Social network modalities
The fuss last week about asymmetric follow got me thinking about communication modalities in social networks. It seems to me that this is yet another case where there’s nothing really new, just fresh perspective. Social networks appear to support the same modalities as data networks, so perhaps it’s worth looking at the old labels and seeing how this applies to emerging use cases:
The classic 1-2-1 pattern. This is what happens with instant messages (IMs), direct messages (DMs) and to an extent good old email (though the use of distribution lists fogs the picture a little there). It’s also what happens with the @name convention in microblogging or something like directed social bookmarking.
In data networks we use multicast groups, and it seems that in social networks the groups concept is the same, so when we post a link, update a status or whatever then it goes by default to a group defined by our immediate social graph (our ‘friends’), or it can be directed at a specific group.
With both unicast and multicast there are clearly ways to have some privacy, with a trade off against the broader collaboration potential. This depends to some extent on whether the defaults are private or public, and whether users normally tinker with those defaults.
This is the uncontrolled, anybody who’s listening option. There’s probably an important distinction between broadcast and public multicast, and this may well be the nub of what asymmetric follow is all about. Frankly I don’t see that much difference between pub/sub asymmetries in regular blogging and microblogging.
Filed under: e2.0 | 3 Comments
Tags: asymetric follow, broadcast, multicast, privacy, social network, unicast
Raspberry Pi Downloads
- Making an image file from an SD card on Windows
- Raspberry Pi GPIO Joystick
- Using Overlay file system with Docker on Ubuntu
- Review - Dell PowerEdge T110 II
- AirPlay on Raspberry Pi the easy way
- Raspberry Pi TV/PVR
- Gen8 Microservers
- Boot2Docker on Hyper-V
- Raspberry Pi Satellite TV
- Using Amazon EC2 as a web proxy
Chris Swan on Gen8 Microservers Hussein Jodiyawalla on Gen8 Microservers Chris Swan on OpenELEC dev builds for Raspbe… Chris Swan on Using Overlay file system with… mancvso on Using Overlay file system with…
- Appeals court: Amazon can’t dodge trademark suit over watch search results
- Is cash still king?
- Fibonacci sequence hidden in ordinary division problem
- From 0 to 0xdeadbeef - security mistakes that will haunt your startup
- The Future of the Web Looks a Lot Like Bitcoin
- How to build your own public key infrastructure
- Speaking of trust…
- City extends taxing power to online movies, music, more
- Why do people believe myths about the Confederacy? Because our textbooks and monuments are wrong.
- @GFM27 I know... you gave your keys to a bot and it did it for you 2 hours ago
- @GFM27 one more of those and commun.it can tell you about an unfollow 2 hours ago
- RT @rossjanderson: New report on David Cameron's proposal to regulate cryptography: wrong in principle, and unworkable in practice https://… 6 hours ago
- @justincormack @monkchips whilst I found them to be one of the more annoying bands of the 80s 6 hours ago
- RT @mestery: Fibonacci sequence hidden in ordinary division problem: If you divide 1 by 999,999,999,999,999,999,999,998,999... http://t.co/… 14 hours ago