Social network modalities
The fuss last week about asymmetric follow got me thinking about communication modalities in social networks. It seems to me that this is yet another case where there’s nothing really new, just fresh perspective. Social networks appear to support the same modalities as data networks, so perhaps it’s worth looking at the old labels and seeing how this applies to emerging use cases:
The classic 1-2-1 pattern. This is what happens with instant messages (IMs), direct messages (DMs) and to an extent good old email (though the use of distribution lists fogs the picture a little there). It’s also what happens with the @name convention in microblogging or something like directed social bookmarking.
In data networks we use multicast groups, and it seems that in social networks the groups concept is the same, so when we post a link, update a status or whatever then it goes by default to a group defined by our immediate social graph (our ‘friends’), or it can be directed at a specific group.
With both unicast and multicast there are clearly ways to have some privacy, with a trade off against the broader collaboration potential. This depends to some extent on whether the defaults are private or public, and whether users normally tinker with those defaults.
This is the uncontrolled, anybody who’s listening option. There’s probably an important distinction between broadcast and public multicast, and this may well be the nub of what asymmetric follow is all about. Frankly I don’t see that much difference between pub/sub asymmetries in regular blogging and microblogging.
Filed under: e2.0 | 3 Comments
Tags: asymetric follow, broadcast, multicast, privacy, social network, unicast
Raspberry Pi Downloads
- The New Stack - Why Docker, Containers and systemd Drive a Wedge Through the Concept of Linux Distributions
- Raspberry Pi GPIO Joystick
- Raspberry Pi TV/PVR
- Docker Networking
- Using Amazon EC2 as a web proxy
- AirPlay on Raspberry Pi the easy way
- Making an image file from an SD card on Windows
- Securely accessing your home network with Raspberry Pi - Pt. 1
- DS18B20 Temperature Sensor with Raspberry Pi
- Raspberry Pi sous vide water bath
Mario Vernari on LinkIt ONE – first … El futuro bajo sospe… on The perils of modern lego DC-J on Node-RED on WRTnode Chris Swan on InfoQ – Amazon releases… hash text on InfoQ – Amazon releases…
- Police lied to judge about man having hostages. SWAT kicked in door, shot w/ non-lethal round, tased & beat him
- I’m in the US - what if I just ignore the EU VAT changes?
- One group dominates the second round of net neutrality comments
- Gnod Smartphone Comparison Chart
- A Hitchhiker’s Guide to Fast and Efficient Data Reconstruction in Erasure-coded Data Centers
- Setuid demystified
- Unreliable Multicast means Unreliable VMware VSAN
- Breaking the law
- A Tale of Tax Avoidance
- Spanish newspapers drive Google News out of Spain, then ask Government to force it to return
- RT @rsdunne: Despite its name/logo Docker enables modularity with a far less prescriptive module spec than other software module systems. 14 hours ago
- @adrianco @adriancolyer WS-CDL (which is based on the Pi calculus) has been rearing its head again for me recently 14 hours ago
- I wrote a little about @docker (and @coreoslinux Rocket) and systemd on @thenewstack thenewstack.io/why-docker-con… 19 hours ago
- RT @webmink: The MPAA, even more evil than expected: "a basis for defeating ISPs’ entitlement to DMCA safe harbor" wmk.me/1JbW6KX 22 hours ago
- RT @samj: Seriously @ParamountPics? This is why we can't have nice things: cnn.com/2014/12/18/sho… 22 hours ago