Social network modalities
The fuss last week about asymmetric follow got me thinking about communication modalities in social networks. It seems to me that this is yet another case where there’s nothing really new, just fresh perspective. Social networks appear to support the same modalities as data networks, so perhaps it’s worth looking at the old labels and seeing how this applies to emerging use cases:
The classic 1-2-1 pattern. This is what happens with instant messages (IMs), direct messages (DMs) and to an extent good old email (though the use of distribution lists fogs the picture a little there). It’s also what happens with the @name convention in microblogging or something like directed social bookmarking.
In data networks we use multicast groups, and it seems that in social networks the groups concept is the same, so when we post a link, update a status or whatever then it goes by default to a group defined by our immediate social graph (our ‘friends’), or it can be directed at a specific group.
With both unicast and multicast there are clearly ways to have some privacy, with a trade off against the broader collaboration potential. This depends to some extent on whether the defaults are private or public, and whether users normally tinker with those defaults.
This is the uncontrolled, anybody who’s listening option. There’s probably an important distinction between broadcast and public multicast, and this may well be the nub of what asymmetric follow is all about. Frankly I don’t see that much difference between pub/sub asymmetries in regular blogging and microblogging.
Filed under: e2.0 | 3 Comments
Tags: asymetric follow, broadcast, multicast, privacy, social network, unicast
Raspberry Pi Downloads
- Making an image file from an SD card on Windows
- Raspberry Pi GPIO Joystick
- Forwarding DNS queries to AWS VPC resolvers
- Connecting Docker containers between VMs with VXLAN
- Three doesn't feel at home on 4G networks
- Review - Dell PowerEdge T110 II
- Apache 2.2 on Ubuntu 14.04
- Securely accessing your home network with Raspberry Pi - Pt. 1
- Using Overlay file system with Docker on Ubuntu
- Howto stunnel from HTTPS to HTTPS
micro:bit… | R… on micro:bit Simon Self Encrypting Driv… on Review – Intel NUC … Chris Swan on Forwarding DNS queries to AWS… Ramon Snir on Forwarding DNS queries to AWS… BBC Micro:Bit availa… on micro:bit Simon
- Your wget is broken and should DIE, GitHubbers tell Microsoft
- A protocol to connect VRM and CRM
- Toothpaste in hotels: Why do they provide shampoo, soap, and high-end toiletries but no toothpaste?
- To fly, to scrooge: Little by little, British Airways is chipping away at its good name
- Intel’s IoT strategy is becoming clear
- Is This the Beginning of the End for OpenStack?
- Oracle, Im sad about you, disappointed in you, and frustrated with you.
- Kraken Phishing Warning
- Bandwidth Costs Around the World
- Communism and Really Existing Socialism: A Reading List for Post-Millennials
- @BenedictEvans what I find odd is that most PNDs are sold as landscape (even widescreen) yet portrait is more useful for navigation 4 hours ago
- Lego Hitchhikers Guide to the Galaxy project ideas.lego.com/projects/150300 4 hours ago
- The full pic from my banner - debugging with @Evryway on our dad's ZX81 #8bit https://t.co/cwUdBYusuz 10 hours ago
- @GlenPRobinson you picked the right day to take off - it's a scorcher 12 hours ago
- RT @bendystraw: My best technical skill isn't coding, it's a willingness to ask questions, in front of everyone, about what I don't underst… 1 day ago