Feeds

War, Web 2.0 and the Fail Loop

From Hezbollah to Twitter

The Power of One eBook: Top reasons to choose HP BladeSystem

Cyburbia The Twitterings of Web 2.0 may seem a million miles from battlefield skirmishes in Lebanon, but they both have something in common. Both illustrate perils of continuous electronic feedback loops.

To most of us, the idea of being in the loop means no more than being "in the know", privy to information known only to those in a privileged inner circle; to be cut out of the loop, by contrast, was to be distanced from your colleagues and excluded from a hallowed circle of power. The general idea of being "in the loop", however, is older than you'd think.

It can be traced back seventy years to an idea called cybernetics. What the progenitors imagined was the perfect human society would see us all hitched to an electronic information loop defined by a continuous cycle of messaging and feedback among all those involved in it.

Writing in the dark shadow of the Holocaust, the American mathematician and father of cybernetics Norbert Wiener convinced himself that society was in danger of spiralling out of control; and that only by putting us into constant touch with each other could he prevent it from careering towards collapse. From there the idea passed to the media guru Marshall McLuhan in Toronto, who predicted as early as the 1960’s that a whirring electronic information loop was going to shake modern society to its foundations, tying everyone and everything together in a "new electronic interdependence." The impact of this electronic information loop coursing through all our veins, thought McLuhan, could only enhance our ability to understand one another. It would, he felt sure, precipitate the rise of a "global village" and a new era of greater responsibility and understanding.

In the late 1960's, exactly the same idea was borrowed by some hippie veterans of the counter-culture from the San Francisco Bay Area to fill the vacuum left by their radical politics.

Through cybernetics, the bohemians of the counter-culture like Stewart Brand saw a means of routing information around the control of the authorities and putting ordinary people back into direct communication with each other. Those hippies slowly morphed into electro-hippies, and many of them went on to become enormously influential in the development of the computer industry and the net in the 1970's and 1980's.

A life in the loop

Only after the collapse of the dot-com boom, however, when the huge fibre-optic information cables which had being laid in the ground to give us lightning new broadband connections to the net were abandoned by the companies which had built them, did ordinary people show any interest in spending time on online social networks. In an entirely spontaneous flight over the last seven years, millions of us have quietly migrated to a vast electronic suburb to burrow under the control of mainstream authorities and spend vast tracts of our time messaging and responding to a constant stream of information from our electronic ties.

I call this place Cyburbia. When we inhabitants of Cyburbia return there compulsively to check for updates, we are not only trying to be more efficient and more productive, but to ward off a persistent fear of falling out of the loop. But what does it really mean to spent vast quantities of our time hitched to an electronic information loop along with everyone else?

Today's breathless and very well paid internet gurus would have you believe that all this makes us and our organisations more agile, more efficient and more responsive. This isnt necessarily so.

The delivery of a continuous stream of messages might well be slowly stretching our brains, turning us into creatures who are better at doing many different things at once. Preliminary studies from neuroscientists and psychologists, however, suggest that in the meantime our brains are likely to become strained and confused if we make too many demands on them. All this is common sense but, buoyed up by fanciful cybernetic ideas about the electrifying power of information, institutions and companies are prone to forgetting it.

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.