Après Spam: The Next Email Crisis
Many web generations ago, the ARPA knights started a revolution against the telco circuit-switching empire
and determined to destroy the death stars and their twisted pairs.
I was one of those knights when our leader Vint Cerf, Father of the Internet, crossed over to the telco side of the force.
Cerf Vader and legions of imperial stormlawyers are now defending the death stars against the insignificant ispwoks.
The previous speaker in this forum series, the Father of the Web, Tim-Berners-Lee-Po - who speaks over 6,000,000,000 dialects -
has been captured by Java the Hutt. You are Luke and Leia. The death stars must be destroyed and I foresee it.
- Bob Metcalfe
by David Gelernter
[Excerpt]
You get an email (maybe longer or more complicated than average, or from someone you don't know); you have no time to respond right now, but you mean to
answer - but other emails stack up, and you answer those first - but you still plan to reply - but more emails keep arriving ... Meanwhile the sender is
wondering: Is he ignoring me on purpose? (I'll cross him off my list and forget about it.) Did he mean to reply, but has since forgotten?
(Resend my message.) Or does he still mean to reply and just hasn't gotten around to it? (Don't get mad or resend.) All three possibilities are
real, and happen all the time. As volume rises, more email conversations trail off into nothing for unknown reasons, the medium is devalued further, and
the problem gets worse - people set even less store by a mail message, send one out on even less provocation, volume rises, more email conversations trail off
into nothing for unknown reasons, the medium is devalued even further.
Luckily, there are good ways to deal with an unreliable medium like email - but not enough people know or use them. (And the techniques won't work
unless many people use them.) These techniques can't add more hours to your day, but can make email fairly transparent. This is a behaviour (not
technology) issue - but today's software makes the problem worse, because the obvious techniques (which involve "acknowledgments" and "time outs") require a
kind of time awareness that today's software mostly discourages.
Still, a prediction: Protocols like the ones proposed below will be commonplace before long. You have to start somewhere.
- The Acknowledgment Rule - Acknowledge in haste, respond at leisure. When you receive an email,
acknowledge it within 24 hours if you can; take 1 week if you must, but more than
that is (ordinarily) too long. An acknowledgment is not an answer. It's a one-liner, something like "thanks for your note; I'll be in touch
soon." It tells the sender that his message has got through and that you plan to answer it some day. Once you've acknowledged a message, you
should answer within (say) 2 weeks of sending the acknowledgment.
- The Re-Send Rule - If an acknowledgment or (later) an answer doesn't arrive in good time, resend your
message verbatim. The receiver's time limits dictate the sender's. If your message hasn't been acknowledged 1 week
later, resend it. If the acknowledgment arrives but no answer has materialised 2 weeks after that, resend. So
you get (at the outside) two chances to restart a sputtering conversation - and that's it. (When you resend a message, a discreet "2"
or "3" in the subject line should be enough to let the receiver know what's going on.)
Where did the "24 hours, 1 week, 2 weeks" time limits come from? I
just made them up. Maybe they're wrong. All I can say in their defense is that I've been a faithful emailer since 1982, and they strike me as about right.
If a message arrives and you can answer right away - be my guest, and forget the acknowledgment. But feel free to acknowledge (and not answer until
later) any ordinary email, no matter how brief. A short email isn't necessarily easy to answer. Any substantive answer costs time and
concentration. We can all sympathise with those desperate characters who attach "sender asked to be notified" messages to their outbound email, but such
messages have no place in polite society. (When you read one of these booby-trapped emails, a note pops up: "Sender asked to be notified when you read
this message - okay to send a notification?") No good. "May I spy on your activities and send back a report?" will never be a tactful question no
matter how delicately you phrase it.
Consider how my rules work in a few common situations.
| You overlook an email entirely. Especially common in the spam age, but happens regularly for other reasons
too. Under my protocol, the sender waits a week; having got no acknowledgment, he then resends - without worrying whether he's waited long enough,
whether you want to ignore him and he is intruding on your splendid isolation, et cetera. The conversation gets a 2nd chance. |
| You see an email, plan to respond but forget. Especially likely when the email is long or
complicated. By sending a quick acknowledgment, you give the sender permission to nudge you (in a reasonable way, after a fair interval). The
conversation is less likely to flicker out by accident. |
| You finally remember to respond, but you've forgotten the details. It suddenly hits you that you intended to
answer a message from somebody about some piece you once published - but a message from whom about what? A conscientious correspondent will
shoulder his virtual shovel and dig the thing out. In practice, the exchange is probably going nowhere unless the sender decides to try again. |
| You ignore an email on purpose. In this case you are better off without the protocol. Under the
protocol, you will be forced to ignore not only the original but the duplicate. Reform is rarely cost-free. |
These rules could be put into effect right now, using any mail system. But they are pointless unless a whole community uses them, and would be a
nuisance to apply using conventional mail software. What's required is a 2-button mail-reader. One button is labelled "acknowledge (quick!)," the
other "answer (slow!)." When you press the "acknowledge" button, you see a time-ordered list of all messages you have yet to acknowledge. Also
included: repeat messages that await resending - you've sent them once but they have not been acknowledged, or remain unanswered. And acknowledgments
received - just to glance at; no action needed.
Maintaining such a list is fairly complicated, but software does the work. Whenever a new message (except an acknowledgment) arrives, the system will
ordinarily start a 24-hour timer, put the message on your "acknowledge" list and prepare an acknowledgment to be launched when you are ready. Whenever you
kick off a new conversation, the system will start a 7-day timer; when the timer runs out, your original message is hauled out of storage, readied for re-launch,
and added to the "acknowledge" list. All these manipulations go on behind the scenes. Pressing "answer" shows you messages you have acknowledged but
have not yet responded to.
Everything on "acknowledge" can be dealt with quickly. If you check it several times a day, you can keep up without bogging down. You might deal
with "reply" once a week. Bottom line: You keep afloat by relying on mass-processing efficiencies (your time-consuming correspondence is bundled into
a neat batch to be dealt with every now and then), and by discreetly re-launching stalled conversations without being obnoxious. Which is
exactly what nearly everyone tries to do anyway. But your two lists let you do the obvious thing at minimal cost in overhead, and without driving your correspondents crazy.
David Gelernter is a contributing editor to The Weekly Standard.
Source: weeklystandard.com 29 September 2003 Vol 9 Issue 3 © 2005,
News Corporation, Weekly Standard all rights reserved.
I can't say just how many times I've received an email from am incipient correspondent and, delighted, I've set it aside because I wanted plenty of time
to prepare an in-depth reply - only to run across the email two months later. By then, I would be too embarrassed to reply and would tell myself that, if it
had been important enough, I would've answered already - mostly just so I can stop feeling so bad about it. Because OF COURSE it was important - I'm
often elbow-deep in a project which consumes my attention (and multi-tracking becomes harder as I get older - and older) and writing emails is labour-intensive
for me because I don't like to just dash something off. Gelernter's rules would be received by me with a sigh of relief - but only if some
combination of hardware and software made it as easy as selecting which button to push - otherwise, I would be little better off than I am now.
Since lots of people are bound to have this same problem, I'm surprised that this hasn't already been "fixed."
Coming Again - a Manifesto
by David Gelernter
Introduction by John Brockman:
Yale computer scientist David Gelernter entered the public mind one morning in January '92 when The New York Sunday Times ran his picture on the front page of the business
section; it filled nearly the whole page. The text of his story occupied almost another whole page inside.
In 1991 Gelernter had published a book for technologists (an extended research paper) called Mirror Worlds, claiming in effect that one day, there would be something like
the Web. As well as forecasting the Web, the book, according to the people who built these systems, also helped lay the basis for the internet programming language "Java" and Sun
Microsystems' "Jini."
Gelernter's earlier work on his parallel programming language "Linda" (which allows you to distribute a computer program across a multitude of processors and thus break down
problems into a multitude of parts in order to solve them more quickly) and "tuple spaces" underlies such modern-day systems as Sun's JavaSpaces, IBM's T-Spaces, a Lucent company's
new "InfernoSpaces" and many other descendants worldwide.
By mid-'92 this set of ideas had taken hold and was exerting a strong influence. By 1993 the Internet was growing fast, and the Web was about to be
launched. Gelernter's research group at Yale was an acknowledged world leader in network software and more important, it was known for "The Vision Thing", for the big picture.
In June '93 everything stopped for Gelernter when he was critically injured by a terrorist mail bomb. He was out of action for the rest of '93 and most of '94 as the Web took
off, the Internet become an international phenomenon and his aggressive forecasts started to come true. Gelernter endured numerous surgeries through 95, and then a long
recuperation period.
Now Gelernter is back. In this audacious manifesto, The Second Coming, he writes: "Everything is up for grabs; everything will change. There is a magnificent
sweep of intellectual landscape right in front of us."
The Second Coming - A Manifesto
by David Gelernter
Any Microsecond Now
Computing will be transformed. It's not just that our problems are big, they are big and obvious. It's not just that the solutions are simple, they are simple and right
under our noses. It's not just that hardware is more advanced than software; the last big operating-systems breakthrough was the Macintosh, 16 years ago, and today's hottest
item is Linux, which is a version of Unix, which was new in 1976.
Users react to the hard truth that commercial software applications tend to be badly-designed, badly-made, incomprehensible and obsolete by blaming themselves ("Computers for
Morons," "Operating Systems for Livestock"), and meanwhile, money surges through our communal imagination like beer from burst barrels. Billions. Naturally the atmosphere
is a little strange; change is coming, soon.
Everything Old Is New Again
- No matter how certain its eventual coming, an event whose exact time and form of arrival are unknown
vanishes when we picture the future. We tend not to believe in the next big war or economic swing; we
certainly don't believe in the next big software revolution.
- Because we don't believe in technological change (we only say we do), we accept bad computer products with
a shrug; we work around them, make the best of them and (like fatalistic 16th-century French peasants)
barely even notice their defects - instead of demanding that they be fixed and changed.
- Everything is up for grabs. Everything will change. There is a magnificent sweep of
intellectual landscape right in front of us.
- The Orwell law of the future: any new technology that can be tried will be. Like Adam Smith's
invisible hand (leading capitalist economies toward ever-increasing wealth), Orwell's Law is an empirical
fact of life.
Ripe Ready and hanging by a thread
- We know that big developments are inevitable in the software world - if only because nothing in that world
corresponds to a "book." You can see a book whole from the outside. You know in advance how a
book is laid out - where the contents or the index will be - and how to "operate" one. As you work
through it, you always know where you stand: how far you have gone and how much is left. "Book" can be
a physical object or a text - an abstraction with many interchangeable physical embodiments. These
properties don't hold for file systems or web sites. You can't see or judge one from the outside,
anticipate the lay-out, tell where you stand as you work your way through.
Whenever we are organising information, the book form is too powerful an idea to do without in some form or other.
- Miniaturisation was the big theme in the first age of computers: rising power, falling prices, computers
for everybody. Theme of the Second Age now approaching: computing transcends computers. Information travels through a sea of
anonymous, interchangeable computers like a breeze through tall grass.
A desktop computer is a scooped-out hole in the beach where information from the Cybersphere wells up like seawater.
- "The network is the computer" - yes; but we're less interested in computers all the time. The real
topic in astronomy is the cosmos, not telescopes. The real topic in computing is the Cybersphere and
the cyberstructures in it, not the computers we use as telescopes and tuners.
- The software systems we depend on most today are operating systems (Unix, the Macintosh OS, Windows et al)
and browsers (Internet Explorer, Netscape Communicator, etc). Operating systems are connectors that
fasten users to computers; they attach to the computer at one end, the user at the other. Browsers
fasten users to remote computers, to "servers" on the internet.
Today's operating systems and browsers are obsolete because people no longer want to be connected to
computers - near ones OR remote ones. (They probably never did). They want to be connected to
information. In the future, people are connected to cyberbodies; cyberbodies drift in the
computational cosmos - also known as the Swarm, the Cybersphere.
From The Prim Pristine Net To The Omnipresent Swarm
- The computing future is based on "cyberbodies" - self-contained, neatly-ordered, beautifully-laid-out
collections of information, like immaculate giant gardens.
- You will walk up to any "tuner" (a computer at home, work or the supermarket, or a TV, a telephone, any
kind of electronic device) and slip in a "calling card," which identifes a cyberbody. The tuner tunes
it in. The cyberbody arrives and settles in like a bluebird perching on a branch.
- Your whole electronic life will be stored in a cyberbody. You can summon it to any tuner at any time.
- By slipping it your calling card, you customise any electronic device you touch; for as long as it holds
your card, the machine knows your habits and preferences better than you know them yourself.
- Any well-designed next-generation electronic gadget will come with a "Disable Omniscience" button.
- The important challenge in computing today is to spend computing power, not horde it.
- The future is dense with computers. They will hang around everywhere in lush growths like Spanish
moss. They will swarm like locusts. But a swarm is not merely a big crowd. The individuals
in the swarm lose their identities. The computers that make up this global swarm will blend together
into the seamless substance of the Cybersphere. Within the swarm, individual computers will be as anonymous as molecules of air.
- A cyberbody can be replicated or distributed over many computers; can inhabit many computers at the same
time. If the Cybersphere's computers are tiles in a paved courtyard, a cyberbody is a cloud's drifting
shadow covering many tiles simultaneously.
- But the Net will change radically before it dies. When you deal with a remote web site, you largely
bypass the power of your desktop in favour of the far-off power of a web server. Using your powerful
desktop computer as a mere channel to reach web sites, reaching through and beyond it instead of using it,
is like renting a Hyundai and keeping your Porsche in the garage. Like executing programs out of disk
storage instead of main memory and cache. The Web makes the desktop impotent.
- The power of desktop machines is a magnet that will reverse today's "everything onto the Web!"
trend. Desktop power will inevitably drag information out of remote servers onto desktops.
- If a million people use a Web site simultaneously, doesn't that mean that we must have a heavy-duty remote
server to keep them all happy? No; we could move the site onto a million desktops and use the internet
for coordination. The "site" is like a military unit in the field, the general moving with his troops
(or like a hockey team in constant swarming motion). (We used essentially this technique to build the
first tuple space implementations. They seemed to depend on a shared server, but the server was an
illusion; there was no server, just a swarm of clients.) Could
Amazon.com be an itinerant horde instead of a fixed Central Command Post? Yes.
Stranger Than Fiction: Computers Today
- The windows-menus-mouse "desktop" interface, invented by Xerox and Apple and now universal, was a
brilliant invention and is now obsolete. It wastes screen-space on meaningless images, fails to
provide adequate clues to what is inside the files represented by those blurry little images, forces users
to choose icons for the desktop when the system could choose them better itself, and keeps users jockeying
windows (like parking attendants rearranging cars in a pint-sized Manhattan lot) in a losing battle for an
unimpeded view of the workspace - which is, ultimately, unattainable. No such unimpeded view exists.
- Icons and "collapsed views" seem new but we have met them before. Any book has a "collapsed" or
"iconified" view, namely its spine. An icon conveys far less information that the average book
spine - and is much smaller. Should it be much smaller? Might a horizontal stack of "book
spines" onscreen be more useful than a clutter of icons?
- The computer mouse was a brilliant invention, but we can see today that it is a bad design. Like any
device that must be moved and placed precisely, it ought to provide tactile feedback; it doesn't.
- Metaphors have a profound effect on computing. The desktop metaphor traps us in a "broad" instead of
"deep" arrangement of information that is fundamentally wrong for computer screens. Compared to a
standard page of words, an actual desktop is big and a computer screen is small. A desktop is easily
extended (use drawers, other desks, tables, the floor); a computer screen is not.
- Apple could have described its interface as a pure "information landscape," with no connection to a
desktop; we invented this landscape (they might have explained) the way a landscape architect or amusement
park designer invents a landscape. We invented an ideal space for seeing and managing computerised
information. Our landscape is imaginary, but you can still enter and move around it. The
computer screen is the window of your vehicle, the face-shield of your diving-helmet.
- Under the desktop metaphor, the screen IS the interface - the interface is a square foot or two of glowing
colours on a glass panel. In the landscape metaphor, the screen is just a viewing pane. When you
look through it, you see the actual interface lying beyond.
Problems On The Surface And Under The Surface
- Modern computing is based on an analogy between computers and file cabinets that is fundamentally wrong
and affects nearly every move we make. (We store "files" on disks, write "records," organize files
into "folders" - file-cabinet language.) Computers are fundamentally unlike file cabinets because they can take action.
- Metaphors have a profound effect on computing: the file-cabinet metaphor traps us in a "passive" instead
of "active" view of information management that is fundamentally wrong for computers.
- The rigid file and directory system you are stuck with on your Mac or PC was designed by programmers for
programmers - and is still a good system for programmers. It is no good for non-programmers. It
never was, and was never intended to be.
- If you have three pet dogs, give them names. If you have 10,000 head of cattle, don't
bother. Nowadays the idea of giving a name to every file on your computer is ridiculous.
- Our standard policy on file names has far-reaching consequences: doesn't merely force us to make up names
where no name is called for; also imposes strong limits on our handling of an important class of
documents - ones that arrive from the outside world. A newly-arrived email message (for example) can't
stand on its own as a separate document - can't show up alongside other files in searches, sit by itself on
the desktop, be opened or printed independently; it has no name, so it must be buried on arrival inside some existing file (the mail
file) that does have a name. The same holds for incoming photos and faxes, Web bookmarks, scanned images...
- You shouldn't have to put files in directories. The directories should reach out and take
them. If a file belongs in six directories, all six should reach out and grab it automatically, simultaneously.
- A file should be allowed to have no name, one name or many names. Many files should be allowed to
share one name. A file should be allowed to be in no directory, one directory, or many
directories. Many files should be allowed to share one directory. Of these eight possibilities,
only three are legal and the other five are banned - for no good reason.
Streams Of Time
- In the beginning, computers dealt mainly in numbers and words. Today they deal mainly with
pictures. In a new period now emerging, they will deal mainly with tangible time - time made visible
and concrete. Chronologies and timelines tend to be awkward in the off-computer world of paper, but they are natural online.
- Computers make alphabetical order obsolete.
- File cabinets and human minds are information- storage systems. We could model computerised
information-storage on the mind instead of the file cabinet if we wanted to.
- Elements stored in a mind do not have names and are not organised into folders; they are retrieved not by
name or folder but by contents. (Hear a voice, think of a face: you've retrieved a memory that
contains the voice as one component.) You can see everything in your memory from the standpoint of
past, present and future. Using a file cabinet, you classify information when you put it in; minds
classify information when it is taken out. (Yesterday at 4pm stood with Natasha on Fifth Avenue in the
rain - as you might recall when you are thinking about "Fifth Avenue," "rain," "Natasha" or many other
things. But you attached no such labels to the memory when you acquired it. The classification happened retrospectively.)
- A "lifestream" organises information not as a file cabinet does but roughly as a mind does.
- A lifestream is a sequence of all kinds of documents - all the electronic documents, digital photos,
applications, Web bookmarks, rolodex cards, email messages and every other digital information chunk in your
life - arranged from oldest to youngest, constantly growing as new documents arrive, easy to browse and
search, with a past, present and future, appearing on your screen as a receding parade of index
cards. Documents have no names and there are no directories; you retrieve elements by content: "Fifth
Avenue" yields a sub-stream of every document that mentions Fifth Avenue.
- A stream flows because time flows, and the stream is a concrete representation of time. The "now"
line divides past from future. If you have a meeting at 10am tomorow, you put a reminder document in
the future of your stream, at 10am tomorrow. It flows steadily towards now. When now equals 10am
tomorrow, the reminder leaps over the now line and flows into the past. When you look at the future of
your stream you see your plans and appointments, flowing steadily out of the future into the present, then the past.
- You manage a lifestream using two basic controls, put and focus, which correspond roughly to acquiring a
new memory and remembering an old one.
- To send email, you put a document on someone else's stream. To add a note to your calendar, you put
a document in the future of your own stream. To continue work on an old document, put a copy at the
head of your stream. Sending email, updating the calendar, opening a document are three instances of
the same operation (put a document on a stream).
- A substream (for example the "Fifth Avenue" substream) is like a conventional directory - except that it
builds itself, automatically; it traps new documents as they arrive; one document can be in many substreams;
and a substream has the same structure as the main stream - a past, present and future; steady flow.
In The Age Of Tangible Time
- The point of lifestreams isn't to shift from one software structure to another but to shift the whole
premise of computerised information: to stop building glorified file cabinets and start building
(simplified, abstract) artificial minds; and to store our electronic lives inside.
- A lifestream can replace the desktop and subsume the functions of the file system, email system and
calendar system. You can store a movie, TV station, virtual museum, electronic store, course of
instruction at any level, electronic auction or an institution's past, present and future (its archives, its
current news and its future plans) in a lifestream. Many websites will be organised as lifestreams.
- The lifestream (or some other system with the same properties) will become the most important
information-organising structure in computing - because even a rough imitation of the human mind is vastly
more powerful than the most sophisticated file cabinet ever conceived.
- Lifestreams (in preliminary form) are a successful commercial product today, but my predictions have
nothing to do with this product. Ultimately the product may succeed or fail. The idea will succeed.
Living Timestreams
- Lifestreams today are conventional information structures, stored at web sites and tuned-in using
browsers. In the future they will be cyberbodies.
- Today's operating systems connect users to computers. In the future we will deal directly with
information, in the form of cyberbodies. Operating systems will connect cyberbodies to computers; will
allow cyberbodies to dock on computers. Users won't deal with operating systems any more, and won't
care about them. Your computer's operating system will make as much difference to you as the voltage level of a bit in memory.
- A lifestream is a landscape you can navigate or fly over at any level. Flying towards the start of
the stream is "time travel" into the past.
- You can walk alongside a lifestream (browsing or searching) or you can jump in and be immersed in information.
- A well-designed store or public building allows you to size up the whole space from outside, or as soon as
you walk in - you see immediately how things are laid out and roughly how large and deep the space
is. Today's typical web site is a failure because it is opaque. You ought to be able to see immediately (not deduce
or calculate) how the site is arranged, how big it is, how deep and how broad. It ought to be transparent.
- Movies, TV shows, virtual museums and all sorts of other cultural products from symphonies to baseball
games will be stored in lifestreams. In other words: each cultural product will be delivered to you in
the form of an artificial mind. You will deal with it not as you deal with an object but roughly as you do with a person.
Institutions Afloat In The Cybersphere
- Your car, your school, your company and yourself are all one-track vehicles moving forward through time,
and they will each leave a stream-shaped cyberbody (like an aircraft's contrail) behind them as they
go. These vapour-trails of crystallised experience will represent our first concrete answer to a hard
question: what is a company, a university, any sort of ongoing organisation or institution, if its staff and
customers and owners can all change, its buildings be bulldozed, its site relocated - what's
left? What is it? The answer: a lifestream in cyberspace.
- A software or service company equals the employees plus the company lifestream. Every employee has
his own view of the communal stream. The company's web site is the publicly-accessible substream of
the main company stream. The company's lifestream is an electronic approximation of the company's memories, its communal mind.
- Lifestreams don't yield the "paperless office." (The "paperless office" is a bad idea because paper
is one of the most useful and valuable media ever invented.) But lifestreams can turn office paper
into a temporary medium - for use, not storage. "On paper" is a good place for information you want to
use; a bad place for information you want to store. In the stream-based office, for each newly-created
or -received paper document: scan it into the stream and throw it away. When you need a paper
document: find it in the stream; print it out; use it; if you wrote on the paper while using it, scan it back in; throw it out.
- Software can solve hard problems in two ways: by algorithm or by making connections - by delivering the problem to exactly the right
human problem-solver. The second technique is just as powerful as the first, but so far we have ignored it.
The Second Coming Of The Computer
- Lifestreams and microcosms are the two most important cyberbody types; they relate to each other as a
single musical line relates to a single chord. The stream is a "moment in space," the microcosm a moment in time.
- Nowadays we use a scanner to transfer a document's electronic image into a computer. Soon, the
scanner will become a Cybersphere port of entry, an all-purpose in-box. Put any object in the in-box
and the system develops an accurate 3D physical transcription, and drops the transcription into the cool
dark well of cyberspace. So the Cybersphere starts to take on just a hint of the textural richness of real life.
We'll know the system is working when a butterfly wanders into the in-box and (a few wingbeats later)
flutters out - and in that brief interval the system has transcribed the creature's appearance and analysed
its way of moving, and the real butterfly leaves a shadow-butterfly behind. Some time soon afterward
you'll be examining some tedious electronic document and a cyber-butterfly will appear at the bottom left
corner of your screen (maybe a Hamearis lucina) and pause there, briefly hiding the text (and showing
its neatly-folded rusty-chocolate wings like Victorian paisley, with orange eyespots) - and moments later
will have crossed the screen and be gone.
But What Does It All Matter?
- If you have plenty of money, the best consequence (so they say) is that you no longer need to think about money. In the future
we will have plenty of technology - and the best consequence will be that we will no longer have to think about technology.
We will return with gratitude and relief to the topics that actually count.
Rebuttal
from John McCarthy 18 June 2000
Comments on the Gelernter Manifesto
- I found a lot wrong with the manifesto, so I'll begin with something I found usable in it. Gelernter grumbles in item 31 that
since email messages aren't files they don't have names and can't stand on their own. I also find it a problem, and it occurred to
me how to mitigate the problem in my own mail reader which is within my word processor.
Suppose I'm reading a message that I consider significant. Typing a single command inserts a reference to the appropriate page in
the message file at the end of a special file of messages, puts in the time, and puts me where I can add an identifying
comment. The entry for the email with the manifesto is "Sat Jun 17 12:48:28 2000 /u/jmc/RMAIL.S00==1906 Gelernter Manifesto",
giving the time, the location of the message in the mail file and the name I gave the message.
If I later click on that line, I'll be reading the message again.
The purpose of messages having names of some sort is so that the receiver can retrieve a message later. I doubt that such a name
can be automatically generated from the message itself, because the subject line, et cetera are in the mental space of the sender, not
the receiver. The receiver has to somehow give the message a name if he wants to be able to subsequently retrieve it in one
step. In this case, I chose "Gelernter Manifesto".
It took 12 minutes to write and debug the message naming facility in the Xemacs editor. The MS-Word users I consulted told me
that it would be very difficult to script MS-word and Windows email systems to do it.
- We all find ourselves repeating essentially the same tasks in using computers. Here's a slogan:
Anything a user can do himself, he should be able to make the computer do for him.
Fully realising this slogan would be a big step, but even a little helps. It's called letting the user "customise" his
environment. Point i above is a small example.
Unfortunately, the making of computer systems and software is dominated by the ideology of the omnipotent programmer (or web site
designer) who knows how the user (regarded as a child) should think and reduces the user's control to pointing and clicking. This
ideology has left even the most sophisticated users in a helpless position compared to where they were 40 years ago in the late 1950s.
Scripting languages were a start in the direction of giving the user more power, but the present ones aren't much good, and not even
programmers use them much to make their own lives simpler. Scripting is particularly awkward for point and click use. Xemacs
customisation is reasonably convenient, but it isn't contiguous with Xemacs Lisp, a really good programming language.
Linux is a step in the right direction of giving the user control in that the source of the operating system is available to users, but
I doubt that many users change Linux for purely personal convenience.
Back to Gelernter
- Most of the Manifesto's metaphors, for example "beer from burst barrels" and "scooped-out hole in the beach", aren't informative.
- In item 4, Gelernter offers
The Orwell law of the future: any new technology that CAN be tried WILL be.
Like Adam Smith's invisible hand (leading capitalist economies toward ever increasing wealth), Orwell's Law is an empirical fact of
life.
It isn't true, and I don't believe Orwell said it. In the preface to 1984, Orwell wrote that 1984 is a cautionary tale that he
didn't expect to happen. In particular, 1984 has the tv that permitted Big Brother's minions to spy on the viewer. I don't
think Orwell expect that to be tried, and it hasn't been.
Indeed the reverse is true. Most possible new technologies are never tried.
- Gelernter, like many other commentators, is glib about the system software and its documentation being bad. Don Norman beat that
drum, and Apple hired him to make things better. He and they didn't have much success. A more careful analysis of what
causes difficulty and how to fix it is needed.
- The problem with file systems and any other tree structures is that tree structures aren't memorable. Someone else's tree
structure, for example a telephone keypad tree, is often helpful the first time you use it but it is a pain to go through the tree again
and again to reach a particular leaf.
- I couldn't figure out what Cybersphere was supposed to mean except that it's grand. Computers haven't changed people's lives to
the extent that telephones, radio, automobiles and air travel did early in the previous century. Paul Krugman is eloquent on this
point in the New York Times for 2000 June 18. Human level artificial intelligence would revolutionise human life, but fewer
people in AI are working in that direction than in the 1970s. Erik Mueller documents one aspect of this neglect in his 1999
article
www.media.mit.edu/~mueller/papers/storyund.html
- I think the idea of doing an Amazon search for a book on your own computer is a bad one, because the computations are trivial, whereas
the file accesses to the Amazon database are substantial. To do it on your own computer would require downloading the whole Amazon
catalog before you started your search.
- Re item 21 thru 26, I don't think changing "desktop" to "information landscape" would have made much difference. The problem of
what you can do with a small screen will remain as long as we have small screens. A 2' x 3' flat screen with 200 bpi resolution
will change computer use much more than another factor of 100 in processor speed. We also need the bathtub screen, the beach
screen and the bed screen.
- item 32. Directories reaching out for files is vague and suggests more AI than is currently available.
- There's something in "streams of time", but it's vague. One thing that is feasible is for an operating system to make a journal
including all the user's key strokes and mouse clicks and identifiable more substantial operations. The journal should be
available for the user to inspect, replay bits of, and to offer for expert inspection when something has gone wrong.
- I don't understand to the objection to names; they were invented long before computers. In item 37, Natasha and Fifth Avenue are
names.
- item 41. "To send email, you put a document on someone else's stream." That suggests that the recipient would read it
right away or at least at a time determined by the sender. Present email sits till you get around to it, and that's better.
- Paper will be needed until screens are better. I use paper just as Gelernter suggests. Print the document for reading and
then throw it away. I'll do that even at the cost of losing the pretty red ink I've put on my printout of the Manifesto.
John McCarthy is Professor of Computer Science at Stanford University. A pioneer in artificial intelligence, McCarthy invented
LISP, the preeminent AI programming language, and first proposed general-purpose time sharing of computers.
Source: Arts and Letters Daily; their website is aldaily.com
For IT-related articles on snooping, usage, the future, e-diaries, piracy, flickers, cyborgs, browsing, trends, jokes, philosophic
agents, artificial consciousness and more, press the "Up" button below to take you to the Table of Contents for this Information and
Technology section.
|