Clive Thompson has a great rumination on a missing piece of the Internet toolsuite: a mapper that watches your browsing and tells you how you found interesting stuff. This is a great example of a technology that would make a wonderful local add-on to your browser, but would be creepy and invasive if offered as a centralized server. That is, it'd be great to know this stuff yourself, and great to have the option to share it with others, but it would be pretty icky to think that some remote, behavioral-ad-analytics-driven entity was using it to build a dossier on your Internet use.
But later on, it’s damn hard to recall precisely how A led to E. You could look at your web history, but it’s an imprecise tool. If you happened to have a lot of tabs open and were multitasking — checking a bit of web mail, poking around intermittently on Wikipedia — then the chronological structure of a web “history” doesn’t work. That’s because there’ll be lots of noise: You’ll also have visited sites G, M, R, L, and Y while doing your A to E march, and those will get inserted inside the chronology. (Your history will look like A-G-B-M-R-C-D-L-Y-E.) Worse, often it’s not until days or weeks after I’ve found a site that I’ll wonder precisely how I found it … at which point the forensic trail in a web history is awfully old, if not deleted.
“How did you find my site?” and Vanevar Bush’s memex
But hey: Why does this matter? Apart from pecuniary interest, why would anyone care about the process by which you found a cool site?
Because there’s a ton of interesting cognitive value in knowing the pathway.
If you’re reading this blog, you are probably least part nerd, which means you’ve likely read (or have heard of) Vanevar Bush’s 1945 essay for the Atlantic Monthly, “As We May Think”. Bush’s essay has become famous amongst digital folks because of how eerily he predicted the emergence of a hyperlinked Internet. “As We May Think” is, at heart, a complaint about information overload (in 1945!) and a suggestion of how to solve it: By building better tools for sorting, saving, and navigating stuff. Bush envisioned a “memex”, a desk-like tool at which you’d sit, reading over zillions of documents stored via microfilm. You could also write your own notes and reflections (which would saved in microfilm format too, photographed automatically via a forehead-mounted webcam “a little larger than a walnut”.
Dale Beran’s been writing about 4chan, /b/ and Anonymous for years, and lurking on their message-boards, and he traces the rise of the self-professed “betas” who embody fragile, toxic masculinity and have been important bellwethers for many internet and real-world phenomena, linking them to Trump as “the loser who won”: “Someone who is all brash […]
Indie news outlet Techdirt is being sued for $15M by Shiva Ayyadurai, who claims to have invented email in 1978, eight years after Ray Tomlinson sent an email over ARPANET; Ayyadurai is represented by Charles Harder, a key figure in the Gawker-killing legal campaign that Peter Thiel financed, and who is also representing Melania Trump […]
In Even good bots fight, a paper written by Oxford Internet Institute researchers and published in PLOS One, the authors survey the edits and reverts made by Wikipedia’s diverse community of bots, uncovering some curious corners where bots — rate-limited by Wikipedia’s rules for bots — slowly and remorseless follow one another around, reverting each […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]