Social network modalities
The fuss last week about asymmetric follow got me thinking about communication modalities in social networks. It seems to me that this is yet another case where there’s nothing really new, just fresh perspective. Social networks appear to support the same modalities as data networks, so perhaps it’s worth looking at the old labels and seeing how this applies to emerging use cases:
The classic 1-2-1 pattern. This is what happens with instant messages (IMs), direct messages (DMs) and to an extent good old email (though the use of distribution lists fogs the picture a little there). It’s also what happens with the @name convention in microblogging or something like directed social bookmarking.
In data networks we use multicast groups, and it seems that in social networks the groups concept is the same, so when we post a link, update a status or whatever then it goes by default to a group defined by our immediate social graph (our ‘friends’), or it can be directed at a specific group.
With both unicast and multicast there are clearly ways to have some privacy, with a trade off against the broader collaboration potential. This depends to some extent on whether the defaults are private or public, and whether users normally tinker with those defaults.
This is the uncontrolled, anybody who’s listening option. There’s probably an important distinction between broadcast and public multicast, and this may well be the nub of what asymmetric follow is all about. Frankly I don’t see that much difference between pub/sub asymmetries in regular blogging and microblogging.
Filed under: e2.0 | 3 Comments
Tags: asymetric follow, broadcast, multicast, privacy, social network, unicast
Raspberry Pi Downloads
- Raspberry Pi GPIO Joystick
- Cloud Price Wars - What about the network?
- Making an image file from an SD card on Windows
- Raspberry Pi TV/PVR
- Multi tier Docker apps with Fig
- Using Amazon EC2 as a web proxy
- Raspberry Pi Satellite TV
- Securely accessing your home network with Raspberry Pi - Pt. 1
- Your own VPN in the cloud
- Making OpenELEC images for Raspberry Pi
Internets of Interes… on Cloud Price Wars – What… Multi tier Docker ap… on Multi tier apps in Docker… Simon on My Azure Virtual Machine… Jeff Loughridge on Connecting Docker containers b… Simon Keen on Home brew
- Diego and Docker Inception Notes and Plan
- Oracle 12c In-Memory Feature Snare?
- Where Docker container security is headed
- TLS hardening
- How the Kickstarter model could transform UK elections
- Teaching science with bad science: resources for teachers
- The Twelve-Factor App
- All But Four Of The High-Profile Domestic Terrorism Plots In The Last Decade Were Crafted From The Ground Up By The FBI
- “Bring the battlefield to the border”: How America’s immigration wars were poisoned by the military-industrial complex
- LXC, Docker, security: is it safe to run applications in Linux Containers
- RT @kevinclosson: Impugn My Character Over Technical Points–But You Should Probably Be Correct When You Do So. Oracle 12c In-Memory… http:/… 8 hours ago
- @csells @darachennis I'm now wondering why I can't have 8TB in 2.5" form factor so I can have the whole of my NAS on my laptop 1 day ago
- @csells @darachennis I put one of this into my laptop last week (along with existing [full] 500GB SSD) it's an awesome piece of kit 1 day ago
- RT @glynmoody: .@techdirt "went from profitable to unprofitable as a result of the SOPA fight", & could do with a little help now - https:/… 2 days ago
- I just backed reporting on The Net Neutrality Battle via @BeaconReader beaconreader.com/projects/the-n… 2 days ago