1 June 2005 to 15 May 2005
the brilliant green: Rainy days never stays (album mix) (1.8M mp3)
In anticipation of my imminent first visit to Japan, one of my very favorite frothy Japanese pop songs.
In anticipation of my imminent first visit to Japan, one of my very favorite frothy Japanese pop songs.
¶ elsewhere on this site · 1 June 2005
Invective shaped kind of like a music review.
Candlemass: Black Dwarf (2.6M mp3)
Thanks to innovative Swedish mathematical transforms, we can now interpolate the true Black Sabbath of which the Ozzy and Dio versions were merely dimensional corruptions.
Thanks to innovative Swedish mathematical transforms, we can now interpolate the true Black Sabbath of which the Ozzy and Dio versions were merely dimensional corruptions.
¶ 26 May 2005
"This email is intended for Mr Glen MacDonald (I hope that this is the correct spelling of your name)", it begins, which sounds more than a little like it will go on to hope that my day is filled with great blessings and explain that intimate trust will be placed in me to assist with the liberation of his late father's fortune from rebel banking purgatory in Liberia or Togo or somewhere.
But no, it's actually an otherwise entirely earnest email about my music-review column. Hopes notwithstanding, though, "Glen MacDonald" is not the correct spelling of my name. Even leaving aside the ambiguous interaction of correctness and capitalization, my first name has two "n"s, and my surname has only one "a". If you only knew my name from hearing it said aloud, you'd have no way at all to know "Glen" from "glenn", and no better than even odds at distinguishing "MacDonald" from "mcdonald". But this writer, preemptively apologetic in case they've tragically guessed incorrectly, is writing to me at an email address published at the bottom of issues of my column. For those of you who do not happen to have committed the TWAS footer format to memory, it looks like this:
Copyright © 1995-2005, glenn mcdonald
Feedback to: twas@furia.com
So not only was the correct spelling of my name displayed a tiny fraction of an inch away from the email address which this writer has transcribed correctly, but presumably this is how they have any idea what my name is in order to be in what they think is a position to guess at its spelling.
I point this out not in anger but in fascination. This writer has looked directly at the correct spelling of my name, and by the time they have switched screens to start typing a note to me, they not only have already lost track of the spelling, but even have lost track of why. They have probably, and if so almost involuntarily, processed the image "glenn mcdonald" into existing memory schema for "Glen" and "MacDonald". These schema not only encode those particular primary spellings, but also contain metadata for uncertainty (thus the awareness of doubt) and probably even the related implicit assumption that the values were initialized from hearing, rather than sight. Our perceptions of the world are so influenced by our expectations and prior experiences that much of the time it's arguably misleading to say that we are seeing at all. Our eyes are receiving light, but our brains are matching patterns. I suspect that for all practical purposes, the writer has physically seen my name in precise letters, but mentally experienced hearing it in ambiguous syllables.
We see things not as they are, but as we are. Actually, it's worse than that. Except in the rarest of moments when we are super-humanly self-aware, we experience not what is, but what we have been. And thus perhaps the strangest inescapable truth: the key to clearer awareness of the world is more comprehensive awareness of self.
But no, it's actually an otherwise entirely earnest email about my music-review column. Hopes notwithstanding, though, "Glen MacDonald" is not the correct spelling of my name. Even leaving aside the ambiguous interaction of correctness and capitalization, my first name has two "n"s, and my surname has only one "a". If you only knew my name from hearing it said aloud, you'd have no way at all to know "Glen" from "glenn", and no better than even odds at distinguishing "MacDonald" from "mcdonald". But this writer, preemptively apologetic in case they've tragically guessed incorrectly, is writing to me at an email address published at the bottom of issues of my column. For those of you who do not happen to have committed the TWAS footer format to memory, it looks like this:
Feedback to: twas@furia.com
So not only was the correct spelling of my name displayed a tiny fraction of an inch away from the email address which this writer has transcribed correctly, but presumably this is how they have any idea what my name is in order to be in what they think is a position to guess at its spelling.
I point this out not in anger but in fascination. This writer has looked directly at the correct spelling of my name, and by the time they have switched screens to start typing a note to me, they not only have already lost track of the spelling, but even have lost track of why. They have probably, and if so almost involuntarily, processed the image "glenn mcdonald" into existing memory schema for "Glen" and "MacDonald". These schema not only encode those particular primary spellings, but also contain metadata for uncertainty (thus the awareness of doubt) and probably even the related implicit assumption that the values were initialized from hearing, rather than sight. Our perceptions of the world are so influenced by our expectations and prior experiences that much of the time it's arguably misleading to say that we are seeing at all. Our eyes are receiving light, but our brains are matching patterns. I suspect that for all practical purposes, the writer has physically seen my name in precise letters, but mentally experienced hearing it in ambiguous syllables.
We see things not as they are, but as we are. Actually, it's worse than that. Except in the rarest of moments when we are super-humanly self-aware, we experience not what is, but what we have been. And thus perhaps the strangest inescapable truth: the key to clearer awareness of the world is more comprehensive awareness of self.
¶ listen to this · 19 May 2005
¶ The Economy of Trust · 19 May 2005 essay/tech
It is becoming increasingly possible for separate systems to perform each of the six major functions of data applications: storage, transformation (including creation), categorization (including tagging, indexing, search and retrieval), visualization, monitoring and the administration of trust.
Historically, of course, these functions were usually not only performed by a single unified system, but mostly limited to that system. At its most insular, old-world applications entailed embedded storage in proprietary formats, integrated authoring tools and UI, integrated (if any) notification, and integrated (if any) user-management.
In the old world of personal data applications, like spreadsheets and word-processors and whatever, standardized file systems at least separated storage and categorization from application logic (you could put your Excel file on a floppy disk, or in your "Budgets" folder). Semi-standardization of formats helped open data transformation and/or visualization a little bit (you could use Word's search-and-replace tools on an RTF file, or run Crystal Reports on your Paradox databases), but published formats are not quite the same thing as open formats. And monitoring and trust were usually expendable for personal applications, or solvable a function at a time.
Old-world online applications changed the distribution of insularities. You could actually use several different tools to send, receive and monitor CompuServe data. Prodigy let you use any tool you wanted, as long as it was a construction-paper hammer designed by runt warthogs for use by cartoon infants. But the online service very clearly owned the physical storage, the content space and the identity space.
The early web was a combination of progress and regress, pretty much no matter which directions you think those go. HTML offered the tantalizing prospect of separating the presentation logic from the data structures, but in practice browser convergence quickly resulted in this being true in only a somewhat obscure development-tools sense. You could produce your HTML files with different software than they would be read with, but you still had to take the client constraints heavily into account. HTML files could be moved around fairly easily, but cross-server transclusion got pretty ugly the moment you tried to move much beyond linking. And identity management was reinvented from scratch anywhere it was unavoidable.
But we now have at least nominal rudimentary pieces of the ability to separate all of these. XML offers an interchangeable application-neutral storage format (or at least a meta-format), XML+HTTP gives us a way to virtualize storage (as long as we don't virtualize it too far), Google has demonstrated the scalable separation of categorization and some amount of visualization, and RSS is at least a conceptual step towards the separation of tracking. LDAP separates identity management for at least certain kinds of communities. These may not be the solutions, but they are indications that the solutions are possible and closer.
But the next steps, in all cases, are huge, and at least as difficult culturally as they will be technically.
Storage
All systems must be prepared to handle external storage transparently to the data's owner, whether this actually means live reading and writing over the network or caching and mirroring to simulate it. An indexer must be able to hand you back the indexes it makes and updates, an image organizer must allow you to store the images on your own server, etc.
Transformation
All data must be stored in as neutral and open a format as possible. Application-neutral information must be tagged in standard self-describing ways. Proprietary information is acceptable only when mandated by definition (for internal security functions and precious little else), and where necessary must be clearly identified and attributed. These will be practical imperatives, not just moral ones. Secrecy is fragile, and the net routes around it instinctively.
Categorization
Anything that exists can be categorized. In many cases, the categorization will end up being qualitatively more valuable than the original information. The only difference between data and meta-data is that meta-data is data the owner of the thing didn't anticipate or provide for. The more fluidly a system can re-integrate the meta-data it spawns, the more powerful it will be. The more afraid you are of your audience, the faster they will depart.
Visualization
Similarly, the more readily a system opens itself to external visualization, the better off it will be. Whatever it is you own and control, it's never more than part of the experience. The default techno-social goal of a data application is to be the reference source for some kind of data. (The default business goal is to have some way to make money, not from that data but from that status.)
Monitoring
Various malformed and over-constrained attempts have been made to generalize the problems of monitoring, change tracking and notification into email, IM, RSS, Trackback, Konfabulator, Dashboard and countless proprietary and special-purpose schemes. The next generation has to supply a version that scales to the entire world, including not only its size and its bandwidth but also its heterogeneity and its self-organization. The new system has to rationalize all flows, including the malevolent ones.
Trust
Ultimately, though, the native currency of the new connected world will be trust. Every interaction of people and systems relies on it, usually inherently and implicitly. Existing systems have mostly survived on trust by exclusivity (firewalls, closed networks, internal identity management) obscurity (mostly self-selection) or informal accountability (feedback and self-policing). None of these scale. The new identity systems must be built not to administer specific applications but to provide universal credentials that verify a user's membership in defined communities. The new data systems must be built so that unknown individuals can be accepted on the basis of delegated authority. In the old world people were "users", users existed inside careful boundaries, and outside of those boundaries all there were were names. In the new world, people are the signals themselves, and a name is a name only by virtue of some authority, and maybe that authority by virtue of another one. In the new data world, where the scope of the network is as big as the scope of the planet, and the size is exponentially larger, the primary component of every transaction of storage, transformation, categorization, visualization or monitoring will be the intimate initialization of the basis of trust under which any two of us say anything to each other at all.
Historically, of course, these functions were usually not only performed by a single unified system, but mostly limited to that system. At its most insular, old-world applications entailed embedded storage in proprietary formats, integrated authoring tools and UI, integrated (if any) notification, and integrated (if any) user-management.
In the old world of personal data applications, like spreadsheets and word-processors and whatever, standardized file systems at least separated storage and categorization from application logic (you could put your Excel file on a floppy disk, or in your "Budgets" folder). Semi-standardization of formats helped open data transformation and/or visualization a little bit (you could use Word's search-and-replace tools on an RTF file, or run Crystal Reports on your Paradox databases), but published formats are not quite the same thing as open formats. And monitoring and trust were usually expendable for personal applications, or solvable a function at a time.
Old-world online applications changed the distribution of insularities. You could actually use several different tools to send, receive and monitor CompuServe data. Prodigy let you use any tool you wanted, as long as it was a construction-paper hammer designed by runt warthogs for use by cartoon infants. But the online service very clearly owned the physical storage, the content space and the identity space.
The early web was a combination of progress and regress, pretty much no matter which directions you think those go. HTML offered the tantalizing prospect of separating the presentation logic from the data structures, but in practice browser convergence quickly resulted in this being true in only a somewhat obscure development-tools sense. You could produce your HTML files with different software than they would be read with, but you still had to take the client constraints heavily into account. HTML files could be moved around fairly easily, but cross-server transclusion got pretty ugly the moment you tried to move much beyond linking. And identity management was reinvented from scratch anywhere it was unavoidable.
But we now have at least nominal rudimentary pieces of the ability to separate all of these. XML offers an interchangeable application-neutral storage format (or at least a meta-format), XML+HTTP gives us a way to virtualize storage (as long as we don't virtualize it too far), Google has demonstrated the scalable separation of categorization and some amount of visualization, and RSS is at least a conceptual step towards the separation of tracking. LDAP separates identity management for at least certain kinds of communities. These may not be the solutions, but they are indications that the solutions are possible and closer.
But the next steps, in all cases, are huge, and at least as difficult culturally as they will be technically.
Storage
All systems must be prepared to handle external storage transparently to the data's owner, whether this actually means live reading and writing over the network or caching and mirroring to simulate it. An indexer must be able to hand you back the indexes it makes and updates, an image organizer must allow you to store the images on your own server, etc.
Transformation
All data must be stored in as neutral and open a format as possible. Application-neutral information must be tagged in standard self-describing ways. Proprietary information is acceptable only when mandated by definition (for internal security functions and precious little else), and where necessary must be clearly identified and attributed. These will be practical imperatives, not just moral ones. Secrecy is fragile, and the net routes around it instinctively.
Categorization
Anything that exists can be categorized. In many cases, the categorization will end up being qualitatively more valuable than the original information. The only difference between data and meta-data is that meta-data is data the owner of the thing didn't anticipate or provide for. The more fluidly a system can re-integrate the meta-data it spawns, the more powerful it will be. The more afraid you are of your audience, the faster they will depart.
Visualization
Similarly, the more readily a system opens itself to external visualization, the better off it will be. Whatever it is you own and control, it's never more than part of the experience. The default techno-social goal of a data application is to be the reference source for some kind of data. (The default business goal is to have some way to make money, not from that data but from that status.)
Monitoring
Various malformed and over-constrained attempts have been made to generalize the problems of monitoring, change tracking and notification into email, IM, RSS, Trackback, Konfabulator, Dashboard and countless proprietary and special-purpose schemes. The next generation has to supply a version that scales to the entire world, including not only its size and its bandwidth but also its heterogeneity and its self-organization. The new system has to rationalize all flows, including the malevolent ones.
Trust
Ultimately, though, the native currency of the new connected world will be trust. Every interaction of people and systems relies on it, usually inherently and implicitly. Existing systems have mostly survived on trust by exclusivity (firewalls, closed networks, internal identity management) obscurity (mostly self-selection) or informal accountability (feedback and self-policing). None of these scale. The new identity systems must be built not to administer specific applications but to provide universal credentials that verify a user's membership in defined communities. The new data systems must be built so that unknown individuals can be accepted on the basis of delegated authority. In the old world people were "users", users existed inside careful boundaries, and outside of those boundaries all there were were names. In the new world, people are the signals themselves, and a name is a name only by virtue of some authority, and maybe that authority by virtue of another one. In the new data world, where the scope of the network is as big as the scope of the planet, and the size is exponentially larger, the primary component of every transaction of storage, transformation, categorization, visualization or monitoring will be the intimate initialization of the basis of trust under which any two of us say anything to each other at all.
I hereby open a public discussion forum called, unhelpfully, vF. I wrote the software for it myself, mostly because I was curious to see what that was like, and now I'm opening it because I'm curious to see what that is like.
If you have something you want to talk about, and nowhere else you'd rather talk about it, you are now welcome to talk about it there.
If you have something you want to talk about, and nowhere else you'd rather talk about it, you are now welcome to talk about it there.
The indulgent, underworked or technically omnicurious among you can help me with a little experiment by going to vLog, a blank anonymous public blog (if it's correct to call something a blog when it doesn't have any way of entering links...) and contributing whatever random comment occurs to you.
I am testing a prototype dual-hash browser/email/browser-round-trip verification system for public commenting with no persistent server-side user-management or user-side server-management.
I am testing a prototype dual-hash browser/email/browser-round-trip verification system for public commenting with no persistent server-side user-management or user-side server-management.