Social

You are currently browsing the archive for the Social category.

Civilization is a draft. Provisional. Scaffolded. Under construction. For example:

DEC. OF INDEP. 1

That’s Thomas Jefferson‘s rough draft of the Declaration of Independence. The Declaration hasn’t changed since July 4, 1776, but the Constitution built on it has been amended thirty-three times, so far. The thirteenth of those abolished slavery, at the close of the Civil War, seventy-seven years after the Constitution was ratified.

Today we are in another struggle for equality, this time on the Net. As Brian Grimmer put it to me, “Digital emancipation is the struggle of the century.”

There is an ironic distance between those first two words: digital and emancipation. The digital world by itself is free. Its boundaries are those of binary math: ones and zeroes. Connecting that world is a network designed to put no restrictions on personal (or any) power, while reducing nearly to zero the functional distance between everybody and everything. Costs too. Meanwhile, most of what we experience on the Net takes place on the World Wide Web, which is not the Net but a layer on top of it. The Web is built on architectural framework called client-server. Within that framework, browsers are clients, and sites are servers. So the relationship looks like this:

calf-cow

In other words, client-server is calf-cow. (I was once told that “client-server” was chosen because “it sounded better than ‘slave-master.’” If anyone has the facts on that, let us know.)

Bruce Schneier gives us another metapor for this asymmetry:

It’s a feudal world out there.

Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft do it all. Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Some of us have pretty much abandoned e-mail altogether … for Facebook.

These vendors are becoming our feudal lords, and we are becoming their vassals.

It’s handy being a vassal. For example, you get to use these shortcuts into websites that require logins:

social-signin

To see how much personal data you risk spilling when you click on the Facebook one, visit iSharedWhat (by Joe Andrieu) for a test run. That spilled data can be used in many ways, including surveillance. The Direct Marketing Association tells us the purpose of surveillance is to give you a better “internet experience” through “interest-based advertising—ads that are intended for you, based on what you do online.” The DMA also provides tools for you to manage experiences of what they call “your ads,” by clicking on this tiny image here:

adchoicesbutton

It appears in the corners of ads from companies in the DMA’s AdChoice program. Here is one:

scottrade

The “AdChoices” text appears when you mouse over the icon. When I click on it, I get this:

scottradepopdown

Like most companies’ privacy policies, Scottrade’s says this: “Scottrade reserves the right to make changes to this Online Privacy Policy at any time.” But never mind that. Instead look at the links that follow. One of those leads to Opt Out From Behavioral Advertising By Participating Companies (BETA). There you can selectively opt out of advertising by dozens of companies. (There are hundreds of those, however. Most don’t allow opting out.)

I suppose that’s kind of them; but for you and me it’s a lot easier just to block all ads and tracking on our own, with a browser extension or add-on. This is why Adblock Plus tops Firefox’s browser add-ons list, which includes many other similar products as well. (The latest is Privacy Badger, from the EFF, which Don Marti visits here.)

Good as they are, ad and tracking blockers are still just prophylactics. They make captivity more bearable, but they don’t emancipate us. For that we need are first person technologies: ways to engage as equals on the open Net, including the feudal Web.

One way to start is by agreeing about how we respect each other. The Respect Trust Framework, for example, is a constitution of sorts, “designed to be self-reinforcing through use of a peer-to-peer reputation system.” Every person and company agreeing to the framework is a peer. Here are the five principles to which all members agree:

Promise We will respect each other’s digital boundaries

Every Member promises to respect the right of every other Member to control the Member Information they share within the network and the communications they receive within the network.

Permission We will negotiate with each other in good faith

As part of this promise, every Member agrees that all sharing of Member Information and sending of communications will be by permission, and to be honest and direct about the purpose(s) for which permission is sought.

Protection We will protect the identity and data entrusted to us

As part of this promise, every Member agrees to provide reasonable protection for the privacy and security of Member Information shared with that Member.

Portability We will support other Members’ freedom of movement

As part of this promise, every Member agrees that if it hosts Member Information on behalf of another Member, the right to possess, access, control, and share the hosted information, including the right to move it to another host, belongs to the hosted Member.

Proof We will reasonably cooperate for the good of all Members

As part of this promise, every Member agrees to share the reputation metadata necessary for the health of the network, including feedback about compliance with this trust framework, and to not engage in any practices intended to game or subvert the reputation system.

The Respect Network has gathered several dozen founding partners in a common effort to leverage the Respect Trust Framework into common use, and within it a market for VRM and services that help out. I’m involved with two of those partners: The Searls Group (my own consultancy, for which Respect Network is a client) and Customer Commons (in which I am a board member).

This summer Respect Network launched a crowd-funding campaign to get this new social login button rolling:

respect-connect-button

It’s called the Respect Connect button, and it embodies all the principles above; but especially the first one: We will respect each others’ digital boundaries. This makes itthe first safe social login button.

Think of the Respect Connect button project as a barn raising. There are lots of planks (and skills) you can bring, but the main ones will be your =names (“equals names”). These are sovereign identifiers you own and manage for yourself — unlike, say, your Twitter @ handle, which Twitter owns. (Organizations — companies, associations, governments — have +names and things have *names.)

Mine is =Doc.

Selling =names are CSPs: Cloud Service Providers. There are five so far (based, respectively, in Las Vegas, Vienna, London, New York/Jerusalem and Perth):

bosonweb-logo danube_clouds-logo paoga-logo emmett_global-logo onexus-logo

Here’s a key feature: they are substituable. You can port your =name from one to the other as easily as you port your phone number from one company to another. (In fact the company that does this in the background for both your =name and your phone number is Neustar, another Respect Network partner.)

You can also self-host your own personal cloud.

I just got back from a world tour of places where much scaffolding work is going up around this and many other ways customers and companies can respect each other and grow markets. I’ll be reporting more on all of it in coming posts. Meanwhile, enjoy some photos.

 

nytimesriverDave says “The New York Times home page needs a re-think.” But he doesn’t stop there, because thinking isn’t enough and complaining is worse than useless. (As I’ve often found. For example, here.)

We need to hack up something new, different, better and — most of all — simpler and easier to implement than anything the Times can do on its own.

(The Times is kinda busy now anyway. And it’s not inclined to simplicity, especially on the Web. That’s not a knock. We’re talking DNA here. But the Times can listen and act, as it did back when Martin Nisenholtz and his team followed Dave’s lead and adopted RSS, reforming and reinvigorating the whole publishing business in the process. We want the same kind of adoption and effects again this time.)

The simplest thing you can do as a programmer is leverage something Dave came up with years ago called river of news. As a reader you can blog, tweet and otherwise submit to the world your suggestions.

Hashtag: #timesriver.

Tagline: All the news that’s fit to flow.

Here’s Dave’s own current set of rivers.

That’s a handy model, but neither Dave nor I want that to restrict your thinking or your coding. We want new thinking, new hacking, new (and renewed) heads on the case and fingers on keyboards.

For that Dave has convened a hackathon. Here’s how he got it rolling:

Here’s an OPML file with all the NYT feeds I could find, in Oct 2012.#

Your task: Build a website using the flow of these feeds. A new way to sample the flow of news from the NYT.#

Here’s what I’m using now, designed years ago. Surely you can do better!#

Share a pointer to your work with this hashtag: #nytfeedfun.#

There’s a lot of data flowing through there. #

A picture of a slice of cheese cake.

PS: Deadline? We’re having an RSS meetup in NYC in mid-June.#

Guidance from my (non-programming) corner:::

Think about turning the Times from a static thing to a live one* — literally, from a paper to a river.

Think about how a river forms. Its sources are tributaries: branches that flow in, not out. The biggest rivers sustain life in their waters and alongside their banks. They are at the very core of culture and civilization. And they pour out through a delta to the ocean. The ocean is the Web. The delta is whatever we make it.

I’ll be writing more about this topic in the coming days and weeks, both in service to journalism’s cause (whatever it is — and I mean that seriously) and to wrap my tour of duty as a visiting scholar at NYU’s Arthur L. Carter,Journalism Institute. (In that I’m following the large footsteps of Dave, who served in the same post under our friend and mentor Jay Rosen.)

So hack away. I’m very eager to see the results — but not as eager as I hope the Times itself will be — for everybody’s sake. (I’m serious about that too. The Times is the anchor institution for civilization as well as journalism. Helping it adapt may be the highest calling we have.)

* Some background on the static/live distinction, written almost a decade ago, and now more relevant than ever.

In this comment and this one under my last post, Ian Falconer brings up a bunch of interesting points, some of which are summarized by these paragraphs from his first comment…

Here in the UK most people over 40 will remember placing calls via a human operator. A real life person who had a direct interaction with both caller and receiver when reversing the call charges. In smaller towns and villages this meant that the operator knew who was phoning who, when and often, given their overarching view, could assume why.

This was socially accepted as the operators were usually local and subject to the same social norms as the friends and neighbors they ‘surveilled’.

But they were also employees of the GPO (General Post Office) with a national security obligation and had a direct reporting route into the national security apparatus, so that, if they felt that something fishy was afoot (especially in times of war), they were assumed to be both reliable and honest witnesses.

No-one assumed secrecy in an operator-mediated system. They assumed discretion on the part of the operator.

Is an ISP any different just because the data is package-based rather than analogue ? It conducts all the same functions as the old operator.

The shift from public ownership to private and from land-lines to mobile has not changed the underlying model of presumed access (as far as teleco users are concerned) and assumed responsibility (on the part of the national security apparatus). And though both are now legally defined under the license terms of privatised telecos, few of the UK’s public know how their comms systems actually work, so often assume a similar design ethos to the US, where constitutionally defined rights are a starting point for systems organisation.

That British Telecom evolved from the GPO is no accident, but neither is it necessarily a designed progression intend on increased surveillance.

… and these from his second:

Against most evidence US Congress doesn’t set UK law. The EU & UK governments do that. And against most evidence the US doesn’t set global social norms. So while I’m not saying Brits explicitly like spies and respect code breakers, there is a history here that forms a backdrop to the national mind set and it looks towards Bletchley Park, Alan Turing & James Bond rather than The Stasi, Senator McCarthey or Hoover’s G-Men.

The time and place to look for a failure of oversight is the sale of rights to spectrum access but a global technological fix for a perceived lack of communicational security, especially a US-led one, seems unlikely. The righteous indignation with respect to Huwei hardware looks like a starting point rather than an end point right now.

To me these events and discoveries more likely to work to fragment the rough and ready constellation of networks into national gardens once more. This would force comms through regulated conduits making in-out surveillance even easier and I tentatively suggest that in the legislation of whatever-comes-next those carrying out oversight do a better job, if legally-enshrined privacy is their aim.

I am somewhat familiar with the UK, having spent a number of years consulting BT. I have also spent a lot of time in the EU, mostly studying and collaborating with VRM developers, a large percentage of which are located in the UK and France.

Here in the U.S. many of us (me included) still had “party lines” and required operator assistance for long-distance calls as recently as the mid-’70s. With party lines phone connections were shared by as many as six other homes, and people could listen in on each other easily. Operators could listen to anything, any time. Thus, as Ian says, discretion rather than secrecy was assumed.

And discretion is The Thing. As it was with the old phone system it also was with spying, which every government does, and we have always assumed was going on — much of it outside the laws that apply to the rest of us — and hopefully for some greater good. Thus whatever we end up with on the Internet will rest on a system of manners and not just of laws and technologies.

Ideally law, technology and manners work in harmony and support each other. What we have had so far, in the era that began with personal computing and grew to include the Internet and smart mobile devices, has been a disharmonious cacophony caused by technology development and adoption with little regard for the incumbent systems of manners and law. And it is still early in the evolution of all three toward working harmony such as we have long experienced in the physical world.

Of those three, however, manners matter most. It seems no accident, to me at least, that the Internet is defined by protocols, which are nothing more than mannerly agreements between network operators and among the human and organizational operators of the network’s billions of end points.

Security of the telco-like centralized locked-down sort was never in the DNA of the Internet Protocol, which is one reason why it never would have been invented by the very companies and governments through whose local, national and international networks the Internet connects us all.

So it should be no surprise, aside from all the privacy concerns currently on the front burner of popular consciousness, that telcos, cablecos, national governments and institutions such as the ITU have busied themselves with stuffing the Internet, in pieces, back inside the regulatory, billing and nationally bordered bottles from which it more or less escaped, at first un-noticed, in the 1980s and early 1990s.

J.P. Rangaswami, when he was at BT, famously noted that a telco’s main competency was not communications but billing. It still is. China’s censored national subset of the world wide Internet is for many countries a model rather than an aberration. And the drift of Net usage to cellular mobile devices and networks has re-acclaimated users to isolated operation within national borders (lest they suffer “bill shock” when they “roam” outside their country) — something the landline-based Internet overcame by design.

All these things play into our evolution toward privacy in the virtual world that is recognizably similar to what we have long experienced in the physical one.

National mind sets are important, because those embody manners too. Public surveillance is far more present, and trusted, in the U.K. than in the U.S. I also sense a more elevated (and perhaps evolved) comprehension of privacy (as, for example, “the right to be left alone”) in Europe than in the U.S. I am often reminded, in Europe, of the consequences of detailed records being kept of citizens’ ethnicities when WWII broke out. Memories of WWII are much different in the U.S. We lost many soldiers in that war, and took in many refugees. But it was not fought on our soil.

There is also in Europe a strong sense that business and government should operate in symbiosis. Here in the U.S., business and government are now posed in popular consciousness (especially on the political and religious right) as opposing forces.

But all these things are just factors of our time. What matters most is that the whole world will need to come to new terms with the three things I listed in my earlier Thoughts on Privacy post: 1) ubiquitous computing power, 2) ubiquitous Internet access, and 3) the unlimited ability to observe, copy and store data. All these capacities are new to human experience, and we have hardly begun to deal with what they mean for civilization.

I suspect that only the generation that has grown up connected — those under, say, the age of 25 — begin to fully comprehend what these new states of being are all about. I’ve been young for a long time (I’m 66 now), but the best I can do is observe in wonder those people who (in Bob Frankston‘s words) assume connectivity as a natural state of being. My 16-year old son feels this state, in his bones, to a degree neither I nor my 40-something kids don’t. To us elders, connectivity is an exceptional grace rather than a natural state.

Manners among the connected young, however, have barely evolved past the reptile stage. In Report: Every Potential 2040 President Already Unelectable Due To Facebook, The Onion was not fully joking (it never is) when it said “A troubling report finds that by 2040 every presidential candidate will be unelectable to political office due to their embarrassing Facebook posts.”

I just hope that the laws we are making today (protecting yesterday from last Thursday, as all new laws tend to do) will be improved by new generations made wiser by their experiences with technologies made ubiquitous by their elders.

In Bubkes, Stephen Lewis has lately been blogging with depth and insight on many topics — music, architecture, culture, infrastructure and events historic and current — in two cities with which he is intimately familiar: Istanbul and Sofia.

In Taksim Underpass: Ask Gertrude Stein, Dorothy Parker, Jane Jacobs, and Robert Moses, he writes,

By itself, the Turkish government’s plan to shunt traffic under and past Taksim Square might indeed lessen vehicular congestion, thus freeing this iconic location from dominance by motor vehicle traffic. In conjunction with the plan to replace all of Taksim Square and Gezi Park with a massive complex of shopping mall, mosque, and fantasy reconstruction of a 19th-century military barracks, however, the underpass will instead deliver more automobile traffic into the urban core, a further step toward transforming a vital, unplanned, dense, “legacy” urban agglomeration into just another suburb.

In Istanbul Conflicts From Afar: Issues and Aspersions, Headscarves and Rambo, he visits specious tales by the Turkish Prime Minister and his sympathizers, of protestors “harassing pious Muslim women and tearing off their headscarves” (among other offenses for which there is no confirming hard evidence), and compares them to equally wrong tales from the Vietnam War era. That was when “US antiwar activists were stigmatized — and crocodile tears poured forth — over reports that US soldiers returning from tours duty in Vietnam were being spit upon by opponents of the war.  Not a single person, however — neither spitter, spat upon, nor witness thereto — ever stepped forward to confirm any such attack.” In support of this he recalls an On the Media program confirming the purely propogandized nature of the claim. I just did some digging and found the program transcript. Here it is.

In Sofia, Bulgaria: From Protest to Protest to Protest, Steve visits “the Balkan blurring of what is said and what is, and what is and what could or should be” and how in Bulgaria “nothing is what is seems to be at first glance, and words, no matter how clear, often refer to alternate realities (click here for my long-ago online discourse on the wisdom and convenience of the oft-heard Bulgarian-language phrase po printsip, tr. ‘in principle‘).” His next post, Plovdiv, Bulgaria, 1997: Musicians Marching in Protest, recalls an earlier protest, again accompanied by an excellent photo.

In Istanbul: Water, Fountains, Taksim, and Infrastructural Tourism, Steve reports on joining a colleague in visiting “the layers of infrastructure — including Ottoman-era fountains — that have served Istanbul over centuries past and during its ten-fold growth in population during the twentieth.” I share with Steve a passion for what he and his colleague call “infrastructural tourism” — a practice which, he adds, “appears already to be underway, albeit searching for its own content and method, as per this report at Design Observer.” Wonderful link, that one. Go read that too.

In From the Archives: Fading Fragments of Legacy Infrastructure, he begins,

Two decades ago, I began to photograph the historic water fountains (çeșme) and water kiosks (sebil) of Istanbul.  I began, not with the grand and monumental, but with obscure and abandoned — those in backstreets, alleyways, and courtyards, functioning and non-functioning fragments of legacy urban infrastructure, overlooked by scholars,  their features surrendered to the elements, decay, and neglect. The forgotten origins and gradual disappearance of many of these structures seemed symbolic of larger urban processes of decline and abandonment — processes that are as central to the functioning and continuity of cities as are restoration and (re)development.

I’ve been doing something similar in New York and New Jersey, where I grew up. A few days ago, driving back to Manhattan from a meeting in Edgewater, New Jersey, I found myself following Google Maps’ navigation to the George Washington Bridge, turning onto Bruce Reynolds Boulevard before bearing right onto a ramp leading into the toll lanes. Paused at a light,  I saw on the right an old street sign marking the late Hoyt Avenue, and realized I was exactly where my parents lived when I was born: at 2063 Hoyt. Ninety-three years earlier, this was the view from that very same spot. (And here’s the larger photo set, with shots old and new. Credit for the old ones goes to my late father and to his little sister Grace, now 101 years old and doing fine.) I hope, when Steve next returns to New York (his home town), we can do some infrastructural touring together, cameras in hand.

Bonus link: Steve’s latest, Further to “Istanbul Conflicts From Afar:” Kudos, Mentions, and “Great Expectorations”, which cites this post as well.

The title of this post, Rebuilding the Future, is one I came up with back when I read Steve’s Taksim Underpass piece, and I wanted to post thoughts about the ironies that always surround the civic graces — especially infrastructure — that we choose to keep using (often for new purposes), or just to preserve, for generations to come. I didn’t go there, because I’ve already said enough and I’d rather that readers get into what Steve is writing and sharing. But I still kinda like the headline, so I’m letting it stand.

I first heard QR codes called “robot barf” yesterday, when JP said it. Got a good laugh out of it too, because: yeah, if a robot could barf, that’s what it would look like.

Digging back, it looks like the first source of the joke is Andy Roberts here, or Jon Mitchell here, both of whom posted on 27 October, 2011.

Kevin Marks followed in the same vein with QR Codes, bad idea or terrible idea? on 28 January 2012. There Kevin wrote, among other things, “QR Codes ignore years of research and culture on how to communicate meaning in symbolic form designed to be captured by image processing tools behind a lens. We have this technology. It is called writing.”

Both John and Kevin pointed to RobotBarf.com, an innocuous-looking Japanese site without a QR code anywhere to be seen. Its title, translated by Google in Chrome, is “Floor coatings proficient poisoning.” The subtitle is “Sister and sister floor coating proficient.” The body copy begins, “By the way, eh had fallen at the door my sister When you go home? What does this murder? The’m was about to close the door involuntarily thought such as.Voice of sister sank to the floor face willl “welcome back” I heard, I went to the front door or what ‘s also Ninen.” Thus speaks the technology we call writing.

Citing Kevin, JP asked me if there was a difference between a QR code and a link. I said yes, because the author can make a QR code mean anything, and a QR code can also have any number of authors, or documents, or you-name-it, associated with it. I didn’t have the time make more of a case than that, but now I do, so here goes.

Think of a QR code as a window to anything, rather than as a form of writing.

For example, a QR code can be window on a product to the relationship between the owner and the company that made the product — and, for that matter, with anybody else involved. That’s where Phil Windley goes in his post titled Using Products to Build Customer Relationships. Some background: Phil’s company, Kynetx, makes QR code tags and stickers called “SquareTags,” which you can attach to the things you own, and which can be programmed, by you, to say or mean anything. I wrote about this a bit in The Internet of Me and My Things. Phil unpacks his case with this:

…by and large, ecommerce sites, from the smallest to the biggest, are just glorified online catalogs not significantly different from their more mundane mail-order catalog cousins. I’ve always thought the Internet ought to allow us to do better — to really change how merchants, companies and service organizations interact and relate to people.

Our vision for SquareTag is just that: helping people and companies have better (i.e. less dysfunctional) relationships. We believe that products are natural connecting points between companies and their customers. Because SquareTag makes those products smart and gives them an online presence, SquareTag provides a powerful tool for building vendor-customer relationships.

When I speak in my blog or on stage about the Internet of My Things, I’m highlighting the natural and powerful feelings people have about their stuff. As Doc Searls says in Chapter 21 of The Intention Economy, “possession is 9/10ths of the three-year old”. Our connections with our things are primitive and deep. We spend much of our time and resources acquiring, using, managing, and disposing of things.

Because of the strong feelings people have about them, products are a natural connecting point between manufacturers, retailers, service companies, and the customer. SquareTag is designed to deepen the connection between people and things by making the interactions richer.

With SquareTag, any thing becomes a programming platform. Products become more useful, more helpful with the addition of SquareTag. As an example, SquareTag gives almost anything an online social profile

Many companies confuse “having information” about their customers with having a relationship. That might constitute customer intelligence, but it’s not a relationship. Relationships are built on common interests and an exchange of value. Both parties need to see that value or it’s not a relationship. People are more likely to resent the fact that you know things about them outside of a relationship…

Using SquareTag companies can engage in a new kind of customer relationship management that does more than store contact information and interaction history. SquareTag provides a way to establish genuine relationships that provide continuous interaction throughout the customer life-cycle. This changes “relationship management” into “relating.”

Between the elipses above, Phil goes into specific use cases and scenarios. It’s deep and fun stuff. Go read it.

Meanwhile, think of how lame it has been for QR codes, so far, to be limited mostly to (actual) robot barf on the corners of ads and on the windows of shops, leading the scanner back to something promotional put up by the company at a website. This is worse than uninteresting: it wastes everybody’s time. But let’s say my next Canon camera, maybe the forthcoming 5D Mark IV, comes with a QR code unique to that camera. If I scan it on Day 1 of owning it, I’ll get, perhaps, a greeting and a link to the owner’s manual. Then, after I put it in my personal cloud, I can add my own annotations, such as links to the photos I’ve taken with the camera, or to my own notes for Canon’s repair people, should I have to send it in for a fix. (Which I’ve done many times over the years with my various cameras.) The repair people can then scan the code and see the notes. Canon too can add updates to the code. (Remember, I can program viewing permissions in my pCloud.) And, if I ever sell the camera or give it away, my notes and Canon’s can go with it, and Canon’s CRM system can be updated with relationship information about the new owner.

Finally, in case you need one more thing to convince you that QR codes are only ugly when misused — and are sure to become beautiful once they are used in creative new ways — there is this item in Wikipedia:

The use of QR codes is free of any license. The QR code is clearly defined and published as an ISO standard.

Denso Wave owns the patent rights on QR codes, but has chosen not to exercise them.

Thank you, Denso Wave.

I just looked up facebook advertising on Google News, and got these results:

More Facebook Ads Are Coming, Your Friends Will Finally Hit Delete
Forbes-8 hours ago
Now, Facebook is doing a pretty smart thing here rolling out the more prominent advertising along with an updated user experience, but will…

Facebook’s New News Feed Is a Binder Full of Advertising The Atlantic Wire-4 hours ago

Disruptions: As User Interaction on Facebook Drops, Sharing  New York Times (blog)-Mar 3, 2013

Facebook Isn’t Your Platform. You’re Facebook’s Platform -Businessweek-Mar 5, 2013

Facebook’s advertising strategy cannot win
USA TODAY-Mar 5, 2013 Facebook presumably did not purposefully create a freeadvertising vehicle (that is, the standard posting function) that’s more effective than its … 

all 84 news sources »

Facebook may charge users to remove ads, patent application reveals GigaOM-by Janko Roettgers-Mar 5, 2013 Facebook may offer users to get rid of ads, highlight custom messages or even select the friends displayed on their personal profile in 

Mostly negative stuff.

But there are some plusses, down below the fold. For example, Facebook advertising works, and couldn’t be more fair, by Rocco Pendola in TheStreet. His gist:

Roughly five months into my job as TheStreet’s director of social media, I can tell you — firsthand — that Facebook advertising works incredibly well for a brand/multimedia organization such as TheStreet. In fact, I argue that if Facebook’s platform doesn’t work for you, you’re simply not doing it right.

Well, good for them. Over here on the receiving end it isn’t so pretty. For example, here’s my latest ad pile at Facebook:

A few questions:

  1. Where does Facebook get the idea that I want to cheat on my wife, to whom it knows I’ve been married for almost 23 years?
  2. Why would Facebook sell an ad to an advertiser that would rudely suggest that there is a chance in hell that I’d ever cheat on my wife?
  3. And why would anybody want to be told, over and over again, as the AARP ads always do, that they’re old?

Maybe it’s because they’ll sell anything to anybody. Or maybe it’s that SeniorPeopleMeet and SeniorsMeet simply buy exposures across the entire “senior” demographic, regardless of what Facebook’s intelligence might say about individuals in that demographic. Clearly Facebook doesn’t mind, regardless of the reasons, which is worse than insulting: it’s stupid and wrong.

It’s hard to imagine a company that has more “big data” about its users than Facebook does, or better means for delivering truly relevant ads to individuals. And yet Facebook’s advertising is mostly ignored, unwelcome or worse. Yes, its advertising program has made Facebook financially successful. But that success masks other failures, such as the very high percentage of misses, many of which have negative results. I see no reason to believe that these failings won’t also be leveraged into the company’s new advertising ventures, covered in the news above.

I’ve been told by adtech professionals that a funny thing about their business is that Google and Facebook are terribly jealous of each other: Google is jealous of Facebook because Facebook can get especially personal with its users, while Facebook is jealous of Google because Google can advertise all over the Web. And yet both are missing real human relationships with their users, because the users are not customers. They are the products being sold to the companies’ real customers, which are advertisers.

What’s keeping Facebook from offering paid services to individuals — or Google from offering more than the few they do? Here’s one reason I got from a Google executive: it costs too much money to serve individual human customers. This isn’t verbatim, but it’s close: If our users were actually customers, we would have to support them with human beings, and we don’t want to make less than $1 million per employee (Yes, that was the number they gave.) And yet, all advertising-supported businesses could benefit a great deal by having at least some of their users become subscribers.

Start with the money. How much would Facebook make if the company offered a subscription service that came with both no advertising and better privacy protections? Depends on the subscription price, of course, multiplied by the number of people who go for the deal. Maybe one of ya’ll can give us some run-ups in the comments below.

Then look at to the signaling issue. Real customers can send much better signals to Facebook than mere “users” can. They can offer real feedback, and good ideas for improving services — the kind of stuff you get when you have a real relationship, rather than a vast data milking operation. For example, a company with human customers can hear, personally, how they’re screwing up, from people who care enough to pay for services.

I’ve dealt with a lot of highly successful companies, and they all risk the same problem: getting high from smoking their own exhaust, and thinking their shit doesn’t stink. Facebook is there right now. And they are making the same mistake that AOL, Compuserve, Prodigy, MySpace and countless other online services did when they were high and thought their shit didn’t stink. They assumed that occupants of their private habitats love being there, and wouldn’t leave. In fact many inhabitants of Facebook only tolerate it, or are there because it’s what works for now, or because lots of their friends and relatives are there. But they can leave, and so can their friends and relatives, as soon as attractive other choices appear. Which is inevitable.

Everybody has limits. Facebook is hell-bent on testing them, apparently.

Bonus link.

6:42am — Flights are starting to land at JFK, I see by Flightaware. Not yet at LGA, EWR or the New England airports. More links:

It’s getting light out, and the snow has stopped.

6:10am — Dig:

5:58am — Fittingly (given the local coverage concentration below), Maine appears to be hardest hit, though farthest from news outside the area. CNN and The Weather Channel are all about Boston, Providence, Hartford and New York.

5:30am — Looking for live local coverage from TV stations. Here’s what I’ve found so far:

That’s it. One in New York, one in Hartford, none in Boston and three in Portland. Maine wins! Corrections, of course, are welcome.

Also: the NYTimes and the Wall Street Journal have both dropped their paywalls for storm coverage. The Boston Globe‘s is still up.

03:30am — This is as quiet as New York gets. No traffic flowing. No horns blowing. No jets on approach to anywhere, or taking off. From our encampment in “upstate” Manhattan, there is just the sound of snowplows scraping Broadway clean.

The Weather Channel (aka Weather.com, aka TWC on my Dish Network channel list, aka @WeatherChannel), calls the storm #Nemo, as they said they would last Fall. The National Weather Service, aka Weather.govisn’t playing along. Neither is AccuWeather.

They should. I’m sure the success of the Nemo nickname has their sphincters in a knot, but they should loosen up. This isn’t just another nor’easter. For parts of Connecticut and Massachusetts, it might be the biggest storm since the last glaciation, named after Wisconsin. (Probably not, but still.) Earthquakes get named after epicenters. And hey, we live in networked times. These days the vernacular wins, fast. Best to get ahead of that curve.

Here’s a view of aviation, as of 3:00am this morning:

Normally thin anyway at this hour, it’s absent in the Northeast entirely. The nearest named flight is a United one inbound to Dulles (UAL981). An un-named plane is passing over Philadelphia, and another over Binghamton. That’s it. (The green color is not for rain, by the way. It’s precipitation density. That’s snow there.)

Tomorrow evening, Tuesday, will be a meetup I wish I could attend in San Francisco. The subject is personal clouds.

We’re not talking about storage here, though that’s part of it, just like storage is part of your PC or your phone. We’re talking about your own personal space, which you control, on the Net, and not just on your devices. We’re talking about your own personal operating system: the platform for your enterprise of one. We’re talking about the place where you stand as you manage not just your own data, but your relationships with other people, various services, the Internet of Things, and your contacts—meaning your real social network (the one you define, your own way). It might be self-hosted, or physically elsewhere on the Net; doesn’t matter, long as it’s yours alone, and secure. That is, not contained in somebody else’s service. (Though you can engage one for that, if you like. On your terms.)

Personal clouds are a new concept, but central to what I (and many others) have been working on for years with ProjectVRM and related efforts. (Some of those will be there too.) It’s where personal computing, personal networking, personal storage and personal autonomy and control all meet — or should, once the tech gets built out.

It’s early in the history of wherever this thing is going to go, which is why going to this thing is a good idea.

Register here.

Take a look at these screenshots of maps on my iPhone 4, running iOS 6:

maps

On the left, maps.google.com, made mobile. On the right, Apple’s new Maps app, which comes with iOS 6. The location in both cases is Harvard Square, not far from where I am right now.

Note how the Apple app not only lacks the Harvard Square T stop (essential information for any map of this type), but traffic information as well. (Not to mention a bunch of other stuff, such as landmarks and street names. (Neither is perfect at the last two, but Google is way better.)

This is beyond inexcusable, especially now that it’s going on two months since Tim Cook apologized for Apple’s Maps fail and promised improvements. How hard can it be, just to add essential subway info? Very, apparently.

I go a bit deeper in this response to this post by Dave a few hours ago. To sum it up, I think only two things will save Apple’s bacon with maps. One is that Nokia/Navteq, Google and others provide maps on iOS that are better than Apple’s, saving Apple the trouble of doing it all. The other is crowd-sourcing the required data, simply because Apple by itself can’t replicate the effort both Google and Nokia/Navteq have put into what they’ve already got. But with the rest of us, Apple can actually do better. It’ll take a sex change for them to un-close their approach to mapping. But they’ll leapfrog the competition in the process, and win loyalty as well.

[Later...] Here is a screenshot that helps enlarge some points I make below in response to Droidkin’s comment:

apple credits and feeback

Note how dim, dark and hidden the small print is here. “Data from TomTom, others” goes to this list of credits. Also “Report a Problem” is simplex, not duplex, far as I know. You can tell them something but it’s like dropping a pebble into the ocean. Who knows what happens to it?

[This post was read by Bitly folks, who reached out appreciatively. The thread continues with a follow-up post here.]

Last night huge thunderstorms moved across New Hampshire, and later across Boston. NOAA radarThere was even a tornado watch (the red outline north of Keene, in the radar image on the left, from the NOAA.) So I thought I’d tweet that.

It has been my practice for quite a while, when tweeting, to use the Bit.ly extension in my Chrome browser.

But then came a surprise. The little Bitly image had changed, and the pop-down word balloon, rather than giving me the shortlink I had expected, told me that Bit.ly was improving. I thought, “Oooh, shit.” Because there was nothing wrong with the old Bit.ly. It was simple and straightforward. You could either copy the shortlink from a window, or know it was on your clipboard after you clicked on the “copy” button, and it said “copied.”

The new and improved Bitly looks like this:

WTF? Ya gotta work to get this many things wrong. My personal list, from the top:

  1. I don’t know what a bitmark is and I don’t want to know. I want a shortlink.
  2. My Twitter handle is there, with my face. Why?
  3. Does the blue “x” close the whole thing or just my twitter handle?
  4. Why is it telling me the URL I want shortened? I see that one already. I want the short bit.ly URL.
  5. Why is it telling me the title of the page? I know that too.
  6. Why would I add a note? And to what? Is this a kind of Delicious move? I hardly ever used Delicious because it was too complicated. Now this is too.
  7. Why “Public?”
  8. What’s the “bundle” I would add this to?
  9. “CANCEL” what? Is something already in progress I don’t know about? (In this brief but intense Age of Facebook, when sites and services — e.g. Facebook Connect — silently provide means for advertisers and third parties to follow your scent like a cloud of flies, that’s a good bet.)
  10. What is Save+ for? To what? Why?
  11. What is “Save and share…” and what’s the difference between that and save? Why would I want a shortlink if not to share it on something that requires it, like Twitter?
  12. What are the symbols next to “Public” and “Save and share…”?
  13. And if, as I suspect, the only way I can get to the shortlink is to hit “Save and share…”, why make me go through that extra click — or, for that matter, ford the raging river of kruft above it to get there?

That was as far as I got before I had to go out to an event in the evening; and when I came back the storm (or something) had knocked my ISP’s Net connection off. So this morning, naturally (given all the above), there’s a tsunami of un-likes at https://twitter.com/#!/search/bitly, as well as out in the long-form blogosphere.

In URL Shortener Bitly Announces Big Update (Unfortunately, It Sucks, And Everybody Hates It), Shea Bennett of All Twitter at MediaBistro writes,

Yesterday, URL shortener of choice Bitly, which has generated more than 25 billion shortened links since inception, announced a change to their platform. A big change. New Bitly, they’re calling it.

Great. There’s only one small problem: everybody, and I mean everybody*, hates it.

Why? Because it’s taken what was a really useful and fast service into something that is bloated with unnecessary add-ons and buzzword crap, and made a one-click share into something that now takes at least three clicks, and is really, really confusing.

In the good old days, which we’ll refer to from now on as BNB (Before New Bitly), shortening links on Bitly was a breeze. A pleasure. It was fast, responsive and if you used an extension you could crunch down the URL of any webpage in a matter of seconds. If you had a Bitly account, you could then share that shortened link straight to Twitter via Bitly using the title of your choice.

So simple. So effective. So perfect.

And so gone.

The Bitly announcement is long: too long for a URL-shortening company. But this excerpt compresses the meat of it:

So what’s new? Now you can…

  • Easily save, share and discover links — they’re called bitmarks, like bookmarks.
  • Instantly search your saved bitmarks.
  • Curate groups of bitmarks into bundles and collaborate on bundles with friends.
  • Make any bitmark or bundle private or public.
  • See what friends are sharing across multiple social networks, all in one place.
  • Save and share links from anywhere with our new bitmarklet, Chrome extension and iPhone app.

It doesn’t stop here. We have big plans for bitly, and we want to build this neighborhood with our community. So get in there, start bitmarking and please tell us what you think!

So they want to be Delicious. And they want to play the social game. Or, as Samantha Murphy in Mashable puts it,

Bit.ly — which has more than 25 billion links saved since 2008 and gets about 300 million link-clicks each day — launched a redesign to not only expand its presence but give users more curation power. Among the most notable of the new tools is a profile page and what the company is calling “bitmarks,” which are similar to bookmarks.

I just checked Dave Winer, who, as I expected, weighs in with some words from the wise:

Based on what I see in their new product release it looks like they’re taking a step toward competing with Twitter. But they didn’t do it in an easy to use way. And the new product is not well user-tested. It looks like they barely used it themselves before turning it on for all the users. Oy. Not a good way to pivot.

Here’s some free advice, what I would do if I were them.

  1.  Immediately restore the old interface, exactly as it was before the transition.
  2. Concurrently, issue a roadmap that goes as follows, so everyone knows where this thing is going.
  3. Take a few weeks to incorporate the huge amount of feedback they’ve gotten and streamline the new UI.
  4. Instead of launching it at bitly.com, launch it at newbetaworksserver.com

The list goes on, and it’s exactly what they should do. At the very least, they should take Step #1. It’s the only way to restore faith with users.

Meanwhile, three additional points.

First is that URL shortening has always been a fail in respect to DNS — the Domain Name System, which was invented for ARPANET in 1982, and has matured as into hardened infrastructure over the decades since. (It’s essentially NEA: Nobody owns it, Everybody can use it, and Anybody can improve it.) On the other hand, URL shortening, as we know it so far, puts resolving the shortened URL in private hands, and those hands can (and will) change. That’s exactly what we’re seeing here with Bitly, and what we tend to see with all private infrastructures that serves public purposes.

Second is that Bitly, like Facebook, Twitter, Google and other advertising-supported businesses with millions (or billions) of users that pay nothing to those companies for the services performed, has a problem that has been familiar to commercial broadcasting since it was born in the 1920s: its consumers and its customers are different populations, and they are financially accountable only to the customers. Not to the consumers. In Bitly’s case its customers, so far, are enterprises that pay to have customized, or branded, short URLs. Could they make their consumers into customers as well, with a freemium model? Possible. I’d recommend it, because it would make the company financially accountable to those users.

Third is that people want their own curation power. The Cloud is a good and necessary form of utility infrastructure. But it’s a vulnerable place to have one’s own digital goods. True, everything, even the physical world, is ephemeral in the long run. But digital ephemera can be wiped out in an instant. We should have at least some sense of control over “what’s mine.” Bitly shortlinks are not really “mine” to begin with. As Yahoo showed with Delicious, commercially curated links are especially vulnerable. And, after this last move, Bitly has given us no new reason to trust them. And many new reasons not to.

So, will I use the new Bitly? Let’s look at what comes up when I hit the “Save and share…” button for Dave’s piece:

This is no less f’d than the other one. Let’s run it down.

  1. Okay, I’ve done the Delicious thing, I guess, if this is saved somewhere. Curation achieved, maybe. Guess I have to go Bitly.com to see. I’ll do that later.
  2. At first I thought the saved link (or whatever) might be under my @ handle on the upper right, but that just brings up a “sign out” option.
  3. I have no intention of connecting to Facebook.
  4. When I click on the blue bar with the checkmark in it, changes happen in the window, but I’m not sure what they are, other than getting un-checked.
  5. I have no intention of emailing it to anybody in this case. And actually, when I email a link, I tend to avoid shortlinks, because they obscure the source. And I’m also not dealing with a 140-character space limit. (Hmm… while we’re on short spaces subject, why not offer texting through SMS?)
  6. Did something get tweeted when I hit the blue bar? I dunno. Checked with Twitter. Nothing there, so guess not.
  7. I see “Shortlink will be appended to tweet,” but does that mean I tweet something if I put it in the box? Guess so, but not sure.
  8. I see the “Copy” next to the almost-illegible shortlink in the blue button. Okay, guess that’s what I should use. But I don’t yet because I want to understand the whole thing first.
  9. What does “NEVERMIND. DON’T SHARE” mean, except as a rebuke? Translated from the passive-aggressive, it says, “You don’t want to play this game? Okay, then fuck off.”
  10. The symbol in the orange “Share to” is barely recognizable as Twitter’s. I think. Not sure. I just clicked on it, and something came up briefly then went away.

When I clicked on it again, I got this:

I don’t want to try again, because I’m not sure it failed. So I check Twitter, and see this:

Damn! I didn’t want that!

This tweet has no context other than me and Bitly. Worse, it looks like a spam. Or like I’d been phished or hijacked in some way. At no time in the history of my blogging or tweeting have I ever uttered a single URL, let alone a shortened one. Or, if I did, I’m sure the context was clear.

This isn’t even a “copy.” It should say “tweet,” if it were to have any meaning at all. I guess I should have written something in the box above. But would that have worked? I dunno.

So I just went through the routine again, this time hitting the blue button that says COPY in orange. I did that for Dave’s post, and this one after I published it, and the result is this normal-form tweet: https://twitter.com/dsearls/status/207856808012951553

It is also now clear to me that the box is for writing a tweet to which the shortlink will be appended. But usually I don’t like to append links, but to work them into the text of the tweet.

Bottom lines:

  1. As Rebecca Greenfield says in The Atlantic Wire, Bit.ly Isn’t Really a Link Shortener Any More. Too bad.
  2. It still works, but the new routine now takes three clicks rather than two, and is far more complicated. The curation does work,, for now. When I go to Bitly.com, below “Welcome to the new bitly,” I see “1–10 OF 900 BITMARKS.” I can also search them. That’s cool. But I’d rather have something in my own personal cloud. And I’d pay Bitly, or anybody who values my independence, for helping me build that.

Mark these words: The next trend is toward independence for individuals, whether they be users or customers. Yet another new dependency is not what anybody wants. Dependencies like Bitly’s new one are a problem, not a solution. Bitly, Facebook, Google and Twitter making their APIs work together does not solve the dependency problem, any more than federations among plantations makes slaves free.

The end-to-end nature of the Net promised independence in the first place. When client-server became calf-cow in 1995, we sold out that promise, and we’ve been selling it out, more and more, ever since.

Now we need to take it back. Hats off to Bitly for making that abundantly clear.

« Older entries