互联网跟移动互联网

1990年代愿景失败

by Ph.D Arnold King, author of nonfiction books, primarily in the area of political economy, and in a previous life, he started one of the web's first commercial sites.

It has been 25 years since I formed my first impressions of the Internet. I thought that it would shift the balance of power away from large organizations. I thought that individuals and smaller entities would gain more autonomy. What we see today is not what I hoped for back then.

In 1993, I did not picture people having their online experience being “fed” to them by large corporations using mysterious algorithms. Instead, I envisioned individuals in control, creating and exploring on their own.

In hindsight, I think that four developments took place that changed the direction of the Internet.

1. The masses came to the Internet. Many of the new arrivals were less technically savvy, were more interested in passively consuming entertainment than in contributing creatively, and were less able to handle uncensored content in a mature way. They have been willing to give up autonomy in exchange for convenience.

2. At the same time, the capability of artificial intelligence grew rapidly. Better artificial intelligence made corporate control over the user experience more cost-effective than had been the case earlier.

3. The winner-take-all mentality took over. Entrepreneurs and consultants were convinced that only one firm in each market segment would dominate. In recent years, this has become almost a self-fulfilling prophecy, as stock market investors poured money into leading firms, giving those firms the freedom to experiment with new business ventures, under-price competitors, and buy out rivals.

4. The peer-to-peer structure of the Internet and the services provided over it did not scale gracefully. The idea of a “dumb network” of fully distributed computing gave way to caching servers and server farms. The personal blog or web site gave way to Facebook and YouTube.

Blogs vs. Facebook

To me, blogs symbolize the “old vision” of the Internet, and Facebook epitomizes the new trend.

When you read blogs, you make your own deliberate choices about which writers to follow. With Facebook, you rely on the “feed” provided by the artificial intelligence algorithm.

Blog writers put effort into their work. They develop a distinctive style. In general, there are two types of blog posts. One type is a collection of links that the blogger believes will be interesting. The other type is a single reference, for which the blogger will provide a quote and additional commentary. On Facebook, many posts are just mindless “shares” where the person doing the sharing adds nothing to what he or she is sharing.

Bloggers create “metadata.” They put their posts into categories, and they add keyword tags. This allows readers to filter what they read. It has the potential to allow for sophisticated searching of blog posts by topic. On Facebook, the artificial intelligence tries to infer our interests from our behavior. We do not select topics ourselves.

The most popular environment for reading and writing blogs is the personal computer, which allows a reader time to think and gives a writer a tool for composing and editing several paragraphs. The most popular environment for reading and posting to Facebook is the smart phone, which favors rapid scrolling and photos with just a few words included.

Catering to the mass market

Before August of 1995, ordinary households were kept off the World Wide Web by significant technical barriers. Until Microsoft released Windows 95, people with Windows computers could not access the Internet without installing additional software. And until America Online provided Web access, the users of the most popular networking service were limited to email and other more primitive Internet protocols.

The fall of 1995 began the period of mass-market adoption of the Internet. Another important leap occurred early in 2007, when Apple's iPhone spurred the use of Internet-enabled smart phones.

As the masses immigrated to the Internet, the average character of the users changed. Early settlers were very focused on preserving anonymity and privacy. Recent arrivals seem more concerned with getting noticed. Although early settlers were intrigued by entertainment on the Internet, for the most part they valued its practical uses more highly. Recent arrivals demand much more entertainment. Early settlers wanted to be active participants in building the World Wide Web and to explore its various strands. Recent arrivals are more passive users of sites like Google and Wikipedia.

Hal Varian, a keen observer of technology who became the chief economist at Google, once wrote a paper that contrasted software that is easy to learn with software that is easy to use. Sometimes, software that is a bit harder to learn can be more powerful. But catering to the mass market can lead software developers to focus on making the software easy to learn rather than easy to use. This distinction may be useful for understanding how Facebook triumphed over blogging.

Big Data and Big Organizations

Back in the 1990s, many of us thought that since everyone could have their own web site, all web sites were created approximately equal. In Free Agent Nation, Dan Pink exuberantly proclaimed that the Internet fulfilled Marx's vision of workers owning the means of production. We thought that the “means of production” were computers connected to the Internet, and they were accessible to individuals.

Instead, enormous advantages accrued to large companies that could amass vast stores of user data and then mine that data using artificial intelligence. If the “means of production” today are Big Data and the algorithms to exploit it, then the means of production are much more accessible to Facebook, Apple, Amazon, and Google than they are to ordinary individuals.

Walled Gardens vs. the Jungle

Although America Online was a powerful franchise in the mid-1990s, its glory soon faded. We thought that the reason for this was that AOL was a “walled garden,” as opposed to the open Internet. The pattern that we noticed was that closed systems tended to lose out. This was the explanation for the near-demise of Apple Computer, which was much less friendly to outside developers than its competitor, Microsoft.

Today, the iPhone is much closer to a walled garden than smart phones that use the Android operating system. Yet the iPhone has maintained a powerful market position.

Facebook is much closer to a walled garden than is the world of blogs. But Facebook grew rapidly in recent years, and blogs are getting less attention.

Push vs. Pull

Traditional mass media was “pushed” to the users. If you wanted to watch a TV program in 1970, you could not record it or stream it. You had to turn your set to the right channel at the right time.

The World Wide Web was designed as a “pull” technology. You would make the choice to visit a web site, often by following links from other web sites.

Big corporations and advertisers are more comfortable with “push” than with “pull.” But in the 1990s, it looked like “pull” was going to win. One of the first efforts at “push technology,” Pointcast Network, famously flopped.

Today, “push technology” is everywhere, in the form of “notifications.” 21st-century consumers, especially smart phone owners, seem to welcome it.

Fraying at the Edge

The traditional telephone system put a lot of intelligence in the middle of the network. Central switchboards did a lot of the connecting work. Sound pulses traveled over wires, and your phone, sitting on the edge of the network, did not have to be intelligent to make sound pulses intelligible. But by the same token, your phone could only respond to sound pulses, not to text or video.

With the Internet, all forms of content are reduced to small digital packets, and the routers in the middle of the network do not know what is in those packets. Only when the packets reach their destination are they re-assembled and then converted to text, sound, or video by an intelligent device located on the edge.

Hence, the Internet was described as a dumb network with intelligence on the edge. One of the characteristics of such a network is that it is difficult to censor. If you do not know the content of packets until they reach the edge, by then it is too late to censor them.

Today, governments are better able to meet the challenge of censoring the Internet. Part of the reason is that the Internet is less de-centralized than it once was. It turns out that in order to process today's volume of content efficiently, the Internet needs more intelligence in the network itself.

The advent of “cloud computing” also changes the relationship between the edge and the network. The “cloud” is an intelligent center, and the many devices that rely on the “cloud” are in that respect somewhat less intelligent than the computers that used the Internet in the 1990s.

Another factor is the importance of major service providers, such as Google and Facebook. These mega-sites give government officials targets to attack when they are not pleased with what they see.

Governance

One of the aspects of the Internet that intrigued me the most in 1993 was its governance mechanism. You can get the flavor of it by reading this brief history of the Internet, written twenty years ago. In particular, note the role of Requests for Comments (RFCs) and Internet Engineering Task Force Working Groups, which I will refer to as IETFs.

I compare IETFs with government agencies this way:

— IETFs are staffed by part-time or limited-term volunteers, whose compensation comes from their regular employers (universities, corporations, government agencies). Agencies are staffed by full-time permanent employees, using taxpayer dollars.

— IETFs solve the problems that they work on. Agencies perpetuate the problems that they work on.

— A particular group of engineers in an IETF disbands once it has solved its problem. An agency never disbands.

When I hear calls for government regulation of the Internet, to me that sounds like a step backward. The IETF approach to regulation seems much better than the agency approach.

Things Could Change

Call me a snob or an old fogy, but I am not happy with where the Internet is today. I believe that things could change. I think that a lot of people are unhappy with the current state of the Internet. But I suspect that the enemy is us.

I am not sure what the solution will look like. I don't think that regulating Facebook is the answer, especially if the main driver of regulation is that people are upset that Donald Trump won the 2016 election.

I don't think that blockchain is the answer, even though it has some of the characteristics of the 1990s Internet. I have little confidence that blockchain can scale gracefully, given what we have seen so far and given the way that the Internet has evolved. And even if blockchain is able to overcome scaling problems, I think that the lesson of the last 25 years is that culture pushes on technology harder than technology pushes on culture.

I think that the challenge that we face on the Internet is the challenge that we face in society in general. In our modern world, we thrive by doing less ourselves and getting more from the services provided by others. But we seem tempted to become passive and careless in ceding power to governments and other large organizations.

In short, how can we sustain an ethic of individual responsibility while enjoying the benefits of extreme interdependence?

by Ph.D Arnold King, author of nonfiction books, primarily in the area of political economy, and in a previous life, he started one of the web's first commercial sites. Originally published on Hacker Noon.

翻译自: https://hackernoon.com/how-the-internet-turned-bad-lb1y120xn

互联网跟移动互联网

互联网跟移动互联网_互联网如何变坏相关推荐

  1. 互联网最新开发语言_互联网是多语言的,但您需要学习普通话

    互联网最新开发语言 The internet is becoming the town square for the global village of tomorrow. - Bill Gates. ...

  2. 互联网测试岗位分类_互联网企业都有哪些技术类岗位

    互联网公司中常见的几种岗位有产品类岗位.技术类岗位.设计类岗位.运营类岗位四类岗位.其中技术要求高的要数技术类岗位了,那么技术类岗位有可以细分为哪些呢?沈阳优就业IT培训老师带你了解下技术岗位分类,让 ...

  3. 互联网运营面试题_互联网运营、产品岗一定要看的面试题

    互联网运营.产品岗一定要看的面试题关于网络运营和产品营销策划.想要刺激的小伙伴们可以看看. 下面就展示这些题目,希望求职者们能够get到题目里面的考察点. 1. 为什么要做产品经理/运营 2.日常生活 ...

  4. 纳米材料在计算机专业的应用,纳米材料论文_互联网_IT计算机_专业资料

    纳米材料论文_互联网_IT计算机_专业资料 (4页) 本资源提供全文预览,点击全文预览即可全文预览,如果喜欢文档就下载吧,查找使用更方便哦! 9.9 积分 纳米材料的性质.制备与表征班级:材料125 ...

  5. 马化腾提问_互联网融合创新会带来哪些改变_知乎回答部分总结

    马化腾(知乎账号ponyma)的提问: 未来十年哪些基础科学突破会影响互联网科技产业?产业互联网和消费互联网融合创新,会带来哪些改变? 节选三网相关的部分回答: 目录 1      关于带宽的意义 2 ...

  6. 凡客副总裁被曝离职:或因IPO受阻|凡客|王春焕|离职_互联网_新浪科技_新浪网...

    凡客副总裁被曝离职:或因IPO受阻|凡客|王春焕|离职_互联网_新浪科技_新浪网 凡客副总裁被曝离职:或因IPO受阻|凡客|王春焕|离职_互联网_新浪科技_新浪网 凡客副总裁被曝离职:或因IPO受阻 ...

  7. IT码农哥放弃50万年薪:辞职卖咖喱凉皮(背后深藏功与名)_互联网的一些事...

    IT码农哥放弃50万年薪:辞职卖咖喱凉皮(背后深藏功与名)_互联网的一些事 IT码农哥放弃50万年薪:辞职卖咖喱凉皮(背后深藏功与名)_互联网的一些事 IT码农哥放弃50万年薪:辞职卖咖喱凉皮(背后深 ...

  8. connertone怎么远程连接服务器,离形得似_互联网艺术与化身网络建设.pdf

    离形得似_互联网艺术与化身网络建设 ( ) 第 8卷 第 4 期 南 京 邮 电 大 学 学 报 社 会 科 学 版 Vo l. 8 No. 4 2006年 12 月 Journal of N anj ...

  9. 概要设计 英文_互联网知识大全:软件开发中和文档常见的英文缩写,还不快收藏...

    概要设计 英文_互联网知识大全:软件开发中和文档常见的英文缩写,还不快收藏... https://blog.csdn.net/weixin_39914243/article/details/11123 ...

  10. 【网络协议从入门到底层原理】【00】课程大纲_互联网与网络协议

    持续学习&持续更新中- 学习态度:守破离 [网络协议从入门到底层原理][00]课程大纲_互联网与网络协议 课程大纲 互联网(Internet) 为什么要学习网络协议 基本常识 C/C++的跨平 ...

最新文章

  1. ajax向后台请求数据,后台接收到数据并进行了处理,但前台就是调用error方法...
  2. Java实战之04JavaWeb-02Request和Response
  3. java容器类4:Queue深入解读
  4. linux 用 grep 查找单个或多个字符串(关键字)
  5. 2020年第十八届西电程序设计竞赛网络预选赛之Problem C 没人比我更懂 COVID-19
  6. 知乎高赞:这个开挂神器简直了!
  7. 二进制包 mysql_二进制包安装MySQL数据库
  8. 111_Power Pivot 24小时维度:累计、同比、环比相关
  9. 注于 IP 衍生品的开发和销售,52TOYS完成数千万元A+轮融资
  10. oracle备份文件命令,oracle备份命令使用实例
  11. .net remoting 使用事件
  12. Google Guice 快速入门
  13. oneapi安装CMAQ
  14. wget 无法验证某某颁发的证书
  15. Windows Live Writer插件:在WLW中插入语法高亮代码
  16. HTML jQuery实现点赞功能(模仿CSDN的样式)
  17. vscode配置php运行环境以及xdebug
  18. mac系统设置alias
  19. 【它山之玉】提高文章命中率的秘诀-科学网马臻
  20. 怀念那些年我们每天使用的经典DOS程序

热门文章

  1. 输出魔方阵,所谓魔方阵是指这样的方阵,它的每一行,每一列和对角线之和均相等。例如,三阶魔方阵为
  2. 计算机在往硬盘上写数据时寻道,计算机在往硬盘上写数据时寻道是从( )磁道开始。...
  3. proceed with launch?解决办法
  4. JAVA开发微信支付(JSAPI支付)
  5. 对于interrupt,interrupted 和 isInterrupted的一些理解
  6. 聚散随缘,勿忘心安 -- 颜夕溪
  7. 使用memccpy函数替代不安全的str[n]cpy、str[n]cat等
  8. unittest测试驱动之断言(四)
  9. 条件自信息量与互信息量的区别
  10. H5新特性 - 新增标签