Skip to content

Facebook – Now with the Mini-Feed of reality

The future is logged. And we’re seeing some of the future right now.

The students of the Facebook are currently working through the newfound reality of their complete Facebook activity being front-and-center to all their ‘friends’. The new mini-feed of their activity within Facebook (comments, notes, adding/removing of pictures, friends and groups) is now broadcast to all their friends’ dashboards automatically and without their consent. As of today, there is not an option to remove this functionality either – mini-feed items can only be deleted after the fact.

i love information. i love my friends. i love information about my friends; however, i don’t like everyone knowing information about what my friends and I do. good networking is like good flirting: leave something to the imagination!

There are two views of these mini-feeds:

1) A user looking at their own page sees a reflection of all their friends’ activity within the system for the last couple weeks – a ‘fortnight story’ of their friends’ activities/updates.

2) A user looking at another user’s page will see what that particular user has been up to the last couple weeks – a ‘fortnight story’ for someone else.

I think this move was inevitable and I applaud it. But I’ve got a longer view than someone using the Facebook today. I would be upset if my information was suddenly available like this. I am not sure why they didn’t have a smaller rollout with some feedback testing. I feel they’re going to get burned by public opinion in the days to come.

I agree, this new facebook is ridiculous! It makes me want to remove my account. I don’t want everyone knowing what I am doing at all times…it has become creepy. Please change it back!!

Normal is shifting.

The users of the Facebook were living in a dream world. Of course their activity was being logged – it’s how Facebook became Facebook. It’s just that the users of the site, until today, didn’t expect their information to be aggregated in quite this way – simply because it hadn’t happened before. And I feel sorry for those who have been ‘outed’ by this system and will continue to feel the brunt of these changes in the next few days as the changes propagate and begin to have a ripple effect on behavior within the system.

I don’t want everybody seeing who i friended, whose wall I wrote on, and when I change my relationship status everytime they sign on. This is a total violation of everyones [sic] privacy. We all hate it. If we want to see something about someone, we will go to their profiles our selves.

This information – this activity information – was already public. It was already part of a public discussion that the users were engaged in by being a member of the community. These students were spreading their political views, their personal habits, their class schedules and friendship networks for all to see (well, all within the Facebook). However, they had the luxury of assuming that most of the people looking at them would have to dig for that information themselves. Someone who wanted the aggregated view of a new aquaintance had some work to do. There was some social friction to knowing too much. And this was comforting – to a point. There was a barrier to entry that insulated the students from the reality.

This change brings them kicking and screaming into the light.

I love facebook, I really do, but this “new facebook” is not improved, it’s horrible! I dont want everyone to know what I am always doing! I wonder what we can do to have it changed?

What we’re seeing is the birth pains of a third generation of social networking.

The first generation was email/IM buddy lists. These allowed us to connect and keep track of our people across distance and time in a way that was more efficient and more seamless than ever before. We knew who was on our lists and we managed the connections. Visibility was limited but we were hooked.

The second generation is our current crop led by Friendster and now MySpace/LiveJournal/Facebook. These sites allow for users to keep track of one another and add a layer of visibility that was quite dramatic when first ‘discovered’. Users were very excited about sharing pictures and collecting as many friends as possible because all these were visible to those who were watching. It was like the mall and middle school all over again. To be seen was the thing.

The third generation will expose the history of this visibility. The full history of what you’ve done in the network. A record of how you’ve behaved in the past will be available in the future. This will (and should) affect your behavior and your friend lists and your decision about which pictures to post.

I really don’t care, i think its a bad move to make it default on with no opt out… …i’m just worried that i will be caught in lies… like saying i am busy working on something, add a friend, and have another friend know i was lying to them, because at 7:34pm i was on facebook…

And this is a good thing – as it mirrors the real world. You shouldn’t lie to your friends. As I’ve said before, the real world is a quaint place where actions matter and people remember. It’s also a place where this virtual overlay we’re playing in today will be taken for granted in only a few very short years. The decisions you make online today will, and should, matter tomorrow.

Students of the Facebook… Play hard, but play smart – and know that everyone is watching.

P.S. I’ll go out on a limb here and say that I expect Facebook to make these mini-feeds optional very shortly. The feedback has been very loud. That said, a dose of reality this big is understandably hard to take.

Update: Just over two days later and the first changes are live.  They’ll survive just fine.

Tags: - - - - -

Earl Mardle on George Allen’s crumbling campaign

First, a word from the almighty OneTrueWiki:

The neutrality of this article is disputed.
Please see the discussion on the talk page.
George Felix Allen (born March 8, 1952, in Whittier, California) is a Republican United States Senator from Virginia. He is running for re-election in 2006 and has been mentioned as a possible candidate for the Republican nomination in the 2008 Presidential election. He has recently been involved in a number of controversies, most prominently his use of the word “macaca.”

I love that disclaimer at the top. Don’t you? Self deprecation and honesty, and therefore, authority on the matter (and 63 references at the time of this writing).

Earl Mardle is all over this new media thing. He’s hit it out of the park and deserves a pat on the back. The power continues to move down the food chain and we’re seeing the toddler years ahead of us now. The 2008 race will be something quite instructive indeed.

New Media With Fangs

When Jim Webb’s campaign for a Virginia Senate seat assigned a worker to attend all the public events of the incumbent George Felix Allen, they made an extremely shrewd move.Gathering intel on your opponent is SOP, but doing it with a video camera in public was a new wrinkle, and it plainly annoyed, perhaps unnerved Mr Allen, who eventually unloaded on the cameraman. The cameraman’s family came from India, and Allen was careless enough to lift the corner of his racist rug and let out the French racist epithet, Macaca.

Boy was that bad tactics. Not only was his racism immediately available on the net, and eventually in the corporate media who could no longer ignore the gathering furore, as it eventually caught up with the Trent Lott racism thing, but it sent the liberal blogosphere on a “where there’s smoke there’s fire” search of the net.

And now the whole game is rolling out like an anchor chain. Finding the photo of Allen posing with the leading lights of the Council of Conservative Citizens was only the start, Jeffrey Feldman took it further and produced a full scale research article on Allen’s racist connections, with chapter, and verse. Frameshop: Allen’s Political Klanbition

Within days, Allen’s previously strong campaign was in trouble, Webb was within the margin of error in the polls and Allen was steppin and fetchin all over the state, trying to stay out of the firing line and keep intact his former presidential ambitions.

I’ve always said that the net shifts the locus of power and control, it takes it away from the traditional owners and gives it to the wider community. It remembers and it aggregates, and it is merciless. Or as Feldman says in his piece.

In 1996, when George Allen posed for the picture, it was hard to imagine that only ten years later that the circumstances surrounding the photo, plus similar circumstances, would be so widely accessible to people beyond the semi-clandestine membership of the CCC. But now they are.

But it gets worse, because if one republican insider was working the CCC track, there’s a good chance there are others. So now the citizen journalists are researching the CCC itself, looking for the reverse links to the Republican party.

No doubt someone in the CCC will soon wake up to the risks and start cleaning out the website. However, you can bet that someone already has a full copy of the site contents to sift at their leisure. Which is a nasty lesson that ABC TV in the US is learning.

After finding itself in the middle of a storm about a biased and politically motivated “docudrama” on the path to 911, ABC tried to pull down the blog it was running on the programme; mostly because the promotional value was being shredded by very pointed and aggressive comments from those who found the timing and the content to be unacceptable in a supposedly independent media organisation.

If you go to the ABC site right now you’ll find the blog missing, but as with the stoush over the censoring of the NYTimes Ombudsman’s blog, someone already has the copy.

Is it any wonder that the people who have controlled the message, the medium and the money for so long, want to remake the net in their own, previous, image?

Earl gets five points.

Tags: - -

The post I wouldn’t write – online stalking

So, I’ve been working through this thought experiment for a few years now…

1) You post information online about yourself in various places
2) It gets aggregated by bot or human
3) Bad guy decides you’re worth screwing with
4) Bad guy finds all this information and can act on it accordingly

Pretty straightforward.

(We also realize that #1 and #2 are not necessary for #3 and #4 to happen)

Today, I find a story on Slashdot with all these elements represented:

http://dumblittleman…/how-to-get-robbed-killed-or-stalked-by.html
Death by Google Calendar: How I Identified you to rob you

(Apparently, it too has undergone some reconsideration – note the title vs. the URL)

I am not picking on this woman but I needed to show a real example. There are tons of public calendars far more revealing than this one. In literally 20 minutes, I now know the name, address, phone number and schedule of this woman. If I can do it, you can be damn sure the real bad guys can. Please be smarter about what you share online. If given a choice, choose the private setting. If you are not given a choice, either choose a new calendar or talk in some code that only you understand. I guess I just don’t understand why people set themselves up to become victims.

There’s nothing really interesting in the story except the way it played out.

I mean, we know that “public information” means it’s public. If someone decides to post something online, then it’s online. It can be crawled, saved, searched, found, archived and refound later. It can also be aggregated, resyndicated, blogged or forwarded. There are entire websites devoted to this aggregation of interesting things – it’s how I found the post in the first place.

That said, there’s nothing new in what was posted. What’s interesting here is how he went about doing it and how little foresight he displays by using real information about someone.

The poster himself now has to deal with the emotional trauma (apparently not so much) of having posted the personal information of this young woman and her housemates. Perhaps more importantly, the young woman herself has to deal with the emotional and potentially physical fallout of being made the posterchild of “How to stalk someone 101”. This is not fair to her at all. And the author should have considered this before making her the object of his ‘research’.

While he and his two friends are positioning their site as “Tips for Life”, they’ve crossed the invisible but morally obvious line of someone else’s personal space. This young woman’s sense of identity and safety has been violated by this posting of personal information. Her trust in the world has probably been knocked down a notch or four. This, to me, is an unacceptable use of the power of “making a point” in any public forum, especially one that’s electronic and archived. The author neglected to consider this (we hope) before making her an example. If the consideration was made and somehow deemed insufficient, then it’s even worse.

Additionally, the comments attached to the original post eventually included a message from the girl’s friend who first woke her with this information on a holiday weekend as well as messages from the girl herself and a close friend. You can read the frustration and loss of control in their words.

First of all, being the topic of discussion suddenly, I would have greatly appreciated a heads-up on this whole article before hving [sic] a friend call me at 6am to alert me that I’ve been publicly cyber-stalked.

Secondly, I admit my own stupidity for listing the calendar as public, a problem that has quickly been fixed, but two things: you could have

1. notified me before posting this article so I could have locked my calendar before having the whole world view it, and

2. used a PSEUDONYM?? For somebody not “thinking bad guy thoughts,” you’ve already endangered me and those who live around/with me by posting my name and screen shots of my calendar.

So thank you in advance for all the lovely stalkers and real “bad guys” out there who now have this information thanks you you. I realize you used my calendar to make a point, but you have also seriously upset me by ACTUALLY endangering me now that slashdot and whoever the hell else has read this article.

I’ve been wanting to post examples of how not to post personal information online for a long time. I’ve wanted to share my own Tips for Life but in every case, have come to the conclusion that it’s not fair to single anyone out. I can only sleep at night if I’m not part of the problem.

Teaching a “Paranoia 101” course might be in my future at some point, but I will definitely not be using previously unaggregated and obscure personal information of young women whom I’ve not contacted ahead of time and asked for consent.

I agree with the original author – be smart, be vigilant, don’t post things you’re not willing to actually let the whole world see.

But I also feel very strongly that the author, in this case, has crossed a very important line and should realize the instructive benefit afforded by his post does not outweigh the personal trauma caused to this young woman. It’s not fair and there are better ways to make a point.

The network brings us closer – but we’re still people and we should consider our actions.

Like she said, he’s really no better at this point than the actual bad guys who might use this information against her.

Tags: - -

Ze Frank is manipulating our lizard brains

I’ve been reading The Media Equation, by Stanford’s Clifford Nass and Byron Reeves. A quick read and yet I’ve been struck by how quickly I changed my mind about its main thesis.

The basic premise is that people treat computers like people – since we have old brains and in the past, everything that seemed real, was real. We are hard-wired to react (prior to thinking about it) that what we’re seeing is real and so, we have physiological and psychological reactions to media that mirror our reactions to other people.

Consciously, we know the representations of what’s in front of us are not real, but we do not react as such – most of the time. We feel connected to media in the same automatic ways we feel connected to the real world. Our old brains, our lizard brains, have not caught up with new technology.

This work was originally published in 1996 and was fairly controversial. Since then, the thoroughness and overwhelming consistency of the research has grown a healthy following and body of related research in the field of Human Computer Interaction.

I would like to posit that Ze Frank has read this book. I would like to further posit that Ze Frank is genius and he has taken Chapter 3 and made it his own during his work on The Show.

The Show

Chapter 3 of The Media Equation works through a series of experiments where people are shown a series of shots from different distances and at different sizes – all of the human head/body. The participants were questioned afterwards and the faces that had the most impact on the viewers were the ones with screen-filling faces and that seemed ‘closer’ to the viewer, those with the least interpersonal distance.

This matches directly with prior social science data whereby we interact more deeply and remember better those people who are physically close to us. It’s how we’ve developed over a few hundred thousand years. Only this time, it was representations of people, not real people.

Ze has taken this to the extreme with his screen-filling shots from his chin to just above his eyebrows. His entire head does not fit within the screen. This extremely close crop forces the viewer to pay attention to everything Ze has to say and not be distracted by anything else in the shot.

I would guess this magnifies his audience’s feelings about his topic for the day. The viewers feel a closer connection to Ze than if he had decided to shoot The Show from a few inches farther out. Ze has used Reeves and Nash to his advantage, and leveraged his understanding of (viral) media to boost his show’s popularity. We feel a connection to Ze that we do not feel with other broadcast personalities.

Lizards like Ze.

Tags: - - - -

Consolidation, paranoia, and IM-creeps oh my!

First, our friend the search engine…

Search data recently released from AOL allows anyone with some intrepid follow-up skills and some social engineering to quickly narrow in on unique individuals – individuals who never considered their independent searches were being aggregated by their ISP. A recent flurry of activity designed to protect us from the search engines signals a slumbering uneasiness with this situation. Something dark has been uncovered and in the short term there is much handwaving and interest. However, as time passes, we’ll fall back into our ‘normal’ ways and continue to put our most personal information-seeking into that gloriously simple bare single box. “It’s just too convenient”, you say. “They’ve done nothing wrong.”

And here’s where the discussion changes. It’s not about Google. Or MSN. Or Yahoo. It’s about one person. Or one subpeona. The fact that it’s all being aggregated is the problem. The fact that there’s a potential for negligence, court-order or simple employee curiosity has profound implications for a great number of people. That is what makes this discussion so important.

Note that the reason employees could inappropriately access sensitive information was because it was sitting in databases they could get to – not because it was present on a card in someone’s wallet.

Centralized databases worry me way more than any other aspect of this technology.

Kim Cameron

We need to understand that our daily breadcrumbs – our attention – our personal interests in where we’re going and what we’re looking for and what we’re buying, are all being sucked up and stored with a unique identifier. We need to realize we’re broadcasting our attention and that it has great value to those who would suck it up. Inform yourself and make a conscious decision about where you spend your time and what you look for. You’re not alone while you surf. AOL has shown us the light.

And onto IM…

Most users think they’re anonymous behind their instant messenger accounts. They think their words aren’t being recorded. You think your friend on the other end of the IM doesn’t have her auto-logging turned on? And that it’s not fully searchable later? Severe paranoia and tin-foil hats notwithstanding, you’re being very naive.

And that’s just your friends. How about when the person on the other end reports you?

Earlier this week the UK government-funded Child Exploitation & Online Protection Centre announced a partnership with Microsoft Messenger. Messenger will be putting a button on the toolbar to allow any user to ‘report abuse’ to the authorities. This is a dangerous precedent. How is this any different than the Terrorist Information and Prevention System (TIPS) program proposed by the US back in 2002?

How much money will be tied up in the next 12 months because of this trigger being too easy to pull? How many prank reports will eat through the government funding? How will danah boyd react to the feeding frenzy this will create once the first one is ‘caught’?

Be aware of what you project. Be aware that this is a global medium. Be aware that it’s being broadcast and recorded. This Internet thing will be around for a while.

Tags: - - - -

The germans will save Wikipedia

The german flavor of the OneTrueWiki will be getting an update soon. Nate Anderson writes at ArsTechnica:

Wikipedia founder Jimmy Wales told CNET in an interview that the Germans are coming—and they have a plan to save Wikipedia. The German-language version of Wikipedia will get an experimental overhaul in the next few weeks designed to cut down on vandalism, edit wars, and misinformation. How will it work? Through the magical power of trust.

In the German system, any user will still be allowed to make edits to any article. Those edits won’t show up in the live version of the site, though, until a registered user with a certain level of time and experience approves the changes. It’s a simple change, but one that could prevent the most juvenile forms of vandalism from ever appearing on the main site, which should do much to remove the appeal of vandalizing articles.

This is interesting on a few levels.

The wiki phenomenon we’ve all experienced in the last few years has definitely reached a tipping point – a point where an educated populace has probably heard of, and might even be able to explain, what a wiki is. We’ve seen NYTimes articles, CNN reports, and BBC broadcasts. We’ve considered what it means to be a ‘real’ resource for our children’s homework assignments – what it means to have a NPOV (neutral point of view).

But we’ve also learned that communities of trusted peers do a very good job of policing themselves (it takes a global village?). While inalienable rights are great, I think this movement away from ‘all users are created equal’ is a good thing. We need to better mirror our real world and give credit and affordances to those who are experienced. We should allow those who are the experts, those who have done this a few times before us, to have more say in how things run. They’ve probably learned something.

This decision by Wikipedia, while in part a reaction to a lengthy court case, is a welcome one. The pantheon should be allowed to speak a little more loudly than the peons. It’s only fair. We’re not all equal when it comes to knowledge. Trust, reputation and expertise are what allow us to divide and conquer. Adam Smith’s Division of Labor is most efficient when we let the experts do what they do.

I welcome this change and can’t wait for it to trickle across the rest of the Wikipedia and the rest of the sites that let allow/encourage user-generated content. The sooner we have more than the lowest common denominator, the sooner we can tap the real power of everyone.

Tags: - - - -

MicroID coming to Last.fm

Earlier this summer I put the call out to the MicroID army

Today, a victory in the makingRuss on the forum writes:

I’ve added this to our development branch – it’ll be live in a month.

Russ

This is a big one – let’s keep knocking on doors and see who answers.

Tags: -

Nathan Schock on Wikipedia and reputation management

An excellent post – I can’t seem to add anything to it. Well done Nathan.

Third, you have to participate in the online conversation. If you don’t, the party will start without you and how many of the millions of people online do you think care about your reputation? That’s what I thought.

Nathan Schock at Fresh Glue:

It all started when someone decided to have fun with a Wikipedia entry. Nothing new, right? It happens all the time. But this entry happened to be about Stephanie Herseth, the lone member of the US House of Representatives from South Dakota.

The wiki-hacker claimed Herseth was pro-life (she’s not), pregnant (she’s not) and engaged to her campaign manager (she’s not). The false information was taken down quickly, but not before it got a little more interesting.

Herseth is in a (very non-competitive) race for re-election this fall and her opponent’s campaign manager couldn’t leave the Wikipedia reference alone. He emailed it to several political bloggers…one of which happened to be the blog of the Rapid City Journal…who posted the full text of the email on the blog…and then defended their decision to do so.

As local political blogger Pat Powers noted, whoever put the false information on Wikipedia didn’t do Republicans any favors. Neither did her opponent’s campaign manager because now the discussion is about his email, rather than what they want to discuss. Not surprisingly the Herseth campaign has sensed the momentum in their favor on this issue and is calling for the campaign manager to be fired.

There are three important new media lessons here for anyone who cares to learn them. First, the Wisdom of Crowds is real and represents a new kind of information and fact exploration process. In the old days (only a few years ago) someone would research a story for days, weeks, months, even years before publishing the definitive account in a newspaper, magazine or book. If you wanted to respond to that account, you had to do the same thing yourself and it was very difficult to correct a story once it was published.

Today, the quest for the facts starts out in the open with a blog post or a Wikipedia entry. Everyone can read that information and respond to it. Eventually, the truth is discovered, as it was in this case, through the participation of a large group of people, like a virtual party. That’s why Wikipedia is always among the most-searched topics on the net. That’s also what makes blogging so difficult for most people to understand. Any one post may not be completely accurate, but is rather part of the process of getting at the accurate account. Sure, there will always be those who abuse the system, as there were in this case, but those people are typically found out and appropriately flogged.

Second, the Internet is not nearly as anonymous as you think. If I were you, I would avoid emailing anything you don’t want the entire world to see. Bad email pitches can find themselves on the Bad Pitch Blog or posted on another blog that (at last count) had 80 comments. And by the way, your computer has a little thing called an “IP address” that leaves a convenient trail for people to follow. As we learned from the Cluetrain Manifesto and Adam Curry, there are no secrets, only information you don’t yet have.

Third, you have to participate in the online conversation. If you don’t, the party will start without you and how many of the millions of people online do you think care about your reputation? That’s what I thought.

Tags: - - - -

AOL blinks and an Iraqi child confirms he’s Rupert

Online identity is something we’re all beginning to face. We exist in a time when the majority of our digital footprints are being copied somewhere else. One AOL searcher so far, Thelma Arnold of Georgia, 62, has been identified by the NYTimes to be unique user 4417749. This is a disturbing first shot across the bow and we need to take every precaution, both as companies doing business and as consumers using these services, that this information be protected (or never stored at all).

But the unintended consequences of all that data being compiled, stored and cross-linked are what Marc Rotenberg, the executive director of the Electronic Privacy Information Center, a privacy rights group in Washington, called “a ticking privacy time bomb.” [NYTimes]

Every search is being remembered and potentially could be aggregated later with unknown consequences. Every email we send works via a store-and-forward technology (your email is a postcard much more than a sealed postal service letter). Every hop along the way (average of 10-15?), the email servers could save your email for later. Subpeanas anyone? To protect the children?

“All of this is dangerous enough. But recent actions of the United States Attorney General and the Director of the Federal Bureau of Investigation last week raise an even larger threat to privacy and security. In the interests of prosecuting child abuse cases, the AG and the FBI Director have asked that the ISP’s retain all of their records just in case someday, somehow, for some reason, the government may want them in some future case.” [Mark Rasch]

It’s not fearmongering, it’s a healthy dose of reality and risk analysis.

So first of all, we’re not anonymous. Second of all, this non-anonymity can be assumed by someone else if the procedures and protections we put into place are poorly thought out.

So I find it interesting today this juxtaposition of an Iraqi child holding a piece of cardboard claiming he’s Rupert Murdoch, owner of MySpace, performing the ‘MySpace salute’. Probably, being the actual Rupert, there is little chance Rupert’s real identity will be compromised by this wonderful image. Those of us who are not Rupert, in name or in financial stature, have a significantly greater risk associated with issues concerning our online identity and attempts to hijack it by others.

myspacesecuritymeasuremurdoch.jpg

We need to become more aware, vigilant, informed, and proactive about our online identities. Our public face is a growing part of our reputation and is beginning to play a significant role in our day to day lives. There are early adopters who have seen this effect for a few years now, but the mainstream media is now catching on and the average citizen will begin to interact with these issues very directly. We all swipe the grocery store member cards to save 10%. Do we know what can be done with data mining and aggregation over time?

ClaimID is using MicroID to allow individual users to claim the pages online about them. This uses cryptographically robust mathematics to confirm that the pages on both ends of the claim are legitimate. It’s proactive, it’s reproducable, and it’s open. It’s not a piece of cardboard. Rupert cannot claim that my weblog is his. Neither can that Iraqi child.

We need more awareness so our policies are better. I’m afraid, however, that it requires us to endure a listing of a few million customers like Thelma before the rest of us wake up.

Tags: - - - - - - -

Who’s in my network? Who’s cool enough?

One of the most interesting things in following “the power of the network” is defining what that network is. I’ve come to the conclusion that what I’m most interested in is the people who make up these networks – not the machines and the codes that make them ‘go’. I have a masters in computer networking – I’ve lost many nights to worrying about how to make something blink faster. I am in library school now because I worked out that I was more interested in the people using the tools than the blinky lights on the tools themselves.

However, in moving into a field made up of people instead of chips and wires, I’ve worked out that people are messy. They aren’t consistent. They aren’t logical. And they certainly aren’t very good at agreeing who is cool enough to be in the cool club

A mailing list is a group structure – it has boundaries and one is either ‘in’ or ‘out’ – it is not possible to be ‘in’ to some people and ‘out’ to others like it is when you think of ego-centric friendship communities. Of course, with any group, there are members who view other members with disdain and would prefer that they were not also part of the group. This is one of the common features of urban tribes that Ethan Watters describes. Mailing lists push people to think in terms of group structures, even when the social cost is great. Faced with having to resolve this, it shouldn’t be surprising that an urban tribe swings back and forth between seeing itself as a collective with an identity that trumps individual relationships and seeing itself as a group of friends first and foremost.

That said – it will be very interesting to see how FeedBurner navigates this water while lots and lots of people are watching (via Techcrunch). If these groups are self-organized (the only way it can scale, right?), be prepared for a very public mea culpa in a few months. The rules for who determines who’s in a group are simple to follow, as long as the stakes are low. Being the biggest kid on the RSS block, FeedBurner’s stakes are not low.

The biggest issue around this will be what rules are used to determine which blogs are included in a given topic. It isn’t clear if there will be any real quality control – in his post Brad says each network will have a gatekeeper to make sure only blogs on topic are included, but there doesn’t appear to be any hurdle as to what constitutes a quality blog in a topic. That could work out badly. And if the bloggers and/or the network coordinator are making subjective decisions on which blogs can be included in a given network, this will end in tears. The politics around who’s in and who’s out of a blog network are impossible. I know this from personal experience.

Tags: - -