A place to cache linked articles (think custom and personal wayback machine)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

index.html 62KB

  1. <!doctype html><!-- This is a valid HTML5 document. -->
  2. <!-- Screen readers, SEO, extensions and so on. -->
  3. <html lang="fr">
  4. <!-- Has to be within the first 1024 bytes, hence before the <title>
  5. See: https://www.w3.org/TR/2012/CR-html5-20121217/document-metadata.html#charset -->
  6. <meta charset="utf-8">
  7. <!-- Why no `X-UA-Compatible` meta: https://stackoverflow.com/a/6771584 -->
  8. <!-- The viewport meta is quite crowded and we are responsible for that.
  9. See: https://codepen.io/tigt/post/meta-viewport-for-2015 -->
  10. <meta name="viewport" content="width=device-width,initial-scale=1">
  11. <!-- Required to make a valid HTML5 document. -->
  12. <title>A Group Is Its Own Worst Enemy (archive) — David Larlet</title>
  13. <meta name="description" content="Publication mise en cache pour en conserver une trace.">
  14. <!-- That good ol' feed, subscribe :). -->
  15. <link rel="alternate" type="application/atom+xml" title="Feed" href="/david/log/">
  16. <!-- Generated from https://realfavicongenerator.net/ such a mess. -->
  17. <link rel="apple-touch-icon" sizes="180x180" href="/static/david/icons2/apple-touch-icon.png">
  18. <link rel="icon" type="image/png" sizes="32x32" href="/static/david/icons2/favicon-32x32.png">
  19. <link rel="icon" type="image/png" sizes="16x16" href="/static/david/icons2/favicon-16x16.png">
  20. <link rel="manifest" href="/static/david/icons2/site.webmanifest">
  21. <link rel="mask-icon" href="/static/david/icons2/safari-pinned-tab.svg" color="#07486c">
  22. <link rel="shortcut icon" href="/static/david/icons2/favicon.ico">
  23. <meta name="msapplication-TileColor" content="#f0f0ea">
  24. <meta name="msapplication-config" content="/static/david/icons2/browserconfig.xml">
  25. <meta name="theme-color" content="#f0f0ea">
  26. <!-- Documented, feel free to shoot an email. -->
  27. <link rel="stylesheet" href="/static/david/css/style_2020-06-19.css">
  28. <!-- See https://www.zachleat.com/web/comprehensive-webfonts/ for the trade-off. -->
  29. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_regular.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: light), (prefers-color-scheme: no-preference)" crossorigin>
  30. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_bold.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: light), (prefers-color-scheme: no-preference)" crossorigin>
  31. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_italic.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: light), (prefers-color-scheme: no-preference)" crossorigin>
  32. <link rel="preload" href="/static/david/css/fonts/triplicate_t3_regular.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: dark)" crossorigin>
  33. <link rel="preload" href="/static/david/css/fonts/triplicate_t3_bold.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: dark)" crossorigin>
  34. <link rel="preload" href="/static/david/css/fonts/triplicate_t3_italic.woff2" as="font" type="font/woff2" media="(prefers-color-scheme: dark)" crossorigin>
  35. <script type="text/javascript">
  36. function toggleTheme(themeName) {
  37. document.documentElement.classList.toggle(
  38. 'forced-dark',
  39. themeName === 'dark'
  40. )
  41. document.documentElement.classList.toggle(
  42. 'forced-light',
  43. themeName === 'light'
  44. )
  45. }
  46. const selectedTheme = localStorage.getItem('theme')
  47. if (selectedTheme !== 'undefined') {
  48. toggleTheme(selectedTheme)
  49. }
  50. </script>
  51. <meta name="robots" content="noindex, nofollow">
  52. <meta content="origin-when-cross-origin" name="referrer">
  53. <!-- Canonical URL for SEO purposes -->
  54. <link rel="canonical" href="http://shirky.com/writings/group_enemy.html">
  55. <body class="remarkdown h1-underline h2-underline h3-underline hr-center ul-star pre-tick">
  56. <article>
  57. <header>
  58. <h1>A Group Is Its Own Worst Enemy</h1>
  59. </header>
  60. <nav>
  61. <p class="center">
  62. <a href="/david/" title="Aller à l’accueil">🏠</a> •
  63. <a href="http://shirky.com/writings/group_enemy.html" title="Lien vers le contenu original">Source originale</a>
  64. </p>
  65. </nav>
  66. <hr>
  67. <main>
  68. <p><em>A speech at ETech, April, 2003</em></p>
  69. <p>
  70. Published July 1, 2003 on the “Networks, Economics, and Culture” mailing list.
  71. <a href="mailto:nec-request@shirky.com?subject=subscribe">Subscribe</a>
  72. to the mailing list.
  73. </p>
  74. <p>
  75. This is a lightly edited version of the keynote I gave on Social
  76. Software at the O’Reilly Emerging Technology conference in Santa
  77. Clara on April 24, 2003
  78. </p>
  79. <hr>
  80. <p>
  81. Good morning, everybody. I want to talk this morning about social
  82. software ...there’s a surprise. I want to talk about a pattern I’ve seen
  83. over and over again in social software that supports large and
  84. long-lived groups. And that pattern is the pattern described in the
  85. title of this talk: “A Group Is Its Own Worst Enemy.”
  86. </p>
  87. <p>
  88. In particular, I want to talk about what I now think is one of the core challenges for designing large-scale social software. Let me offer a definition of social software, because it’s a term that’s still fairly amorphous. My definition is fairly simple: It’s software that supports group interaction. I also want to emphasize, although that’s a fairly simple definition, how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  89. </p>
  90. <p>
  91. Prior to the Internet, we had lots of patterns that supported point-to-point two-way. We had telephones, we had the telegraph. We were familiar with technological mediation of those kinds of conversations. Prior to the Internet, we had lots of patterns that supported one-way outbound. I could put something on television or the radio, I could publish a newspaper. We had the printing press. So although the Internet does good things for those patterns, they’re patterns we knew from before.
  92. </p>
  93. <p>
  94. Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table. There was no technological mediation for group conversations. The closest we got was the conference call, which never really worked right -- “Hello? Do I push this button now? Oh, shoot, I just hung up.” It’s not easy to set up a conference call, but it’s very easy to email five of your friends and say “Hey, where are we going for pizza?” So ridiculously easy group forming is really news.
  95. </p>
  96. <p>
  97. We’ve had social software for 40 years at most, dated from the Plato BBS system, and we’ve only had 10 years or so of widespread availability, so we’re just finding out what works. We’re still learning how to make these kinds of things.
  98. </p>
  99. <p>
  100. Now, software that supports group interaction is a fundamentally unsatisfying definition in many ways, because it doesn’t point to a specific class of technology. If you look at email, it obviously supports social patterns, but it can also support a broadcast pattern. If I’m a spammer, I’m going to mail things out to a million people, but they’re not going to be talking to one another, and I’m not going to be talking to them -- spam is email, but it isn’t social. If I’m mailing you, and you’re mailing me back, we’re having point-to-point and two-way conversation, but not one that creates group dynamics.
  101. </p>
  102. <p>
  103. So email doesn’t necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I’m Glenn Reynolds, and I’m publishing something with Comments Off and reaching a million users a month, that’s really broadcast. It’s interesting that I can do it as a single individual, but the pattern is closer to MSNBC than it is to a conversation. If it’s a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that’s social. So, again, weblogs are not necessarily social, although they can support social patterns.
  104. </p>
  105. <p>
  106. Nevertheless, I think that definition is the right one, because it recognizes the fundamentally social nature of the problem. Groups are a run-time effect. You cannot specify in advance what the group will do, and so you can’t substantiate in software everything you expect to have happen.
  107. </p>
  108. <p>
  109. Now, there’s a large body of literature saying “We built this software, a group came and used it, and they began to exhibit behaviors that surprised us enormously, so we’ve gone and documented these behaviors.” Over and over and over again this pattern comes up. (I hear Stewart [Brand, of the WELL] laughing.) The WELL is one of those places where this pattern came up over and over again.
  110. </p>
  111. <p>
  112. This talk is in three parts. The best explanation I have found for the kinds of things that happen when groups of humans interact is psychological research that predates the Internet, so the first part is going to be about W.R. Bion’s research, which I will talk about in a moment, research that I believe explains how and why a group is its own worst enemy.
  113. </p>
  114. <p>
  115. The second part is: Why now? What’s going on now that makes this worth thinking about? I think we’re seeing a revolution in social software in the current environment that’s really interesting.
  116. </p>
  117. <p>
  118. And third, I want to identify some things, about half a dozen things, in fact, that I think are core to any software that supports larger, long-lived groups.
  119. </p>
  120. <h2>Part One: How is a group its own worst enemy?</h2>
  121. <p>
  122. So, Part One. The best explanation I have found for the ways in which this pattern establishes itself, the group is its own worst enemy, comes from a book by W.R. Bion called “Experiences in Groups,” written in the middle of the last century.
  123. </p>
  124. <p>
  125. Bion was a psychologist who was doing group therapy with groups of neurotics. (Drawing parallels between that and the Internet is left as an exercise for the reader.) The thing that Bion discovered was that the neurotics in his care were, as a group, conspiring to defeat therapy.
  126. </p>
  127. <p>
  128. There was no overt communication or coordination. But he could see that whenever he would try to do anything that was meant to have an effect, the group would somehow quash it. And he was driving himself crazy, in the colloquial sense of the term, trying to figure out whether or not he should be looking at the situation as: Are these individuals taking action on their own? Or is this a coordinated group?
  129. </p>
  130. <p>
  131. He could never resolve the question, and so he decided that the unresolvability of the question was the answer. To the question: Do you view groups of people as aggregations of individuals or as a cohesive group, his answer was: “Hopelessly committed to both.”
  132. </p>
  133. <p>
  134. He said that humans are fundamentally individual, and also fundamentally social. Every one of us has a kind of rational decision-making mind where we can assess what’s going on and make decisions and act on them. And we are all also able to enter viscerally into emotional bonds with other groups of people that transcend the intellectual aspects of the individual.
  135. </p>
  136. <p>
  137. In fact, Bion was so convinced that this was the right answer that the image he put on the front cover of his book was a Necker cube, one of those cubes that you can look at and make resolve in one of two ways, but you can never see both views of the cube at the same time. So groups can be analyzed both as collections of individuals and having this kind of emotive group experience.
  138. </p>
  139. <p>
  140. Now, it’s pretty easy to see how groups of people who have formal memberships, groups that have been labeled and named like “I am a member of such-and-such a guild in a massively multi-player online role-playing game,” it’s easy to see how you would have some kind of group cohesion there. But Bion’s thesis is that this effect is much, much deeper, and kicks in much, much sooner than many of us expect. So I want to illustrate this with a story, and to illustrate the illustration, I’ll use a story from your life. Because even if I don’t know you, I know what I’m about to describe has happened to you.
  141. </p>
  142. <p>
  143. You are at a party, and you get bored. You say “This isn’t doing it for me anymore. I’d rather be someplace else. I’d rather be home asleep. The people I wanted to talk to aren’t here.” Whatever. The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don’t leave. You make a decision “I don’t like this.” If you were in a bookstore and you said “I’m done,” you’d walk out. If you were in a coffee shop and said “This is boring,” you’d walk out.
  144. </p>
  145. <p>
  146. You’re sitting at a party, you decide “I don’t like this; I don’t want to be here.” And then you don’t leave. That kind of social stickiness is what Bion is talking about.
  147. </p>
  148. <p>
  149. And then, another really remarkable thing happens. Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  150. </p>
  151. <p>
  152. This effect is so steady it’s sometimes called the paradox of groups. It’s obvious that there are no groups without members. But what’s less obvious is that there are no members without a group. Because what would you be a member of?
  153. </p>
  154. <p>
  155. So there’s this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it’s subconscious, you start getting group effects. And the effects that we’ve seen come up over and over and over again in online communities.
  156. </p>
  157. <p>
  158. Now, Bion decided that what he was watching with the neurotics was the group defending itself against his attempts to make the group do what they said they were supposed to do. The group was convened to get better, this group of people was in therapy to get better. But they were defeating that. And he said, there are some very specific patterns that they’re entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  159. </p>
  160. <p>
  161. The first is sex talk, what he called, in his mid-century prose, “A group met for pairing off.” And what that means is, the group conceives of its purpose as the hosting of flirtatious or salacious talk or emotions passing between pairs of members.
  162. </p>
  163. <p>
  164. You go on IRC and you scan the channel list, and you say “Oh, I know what that group is about, because I see the channel label.” And you go into the group, you will also almost invariably find that it’s about sex talk as well. Not necessarily overt. But that is always in scope in human conversations, according to Bion. That is one basic pattern that groups can always devolve into, away from the sophisticated purpose and towards one of these basic purposes.
  165. </p>
  166. <p>
  167. The second basic pattern that Bion detailed: The identification and vilification of external enemies. This is a very common pattern. Anyone who was around the Open Source movement in the mid-Nineties could see this all the time. If you cared about Linux on the desktop, there was a big list of jobs to do. But you could always instead get a conversation going about Microsoft and Bill Gates. And people would start bleeding from their ears, they would get so mad.
  168. </p>
  169. <p>
  170. If you want to make it better, there’s a list of things to do. It’s Open Source, right? Just fix it. “No, no, Microsoft and Bill Gates grrrrr ...”, the froth would start coming out. The external enemy -- nothing causes a group to galvanize like an external enemy.
  171. </p>
  172. <p>
  173. So even if someone isn’t really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  174. </p>
  175. <p>
  176. The third pattern Bion identified: Religious veneration. The nomination and worship of a religious icon or a set of religious tenets. The religious pattern is, essentially, we have nominated something that’s beyond critique. You can see this pattern on the Internet any day you like. Go onto a Tolkein newsgroup or discussion forum, and try saying “You know, The Two Towers is a little dull. I mean loooong. We didn’t need that much description about the forest, because it’s pretty much the same forest all the way.”
  177. </p>
  178. <p>
  179. Try having that discussion. On the door of the group it will say: “This is for discussing the works of Tolkein.” Go in and try and have that discussion.
  180. </p>
  181. <p>
  182. Now, in some places people say “Yes, but it needed to, because it had to convey the sense of lassitude,” or whatever. But in most places you’ll simply be flamed to high heaven, because you’re interfering with the religious text.
  183. </p>
  184. <p>
  185. So these are human patterns that have shown up on the Internet, not because of the software, but because it’s being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert’s Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we’re going to draw a relatively small circle around the acceptable ones.
  186. </p>
  187. <p>
  188. He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  189. </p>
  190. <p>
  191. In the Seventies -- this is a pattern that’s shown up on the network over and over again -- in the Seventies, a BBS called Communitree launched, one of the very early dial-up BBSes. This was launched when people didn’t own computers, institutions owned computers.
  192. </p>
  193. <p>
  194. Communitree was founded on the principles of open access and free dialogue. “Communitree” -- the name just says “California in the Seventies.” And the notion was, effectively, throw off structure and new and beautiful patterns will arise.
  195. </p>
  196. <p>
  197. And, indeed, as anyone who has put discussion software into groups that were previously disconnected has seen, that does happen. Incredible things happen. The early days of Echo, the early days of usenet, the early days of Lucasfilms Habitat, over and over again, you see all this incredible upwelling of people who suddenly are connected in ways they weren’t before.
  198. </p>
  199. <p>
  200. And then, as time sets in, difficulties emerge. In this case, one of the difficulties was occasioned by the fact that one of the institutions that got hold of some modems was a high school. And who, in 1978, was hanging out in the room with the computer and the modems in it, but the boys of that high school. And the boys weren’t terribly interested in sophisticated adult conversation. They were interested in fart jokes. They were interested in salacious talk. They were interested in running amok and posting four-letter words and nyah-nyah-nyah, all over the bulletin board.
  201. </p>
  202. <p>
  203. And the adults who had set up Communitree were horrified, and overrun by these students. The place that was founded on open access had too much open access, too much openness. They couldn’t defend themselves against their own users. The place that was founded on free speech had too much freedom. They had no way of saying “No, that’s not the kind of free speech we meant.”
  204. </p>
  205. <p>
  206. But that was a requirement. In order to defend themselves against being overrun, that was something that they needed to have that they didn’t have, and as a result, they simply shut the site down.
  207. </p>
  208. <p>
  209. Now you could ask whether or not the founders’ inability to defend themselves from this onslaught, from being overrun, was a technical or a social problem. Did the software not allow the problem to be solved? Or was it the social configuration of the group that founded it, where they simply couldn’t stomach the idea of adding censorship to protect their system. But in a way, it doesn’t matter, because technical and social issues are deeply intertwined. There’s no way to completely separate them.
  210. </p>
  211. <p>
  212. What matters is, a group designed this and then was unable, in the context they’d set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters. Communitree wasn’t shut down by people trying to crash or syn-flood the server. It was shut down by people logging in and posting, which is what the system was designed to allow. The technological pattern of normal use and attack were identical at the machine level, so there was no way to specify technologically what should and shouldn’t happen. Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn’t care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  213. </p>
  214. <p>
  215. Now, this story has been written many times. It’s actually frustrating to see how many times it’s been written. You’d hope that at some point that someone would write it down, and they often do, but what then doesn’t happen is other people don’t read it.
  216. </p>
  217. <p>
  218. The most charitable description of this repeated pattern is “learning from experience.” But learning from experience is the worst possible way to learn something. Learning from experience is one up from remembering. That’s not great. The best way to learn something is when someone else figures it out and tells you: “Don’t go in that swamp. There are alligators in there.”
  219. </p>
  220. <p>
  221. Learning from experience about the alligators is lousy, compared to learning from reading, say. There hasn’t been, unfortunately, in this arena, a lot of learning from reading. And so, lessons from Lucasfilms’ Habitat, written in 1990, reads a lot like Rose Stone’s description of Communitree from 1978.
  222. </p>
  223. <p>
  224. This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  225. </p>
  226. <p>
  227. There’s a great document called “LambdaMOO Takes a New Direction,” which is about the wizards of LambdaMOO, Pavel Curtis’s Xerox PARC experiment in building a MUD world. And one day the wizards of LambdaMOO announced “We’ve gotten this system up and running, and all these interesting social effects are happening. Henceforth we wizards will only be involved in technological issues. We’re not going to get involved in any of that social stuff.”
  228. </p>
  229. <p>
  230. And then, I think about 18 months later -- I don’t remember the exact gap of time -- they come back. The wizards come back, extremely cranky. And they say: “What we have learned from you whining users is that we can’t do what we said we would do. We cannot separate the technological aspects from the social aspects of running a virtual world.
  231. </p>
  232. <p>
  233. “So we’re back, and we’re taking wizardly fiat back, and we’re going to do things to run the system. We are effectively setting ourselves up as a government, because this place needs a government, because without us, the place was falling apart.”
  234. </p>
  235. <p>
  236. People who work on social software are closer in spirit to economists and political scientists than they are to people making compilers. They both look like programming, but when you’re dealing with groups of people as one of your run-time phenomena, that is an incredibly different practice. In the political realm, we would call these kinds of crises a constitutional crisis. It’s what happens when the tension between the individual and the group, and the rights and responsibilities of individuals and groups, gets so serious that something has to be done.
  237. </p>
  238. <p>
  239. And the worst crisis is the first crisis, because it’s not just “We need to have some rules.” It’s also “We need to have some rules for making some rules.” And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  240. </p>
  241. <p>
  242. Geoff Cohen has a great observation about this. He said “The likelihood that any unmoderated group will eventually get into a flame-war about whether or not to have a moderator approaches one as time increases.” As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  243. </p>
  244. <h2>Part Two: Why now? </h2>
  245. <p>
  246. If these things I’m saying have happened so often before, have been happening and been documented and we’ve got psychological literature that predates the Internet, what’s going on now that makes this important?
  247. </p>
  248. <p>
  249. I can’t tell you precisely why, but observationally there is a revolution in social software going on. The number of people writing tools to support or enhance group collaboration or communication is astonishing.
  250. </p>
  251. <p>
  252. The web turned us all into size queens for six or eight years there. It was loosely coupled, it was stateless, it scaled like crazy, and everything became about How big can you get? “How many users does Yahoo have? How many customers does Amazon have? How many readers does MSNBC have?” And the answer could be “Really a lot!” But it could only be really a lot if you didn’t require MSNBC to be answering those readers, and you didn’t require those readers to be talking to one another.
  253. </p>
  254. <p>
  255. The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn’t supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can’t. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can’t be supported when you’re talking about tens of thousands or millions of users, at least in a single group.
  256. </p>
  257. <p>
  258. We’ve had things like mailing lists and BBSes for a long time, and more recently we’ve had IM, we’ve had these various patterns. And now, all of a sudden, these things are popping up. We’ve gotten weblogs and wikis, and I think, even more importantly, we’re getting platform stuff. We’re getting RSS. We’re getting shared Flash objects. We’re getting ways to quickly build on top of some infrastructure we can take for granted, that lets us try new things very rapidly.
  259. </p>
  260. <p>
  261. I was talking to Stewart Butterfield about the chat application they’re trying here. I said “Hey, how’s that going?” He said: “Well, we only had the idea for it two weeks ago. So this is the launch.” When you can go from “Hey, I’ve got an idea” to “Let’s launch this in front of a few hundred serious geeks and see how it works,” that suggests that there’s a platform there that is letting people do some really interesting things really quickly. It’s not that you couldn’t have built a similar application a couple of years ago, but the cost would have been much higher. And when you lower costs, interesting new kinds of things happen.
  262. </p>
  263. <p>
  264. So the first answer to Why Now? is simply “Because it’s time.” I can’t tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn’t know what we were doing.
  265. </p>
  266. <p>
  267. One was a bad idea, the other turns out to be a really good idea. It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern.
  268. </p>
  269. <p>
  270. We got the weblog pattern in around ’96 with Drudge. We got weblog platforms starting in ’98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it’s going to change everything.
  271. </p>
  272. <p>
  273. The vertigo moment for me was when Phil Gyford launched the Pepys weblog, Samuel Pepys’ diaries of the 1660’s turned into a weblog form, with a new post every day from Pepys’ diary. What that said to me was: Phil was asserting, and I now believe, that weblogs will be around for at least 10 years, because that’s how long Pepys kept a diary. And that was this moment of projecting into the future: This is now infrastructure we can take for granted.
  274. </p>
  275. <p>
  276. Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don’t know. It just takes a while for people to get used to these ideas.
  277. </p>
  278. <p>
  279. So, first of all, this is a revolution in part because it is a revolution. We’ve internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  280. </p>
  281. <p>
  282. When you got social software on the web in the mid-Nineties, a lot of it was: “This is the Giant Lotus Dreadnought, now with New Lightweight Web Interface!” It never felt like the web. It felt like this hulking thing with a little, you know, “Here’s some icons. Don’t look behind the curtain.”
  283. </p>
  284. <p>
  285. A weblog is web-native. It’s the web all the way in. A wiki is a web-native way of hosting collaboration. It’s lightweight, it’s loosely coupled, it’s easy to extend, it’s easy to break down. And it’s not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we’re taking all of these tools and we’re extending them in a way that lets us build new things really quickly.
  286. </p>
  287. <p>
  288. Third, in David Weinberger’s felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern. It’s really worthwhile to look into what Joi Ito is doing with the Emergent Democracy movement, even if you’re not interested in the themes of emerging democracy. This started because a conversation was going on, and Ito said “I am frustrated. I’m sitting here in Japan, and I know all of these people are having these conversations in real-time with one another. I want to have a group conversation, too. I’ll start a conference call.
  289. </p>
  290. <p>
  291. “But since conference calls are so lousy on their own, I’m going to bring up a chat window at the same time.” And then, in the first meeting, I think it was Pete Kaminski said “Well, I’ve also opened up a wiki, and here’s the URL.” And he posted it in the chat window. And people can start annotating things. People can start adding bookmarks; here are the lists.
  292. </p>
  293. <p>
  294. So, suddenly you’ve got this meeting, which is going on in three separate modes at the same time, two in real-time and one annotated. So you can have the conference call going on, and you know how conference calls are. Either one or two people dominate it, or everyone’s like “Oh, can I -- no, but --”, everyone interrupting and cutting each other off.
  295. </p>
  296. <p>
  297. It’s very difficult to coordinate a conference call, because people can’t see one another, which makes it hard to manage the interrupt logic. In Joi’s conference call, the interrupt logic got moved to the chat room. People would type “Hand,” and the moderator of the conference call will then type “You’re speaking next,” in the chat. So the conference call flowed incredibly smoothly.
  298. </p>
  299. <p>
  300. Meanwhile, in the chat, people are annotating what people are saying. “Oh, that reminds me of So-and-so’s work.” Or “You should look at this URL...you should look at that ISBN number.” In a conference call, to read out a URL, you have to spell it out -- “No, no, no, it’s w w w dot net dash...” In a chat window, you get it and you can click on it right there. You can say, in the conference call or the chat: “Go over to the wiki and look at this.”
  301. </p>
  302. <p>
  303. This is a broadband conference call, but it isn’t a giant thing. It’s just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It’s different from: Let’s take the Lotus juggernaut and add a web front-end.
  304. </p>
  305. <p>
  306. And finally, and this is the thing that I think is the real freakout, is ubiquity. The web has been growing for a long, long time. And so some people had web access, and then lots of people had web access, and then most people had web access.
  307. </p>
  308. <p>
  309. But something different is happening now. In many situations, all people have access to the network. And “all” is a different kind of amount than “most.” “All” lets you start taking things for granted.
  310. </p>
  311. <p>
  312. Now, the Internet isn’t everywhere in the world. It isn’t even everywhere in the developed world. But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they’re friends with is online. Everyone in their family is online.
  313. </p>
  314. <p>
  315. And this pattern of ubiquity lets you start taking this for granted. Bill Joy once said “My method is to look at something that seems like a good idea and assume it’s true.” We’re starting to see software that simply assumes that all offline groups will have an online component, no matter what.
  316. </p>
  317. <p>
  318. It is now possible for every grouping, from a Girl Scout troop on up, to have an online component, and for it to be lightweight and easy to manage. And that’s a different kind of thing than the old pattern of “online community.” I have this image of two hula hoops, the old two-hula hoop world, where my real life is over here, and my online life is over there, and there wasn’t much overlap between them. If the hula hoops are swung together, and everyone who’s offline is also online, at least from my point of view, that’s a different kind of pattern.
  319. </p>
  320. <p>
  321. There’s a second kind of ubiquity, which is the kind we’re enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don’t run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  322. </p>
  323. <p>
  324. The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it’s going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  325. </p>
  326. <p>
  327. It really quickly becomes an assumption that a group can do things like “Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them.” It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who’s in a room can be online together at the same time, can lead to new patterns.
  328. </p>
  329. <h2>Part Three: What can we take for granted?</h2>
  330. <p>
  331. If these assumptions are right, one that a group is its own worst enemy, and two, we’re seeing this explosion of social software, what should we do? Is there anything we can say with any certainty about building social software, at least for large and long-lived groups?
  332. </p>
  333. <p>
  334. I think there is. A little over 10 years ago, I quit my day job, because Usenet was so interesting, I thought: This is really going to be big. And I actually wrote a book about net culture at the time: Usenet, the Well, Echo, IRC and so forth. It launched in April of ’95, just as that world was being washed away by the web. But it was my original interest, so I’ve been looking at this problem in one way or another for 10 years, and I’ve been looking at it pretty hard for the a year and a half or so.
  335. </p>
  336. <p>
  337. So there’s this question “What is required to make a large, long-lived online group successful?” and I think I can now answer with some confidence: “It depends.” I’m hoping to flesh that answer out a little bit in the next ten years.
  338. </p>
  339. <p>
  340. But I can at least say some of the things it depends on. The Calvinists had a doctrine of natural grace and supernatural grace. Natural grace was “You have to do all the right things in the world to get to heaven...” and supernatural grace was “...and God has to anoint you.” And you never knew if you had supernatural grace or not. This was their way of getting around the fact that the Book of Revelations put an upper limit on the number of people who were going to heaven.
  341. </p>
  342. <p>
  343. Social software is like that. You can find the same piece of code running in many, many environments. And sometimes it works and sometimes it doesn’t. So there is something supernatural about groups being a run-time experience.
  344. </p>
  345. <p>
  346. The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There’s a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it’s not like a cake recipe. There’s nothing you can do to make it come out right every time.
  347. </p>
  348. <p>
  349. There are, however, I think, about half a dozen things that are broadly true of all the groups I’ve looked at and all the online constitutions I’ve read for software that supports large and long-lived groups. And I’d break that list in half. I’d say, if you are going to create a piece of social software designed to support large groups, you have to accept three things, and design for four things.
  350. </p>
  351. <h2>Three Things to Accept</h2>
  352. <ol>
  353. <li>
  354. <p>
  355. Of the things you have to accept, the first is that you cannot completely separate technical and social issues. There are two attractive patterns. One says, we’ll handle technology over `here, we’ll do social issues there. We’ll have separate mailing lists with separate discussion groups, or we’ll have one track here and one track there. This doesn’t work. It’s never been stated more clearly than in the pair of documents called “LambdaMOO Takes a New Direction.” I can do no better than to point you to those documents.
  356. </p>
  357. <p>
  358. But recently we’ve had this experience where there was a social software discussion list, and someone said “I know, let’s set up a second mailing list for technical issues.” And no one moved from the first list, because no one could fork the conversation between social and technical issues, because the conversation can’t be forked.
  359. </p>
  360. <p>
  361. The other pattern that’s very, very attractive -- anybody who looks at this stuff has the same epiphany, which is: “Omigod, this software is determining what people do!” And that is true, up to a point. But you cannot completely program social issues either. So you can’t separate the two things, and you also can’t specify all social issues in technology. The group is going to assert its rights somehow, and you’re going to get this mix of social and technological effects.
  362. </p>
  363. <p>
  364. So the group is real. It will exhibit emergent effects. It can’t be ignored, and it can’t be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that’s worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  365. </p>
  366. </li>
  367. <li>
  368. <p>
  369. The second thing you have to accept: Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner’s phrase for “the group within the group that matters most.”
  370. </p>
  371. <p>
  372. The core group on Communitree was undifferentiated from the group of random users that came in. They were separate in their own minds, because they knew what they wanted to do, but they couldn’t defend themselves against the other users. But in all successful online communities that I’ve looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  373. </p>
  374. <p>
  375. Now, the software does not always allow the core group to express itself, which is why I say you have to accept this. Because if the software doesn’t allow the core group to express itself, it will invent new ways of doing so.
  376. </p>
  377. <p>
  378. On alt.folklore.urban , the discussion group about urban folklore on Usenet, there was a group of people who hung out there and got to be friends. And they came to care about the existence of AFU, to the point where, because Usenet made no distinction between members in good standing and drive-by users, they set up a mailing list called The Old Hats. The mailing list was for meta-discussion, discussion about AFU, so they could coordinate efforts formally if they were going to troll someone or flame someone or ignore someone, on the mailing list.
  379. </p>
  380. <p>
  381. <em>
  382. Addendum, July 2, 2003: A longtime a.f.u participant says that the Old
  383. Hat list was created to allow the Silicon Valley-dwelling members to
  384. plan a barbecue, so that they could add a face-to-face dimension to
  385. their virtual interaction. The use of the list as a backstage area for
  386. discussing the public newsgroup arose after the fact.
  387. </em>
  388. </p>
  389. <p> Then, as Usenet kept growing, many newcomers came along and
  390. seemed to like the environment, because it was well-run. In order to
  391. defend themselves from the scaling issues that come from of adding a
  392. lot of new members to the Old Hats list, they said “We’re starting a
  393. second list, called the Young Hats.” </p>
  394. <p> So they created this
  395. three-tier system, not dissimilar to the tiers of anonymous cowards,
  396. logged-in users, and people with high karma on Slashdot. But because
  397. Usenet didn’t let them do it in the software, they brought in other
  398. pieces of software, these mailing lists, that they needed to build the
  399. structure. So you don’t get the program users, the members in good
  400. standing will find one another and be recognized to one another.
  401. </p>
  402. </li>
  403. <li>
  404. <p>
  405. The third thing you need to accept: The core group has
  406. rights that trump individual rights in some situations. This pulls
  407. against the libertarian view that’s quite common on the network, and
  408. it absolutely pulls against the one person/one vote notion. But you
  409. can see examples of how bad an idea voting is when citizenship is the
  410. same as ability to log in. </p>
  411. <p> In the early Nineties, a proposal
  412. went out to create a Usenet news group for discussing Tibetan culture,
  413. called soc.culture.tibet. And it was voted down, in large part
  414. because a number of Chinese students who had Internet access voted it
  415. down, on the logic that Tibet wasn’t a country; it was a region of
  416. China. And in their view, since Tibet wasn’t a country, there
  417. oughtn’t be any place to discuss its culture, because that was
  418. oxymoronic. </p>
  419. <p> Now, everyone could see that this was the wrong
  420. answer. The people who wanted a place to discuss Tibetan culture
  421. should have it. That was the core group. But because the one
  422. person/one vote model on Usenet said “Anyone who’s on Usenet gets to
  423. vote on any group,” sufficiently contentious groups could simply be
  424. voted away. </p>
  425. <p> Imagine today if, in the United States, Internet
  426. users had to be polled before any anti-war group could be created. Or
  427. French users had to be polled before any pro-war group could be
  428. created. The people who want to have those discussions are the people
  429. who matter. And absolute citizenship, with the idea that if you can
  430. log in, you are a citizen, is a harmful pattern, because it is the
  431. tyranny of the majority. </p>
  432. <p> So the core group needs ways to
  433. defend itself -- both in getting started and because of the effects I
  434. talked about earlier -- the core group needs to defend itself so that
  435. it can stay on its sophisticated goals and away from its basic
  436. instincts. </p>
  437. <p> The Wikipedia has a similar system today, with a
  438. volunteer fire department, a group of people who care to an unusual
  439. degree about the success of the Wikipedia. And they have enough
  440. leverage, because of the way wikis work, they can always roll back
  441. graffiti and so forth, that that thing has stayed up despite repeated
  442. attacks. So leveraging the core group is a really powerful system.
  443. </p>
  444. </li>
  445. </ol>
  446. <p> Now, when I say these are three things you have to accept, I
  447. mean you <i>have to</i> accept them. Because if you don’t accept them
  448. upfront, they’ll happen to you anyway. And then you’ll end up writing
  449. one of those documents that says “Oh, we launched this and we tried
  450. it, and then the users came along and did all these weird things. And
  451. now we’re documenting it so future ages won’t make this mistake.”
  452. Even though you didn’t read the thing that was written in 1978.
  453. </p>
  454. <p> All groups of any integrity have a constitution. The
  455. constitution is always partly formal and partly informal. At the very
  456. least, the formal part is what’s substantiated in code -- “the
  457. software works this way.” </p>
  458. <p> The informal part is the sense of
  459. “how we do it around here.” And no matter how is substantiated in
  460. code or written in charter, whatever, there will always be an informal
  461. part as well. You can’t separate the two. </p>
  462. <h2>Four Things to Design For</h2>
  463. <ol>
  464. <li>
  465. <p>If you were going to build a piece of
  466. social software to support large and long-lived groups, what would you
  467. design for? The first thing you would design for is handles the user
  468. can invest in. </p>
  469. <p> Now, I say “handles,” because I don’t want to
  470. say “identity,” because identity has suddenly become one of those
  471. ideas where, when you pull on the little thread you want, this big bag
  472. of stuff comes along with it. Identity is such a hot-button issue
  473. now, but for the lightweight stuff required for social software, its
  474. really just a handle that matters. </p>
  475. <p> It’s pretty widely
  476. understood that anonymity doesn’t work well in group settings, because
  477. “who said what when” is the minimum requirement for having a
  478. conversation. What’s less well understood is that weak pseudonymity
  479. doesn’t work well, either. Because I need to associate who’s saying
  480. something to me now with previous conversations. </p>
  481. <p> The world’s
  482. best reputation management system is right here, in the brain. And
  483. actually, it’s right here, in the back, in the emotional part of the
  484. brain. Almost all the work being done on reputation systems today is
  485. either trivial or useless or both, because reputations aren’t
  486. linearizable, and they’re not portable. </p>
  487. <p> There are people who
  488. cheat on their spouse but not at cards, and vice versa, and both and
  489. neither. Reputation is not necessarily portable from one situation to
  490. another, and it’s not easily expressed. </p>
  491. <p> eBay has done us all
  492. an enormous disservice, because eBay works in non-iterated atomic
  493. transactions, which are the opposite of social situations. eBay’s
  494. reputation system works incredibly well, because it starts with a
  495. linearizable transaction -- “How much money for how many Smurfs?” --
  496. and turns that into a metric that’s equally linear. </p>
  497. <p> That
  498. doesn’t work well in social situations. If you want a good reputation
  499. system, just let me remember who you are. And if you do me a favor,
  500. I’ll remember it. And I won’t store it in the front of my brain, I’ll
  501. store it here, in the back. I’ll just get a good feeling next time I
  502. get email from you; I won’t even remember why. And if you do me a
  503. disservice and I get email from you, my temples will start to throb,
  504. and I won’t even remember why. If you give users a way of remembering
  505. one another, reputation will happen, and that requires nothing more
  506. than simple and somewhat persistent handles. </p>
  507. <p> Users have to be
  508. able to identify themselves and there has to be a penalty for
  509. switching handles. The penalty for switching doesn’t have to be total.
  510. But if I change my handle on the system, I have to lose some kind of
  511. reputation or some kind of context. This keeps the system functioning.
  512. </p>
  513. <p> Now, this pulls against the sense that we’ve had since the
  514. early psychological writings about the Internet. “Oh, on the Internet
  515. we’re all going to be changing identities and genders like we change
  516. our socks.” </p>
  517. <p> And you see things like the Kaycee Nicole story,
  518. where a woman in Kansas pretended to be a high school student, and
  519. then because the invented high school student’s friends got so
  520. emotionally involved, she then tried to kill the Kaycee Nicole persona
  521. off. “Oh, she’s got cancer and she’s dying and it’s all very tragic.”
  522. And of course, everyone wanted to fly to meet her. So then she sort
  523. of panicked and vanished. And a bunch of places on the Internet,
  524. particularly the MetaFilter community, rose up to find out what was
  525. going on, and uncovered the hoax. It was sort of a distributed
  526. detective movement. </p>
  527. <p> Now a number of people point to this and
  528. say “See, I told you about that identity thing!” But the Kaycee
  529. Nicole story is this: changing your identity is really weird. And
  530. when the community understands that you’ve been doing it and you’re
  531. faking, that is seen as a huge and violent transgression. And they
  532. will expend an astonishing amount of energy to find you and punish
  533. you. So identity is much less slippery than the early literature
  534. would lead us to believe. </p>
  535. </li>
  536. <li>
  537. <p>Second, you have to design a
  538. way for there to be members in good standing. Have to design some way
  539. in which good works get recognized. The minimal way is, posts appear
  540. with identity. You can do more sophisticated things like having
  541. formal karma or “member since.” </p>
  542. <p> I’m on the fence about
  543. whether or not this is a design or accepting. Because in a way I
  544. think members in good standing will rise. But more and more of the
  545. systems I’m seeing launching these days are having some kind of
  546. additional accretion so you can tell how much involvement members have
  547. with the system. </p>
  548. <p> There’s an interesting pattern I’m seeing
  549. among the music-sharing group that operates between Tokyo and Hong
  550. Kong. They operate on a mailing list, which they set up for
  551. themselves. But when they’re trading music, what they’re doing is,
  552. they’re FedExing one another 180-gig hard-drives. So you’re getting
  553. .wav files and not MP3s, and you’re getting them in bulk. </p>
  554. <p>
  555. Now, you can imagine that such a system might be a target for
  556. organizations that would frown on this activity. So when you join
  557. that group, your user name is appended with the user name of the
  558. person who is your sponsor. You can’t get in without your name being
  559. linked to someone else. You can see immediately the reputational
  560. effects going on there, just from linking two handles. </p>
  561. <p> So in
  562. that system, you become a member in good standing when your sponsor
  563. link goes away and you’re there on your own report. If, on the other
  564. hand, you defect, not only are you booted, but your sponsor is booted.
  565. There are lots and lots of lightweight ways to accept and work with
  566. the idea of member in good standing. </p>
  567. </li>
  568. <li>
  569. <p>Three, you need
  570. barriers to participation. This is one of the things that killed
  571. Usenet. You have to have some cost to either join or participate, if
  572. not at the lowest level, then at higher levels. There needs to be
  573. some kind of segmentation of capabilities. </p>
  574. <p> Now, the
  575. segmentation can be total -- you’re in or you’re out, as with the
  576. music group I just listed. Or it can be partial -- anyone can read
  577. Slashdot, anonymous cowards can post, non-anonymous cowards can post
  578. with a higher rating. But to moderate, you really have to have been
  579. around for a while. </p>
  580. <p> It has to be hard to do at least some
  581. things on the system for some users, or the core group will not have
  582. the tools that they need to defend themselves. </p>
  583. <p> Now, this
  584. pulls against the cardinal virtue of ease of use. But ease of use is
  585. wrong. Ease of use is the wrong way to look at the situation, because
  586. you’ve got the Necker cube flipped in the wrong direction. The user
  587. of social software is the group, not the individual. </p>
  588. <p> I think
  589. we’ve all been to meetings where everyone had a really good time,
  590. we’re all talking to one another and telling jokes and laughing, and
  591. it was a great meeting, except we got nothing done. Everyone was
  592. amusing themselves so much that the group’s goal was defeated by the
  593. individual interventions. </p>
  594. <p> The user of social software is the
  595. group, and ease of use should be for the group. If the ease of use is
  596. only calculated from the user’s point of view, it will be difficult to
  597. defend the group from the “group is its own worst enemy” style attacks
  598. from within. </p>
  599. </li>
  600. <li>
  601. <p>And, finally, you have to find a way to
  602. spare the group from scale. Scale alone kills conversations, because
  603. conversations require dense two-way conversations. In conversational
  604. contexts, Metcalfe’s law is a drag. The fact that the amount of
  605. two-way connections you have to support goes up with the square of the
  606. users means that the density of conversation falls off very fast as
  607. the system scales even a little bit. You have to have some way to let
  608. users hang onto the less is more pattern, in order to keep associated
  609. with one another. </p>
  610. <p> This is an inverse value to scale question.
  611. Think about your Rolodex. A thousand contacts, maybe 150 people you
  612. can call friends, 30 people you can call close friends, two or three
  613. people you’d donate a kidney to. The value is inverse to the size of
  614. the group. And you have to find some way to protect the group within
  615. the context of those effects. </p>
  616. <p> Sometimes you can do soft
  617. forking. Live Journal does the best soft forking of any software I’ve
  618. ever seen, where the concepts of “you” and “your group” are pretty
  619. much intertwingled. The average size of a Live Journal group is about
  620. a dozen people. And the median size is around five. </p>
  621. <p> But each
  622. user is a little bit connected to other such clusters, through their
  623. friends, and so while the clusters are real, they’re not completely
  624. bounded -- there’s a soft overlap which means that though most users
  625. participate in small groups, most of the half-million LiveJournal
  626. users are connected to one another through some short chain. </p>
  627. <p>
  628. IRC channels and mailing lists are self-moderating with scale, because
  629. as the signal to noise ratio gets worse, people start to drop off,
  630. until it gets better, so people join, and so it gets worse. You get
  631. these sort of oscillating patterns. But it’s self-correcting.
  632. </p>
  633. <p> And then my favorite pattern is from MetaFilter, which is:
  634. When we start seeing effects of scale, we shut off the new user page.
  635. “Someone mentions us in the press and how great we are? Bye!” That’s
  636. a way of raising the bar, that’s creating a threshold of
  637. participation. And anyone who bookmarks that page and says “You know,
  638. I really want to be in there; maybe I’ll go back later,” that’s the
  639. kind of user MeFi wants to have. </p>
  640. <p> You have to find some way to
  641. protect your own users from scale. This doesn’t mean the scale of the
  642. whole system can’t grow. But you can’t try to make the system large
  643. by taking individual conversations and blowing them up like a balloon;
  644. human interaction, many to many interaction, doesn’t blow up like a
  645. balloon. It either dissipates, or turns into broadcast, or collapses.
  646. So plan for dealing with scale in advance, because it’s going to
  647. happen anyway. </p>
  648. </li>
  649. </ol>
  650. <h2>Conclusion</h2>
  651. <p> Now, those four
  652. things are of course necessary but not sufficient conditions. I
  653. propose them more as a platform for building the interesting
  654. differences off. There are lots and lots and lots of other effects
  655. that make different bits of software interesting enough that you would
  656. want to keep more than one kind of pattern around. But those are
  657. commonalities I’m seeing across a range of social software for large
  658. and long-lived groups. </p>
  659. <p> In addition, you can do all sorts of
  660. things with explicit clustering, whether it’s guilds in massively
  661. multi-player games, or communities on Live Journal or what have you.
  662. You can do things with conversational artifacts, where the group
  663. participation leaves behind some record. The Wikipedia right now, the
  664. group collaborated online encyclopedia is the most interesting
  665. conversational artifact I know of, where product is a result of
  666. process. Rather than “We’re specifically going to get together and
  667. create this presentation” it’s just “What’s left is a record of what
  668. we said.” </p>
  669. <p> There are all these things, and of course they
  670. differ platform to platform. But there is this, I believe, common
  671. core of things that will happen whether you plan for them or not, and
  672. things you should plan for, that I think are invariant across large
  673. communal software. </p>
  674. <p> Writing social software is hard. And, as
  675. I said, the act of writing social software is more like the work of an
  676. economist or a political scientist. And the act of hosting social
  677. software, the relationship of someone who hosts it is more like a
  678. relationship of landlords to tenants than owners to boxes in a
  679. warehouse. </p>
  680. <p> The people using your software, even if you own it
  681. and pay for it, have rights and will behave as if they have rights.
  682. And if you abrogate those rights, you’ll hear about it very quickly.
  683. </p>
  684. <p> That’s part of the problem that the John Hegel theory of
  685. community -- community leads to content, which leads to commerce --
  686. never worked. Because lo and behold, no matter who came onto the
  687. Clairol chat boards, they sometimes wanted to talk about things that
  688. weren’t Clairol products. </p>
  689. <p> “But we paid for this! This is the
  690. Clairol site!” Doesn’t matter. The users are there for one another.
  691. They may be there on hardware and software paid for by you, but the
  692. users are there for one another. </p>
  693. <p> The patterns here, I am
  694. suggesting, both the things to accept and the things to design for,
  695. are givens. Assume these as a kind of social platform, and then you
  696. can start going out and building on top of that the interesting stuff
  697. that I think is going to be the real result of this period of
  698. experimentation with social software. </p>
  699. <p> Thank you very much.</p>
  700. <p><em>
  701. Published June 30, 2003 on the “Networks, Economics, and Culture” mailing list. </em></p>
  702. </main>
  703. </article>
  704. <hr>
  705. <footer>
  706. <p>
  707. <a href="/david/" title="Aller à l’accueil">🏠</a> •
  708. <a href="/david/log/" title="Accès au flux RSS">🤖</a> •
  709. <a href="http://larlet.com" title="Go to my English profile" data-instant>🇨🇦</a> •
  710. <a href="mailto:david%40larlet.fr" title="Envoyer un courriel">📮</a> •
  711. <abbr title="Hébergeur : Alwaysdata, 62 rue Tiquetonne 75002 Paris, +33184162340">🧚</abbr>
  712. </p>
  713. <template id="theme-selector">
  714. <form>
  715. <fieldset>
  716. <legend>Thème</legend>
  717. <label>
  718. <input type="radio" value="auto" name="chosen-color-scheme" checked> Auto
  719. </label>
  720. <label>
  721. <input type="radio" value="dark" name="chosen-color-scheme"> Foncé
  722. </label>
  723. <label>
  724. <input type="radio" value="light" name="chosen-color-scheme"> Clair
  725. </label>
  726. </fieldset>
  727. </form>
  728. </template>
  729. </footer>
  730. <script type="text/javascript">
  731. function loadThemeForm(templateName) {
  732. const themeSelectorTemplate = document.querySelector(templateName)
  733. const form = themeSelectorTemplate.content.firstElementChild
  734. themeSelectorTemplate.replaceWith(form)
  735. form.addEventListener('change', (e) => {
  736. const chosenColorScheme = e.target.value
  737. localStorage.setItem('theme', chosenColorScheme)
  738. toggleTheme(chosenColorScheme)
  739. })
  740. const selectedTheme = localStorage.getItem('theme')
  741. if (selectedTheme && selectedTheme !== 'undefined') {
  742. form.querySelector(`[value="${selectedTheme}"]`).checked = true
  743. }
  744. }
  745. const prefersColorSchemeDark = '(prefers-color-scheme: dark)'
  746. window.addEventListener('load', () => {
  747. let hasDarkRules = false
  748. for (const styleSheet of Array.from(document.styleSheets)) {
  749. let mediaRules = []
  750. for (const cssRule of styleSheet.cssRules) {
  751. if (cssRule.type !== CSSRule.MEDIA_RULE) {
  752. continue
  753. }
  754. // WARNING: Safari does not have/supports `conditionText`.
  755. if (cssRule.conditionText) {
  756. if (cssRule.conditionText !== prefersColorSchemeDark) {
  757. continue
  758. }
  759. } else {
  760. if (cssRule.cssText.startsWith(prefersColorSchemeDark)) {
  761. continue
  762. }
  763. }
  764. mediaRules = mediaRules.concat(Array.from(cssRule.cssRules))
  765. }
  766. // WARNING: do not try to insert a Rule to a styleSheet you are
  767. // currently iterating on, otherwise the browser will be stuck
  768. // in a infinite loop…
  769. for (const mediaRule of mediaRules) {
  770. styleSheet.insertRule(mediaRule.cssText)
  771. hasDarkRules = true
  772. }
  773. }
  774. if (hasDarkRules) {
  775. loadThemeForm('#theme-selector')
  776. }
  777. })
  778. </script>
  779. </body>
  780. </html>