Social network modalities
The fuss last week about asymmetric follow got me thinking about communication modalities in social networks. It seems to me that this is yet another case where there’s nothing really new, just fresh perspective. Social networks appear to support the same modalities as data networks, so perhaps it’s worth looking at the old labels and seeing how this applies to emerging use cases:
The classic 1-2-1 pattern. This is what happens with instant messages (IMs), direct messages (DMs) and to an extent good old email (though the use of distribution lists fogs the picture a little there). It’s also what happens with the @name convention in microblogging or something like directed social bookmarking.
In data networks we use multicast groups, and it seems that in social networks the groups concept is the same, so when we post a link, update a status or whatever then it goes by default to a group defined by our immediate social graph (our ‘friends’), or it can be directed at a specific group.
With both unicast and multicast there are clearly ways to have some privacy, with a trade off against the broader collaboration potential. This depends to some extent on whether the defaults are private or public, and whether users normally tinker with those defaults.
This is the uncontrolled, anybody who’s listening option. There’s probably an important distinction between broadcast and public multicast, and this may well be the nub of what asymmetric follow is all about. Frankly I don’t see that much difference between pub/sub asymmetries in regular blogging and microblogging.
Filed under: e2.0 | 3 Comments
Tags: asymetric follow, broadcast, multicast, privacy, social network, unicast
Raspberry Pi Downloads
- Making an image file from an SD card on Windows
- Raspberry Pi TV/PVR
- Raspberry Pi GPIO Joystick
- AirPlay on Raspberry Pi the easy way
- Raspberry Pi Satellite TV
- Review - Dell PowerEdge T110 II
- Raspberry Pi sous vide water bath
- Three doesn't feel at home on 4G networks
- Apache 2.2 on Ubuntu 14.04
- Kindle 3G - it's a trap
Jay Dee on UI Versus UX – Southern… Chris Swan on Refereeing the Unikernels… John O'Hara on Copying GPT SSDs Andrew Errington on Improved temperature control f… Chris Swan on Copying GPT SSDs
- We’re in a brave, new post open source world
- Windows 10 spying: Disabling tracking is impossible
- How a sewing machine works
- Yogi Berra "If you come to a fork in the road, take it"
- Hazel eyes
- What Happens When You Drink an Entire Bottle of Weed Lube
- ClControl launch of Specific “C” type EC2 instances post office hours to save costs
- Error 53: Apple remotely bricks phones to punish customers for getting independent repairs
- Ridiculous Copyright Fight Still Keeping The Only Video Of The First Super Bowl Locked Up
- Cloud Price Performance Benchmark [pdf]
- @adrius42 I think @SimonCrosby point is that threat intel is like watching the news - mostly bad things happening to other people 1 day ago
- RT @mattblaze: If this doesn't demonstrate that ad tracking has gotten dangerously out of control, I don't know what will. https://t.co/vlD… 1 day ago
- @swdownes @GrahamChastney 50% - that was probably true a decade ago pinboard.in/u:cpswan/t:AVi… 1 day ago
- @samj very happy with my RPi/Kodi adding the smarts to my 'dumb' Samsung UE55J5100 rather than some nasty proprietary UI that spies on me 1 day ago
- RT @KentBeck: minimizing mistakes is incompatible with maximizing learning 2 days ago