Social network modalities
The fuss last week about asymmetric follow got me thinking about communication modalities in social networks. It seems to me that this is yet another case where there’s nothing really new, just fresh perspective. Social networks appear to support the same modalities as data networks, so perhaps it’s worth looking at the old labels and seeing how this applies to emerging use cases:
The classic 1-2-1 pattern. This is what happens with instant messages (IMs), direct messages (DMs) and to an extent good old email (though the use of distribution lists fogs the picture a little there). It’s also what happens with the @name convention in microblogging or something like directed social bookmarking.
In data networks we use multicast groups, and it seems that in social networks the groups concept is the same, so when we post a link, update a status or whatever then it goes by default to a group defined by our immediate social graph (our ‘friends’), or it can be directed at a specific group.
With both unicast and multicast there are clearly ways to have some privacy, with a trade off against the broader collaboration potential. This depends to some extent on whether the defaults are private or public, and whether users normally tinker with those defaults.
This is the uncontrolled, anybody who’s listening option. There’s probably an important distinction between broadcast and public multicast, and this may well be the nub of what asymmetric follow is all about. Frankly I don’t see that much difference between pub/sub asymmetries in regular blogging and microblogging.
Filed under: e2.0 | 3 Comments
Tags: asymetric follow, broadcast, multicast, privacy, social network, unicast
Raspberry Pi Downloads
- Making an image file from an SD card on Windows
- Raspberry Pi GPIO Joystick
- Three doesn't feel at home on 4G networks
- Howto - Factory Reset iLO 4 on HP Microserver Gen8
- Howto stunnel from HTTPS to HTTPS
- Forwarding DNS queries to AWS VPC resolvers
- Raspberry Pi Satellite TV
- AirPlay on Raspberry Pi the easy way
- Using Overlay file system with Docker on Ubuntu
- Using Amazon EC2 as a web proxy
LEGO and Photography… on The perils of modern lego Gurpreet Singh on Why my X230 might be my last L… aaron ng on USB Shaver Charger Chris Swan on Raspberry Pi GPIO Joystic… Fernando Cunha JR on Raspberry Pi GPIO Joystic…
- The Positive Reframe: Why Trump’s Inauguration is Not the Beginning of an Era — but the End
- How a TV Sitcom Triggered the Downfall of Western Civilization
- Visual Computational Sociology
- The Death of the British Dream
- On Brexit solipsism
- Mini Mac Trumps the Big Mac
- How to Write Email with Military Precision
- Civil Service had to expand 600% to cope with WW2.
- Bridge reportedly cost 548 million yuan. Next time you read China is a technocracy run by engineers, remember it.
- Natural selection making 'education genes' rarer, says Icelandic study
- RT @swardley: The Army Handgun: A New Poster Child for Acquisition Malpractice? - defensenews.com/articles/the-a… 22 minutes ago
- I just published “The politics of data” medium.com/p/the-politics… 28 minutes ago
- RT @ClaireHammond: Best. Typo. Ever. 🤗 https://t.co/33uJNG1bHM 2 hours ago
- [blog] Replacing Active Directory DNS with BIND on OpenWRT blog.thestateofme.com/2017/01/22/rep… 3 hours ago
- [blog] Restoring Power blog.thestateofme.com/2017/01/22/res… replacing an RCD with RCBOs for reliable trip free power, and some UPS monitoring with NUT 4 hours ago