to previous settings is insanely useful; without it I would have lost my portfolio several times over the course of my undergraduate experience, and this functionality online makes life a lot easier. Though I can also attest to the dangers of a corrupted Red PC, after saving and restoring a backup on my computer from a corrupted file. The security no longer needs to be focused on the access to tools for modification, but on the undo button.

I can only imagine what it would be like to be banned from a site because someone in the same city did something stupid; Qatar has a very fascinating system working there. In that vein, the idea of spy versus spy withing computer networks is a fascinating concept; what better way to gather information on spyware than by spreading in a similar fashion? If computers could be saturated with this type of toolkit, the information made available would be invaluable. Strangely, it seems as though this would almost be more effective if distributed exactly like a virus; volunteers for this sort of program probably are already conscious of threats to their computer. By quietly monitoring the effects of various files on computers belonging to users who obviously don't concern themselves with security, I'd think malicious elements would be much more visible.

But I'm not a computer scientist, nor am I truly fit to make assertions regarding this material. I am content with the knowledge that we are seeing examples of these solutions and am interested in observing these issues play out through instances online.

Monday, November 23, 2009

13.1 Networking

To call this one of the more intellectual reads would be a gross understatement. After rereading most of the pages and returning to previous material to ensure I was (maybe) comprehending the material, it felt as though any preexisting concept of networks was smothered under the raw weight of protocol.

While it is generous of the authors to acknowledge the existence of protocol in a cybernetic and biological environment, it felt to me as though more was lost through this analysis than gained. Those not already versed in the finer points of DNA or TCP/IP are left to stumble through explanations that touch on topics but require previous knowledge to understand the full extent of the topic. I was particularly glad, however, that the genetics class I took as an undergraduate has paid off.

Having trouble keeping up with some of the examples didn't lessen the impact of this book, however. Thinking in terms of protocol and information, edges and nodes, is an emergent idea that specifically caters to the current mindset and technology available.

Of course, our government so frequently referenced in The Exploit is anything but fluid. It is ferociously vertical and still exclusive in several ways. While the book focuses on communities and governing bodies in the real world, it seems more likely that a community driven by protocol will come to fruition through online media and not be contained by any single governing body due to the fluidity of the medium. Short of a revolution, there is almost no place to begin shifting a nation to a protocol or even counterprotocol.

Early on (p26) there is mention of military action being shaped to accommodate a more protocological force. If I remember right this is mentioned later with the global deployment of the United States military, which seems to fall between hierarchy and protocol. There is a clear pecking order in the military, but it is also equipped to be highly adaptive if there is a change in command or an emergency. Perhaps I'm wrong, but I have no doubt it would be very interesting to see how these separated networks would adapt if they were to sever all edges connecting them to other military patches around the globe. How many isolated networks would react in tandem with other networks on the other side of the world? This doesn't exhibit the political openness of protocol or the horizontal distribution, but it may be one of the better examples of flexibility.

Counterprotocol seems like something still a ways beyond our grasp. We are beginning to demonstrate many-to-many interactions, but it still feels as though it is very much initiated by the individual, not by any "swarm" mentality. Blurring the line between edges and nodes feels like some maddening science fiction jargon, and I am hesitant to accept this prediction. The need for pushing past protocol seems accurate; remaining static accomplishes little, and it will be interesting to see if the next step in networking expands as predicted in this book.

Monday, November 16, 2009

12.0 Networking Error

The dangers of networking between groups in Watts' book really struck a chord with me. As a member of the campus newspaper, it has become increasingly obvious that change is needed. We have an online presence, but it is still in its infancy. As we start bringing video and audio aspects to our site, we start having overlap with our online television station on campus, and, if we were ever at the level where we could be reviewing music online, we could potentially have overlap with our online radio station.

This raised several very important questions. Namely, what should our media organizations do? Do we continue separately, possibly duplicating content and competing directly with our fellow media groups on campus? Do we coordinate and tackle ideas separately? Do we join forces?

Blasphemy, right? Combine several old forms of media into a new conglomerate. It's like throwing all the old forms into the blender and lapping up the abattoir remains like cannibals. Even though this is already happening on a magical little place known to a rare few as the internet. And contrary to some doctoral students that seem convinced that the internet will shrink as soon as the economy recovers, I think the internet is doing alright for itself as a source of news and information.

We can see this happening already; news broadcasts on television say that more information can be found online or in a newspaper, or vice-versa. When a new medium comes along that is a one-stop shop for information that is increasingly being taken seriously, being assailed by information through only one medium seems almost classical and quaint. All this is invariably a bit harsh and a bit too much, but the basic question remains: why are we keeping media separated besides to preserve older institutions?

This is part one of my networking complications in real life. Part two stems from the fact that for some reason the people in charge of media and communication at our school in many ways are terrible at communicating internally and externally. This is not the fault of one individual or one organization, it is an organizational flaw that is inherent in almost every layer of our media.

For example, a recent dance hosted by our radio station had an event established on Facebook weeks before the event, but most of the invites were only sent days before. Someone posted how much they hate that these events are only announced a week before they happen, and the official radio response was "Ask us earlier, cus we know." As if people should constantly be checking with members involved in the media group to get information because it's too inconvenient to broadcast this information ahead of schedule. There are very few things right about this situation. And there have been similar instances with each branch of media on campus, to be sure.

The only official communication between these organizations is handled through an operating board. This board ultimately exists to deal with jobs, legal issues, and implementing new media groups, so perhaps it's not exactly the place to be discussing certain ideas between organizations. But the real kicker here is that this group has met once this entire semester. Technically twice, but the leaders of the media groups were not invited to the second one. So aside from hunting down the offices of different media members or stalking them on Facebook, the best way to get information on a different branch of the media is to go through the one person overlooking every media group, since as was made evident by the previous example each group may not see fit to broadcast information to everyone.

The institution seems to resist effective communication at nearly every level of organization, and there's no easy way to fix this. So I've begun encouraging the creation of a new level through my position: advertising.

Maybe I'm an anomaly as the only standard paid individual involved in advertising in student media, but advertising is quite isolated from the standard positions in media. Physically as well as intellectually, since all of the newspaper office is across the hall from my spacious, empty workspace. And for a change, this can be very beneficial. As our website goes through an overhaul and gets online advertising, the possibility of advertising through other media groups arose. Even if there is one aspect that could reach over all media groups, it seems this would be a step in the right direction towards expanding our media network.

Of course, Watts says this can be dangerous, and I'm well aware that certain members of our newspaper staff and opinion publication would invariably come to blows within minutes of working together. Would it be worth it? Could it potentially be successful? Where better to risk something like this than in an academic environment? Provided things pan out and there is even a possibility of forming some connections, I'll be eager to see what life is like beyond these steel caves.

12.1 Statistically Probable

Whether it's simply gauging quantity or solving complex problems through formulas, numbers are extremely convenient. Six Degrees is by far the most mathematically inclined individual we've read so far, which brings a lot of interesting points to the table.

As someone who took a whopping two math classes as an undergraduate student, it is both refreshing and sometimes frustrating thinking of certain concepts in non-abstract terms. Prior to reading the book, I never really considered networks so important in so many fields of science. It does make sense, though; in many sciences, strange things happen when groups are added to the mix. As quoted early on from Anderson, more is different.

With each iteration and additional field of study, new approaches address the different angles that networking has been studied from. Each time, fascinating ideas are revealed, from the Small-world Networks constrained between two curves to the baffling tests performed by Asch. While each further study provides a better idea of how networking and in many ways society works statistically, each test comes with a disclaimer warning that these don't cover everything.

And really, how could they? Even with the development of computers since the 1950's that have allowed people to research topics and simulate environments in ways that were unthinkable before, there are still thinks beyond our ability to imitate or replicate. We can calculate the possible variations of societies based on grouping and random encounters, and while this provides interesting information about Small-world Networks, it brings about far more questions than it answers. I almost wish that Watts had included the variables and criteria used to generate this information.

This isn't to say that the questions are bad, by any stretch of the imagination. Over the course of the book, all the statistics and numbers add up to provide a far more encompassing view of how networks operate, but it seems as though this information can realistically only be viewed separately. Like a much more complicated Heisenberg Uncertainty Principle, there are multiple aspects of human nature that we have significant problems comparing and gauging side by side. Even the most complex simulation would have trouble taking everything into account. Humans are tricky like that.

But we do get a better idea of some of the stupid crazy things people are prone to (again, see Asch). As Watts ends with, this is all still relatively new. Strangely enough, many theories in networking share traits in physics and epidemiology and sociology, leading to new networks being formed between unlikely groups in the scientific community. The research is there, the application is complicated, and the work is set out for those that wish to continue in this field.

Monday, November 9, 2009

11.1 Defining Ourselves

All this talk about defining ourselves online makes me feel as though we are increasingly defined by a set of variables and statistics. Not to say that we weren't before, but now it's far more obvious and quantitative. It's just like those programming classes I'm glad I won't have to take again: eyeColor = "GREEN", height = 76, hairColor = "BROWN". Each of these bits of information is categorized and stored away, in many ways bringing the body online through characters and numbers. This makes for a personalized space online with sites that remember our preferences like Amazon.com and can even tell us not only who we're romantically compatible with but how successful the relationship is likely to be across multiple categories.

All of this, however, is determined by the information we provide. Yes, we tailor that information. The information accessible to friends is in many cases also accessible to family and coworkers, as well as potential employers. Broadcasting personal information is typically not wise, and throwing up a few quotes from Shakespeare or saying one of your favorite books is Catcher in the Rye never hurt anyone.

As Boyd indicates, we define ourselves textually online and write ourselves into existence in this online space. When the writing stops, the persona online starts to fade; even information that is only a few weeks old is outdated when many are making their presence known every few hours. Once the information lingers for long enough, even if it is still physically present online, it can become detached from the person who originally constructed the information and eventually lost.

Years ago I frequently updated a page on deviantART and had a MySpace page. The MySpace page was rarely updated and I had more friends on Facebook, so even though the information was present there it drifted into obscurity to the point that I can't remember how to access my account. The information about myself never changed on deviantART, but each new art submission and comment on other artist's work maintained an identity and presence; the most recent post was who I was on that site. Once I stopped posting, people stopped visiting and the identity attached to that account stopped existing some years ago.

Now, I've reached a point where the information communicated online rarely has any synchronization with reality. While I have the option to broadcast my current state of being over Twitter or Facebook, it is more like announcing than expressing, though many friends on Facebook seem inclined to express their political views very visibly on my newsfeed day after day. And maybe that's the new state of things; less concern with what information is presented to others. People are already broadcasting their breakups on Facebook before their significant others know about it, so why not make everything as blatant?

Monday, November 2, 2009

10.1 Knowledge is Power

Blueprints are useful. Describing blueprints verbally is painful. A picture is worth a thousand words. Just saying. Also, I'm delighted to see Nakamura actually mention the difficulties and complications new terminology brings to the table. It seems in some cases that is the theme of some of the material that we read; for all the topics on communication, the way they're presented can easily hamper interpretation.

I couldn't help but think of the internet as a whole after reading Panopticism, which I'm assuming is the point I was supposed to get. Everything is recorded, equally divided, and uninterrupted work links the outside and the inside; this seems so familiar, but the internet as we've come to know it hardly seems like a disciplinary mechanism.

The paragraph on lepers seems reminiscent of the divided cultures on the internet. While not literally exiled to their leper colonies, individuals do isolate their presence online and tend to limit it to specific frequented sites and areas. In an escapist sort of way, people driven away by events or groups in reality are almost guaranteed to find like-minded individuals online. For some reason I'm envisioning Chevy Chase and Dan Akroyd in the slightly modified Lepers Like Us.

In many ways the internet does seem like a great asylum, dividing us by our characteristics and fetishes. The strange thing now is the fact that every individual is a spectator in the central chamber and an inmate; we have the potential to witness those around us and we are becomingly increasingly visible online.

Though I also agree with Nakamura's assumption about previous media; we can't describe all the new means with old terms, since it frankly isn't the same. We tend to fall back on the accepted uses that have prevailed in previous media.

Over the course of last week I spent my time in Austin at the National College Media Convention, which was a fascinating experience on many levels. I have only been involved with campus media for a year, which means I'm nowhere near as experienced as the advisers presenting information and many of the students present. And I felt better off for it. After listening to a person with a doctorate tell me that online news would greatly decline after the economy recovers based on seven-year-old data, I worried the ignorance might be contagious but also felt pretty smart comparatively.

Though it may not be a good sign. The 'experts' in the field in many cases have trouble converting their expertise to fit with new media, and the technology is changing at a rate where newly appointed experts have mastered outdated material. Mentioning the seven-year-old data is only important because so much has happened just in that span of time. The groups that are surviving and thriving in college media aren't necessarily professionals, but they certainly are adaptable, and that is far more useful than possessing a wealth of outdated information.

But I digress. For all the advertisements that bombard my screen every time I peruse the internet, it never occurred to me that there is a correlation between some of these advertisements and the virtual personas witnessing them. Teeth whitening ads and body-building advertisements seemed like just more spam, but they do cater to a particular interest and are more prevalent than most other types of advertisements. This probably should have struck me since I'm in advertising, though I suppose I'm not quite trained to think that way.

Though advertising now is at a peculiar crossroads. As many speakers at the NCMC confessed, their website had greater reach and potential but the advertising revenue from online was a incomparable besides the revenue from print ads. Part of this seems to be a result of something one of the speakers mentioned; many people don't understand why they pay for clicks on a banner. This goes back to the rate of change in technology over the past quarter of a century. Old ideas taken for granted clash with emerging concepts, and the results are... fascinating.

Sunday, October 25, 2009

9.0 First Thoughts and Public Relations

Today started a little different from my normal Sunday. After driving to Dallas, finding parking, and climbing on top of a security booth, I got a very unique view of the unfolding events for PAC-WE. This was quite an experience, and an hour, several scratches, and a leap of faith later I had essentially witnessed around a hundred people in yellow ponchos form two distinct shapes in a parking lot.

Of course, there was significant meaning behind the event, but all that information can be found on the website. This is about the experience, as well as communication and responsibility for new media. Or it will be when I get to that.

I honestly had not heard the phone story listed in the beginning of Here Comes Everybody before. That experience seems like the ideal outcome, with so many people rallying behind one issue, motivated by some virtue. Well, aside from the off-topic forums.

And PAC-WE seemed like something along the same lines. I heard about the event less than a week before it took place, but after searching around I found that the event had a Twitter feed, a Facebook page, and had been covered by a KERA blog. Sometime before the event someone mentioned the expected turnout for the event, which incidentally was a bit larger than the actual turnout.

The event had been a work in progress for about a month, which is a bit more than the ten day miracle performed to recover a lost phone. Given, this was an exceptional case, but what was to keep PAC-WE from being one as well? Bad timing? Networking issues? There are more variables than I could possibly imagine, but I still wonder what could have made things even better and hope to see a similar event inspired by our campus' art program soon.

All the planning and communication for this event was well organized from what I saw, which made me think about the end of the cell phone story where Evans gets a new job in public relations. This tripped an alarm in my head about the destruction of the public sphere. Given, I haven't worked in PR, though this comes up quite a bit at the office for the newspaper I work at since most writers should try to not sound like PR. I work in advertising and have come to understand that distribution does not equal our number of readers.

Assuming there is some large, typical company with PR distributing information on the company to various sources and advertising paying others to display their product or service, where does Facebook fit in? Or Twitter, for that matter? Perhaps this is an obvious question, but it seems that the people who have large followings in social networks could be making a mint through companies in two ways. They know how to get a following and could probably create a network of individuals interested in the company's goods.

The other way these people could help is more indirect and quite possibly more effective. If you see a movie star drinking a sports drink on the big screen, the scene screams "product placement". If you see that same movie star tweet about drinking that same drink while kicking back and watching a sports game, it's not product placement; it's a personal promotion from an individual who isn't being paid to support that product. Or, we assume isn't being paid to support that product.

Twitter manipulations aside, assuming we should, who should network a company? They're not paying to promote, but is it still advertising? There's no mouthpiece in the form of other people to spread the word, but is it still public relations? Or is this something that could become a part of everyone's job? Most of us have these accounts for social networking, so technically we could all be funneling in resources for our businesses. If we should, why, and if so, who? Something I'll be pondering while finishing Shirky.