Welcome!

Agile Computing Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, ManageEngine IT Matters, Liz McMillan

Blog Feed Post

[liveblog] Judith Donath on designing for sociality (“Social Machines”)

Judith Donath is giving a book talk to launch The Social Machine. I read it this weekend and it is a rich work that explores the ways in which good design can improve our online sociality. I’m a fan of Judith’s and am looking forward to seeing what 25-minutes’ worth of ideas she selects to talk about tonight, given the richness of her book.

NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness. Over-emphasizing small matters. Paraphrasing badly. Not running a spellpchecker. Mangling other people’s ideas and words. You are warned, people.

Judith begins by saying that the theme of the book is the importance of online social interaction and designing for it. Our interfaces may look sophisticated but they’re primitive when it comes to enabling social interaction. She uses a Mark Twain story ["Was the World Made for Man?"] about an oyster’s point of view to remind us that online design isn’t really all that evolved. One big issue: We can’t see the interactions.

We like being with other people, Judith remindsd us. We like seeing how they look, feeling the energy in a room, etc. This is hard to perceive when you’re looking at screen. Our computers connect us to tremendous crowds, but we don’t see the level of activity or the patterns. She shows a work from 25 years ago when she spent a summer in Japan. Her friends were in Boston on computers. The “who” command let her see who was online and how active they were; it was an old-style computer print-out of a list. She came back from Japan trying to design a more useful display. In the early 1990s she came up with “Visual Who,” a text-based visualization of the people online, filterable by interests, etc. She shows some other ways of displaying social network maps, but such maps aren’t yet integrated into the social network interfaces. Maps like these would help manage Facebook’s privacy settings, she ways. Or we could use them as an interface for keeping up with people we haven’t interacted with in a while, etc.

Legibility is a huge issue, she says. Information is non-spatial, so it can be hard to parse. Judith points to the Talk pages where Wikipedia pages are discussed and edited. Fernanda Viegas and Martin Wattenberg did a visualization (History Flow) of the edits on the Chocolate article. This lets you see what’s controversial and what isn’t. They then took the same data and looked not at every edit, but sampled it at fixed times. It’s a much smoother diagram. That shows the reader’s experience, while the first version showed the writers’ version.

Now Judith talks about “Beyond Being There” (a paper by Hollan, Nielsen, Stornetta, et al.). We can do things with these tools that we can’t do face-to-face. (The fact that we’re in public looking at our cell phones indicates that we’re getting some meaningful social connection that way, she says.) Judith shows the interface to “Talking Circles,” [pdf] an interface for audio conferences. It consists of colored circles. When someone speaks, their circle’s inside moves with their voice. Circles that are near each other are able to hear each other. As they move away, they can’t hear each other. So you could have a private conversation over this digital medium.

These interfaces change the social dynamics around a space. E.g., the “Like” economy induces some to use Intagram to try to gather more likes. Judith points to the Karrie Karahalios and Viega’s Conversation Clock“, a table top that shows who spoke when and who overlapped (interrupted) another. E.g., the fact that we’re all being watched (or think we are — Judith references the Panopticon) shapes our behavior. She points to the EU’s decision that Google has to remove links upon user request.

Judith points to a portrait of Queen Elizabeth I, who looks young in a painting done when she was 65. If you think about data as portraying someone, you become aware of the triangle of subject, audience, and painter, each with their own interests. (She says that two years ago another portrait of Elizabeth from the same time and studio shows her looking very old indeed.)

When you think about doing portraits with data, you have to ask how to make something expressive. She points to “The Rhythm of Salience,” a project she created using an existing conversation database. She picked out words that she identified as being about the individuals. At heart, a portrait takes what’s representative of someone, exaggerates it, and shows the salience. She shows the Caricature Generator by Susan Brennan. You can do the same thing with words, e.g. Themail by Fernanda Viegas and Scott Golder. People save their email, but generally they don’t use their archives. People are more interested in keeping the patterns of relationships than in the individual emails. So, Themail shows a histogram of the month-to-month relationship with anyone in your archive. The column shows the volume of messages, but the words that compose the bars show you the dominant words. [I didn't get that exactly right. Sorry]

She ends by showing Personas by Aaron Zinman (and Donath). You type in your name and spits back a little portrait of you. It searches Google for mentions of your name and characterizes it.

All of these raise enormous questions, she says.

Q&A [extra special abbreviated version]

Q: [me] Is this change good? Or pathological? You show an incredibly fluid environment; is this changing our f2f relationships?

A: Jane Jacobs wrote the Life and Death of Great American Cities not to judge cities but to make them better. My book tries to show ways we can use design to make our social relationships better. Right now we deal with one another differently f2f and in the real world. In 10 years, that distinction will be much less pronounced. E.g., as Google Glass type products and better interfaces will have much more important affects on f2f. That’s why it’s important that we think about these issues now.

Colin Maclay: And as danah boyd says, for the youth it’s not offline or online life. It’s just life.

Q: What’s the difference between info that you put up and info about you that others post and use?

A: There’s very little use of pseudonymity online. Usually it’s your real name or you’re anonymous. Judith shops online for most of her stuff, and she reads reviews. But she doesn’t write reviews in part because she doesn’t want her deodorant review to come up when people google her. That’s where pseudonyms come in. Pseudonyms don’t guarantee complete anonymity but for everyday use they enable us to gain control over our lives online.

Q: Nicholas Negroponte: You were doing social networking work decades ago. Why is it taking so long for the evolution we’re waiting for?

A: The Web set design back tremendously. The Web made it easy for everyone to participate, but one of the costs was that the simplicity of the interface of the Web made it hard to do design or to have identities online. It slowed down a lot of social design. Also, the world of design is extremely conservative because companies imitate one another.

Q: GPS is causing a generational difference in how we navigate space…

A: Tech is often designed subconsciously so that there are insiders and outsiders. [I've overly shortened this interchange.]

Q: Email vs. text messaging?

A: There are fashions. Also, IM has its uses…

Q: How can sites guarantee what they intend to provide, e.g., privacy? How can they ensure trust? E.g., people have figured out how to take screencaptures of snapchat, subverting the design.

A: Design doesn’t guarantee things. But we should have spaces where we have good enough privacy. We need better interfaces for this. Also, many things you see online don’t let you have a sense of how big your audience is or how permanent will be what you say. Some of the visualizations I’ve talked about give you a sense of the publicness of what you’re saying.

Q: Pseudonymity does reign supreme on Reddit. And whatever happened to Second Life, which seems to address some of the issues you talked about.

A: About every 7 years, a new avatar-based space comes out, so we’re about due for the next. Our original work with Chat Spaces was in response to The Palace. I’m not a big fan of that type of graphical chat space because they’re trying to reproduce the feeling of being f2f without going “beyond being there. ” E.g., a student [?] wrote a paper on why there are chairs in Second Life. Good question. Q: What about skeuomorphism? That metaphor holds things back. Is it just an art to come up with designs that break the old metaphors?

A: The first part of the book deals with that question. There’s a chapter on metaphor. If your metaphors are too heavy handed, they limit what you can do. E.g., if you use folders, you have to figure out which one to put your email in. If you used labels (tags), you wouldn’t have to make those decisions. A lot of the art of design is learning how to use metaphors so you can do something more abstract while still being legible, and how you can bend the metaphors without breaking them.

Q: How does Internet balkanization affect your viewpoint and affect designers?

A: How do we use language and images to bridge cultures? Designers have to understand what images mean. It’s an enormously difficult problem. It’s crucial to try to be always cognizant of one’s own cultural issues. E.g., Caricatures look different depending on your cultural norms. In the book, I did not write about caricatures of Obama in white and black publications, butepending on what norm you use, you get different results about what’s salient.

Q: If you could give people a visualization of how they behave in negotiations, that could be useful when people get stuck.

A: The Conversation Clock’s design has done some work on this. Who’s saying no? Who’s interrupting. It’s difficult for people to notice.

Q: The iPhone has just moved away from skeuomorphism. Do you know how long it takes for us to move away from this?

A: Much of this has to do with style and fashion.

Read the original blog entry...

More Stories By David Weinberger

David is the author of JOHO the blog (www.hyperorg.com/blogger). He is an independent marketing consultant and a frequent speaker at various conferences. "All I can promise is that I will be honest with you and never write something I don't believe in because someone is paying me as part of a relationship you don't know about. Put differently: All I'll hide are the irrelevancies."

@ThingsExpo Stories
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
Artificial intelligence, machine learning, neural networks. We’re in the midst of a wave of excitement around AI such as hasn’t been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. Will this time be different? Most likely. Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Furthermore, the funding and research going into AI now comes from a wide range of com...
In this presentation, Striim CTO and founder Steve Wilkes will discuss practical strategies for counteracting fraud and cyberattacks by leveraging real-time streaming analytics. In his session at @ThingsExpo, Steve Wilkes, Founder and Chief Technology Officer at Striim, will provide a detailed look into leveraging streaming data management to correlate events in real time, and identify potential breaches across IoT and non-IoT systems throughout the enterprise. Strategies for processing massive ...
SYS-CON Events announced today that GrapeUp, the leading provider of rapid product development at the speed of business, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market acr...
Internet of @ThingsExpo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devic...
SYS-CON Events announced today that Ayehu will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara California. Ayehu provides IT Process Automation & Orchestration solutions for IT and Security professionals to identify and resolve critical incidents and enable rapid containment, eradication, and recovery from cyber security breaches. Ayehu provides customers greater control over IT infras...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business...
SYS-CON Events announced today that Cloud Academy named "Bronze Sponsor" of 21st International Cloud Expo which will take place October 31 - November 2, 2017 at the Santa Clara Convention Center in Santa Clara, CA. Cloud Academy is the industry’s most innovative, vendor-neutral cloud technology training platform. Cloud Academy provides continuous learning solutions for individuals and enterprise teams for Amazon Web Services, Microsoft Azure, Google Cloud Platform, and the most popular cloud com...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.