Skip to main content

Home/ TOK Friends/ Group items tagged square

Rss Feed Group items tagged

Javier E

Technopoly-Chs. 4.5--The Broken Defenses - 0 views

  • r ~~~-~st of us. There is almo-~t-n~ ~ wheth;~~ct~~l or imag'l ined, that will surprise us for very long, since we have no comprehensive and consistent picture of the world that would [ make the fact appear as an unacceptable contradiction.
  • The belief system of a tool-using culture is rather like a brand-new deck of cards. Whether it is a culture of technological simplicity or sophistication, there always exists a more or less comprehensive, ordered world-view, resting on a set of metaphysical or theological assumptions. Ordinary men and women might not clearly grasp how the harsh realities of their lives fit into the grand and benevolent design of the universe, but they have no doubt that there is such a design, and their priests and shamans are well able, by deduction from a handful of principles, to make it, if not wholly rational, at least coherent.
  • From the early seventeenth century, when Western culture u~ertook to reorganize itself to accommodate the printing press, until the mid-nineteenth century, no significant technologies were introduced that altered l-he form, volume, or speed of . in~. As a consequence, Western culture had more than two hundred years to accustom itself to the new information conditions created by the press.
  • ...86 more annotations...
  • That is eseecial1y the case with technical facts.
  • as incomprehensible problems mount, as the con- ~ cept of progress fades, as meaning itself becomes suspect, the T echnopolist stands firm in believing that what the world needs is yet more information. It is like the joke about the man who , complains that the food he is being served in a restaurant is \ inedibleand also that the_ portions are too small
  • The faith of those who believed in Progress was based on the assumption that one could discern a purpose to the human enterprise, even without the theological scaffolding that supported the Christian edifice of belief. Science and technology were the chief instruments of Progress, and · i.Lac_cumulation of reliable in orma on a out nature _1b_n, would bring ignorance, superstition, and suffering to an end.
  • In T ~chnopoly, we are driven to fill our lives with the quesUo "accesTinformation.
  • But the genie that came out of the bottle proclaiming that information was the new god of culture was a deceiver. It solved the problez:n of information scarcity, the disadvantages o_f wh~s~ious. But it gave no wami g_ahout the dan_gers of information7rttn,
  • !:ion of what is called a_ curriculum was a logical step toward 1./ organizing, limiting, and discriminating among available sources of information. Schools became technocracy's first secular bureaucracies, structures for legitimizing some parts of the flow of infgrmatiQD and di"s.ci.e.diling other earts. School;;ere, in short, a ~eans of governing the ecology of information.
  • James Beniger's The <;antral Revolution, which is among the three or four most important books we have on the lb\b'ect of the relation of informe;ition to culture. In the next chapter, I have relied to a considerable degree on The Control Revolution in my discussion of the breakdown of the control mechanisms,
  • most of the methods by which technocracies. have hoped to keep information from running amok are now dysfunctional. Indeed, one_ ~_i!)!_.Q.L.de£ining_a.I..em Q~ oly is to say that its inf_o_fmation immu is inoperable.
  • Very early ~n, tt..w.as..understood that the printed book had er ate.cl-a ir::ifo · · on crisis and that . =somet ing needed to be done to aintain a measure of control.
  • it is why in _a TechnoE,.oly there can be no transcendent sense of purpose or meaning, no cultural coherence.
  • In - 1480, before the informati9n explosion, there were thirty-four schools in all of England. By 1660, there were 444, one school for every twelve square miles.
  • There were several reasons for the rapid growth of the common school, but none was more obvious than that it was a necessary response to the anxiefies and confusion aroused by information on the loose. The inven-
  • The milieu in which T echnopoly flourishes is one in which the tie between information and human purpose has been severed, i.e., inf~rmation appears indiscriminately, directed at no one in particular, in enormous volume and at high speeds; and disconnected from theory, meaning, or purpose.
  • Abetted ~~orm of ed~~on that in itself has been em _lie~any co~e~ent world-view, Technopoly deprives us of the social, p·olitical, historical, mefaphys1cal, logical, or spiritual bases for knowing what is beyond belief.
  • It developed new institutions, such as the school and representative government. It developed new conceptions of knowledge and intelligence, and a height-
  • ened respect for reason and privacy. It developed new forms of economic activity, such as mechanized production and corporate capitalism, and even gave articulate expression to the possibilities of a humane socialism.
  • There is not a single line written by Jefferson, Adams, Paine, Hamilton, or Franklin that does not take for granted that when information is made available to citizens they are capable of managing it. This is not to say that the Founding Fathers believed information could not be false, misleading, or irrelevant. But they believed that the marketplace of infonpation and ideas was sufficiently ordered so that citizens could make sense of what they read and heard and, through reason, judge ·its μsefulness to their lives. Jefferson's proposals for education, Paine'~ arguments for self-governance, Franklin's arrangements for community affairs assume coherent, commonly shared principles.that allow us to debate such questions as: What are the responsibilities of citizens? What is the nature of education? What constitutes human progress? What are the limitations of social structures?
  • New forms of public discourse came into being through newspapers, pamphlets, broadsides, and books.
  • It is no wonder that the eighteenth century gave us our standard of excellence in the use of reason, as exemplified in the work of Goethe, Voltaire, Diderot, Kant, Hume, Adam Smith, Edmund Burke, Vico, Edward Gibbon, and, of course, Jefferson, Madison, Franklin, Adams, Hamilton, and Thomas Paine.
  • I weight the list with America's "Founding Fathers" because technocratic-typographic America was the first nation ever to be argued into existence irLpr111t. Paine's Common Sense and The Rights of Man, Jefferson's Declaration of Independence, and the Federalist Papers were written and printed efforts to make the American experiment appear reasonable to the people, which to the eighteenth-century mind was both necessary and sufficient. To any people whose politics were the politics of the printed page, as Tocqueville said of America, reason and printr ing were inseparable.
  • The presumed close connection among information, reason, and usefulness began to lose its_ legitimacy toward the midnineteenth century with the invention of the telegraph. Prior to the telegraph, information could be moved only as fa~. as a train could travel: al5out thirty-five miles per hour. Prior to the telegraph, information was sought as part of the process of understanding and solvin articular roblems. Prior to the telegraph, informal-ion tended to be of local interest.
  • First Amendment to the United States Constitution stands as a monument to the ideolo_g~~ print. It says: "Congress shall make no law respecting the establishment of religion, or prohibiting the free exercise thereof; or abridging freedom of speech or of the press; or of the right of the people peaceably to assemble, and to petition the government for a redress of grievances." In these forty-five words we may find the fundamental values of the literate, reasoning_giind as fostered by the print revolution: a belief in privacy, individuality, intellectual freedom, open criticism, and ~.' adio .
  • telegraphy created the idea of context-free . 1 informatig_n::= that fs'~the idea that the value of information need ;;~t be ti~ to any function it might serve in social and political
  • decision-making and action. The telegraph made information into a commodity, a "thing" that could be bought and sold irrespective of its uses or meaning. 2
  • a new definition qf information came into being. Here was information that rejected the necessit ·of interco~nectedness, proceeded without conte~rgued for instancy against historic continuity, and offere · ascination· in place of corn !exit and cohe ence.
  • The potential of the telegraph to transform information into a commodity might never have been realized except for its artnershi with the enny ress, which was the first institution to grasp the significance of the annihilation of space and the saleability of irrelevant information.
  • the fourth stage of the information revolution occurred, broadcasting. And then the fifth, computer technology. Each of these brought with it new forms of information, unpre~edented amounts of it, and increased speeds
  • photography was invented at approximately the same time a~phy, and initiated the Ehi:rd stage of the information revolution. Daniel Boorstin has called it "the graphic revolution," bec~use the photograph and other ico~ogr~phs br~ on a massive intrusion of ima es into the symbolic environment:
  • The new imagery, with photography at its forefront, did not merely function as a supplement to language but tended to replace it as our dominant: means for construing, understanding~d testing reaj.ity.
  • ~ the beginning of the seventeenth century, an entirely new information environment had been created by_12rint
  • It is an improbable world. It is a world in which the idea of human progress, as Bacon ex~sed it, has been g~ by the idea of technological progress.
  • The aim is no_t to reduZe ignorance, r . supersti ion, and s ering but to accommodate ourselves to the requirements of new technologies.
  • echnopoly is a state of cttlture., It is also a st~te of mind. It consists in the deification of technology, which means that the culture seeks its authorization in te0,~logy, finds · .atisf~tions in technolo , and takes its orders from technolog-¥,
  • We proceed under ( the. assumption that information is our friend, believing that cultures may suffer grievously from a lack of information, which, of course, they do. It is only now beginning to be understood that cultures may also suffer grievously from infori mation glut, information without meaning, information without · .... control mechanisms.
  • Those who feel most comfortable in Technop.oJy are those who are convinced that technical progress is humanity's supreme achievement and the instrument by which our most profound dilemmas may be solved. They also believe that information is an unmixed blessing, which through its continued and uncontrolled production and dissemination offers increased freedom, creativity, and peace of mind.
  • Th_e relationship between information and the mechanisms ( for its control is fairly simple ~ec · ·ology increases the available supply of information. As the supply is increased, \ control mechanisms are strained. Additional control mech\ anisms ~re needed to cope with new information. When addi1 tional control mechanisms are themselves technical, they in tum I further increase the supply of information. When the supply of information is no longer controllable, a general breakdown in psychic tranquillity and social purpose occurs. Without defenses, people have no way of finding meaning in their experiences, lose their capacity to remember, and have difficulty imagining reasonable futures.
  • any decline in the force of i~~~ti'?n_s makes people vulnerable to information chaos. 1 To say that life is destabilized by weakened institutions is merely to say that information loses its use and therefore becomes a source of confu;~n rather than coherence.
  • T echnop_oly, then, is to say it is what h~pens to society when the defe~ainst informati;~ glut have broken down.
  • Soci~finstitufions sometimes do their work simply by denying people access to information, but principally by directing how much weight and, therefore, value one must give to information. Social institutions are concerned with the meaning of information and can be quite rigorous in enforcing standards of admission.
  • H is what happens when a culture, overcome by information generated by technology, tries to employ technology itself as a means of providing clear direction and humane purpose. The effort is mostly doomed to failure
  • although legal theory has been taxed to the limit by new information from diverse sources-biology, psychology, and sociology, among themthe rules governing relevance have remained fairly stable. This may account for Americans' overuse of the co~~-~~ as a mean; of finding cohe_!Til.<iAncl__s.tability. As other institutions become I unusabl~ mechanisms for the control of wanton information, the courts stand as a final arbiter of truth.
  • the school as a mechanism for information control. What its standards are can usually be found in, a curriculum or, with even more clarity, in a course catalogue. A college catalogue lists courses, subjects, and fields of study that, taken together, amount to a certified statement of what a serious student ought to think about.
  • The Republican Party represented the interests of the rich, who, by definition, had no concern for us.
  • More to the point, in what is omitted from a catalogue, we may learn what a serious student ought not to think about. A college catalogue, in other words, is a formal description of an information management program; it defines and categorizes knowledge, and in so doing systematically excludes, demeans, labels as trivial-i~ a word, disregards certain kinds of information.
  • In the West, the family as an institution for the management of nonbiological information began with the ascendance of print. As books on every conceivable subject become available, parent_~ were forced int°._the roles of guard-· ians'... protectors, nurturers, and arbiters of taste and rectitude. \ Their function was to define what it means to be a child by \ excluding from the family's domain information that would 1. undermine its purpose.
  • all_ theories are oversimplifications, or at least lead to oversimplification. The rule of law is an oversimplification. A curriculum is an oversimplification. So is a family's conception of a child. T~~t is the funt!ion _o._Ltheories-_ to o~~~~ip:lp}}_fy, and thus to assist believers in_ organiziDg, weighting, _ _an~_ excluding information. Therein lies the power of theories.
  • That the family can no longer do this is, I believe, obvious to everyone.
  • Th~-ir weakness is that precisely because they oversimplify, they are vulnerable to attack by new information. When there is too much information to _$_ustaJ12 -~,:Z}I theory, infoLm_a_ti.on._Q.~S<?~es essentially mea11iD_g!~s
  • The political party is another.
  • As a young man growing up in a Democratic-household, I was provided with clear instructions on what value to assign to political events and commentary.
  • The most imposing institutions for the control of information are religio!1 ~nd the st~J:f, .. They do their work in a somewhat more abstract way than do courts, schools, families, or political parties. The_y m?n~g~__Ji;1formation throug~ creation of mytJ:is and stories that express theories about funq1m1entaf question_s_:_ __ 10:_hy are we here, where have we come from, and where are we headed?
  • They followed logically from theory, which was, as I remember it, as follows: Because people need protection, they must align themselves with a political organization. The Democratic Party was entitled to our loyalty because it represented the social and economic interests of the working class, of which our family, relatives, and neighbors were members
  • the Bible also served as an information control mechanism, especially in the moral domain. The Bible gives manifold
  • any educational institution, if it is to function well in the mana~~nt of information, must have a theory about its purpose and meaning-'. .!n'!::!Sl. have the means to give clear expression to its_ theory, and must do so, to a large extent, by excluding information.
  • instructions on what one must do and must not do, as well as guidance on what language to avoid (on pain of committing blasphemy), what ideas to avoid (on pain of committing heresy), what symbols to avoid (on pain of committing idolatry). Necessarily but perhaps._ unfortunately, the Bible also explained how the world came into being in such literal detail that it could not accommodate new information produced by the telescope and subsequent technologies.
  • in observing God's laws, and the detailed requirements of their enactment, believers receive guidance about what books they should not read, about what plays and films they should not see, about what music they should not hear, about what subjects their children should not study, and so on. For strict fundamentalists of the Bible, the theory and what follows from it seal them off from unwanted information, and in that way their actions are invested with meaning, clarity, and, they believe, moral authority.
  • Those who reject the Bible's theory and who believe, let us say, in the theory of Science are also protected from unwanted information. Their theory, for example, instructs them to disregard information about astrology, dianetics, and creationism, which they usually label as medieval superstition or subjective opinion.
  • Their theory fails to give any guidance about moral information and, by definition, gives little weight to information that falls outside the constraints of science. Undeniably, fewer and fewer people are bound in any serious way to Biblical or other religious traditions as a source of compelling attention and authority, the result of which is that they make no f!lOral decisions, onl~_pradical ones. _This is still another way of defining Technopoly. The term is aptly used for a _culture whose av.~ilable theories do not offer guidance about what is acceptable informaHon in the moral domain.
  • thought-world that functions not only without a transcendent; narrative to provide moral underpinnings but also without strong social institutions to control the flood of information produced by technology.
  • In the r case of the United States, the great eighteenth-century revolution was not indifferent to commodity capitalism but was nonetheless infused with profound moral content. The U~!ed States was not merely an experiment in a new form of governance; it wai1nefu1fillmenl-oFGocf s plan. True, Adams, Jeffe;son, and Painere1ected-fne supernatural elements in the Bible,· but they never doubted that their experiment had the imprimatur of \ Providence. People were to be free but for a eurp_9se. Their [ God~giv_e~ig[ifs im li~_? obli ations and responsibilities, not L onfytoGod but to other nations, to which the new republic would be a guide and a showcase of what is possible-w~en reason and spirituality commingle.
  • American Technopoly must rel,y, to an obsessive extent, on technica( ~ethods to control the flow of information. Three such means merit speci attention.
  • The first is bureaucracy, which James Beniger in The Control © Revolution ra°i1l~as atoremost among all technological solutions to the crisis of control."
  • It is an open question whether or not "liberal democracy" in its present form can provide a thought-world of sufficient moral substance to sustain meaningful lives.
  • Vaclav Havel, then newly elected as president of Czechoslovakia, posed in an address to the U.S. Congress. "We still don't know how to put morality ahead of politics, science, and economics," he said. "We are still incapable of understanding that the only genuine backbone of our actions-if they are to be moral-is responsibility. Responsibility to something higher than my family, my country, my firm, my success." What Havel is saying is that it is not enough for his nation to liberate itself from one flawed theory; it is necessary to find another, and he worries that Technopoly provides no answer.
  • Francis Fukuyama is wrong. There is another ideological conflict to be fought-between "liberal democracy" as conceived in the eighteenth century, with all its transcendent moral underpinnings, and T echnopoly, a twentieth-century
  • in at- ~ tempting to make the most rational use of information, bureaucracy ignores all information and ideas that do not contribute to efficiency
  • bureaucracy has no intellectual, I political, or moral theory--,--except for its implicit assumption that efficiency is the principal aim of all social institutions and that other goals are essentially less worthy, if not irrelevant. That is why John Stuart Mill thought bureaucracy a "tyranny" and C. S. Lewis identified it with Hell.
  • in principle a bureaucracy is simply a coordinated series of techniques for reducing the amount of information that requires processing.
  • The transformation of bureaucracy from a set of techniques·> designecfto serve social ~tutions to an auton-;;mous metainstitution that largely serves itself came as a result of several developments in the mid-andlate-nineteenth century: rapid ../ industrial growth, improvements in transportation and commu- ·✓ nication, the extension of government into ever-larger realms of V public and business affairs, the increasing centralization of gov- v ernmental structures.
  • extent that the decision will affect the efficient operations of the J bureaucracy, and takes no responsibility for its human consequences.
  • Along the way, it ceased to be merely a servant of social institutions an
  • became ~ their master. Bureaucracy now not only solves problems but creates them. More important, it defines what our problems are---and they arec!.lways, in the bureaucra!!c view, problems of l . , efficiency.
  • ex~r- (J} tis~ is a second important technical means by which Technopoly s~s furiously to control information.
  • the expert in Techno oly has two characteristics that distinguish im or her from experts of the {i) past. First, Technopoly's experts tend to be ignorant about any matter not directly related to their specialized area.
  • T echnopoly' s experts claim dominion not only_gyer technical matters but also over so@,--12~ichological. and moral · aff~irs.
  • "bureaucrat" has come to mean a person who \ by training, commitment, and even temperament is indifferent ~ ). to both the content and the fatality of a human problem. Th~ \ 'bureaucrat considers the implications of a decision only to the
  • Technical machinery is essential to both the bureaucrat and c:/ the expert, and m~ be regarded as a third mechanism of information control.
  • I have in mind "softer" technologies such as IQ tests, SATs, standardized forms, taxonomies, and opinion polls. Some of these I discuss in detail in chapter eight, "Invisible T echnologies," but I mention them here because their role in reducing the types and quantity of information admitted to a system often goes unnoticed, and therefore their role in redefining traditional concepl::s also· goes unnoticed. There is, for example, no test that can measure a person's intelligenc
  • Th_~-role of t!;_e ~xpert is to concentrate o_l}_one_ .H~ld of knowledge, sift through all that is available, eliminate that -.--:-: __ __:~---------which has no bearing on a problem, and use what is left !Q. !!§Sist in solving a probl~.
  • the expert relies on our believing in the reality of technical machinery, which means we will reify the answers generated by the machinery. We come to believe that our score is our intelligence,· or our capacity for creativity or love or pain. We come to believe that the results of opinion polls are what people believe, as if our beliefs can be encapsulated in such sentences as "I approve" and "I disapprove."
  • it is disas~ \ trou~p!ie~e_~ved by technical means and where efficiency is usually irrelevant, such as in education, law, fa~iiy life, and p·r;blems of p~;;~~al maladjustment.
  • perceptions and judgment declines, bureaucracies, expertise, and technical machinery become the principal means by which, T echnopoly hopes to control information and thereby provide itself with intelligibility and order. The rest of this book tells the · story of why this cannot work, and of the pain and stupidity that are the consequences.
  • Institutions ca~~aked~cisions on the basis of scores and. sfatistics, and. there certainly may be occasions where there is no reasonable alternative. But unless such decisions are made with profound skepticism-that is, acknowledged as being made for administrative convenience-they are delusionary.
  • In Technopoly, the \. delusion is sanctified by our granting inordinate prestige to experts who are armed with sophisticated technical machinery. Shaw once remarked that all professions are conspiracies against the laity. I would go further: in Technopoly, all exeeds are invested with the charisma of priestliness
  • The god they serve does not speak \ of righteousness or goodness or mercy or grace. Their god speaks of efficiency, precision, objectivity. And that is why such concepts as sin and evil disappear in Technopoly. They come from a moral universe that is irrelevant to the theology of expertise. And so the priests of Technopoly call sin "social deviance," which is a statistical concept, and they call evil "psychopathology," which is a medical concept. Sin and evil disappear because they cannot be measured and objectified, and therefore cannot be dealt with by experts.
  • As the power of traditional social institutions to organize
peterconnelly

How an Organized Republican Effort Punishes Companies for Climate Action - The New York... - 0 views

  • In Texas, a new law bars the state’s retirement and investment funds from doing business with companies that the state comptroller says are boycotting fossil fuels.
  • Conservative lawmakers in 15 other states are promoting similar legislation.
  • Across the country, Republican lawmakers and their allies have launched a campaign to try to rein in what they see as activist companies trying to reduce the greenhouse gases that are dangerously heating the planet.
  • ...16 more annotations...
  • In doing so, Mr. Moore and others have pushed climate change from the scientific realm into the political battles already raging over topics like voting rights, abortion and L.G.B.T.Q. issues.
  • “There is a coordinated effort to chill corporate engagement on these issues,” said Daniella Ballou-Aares
  • They have worked alongside a nonprofit organization that has run television ads, dispatched roaming billboard trucks and rented out a Times Square billboard criticizing BlackRock for championing what they call woke causes, including environmentalism.
  • That activism has often put companies at odds with the Republican Party, traditionally the ally of big business.
  • as pressure has grown from consumers and liberal groups to take action, corporations have warmed to the notion of using capital and markets to create a cleaner economy
  • When President Trump declared in 2017 that he would pull the United States from the Paris climate accord, more than 2,000 businesses and investors — including Apple, Amazon and Mars — signed a pledge to continue to work toward climate goals.
  • Mr. Fink of BlackRock has emerged as a main target of conservatives.
  • And in January, Mr. Moore pulled about $20 million out of a fund managed by BlackRock because the firm has encouraged other companies to reduce emissions. BlackRock still manages several billion for West Virginia’s state retirement system. “We’re divesting from BlackRock because they’re divesting from us,” Mr. Moore said in an interview.
  • “These big banks are virtue signaling because they are woke,”
  • “Every company and every industry will be transformed by the transition to a net-zero world,” Mr. Fink wrote. “The question is, will you lead, or will you be led?”
  • “We are perhaps the world’s largest investor in fossil fuel companies, and, as a long-term investor in these companies, we want to see these companies succeed and prosper,” BlackRock’s head of external affairs, Dalia Blass, wrote in a letter to Texas regulators in January.
  • “BlackRock is trying to have it all ways, acting like it is trying to please everyone.”
  • “ESG is a scam,” he said on Twitter on this month. “It has been weaponized by phony social justice warriors.” Shortly after that he shared a meme that declared an ESG score “determines how compliant your business is with the leftist agenda.”
  • “Climate change is not a financial risk that we need to worry about,” adding, “Who cares if Miami is six meters underwater in 100 years?”
  • That view is at odds with the findings of the world’s leading climate scientists. A major United Nations report warned last month that the world could reach a threshold by the end of this decade beyond which the dangers of global warming — including worsening floods, droughts and wildfires — will grow considerably. In 2021, there were 20 weather or climate-related disasters in the United States that each cost more than $1 billion in losses, according to the federal government.
  • “Our ambition is to be the leading bank supporting the global economy in the transition to net zero,” he said.
Javier E

Opinion | Have Some Sympathy - The New York Times - 0 views

  • Schools and parenting guides instruct children in how to cultivate empathy, as do workplace culture and wellness programs. You could fill entire bookshelves with guides to finding, embracing and sharing empathy. Few books or lesson plans extol sympathy’s virtues.
  • “Sympathy focuses on offering support from a distance,” a therapist explains on LinkedIn, whereas empathy “goes beyond sympathy by actively immersing oneself in another person’s emotions and attempting to comprehend their point of view.”
  • In use since the 16th century, when the Greek “syn-” (“with”) combined with pathos (experience, misfortune, emotion, condition) to mean “having common feelings,” sympathy preceded empathy by a good four centuries
  • ...8 more annotations...
  • Empathy (the “em” means “into”) barged in from the German in the 20th century and gained popularity through its usage in fields like philosophy, aesthetics and psychology. According to my benighted 1989 edition of Webster’s Unabridged, empathy was the more self-centered emotion, “the intellectual identification with or vicarious experiencing of the feelings, thoughts or attitudes of another.”
  • in more updated lexicons, it’s as if the two words had reversed. Sympathy now implies a hierarchy whereas empathy is the more egalitarian sentiment.
  • Sympathy, the session’s leader explained to school staff members, was seeing someone in a hole and saying, “Too bad you’re in a hole,” whereas empathy meant getting in the hole, too.
  • “Empathy is a choice and it’s a vulnerable choice because in order to connect with you, I have to connect with something in myself that knows that feeling,”
  • Still, it’s hard to square the new emphasis on empathy — you must feel what others feel — with another element of the current discourse. According to what’s known as “standpoint theory,” your view necessarily depends on your own experience: You can’t possibly know what others feel.
  • In short, no matter how much an empath you may be, unless you have actually been in someone’s place, with all its experiences and limitations, you cannot understand where that person is coming from. The object of your empathy may find it presumptuous of you to think that you “get it.”
  • Bloom asks us to imagine what empathy demands should a friend’s child drown. “A highly empathetic response would be to feel what your friend feels, to experience, as much as you can, the terrible sorrow and pain,” he writes. “In contrast, compassion involves concern and love for your friend, and the desire and motivation to help, but it need not involve mirroring your friend’s anguish.”
  • Bloom argues for a more rational, modulated, compassionate response. Something that sounds a little more like our old friend sympathy.
Javier E

What Did Twitter Turn Us Into? - The Atlantic - 0 views

  • The bedlam of Twitter, fused with the brevity of its form, offers an interpretation of the virtual town square as a bustling, modernist city.
  • It’s easy to get stuck in a feedback loop: That which appears on Twitter is current (if not always true), and what’s current is meaningful, and what’s meaningful demands contending with. And so, matters that matter little or not at all gain traction by virtue of the fact that they found enough initial friction to start moving.
  • The platform is optimized to make the nonevent of its own exaggerated demise seem significant.
  • ...9 more annotations...
  • the very existence of tweets about an event can make that event seem newsworthy—by virtue of having garnered tweets. This supposed newsworthiness can then result in literal news stories, written by journalists and based on inspiration or sourcing from tweets themselves, or it can entail the further spread of a tweet’s message by on-platform engagement, such as likes and quote tweets. Either way, the nature of Twitter is to assert the importance of tweets.
  • Tweets appear more meaningful when amplified, and when amplified they inspire more tweets in the same vein. A thing becomes “tweetworthy” when it spreads but then also justifies its value both on and beyond Twitter by virtue of having spread. This is the “famous for being famous” effect
  • This propensity is not unique to Twitter—all social media possesses it. But the frequency and quantity of posts on Twitter, along with their brevity, their focus on text, and their tendency to be vectors of news, official or not, make Twitter a particularly effective amplification house of mirrors
  • At least in theory. In practice, Twitter is more like an asylum, inmates screaming at everyone and no one in particular, histrionics displacing reason, posters posting at all costs because posting is all that is possible
  • Twitter shapes an epistemology for users under its thrall. What can be known, and how, becomes infected by what has, or can, be tweeted.
  • Producers of supposedly actual news see the world through tweet-colored glasses, by transforming tweets’ hypothetical status as news into published news—which produces more tweeting in turn.
  • For them, and others on this website, it has become an awful habit. Habits feel normal and even justified because they are familiar, not because they are righteous.
  • Twitter convinced us that it mattered, that it was the world’s news service, or a vector for hashtag activism, or a host for communities without voices, or a mouthpiece for the little gal or guy. It is those things, sometimes, for some of its users. But first, and mostly, it is a habit.
  • We never really tweeted to say something. We tweeted because Twitter offered a format for having something to say, over and over again. Just as the purpose of terrorism is terror, so the purpose of Twitter is tweeting.
Javier E

Opinion | A Nobel Prize for the Economics of Panic - The New York Times - 0 views

  • Obviously, Bernanke, Diamond and Dybvig weren’t the first economists to notice that bank runs happen
  • Diamond and Dybvig provided the first really clear analysis of why they happen — and why, destructive as they are, they can represent rational behavior on the part of bank depositors. Their analysis was also full of implications for financial policy.
  • Bernanke provided evidence on why bank runs matter and, although he avoided saying so directly, why Milton Friedman was wrong about the causes of the Great Depression.
  • ...20 more annotations...
  • Diamond and Dybvig offered a stylized but insightful model of what banks do. They argued that there is always a tension between individuals’ desire for liquidity — ready access to funds — and the economy’s need to make long-term investments that can’t easily be converted into cash.
  • Banks square that circle by taking money from depositors who can withdraw their funds at will — making those deposits highly liquid — and investing most of that money in illiquid assets, such as business loans.
  • So banking is a productive activity that makes the economy richer by reconciling otherwise incompatible desires for liquidity and productive investment. And it normally works because only a fraction of a bank’s depositors want to withdraw their funds at any given time.
  • This does, however, make banks vulnerable to runs. Suppose that for some reason many depositors come to believe that many other depositors are about to cash out, and try to beat the pack by withdrawing their own funds. To meet these demands for liquidity, a bank will have to sell off its illiquid assets at fire sale prices, and doing so can drive an institution that should be solvent into bankruptcy
  • If that happens, people who didn’t withdraw their funds will be left with nothing. So during a panic, the rational thing to do is to panic along with everyone else.
  • There was, of course, a huge wave of banking panics in 1930-31. Many banks failed, and those that survived made far fewer business loans than before, holding cash instead, while many families shunned banks altogether, putting their cash in safes or under their mattresses. The result was a diversion of wealth into unproductive uses. In his 1983 paper, Bernanke offered evidence that this diversion played a large role in driving the economy into a depression and held back the subsequent recovery.
  • In the story told by Friedman and Anna Schwartz, the banking crisis of the early 1930s was damaging because it led to a fall in the money supply — currency plus bank deposits. Bernanke asserted that this was at most only part of the stor
  • a government backstop — either deposit insurance, the willingness of the central bank to lend money to troubled banks or both — can short-circuit potential crises.
  • Such arrangements offered a higher yield than conventional deposits. But they had no safety net, which opened the door to an old-style bank run and financial panic.
  • So banks need to be regulated as well as backstopped. As I said, the Diamond-Dybvig analysis had remarkably large implications for policy.
  • From an economic point of view, banking is any form of financial intermediation that offers people seemingly liquid assets while using their wealth to make illiquid investments.
  • This insight was dramatically validated in the 2008 financial crisis.
  • By the eve of the crisis, however, the financial system relied heavily on “shadow banking” — banklike activities that didn’t involve standard bank deposits
  • But providing such a backstop raises the possibility of abuse; banks may take on undue risks because they know they’ll be bailed out if things go wrong.
  • And the panic came. The conventionally measured money supply didn’t plunge in 2008 the way it did in the 1930s — but repo and other money-like liabilities of financial intermediaries did:
  • Fortunately, by then Bernanke was chair of the Federal Reserve. He understood what was going on, and the Fed stepped in on an immense scale to prop up the financial system.
  • a sort of meta point about the Diamond-Dybvig work: Once you’ve understood and acknowledged the possibility of self-fulfilling banking crises, you become aware that similar things can happen elsewhere.
  • Perhaps the most notable case in relatively recent times was the euro crisis of 2010-12. Market confidence in the economies of southern Europe collapsed, leading to huge spreads between the interest rates on, for example, Portuguese bonds and those on German bonds. The conventional wisdom at the time — especially in Germany — was that countries were being justifiably punished for taking on excessive debt
  • the Belgian economist Paul De Grauwe argued that what was actually happening was a self-fulfilling panic — basically a run on the bonds of countries that couldn’t provide a backstop because they no longer had their own currencies.
  • Sure enough, when Mario Draghi, the president of the European Central Bank at the time, finally did provide a backstop in 2012 — he said the magic words “whatever it takes,” implying that the bank would lend money to the troubled governments if necessary — the spreads collapsed and the crisis came to an end:
Javier E

Whistleblower: Twitter misled investors, FTC and underplayed spam issues - Washington Post - 0 views

  • Twitter executives deceived federal regulators and the company’s own board of directors about “extreme, egregious deficiencies” in its defenses against hackers, as well as its meager efforts to fight spam, according to an explosive whistleblower complaint from its former security chief.
  • The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
  • Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
  • ...56 more annotations...
  • The complaint — filed last month with the Securities and Exchange Commission and the Department of Justice, as well as the FTC — says thousands of employees still had wide-ranging and poorly tracked internal access to core company software, a situation that for years had led to embarrassing hacks, including the commandeering of accounts held by such high-profile users as Elon Musk and former presidents Barack Obama and Donald Trump.
  • the whistleblower document alleges the company prioritized user growth over reducing spam, though unwanted content made the user experience worse. Executives stood to win individual bonuses of as much as $10 million tied to increases in daily users, the complaint asserts, and nothing explicitly for cutting spam.
  • Chief executive Parag Agrawal was “lying” when he tweeted in May that the company was “strongly incentivized to detect and remove as much spam as we possibly can,” the complaint alleges.
  • Zatko described his decision to go public as an extension of his previous work exposing flaws in specific pieces of software and broader systemic failings in cybersecurity. He was hired at Twitter by former CEO Jack Dorsey in late 2020 after a major hack of the company’s systems.
  • “I felt ethically bound. This is not a light step to take,” said Zatko, who was fired by Agrawal in January. He declined to discuss what happened at Twitter, except to stand by the formal complaint. Under SEC whistleblower rules, he is entitled to legal protection against retaliation, as well as potential monetary rewards.
  • “Security and privacy have long been top companywide priorities at Twitter,” said Twitter spokeswoman Rebecca Hahn. She said that Zatko’s allegations appeared to be “riddled with inaccuracies” and that Zatko “now appears to be opportunistically seeking to inflict harm on Twitter, its customers, and its shareholders.” Hahn said that Twitter fired Zatko after 15 months “for poor performance and leadership.” Attorneys for Zatko confirmed he was fired but denied it was for performance or leadership.
  • A person familiar with Zatko’s tenure said the company investigated Zatko’s security claims during his time there and concluded they were sensationalistic and without merit. Four people familiar with Twitter’s efforts to fight spam said the company deploys extensive manual and automated tools to both measure the extent of spam across the service and reduce it.
  • Overall, Zatko wrote in a February analysis for the company attached as an exhibit to the SEC complaint, “Twitter is grossly negligent in several areas of information security. If these problems are not corrected, regulators, media and users of the platform will be shocked when they inevitably learn about Twitter’s severe lack of security basics.”
  • Zatko’s complaint says strong security should have been much more important to Twitter, which holds vast amounts of sensitive personal data about users. Twitter has the email addresses and phone numbers of many public figures, as well as dissidents who communicate over the service at great personal risk.
  • This month, an ex-Twitter employee was convicted of using his position at the company to spy on Saudi dissidents and government critics, passing their information to a close aide of Crown Prince Mohammed bin Salman in exchange for cash and gifts.
  • Zatko’s complaint says he believed the Indian government had forced Twitter to put one of its agents on the payroll, with access to user data at a time of intense protests in the country. The complaint said supporting information for that claim has gone to the National Security Division of the Justice Department and the Senate Select Committee on Intelligence. Another person familiar with the matter agreed that the employee was probably an agent.
  • “Take a tech platform that collects massive amounts of user data, combine it with what appears to be an incredibly weak security infrastructure and infuse it with foreign state actors with an agenda, and you’ve got a recipe for disaster,” Charles E. Grassley (R-Iowa), the top Republican on the Senate Judiciary Committee,
  • Many government leaders and other trusted voices use Twitter to spread important messages quickly, so a hijacked account could drive panic or violence. In 2013, a captured Associated Press handle falsely tweeted about explosions at the White House, sending the Dow Jones industrial average briefly plunging more than 140 points.
  • After a teenager managed to hijack the verified accounts of Obama, then-candidate Joe Biden, Musk and others in 2020, Twitter’s chief executive at the time, Jack Dorsey, asked Zatko to join him, saying that he could help the world by fixing Twitter’s security and improving the public conversation, Zatko asserts in the complaint.
  • In 1998, Zatko had testified to Congress that the internet was so fragile that he and others could take it down with a half-hour of concentrated effort. He later served as the head of cyber grants at the Defense Advanced Research Projects Agency, the Pentagon innovation unit that had backed the internet’s invention.
  • But at Twitter Zatko encountered problems more widespread than he realized and leadership that didn’t act on his concerns, according to the complaint.
  • Twitter’s difficulties with weak security stretches back more than a decade before Zatko’s arrival at the company in November 2020. In a pair of 2009 incidents, hackers gained administrative control of the social network, allowing them to reset passwords and access user data. In the first, beginning around January of that year, hackers sent tweets from the accounts of high-profile users, including Fox News and Obama.
  • Several months later, a hacker was able to guess an employee’s administrative password after gaining access to similar passwords in their personal email account. That hacker was able to reset at least one user’s password and obtain private information about any Twitter user.
  • Twitter continued to suffer high-profile hacks and security violations, including in 2017, when a contract worker briefly took over Trump’s account, and in the 2020 hack, in which a Florida teen tricked Twitter employees and won access to verified accounts. Twitter then said it put additional safeguards in place.
  • This year, the Justice Department accused Twitter of asking users for their phone numbers in the name of increased security, then using the numbers for marketing. Twitter agreed to pay a $150 million fine for allegedly breaking the 2011 order, which barred the company from making misrepresentations about the security of personal data.
  • After Zatko joined the company, he found it had made little progress since the 2011 settlement, the complaint says. The complaint alleges that he was able to reduce the backlog of safety cases, including harassment and threats, from 1 million to 200,000, add staff and push to measure results.
  • But Zatko saw major gaps in what the company was doing to satisfy its obligations to the FTC, according to the complaint. In Zatko’s interpretation, according to the complaint, the 2011 order required Twitter to implement a Software Development Life Cycle program, a standard process for making sure new code is free of dangerous bugs. The complaint alleges that other employees had been telling the board and the FTC that they were making progress in rolling out that program to Twitter’s systems. But Zatko alleges that he discovered that it had been sent to only a tenth of the company’s projects, and even then treated as optional.
  • “If all of that is true, I don’t think there’s any doubt that there are order violations,” Vladeck, who is now a Georgetown Law professor, said in an interview. “It is possible that the kinds of problems that Twitter faced eleven years ago are still running through the company.”
  • The complaint also alleges that Zatko warned the board early in his tenure that overlapping outages in the company’s data centers could leave it unable to correctly restart its servers. That could have left the service down for months, or even have caused all of its data to be lost. That came close to happening in 2021, when an “impending catastrophic” crisis threatened the platform’s survival before engineers were able to save the day, the complaint says, without providing further details.
  • One current and one former employee recalled that incident, when failures at two Twitter data centers drove concerns that the service could have collapsed for an extended period. “I wondered if the company would exist in a few days,” one of them said.
  • The current and former employees also agreed with the complaint’s assertion that past reports to various privacy regulators were “misleading at best.”
  • For example, they said the company implied that it had destroyed all data on users who asked, but the material had spread so widely inside Twitter’s networks, it was impossible to know for sure
  • As the head of security, Zatko says he also was in charge of a division that investigated users’ complaints about accounts, which meant that he oversaw the removal of some bots, according to the complaint. Spam bots — computer programs that tweet automatically — have long vexed Twitter. Unlike its social media counterparts, Twitter allows users to program bots to be used on its service: For example, the Twitter account @big_ben_clock is programmed to tweet “Bong Bong Bong” every hour in time with Big Ben in London. Twitter also allows people to create accounts without using their real identities, making it harder for the company to distinguish between authentic, duplicate and automated accounts.
  • In the complaint, Zatko alleges he could not get a straight answer when he sought what he viewed as an important data point: the prevalence of spam and bots across all of Twitter, not just among monetizable users.
  • Zatko cites a “sensitive source” who said Twitter was afraid to determine that number because it “would harm the image and valuation of the company.” He says the company’s tools for detecting spam are far less robust than implied in various statements.
  • “Agrawal’s Tweets and Twitter’s previous blog posts misleadingly imply that Twitter employs proactive, sophisticated systems to measure and block spam bots,” the complaint says. “The reality: mostly outdated, unmonitored, simple scripts plus overworked, inefficient, understaffed, and reactive human teams.”
  • The four people familiar with Twitter’s spam and bot efforts said the engineering and integrity teams run software that samples thousands of tweets per day, and 100 accounts are sampled manually.
  • Some employees charged with executing the fight agreed that they had been short of staff. One said top executives showed “apathy” toward the issue.
  • Zatko’s complaint likewise depicts leadership dysfunction, starting with the CEO. Dorsey was largely absent during the pandemic, which made it hard for Zatko to get rulings on who should be in charge of what in areas of overlap and easier for rival executives to avoid collaborating, three current and former employees said.
  • For example, Zatko would encounter disinformation as part of his mandate to handle complaints, according to the complaint. To that end, he commissioned an outside report that found one of the disinformation teams had unfilled positions, yawning language deficiencies, and a lack of technical tools or the engineers to craft them. The authors said Twitter had no effective means of dealing with consistent spreaders of falsehoods.
  • Dorsey made little effort to integrate Zatko at the company, according to the three employees as well as two others familiar with the process who spoke on the condition of anonymity to describe sensitive dynamics. In 12 months, Zatko could manage only six one-on-one calls, all less than 30 minutes, with his direct boss Dorsey, who also served as CEO of payments company Square, now known as Block, according to the complaint. Zatko allegedly did almost all of the talking, and Dorsey said perhaps 50 words in the entire year to him. “A couple dozen text messages” rounded out their electronic communication, the complaint alleges.
  • Faced with such inertia, Zatko asserts that he was unable to solve some of the most serious issues, according to the complaint.
  • Some 30 percent of company laptops blocked automatic software updates carrying security fixes, and thousands of laptops had complete copies of Twitter’s source code, making them a rich target for hackers, it alleges.
  • A successful hacker takeover of one of those machines would have been able to sabotage the product with relative ease, because the engineers pushed out changes without being forced to test them first in a simulated environment, current and former employees said.
  • “It’s near-incredible that for something of that scale there would not be a development test environment separate from production and there would not be a more controlled source-code management process,” said Tony Sager, former chief operating officer at the cyberdefense wing of the National Security Agency, the Information Assurance divisio
  • Sager is currently senior vice president at the nonprofit Center for Internet Security, where he leads a consensus effort to establish best security practices.
  • Zatko stopped the material from being presented at the Dec. 9, 2021 meeting, the complaint said. But over his continued objections, Agrawal let it go to the board’s smaller Risk Committee a week later.
  • “A best practice is that you should only be authorized to see and access what you need to do your job, and nothing else,” said former U.S. chief information security officer Gregory Touhill. “If half the company has access to and can make configuration changes to the production environment, that exposes the company and its customers to significant risk.”
  • The complaint says Dorsey never encouraged anyone to mislead the board about the shortcomings, but that others deliberately left out bad news.
  • The complaint says that about half of Twitter’s roughly 7,000 full-time employees had wide access to the company’s internal software and that access was not closely monitored, giving them the ability to tap into sensitive data and alter how the service worked. Three current and former employees agreed that these were issues.
  • An unnamed executive had prepared a presentation for the new CEO’s first full board meeting, according to the complaint. Zatko’s complaint calls the presentation deeply misleading.
  • The presentation showed that 92 percent of employee computers had security software installed — without mentioning that those installations determined that a third of the machines were insecure, according to the complaint.
  • Another graphic implied a downward trend in the number of people with overly broad access, based on the small subset of people who had access to the highest administrative powers, known internally as “God mode.” That number was in the hundreds. But the number of people with broad access to core systems, which Zatko had called out as a big problem after joining, had actually grown slightly and remained in the thousands.
  • The presentation included only a subset of serious intrusions or other security incidents, from a total Zatko estimated as one per week, and it said that the uncontrolled internal access to core systems was responsible for just 7 percent of incidents, when Zatko calculated the real proportion as 60 percent.
  • When Dorsey left in November 2021, a difficult situation worsened under Agrawal, who had been responsible for security decisions as chief technology officer before Zatko’s hiring, the complaint says.
  • Agrawal didn’t respond to requests for comment. In an email to employees after publication of this article, obtained by The Post, he said that privacy and security continues to be a top priority for the company, and he added that the narrative is “riddled with inconsistences” and “presented without important context.”
  • On Jan. 4, Zatko reported internally that the Risk Committee meeting might have been fraudulent, which triggered an Audit Committee investigation.
  • Agarwal fired him two weeks later. But Zatko complied with the company’s request to spell out his concerns in writing, even without access to his work email and documents, according to the complaint.
  • Since Zatko’s departure, Twitter has plunged further into chaos with Musk’s takeover, which the two parties agreed to in May. The stock price has fallen, many employees have quit, and Agrawal has dismissed executives and frozen big projects.
  • Zatko said he hoped that by bringing new scrutiny and accountability, he could improve the company from the outside.
  • “I still believe that this is a tremendous platform, and there is huge value and huge risk, and I hope that looking back at this, the world will be a better place, in part because of this.”
Javier E

The Israel-Hamas War Shows Just How Broken Social Media Has Become - The Atlantic - 0 views

  • major social platforms have grown less and less relevant in the past year. In response, some users have left for smaller competitors such as Bluesky or Mastodon. Some have simply left. The internet has never felt more dense, yet there seem to be fewer reliable avenues to find a signal in all the noise. One-stop information destinations such as Facebook or Twitter are a thing of the past. The global town square—once the aspirational destination that social-media platforms would offer to all of us—lies in ruins, its architecture choked by the vines and tangled vegetation of a wild informational jungle
  • Musk has turned X into a deepfake version of Twitter—a facsimile of the once-useful social network, altered just enough so as to be disorienting, even terrifying.
  • At the same time, Facebook’s user base began to erode, and the company’s transparency reports revealed that the most popular content circulating on the platform was little more than viral garbage—a vast wasteland of CBD promotional content and foreign tabloid clickbait.
  • ...4 more annotations...
  • What’s left, across all platforms, is fragmented. News and punditry are everywhere online, but audiences are siloed; podcasts are more popular than ever, and millions of younger people online have turned to influencers and creators on Instagram and especially TikTok as trusted sources of news.
  • Social media, especially Twitter, has sometimes been an incredible news-gathering tool; it has also been terrible and inefficient, a game of do your own research that involves batting away bullshit and parsing half truths, hyperbole, outright lies, and invaluable context from experts on the fly. Social media’s greatest strength is thus its original sin: These sites are excellent at making you feel connected and informed, frequently at the expense of actually being informed.
  • At the center of these pleas for a Twitter alternative is a feeling that a fundamental promise has been broken. In exchange for our time, our data, and even our well-being, we uploaded our most important conversations onto platforms designed for viral advertising—all under the implicit understanding that social media could provide an unparalleled window to the world.
  • What comes next is impossible to anticipate, but it’s worth considering the possibility that the centrality of social media as we’ve known it for the past 15 years has come to an end—that this particular window to the world is being slammed shut.
Javier E

Why the Past 10 Years of American Life Have Been Uniquely Stupid - The Atlantic - 0 views

  • Social scientists have identified at least three major forces that collectively bind together successful democracies: social capital (extensive social networks with high levels of trust), strong institutions, and shared stories.
  • Social media has weakened all three.
  • gradually, social-media users became more comfortable sharing intimate details of their lives with strangers and corporations. As I wrote in a 2019 Atlantic article with Tobias Rose-Stockwell, they became more adept at putting on performances and managing their personal brand—activities that might impress others but that do not deepen friendships in the way that a private phone conversation will.
  • ...118 more annotations...
  • the stage was set for the major transformation, which began in 2009: the intensification of viral dynamics.
  • Before 2009, Facebook had given users a simple timeline––a never-ending stream of content generated by their friends and connections, with the newest posts at the top and the oldest ones at the bottom
  • That began to change in 2009, when Facebook offered users a way to publicly “like” posts with the click of a button. That same year, Twitter introduced something even more powerful: the “Retweet” button, which allowed users to publicly endorse a post while also sharing it with all of their followers.
  • “Like” and “Share” buttons quickly became standard features of most other platforms.
  • Facebook developed algorithms to bring each user the content most likely to generate a “like” or some other interaction, eventually including the “share” as well.
  • Later research showed that posts that trigger emotions––especially anger at out-groups––are the most likely to be shared.
  • By 2013, social media had become a new game, with dynamics unlike those in 2008. If you were skillful or lucky, you might create a post that would “go viral” and make you “internet famous”
  • If you blundered, you could find yourself buried in hateful comments. Your posts rode to fame or ignominy based on the clicks of thousands of strangers, and you in turn contributed thousands of clicks to the game.
  • This new game encouraged dishonesty and mob dynamics: Users were guided not just by their true preferences but by their past experiences of reward and punishment,
  • As a social psychologist who studies emotion, morality, and politics, I saw this happening too. The newly tweaked platforms were almost perfectly designed to bring out our most moralistic and least reflective selves. The volume of outrage was shocking.
  • It was just this kind of twitchy and explosive spread of anger that James Madison had tried to protect us from as he was drafting the U.S. Constitution.
  • The Framers of the Constitution were excellent social psychologists. They knew that democracy had an Achilles’ heel because it depended on the collective judgment of the people, and democratic communities are subject to “the turbulency and weakness of unruly passions.”
  • The key to designing a sustainable republic, therefore, was to build in mechanisms to slow things down, cool passions, require compromise, and give leaders some insulation from the mania of the moment while still holding them accountable to the people periodically, on Election Day.
  • The tech companies that enhanced virality from 2009 to 2012 brought us deep into Madison’s nightmare.
  • a less quoted yet equally important insight, about democracy’s vulnerability to triviality.
  • Madison notes that people are so prone to factionalism that “where no substantial occasion presents itself, the most frivolous and fanciful distinctions have been sufficient to kindle their unfriendly passions and excite their most violent conflicts.”
  • Social media has both magnified and weaponized the frivolous.
  • It’s not just the waste of time and scarce attention that matters; it’s the continual chipping-away of trust.
  • a democracy depends on widely internalized acceptance of the legitimacy of rules, norms, and institutions.
  • when citizens lose trust in elected leaders, health authorities, the courts, the police, universities, and the integrity of elections, then every decision becomes contested; every election becomes a life-and-death struggle to save the country from the other side
  • The most recent Edelman Trust Barometer (an international measure of citizens’ trust in government, business, media, and nongovernmental organizations) showed stable and competent autocracies (China and the United Arab Emirates) at the top of the list, while contentious democracies such as the United States, the United Kingdom, Spain, and South Korea scored near the bottom (albeit above Russia).
  • The literature is complex—some studies show benefits, particularly in less developed democracies—but the review found that, on balance, social media amplifies political polarization; foments populism, especially right-wing populism; and is associated with the spread of misinformation.
  • When people lose trust in institutions, they lose trust in the stories told by those institutions. That’s particularly true of the institutions entrusted with the education of children.
  • Facebook and Twitter make it possible for parents to become outraged every day over a new snippet from their children’s history lessons––and math lessons and literature selections, and any new pedagogical shifts anywhere in the country
  • The motives of teachers and administrators come into question, and overreaching laws or curricular reforms sometimes follow, dumbing down education and reducing trust in it further.
  • young people educated in the post-Babel era are less likely to arrive at a coherent story of who we are as a people, and less likely to share any such story with those who attended different schools or who were educated in a different decade.
  • former CIA analyst Martin Gurri predicted these fracturing effects in his 2014 book, The Revolt of the Public. Gurri’s analysis focused on the authority-subverting effects of information’s exponential growth, beginning with the internet in the 1990s. Writing nearly a decade ago, Gurri could already see the power of social media as a universal solvent, breaking down bonds and weakening institutions everywhere it reached.
  • he notes a constructive feature of the pre-digital era: a single “mass audience,” all consuming the same content, as if they were all looking into the same gigantic mirror at the reflection of their own society. I
  • The digital revolution has shattered that mirror, and now the public inhabits those broken pieces of glass. So the public isn’t one thing; it’s highly fragmented, and it’s basically mutually hostile
  • Facebook, Twitter, YouTube, and a few other large platforms unwittingly dissolved the mortar of trust, belief in institutions, and shared stories that had held a large and diverse secular democracy together.
  • I think we can date the fall of the tower to the years between 2011 (Gurri’s focal year of “nihilistic” protests) and 2015, a year marked by the “great awokening” on the left and the ascendancy of Donald Trump on the right.
  • Twitter can overpower all the newspapers in the country, and stories cannot be shared (or at least trusted) across more than a few adjacent fragments—so truth cannot achieve widespread adherence.
  • fter Babel, nothing really means anything anymore––at least not in a way that is durable and on which people widely agree.
  • Politics After Babel
  • “Politics is the art of the possible,” the German statesman Otto von Bismarck said in 1867. In a post-Babel democracy, not much may be possible.
  • The ideological distance between the two parties began increasing faster in the 1990s. Fox News and the 1994 “Republican Revolution” converted the GOP into a more combative party.
  • So cross-party relationships were already strained before 2009. But the enhanced virality of social media thereafter made it more hazardous to be seen fraternizing with the enemy or even failing to attack the enemy with sufficient vigor.
  • What changed in the 2010s? Let’s revisit that Twitter engineer’s metaphor of handing a loaded gun to a 4-year-old. A mean tweet doesn’t kill anyone; it is an attempt to shame or punish someone publicly while broadcasting one’s own virtue, brilliance, or tribal loyalties. It’s more a dart than a bullet
  • from 2009 to 2012, Facebook and Twitter passed out roughly 1 billion dart guns globally. We’ve been shooting one another ever since.
  • “devoted conservatives,” comprised 6 percent of the U.S. population.
  • the warped “accountability” of social media has also brought injustice—and political dysfunction—in three ways.
  • First, the dart guns of social media give more power to trolls and provocateurs while silencing good citizens.
  • a small subset of people on social-media platforms are highly concerned with gaining status and are willing to use aggression to do so.
  • Across eight studies, Bor and Petersen found that being online did not make most people more aggressive or hostile; rather, it allowed a small number of aggressive people to attack a much larger set of victims. Even a small number of jerks were able to dominate discussion forums,
  • Additional research finds that women and Black people are harassed disproportionately, so the digital public square is less welcoming to their voices.
  • Second, the dart guns of social media give more power and voice to the political extremes while reducing the power and voice of the moderate majority.
  • The “Hidden Tribes” study, by the pro-democracy group More in Common, surveyed 8,000 Americans in 2017 and 2018 and identified seven groups that shared beliefs and behaviors.
  • Social media has given voice to some people who had little previously, and it has made it easier to hold powerful people accountable for their misdeeds
  • The group furthest to the left, the “progressive activists,” comprised 8 percent of the population. The progressive activists were by far the most prolific group on social media: 70 percent had shared political content over the previous year. The devoted conservatives followed, at 56 percent.
  • These two extreme groups are similar in surprising ways. They are the whitest and richest of the seven groups, which suggests that America is being torn apart by a battle between two subsets of the elite who are not representative of the broader society.
  • they are the two groups that show the greatest homogeneity in their moral and political attitudes.
  • likely a result of thought-policing on social media:
  • political extremists don’t just shoot darts at their enemies; they spend a lot of their ammunition targeting dissenters or nuanced thinkers on their own team.
  • Finally, by giving everyone a dart gun, social media deputizes everyone to administer justice with no due process. Platforms like Twitter devolve into the Wild West, with no accountability for vigilantes.
  • Enhanced-virality platforms thereby facilitate massive collective punishment for small or imagined offenses, with real-world consequences, including innocent people losing their jobs and being shamed into suicide
  • we don’t get justice and inclusion; we get a society that ignores context, proportionality, mercy, and truth.
  • Since the tower fell, debates of all kinds have grown more and more confused. The most pervasive obstacle to good thinking is confirmation bias, which refers to the human tendency to search only for evidence that confirms our preferred beliefs
  • search engines were supercharging confirmation bias, making it far easier for people to find evidence for absurd beliefs and conspiracy theorie
  • The most reliable cure for confirmation bias is interaction with people who don’t share your beliefs. They confront you with counterevidence and counterargument.
  • In his book The Constitution of Knowledge, Jonathan Rauch describes the historical breakthrough in which Western societies developed an “epistemic operating system”—that is, a set of institutions for generating knowledge from the interactions of biased and cognitively flawed individuals
  • English law developed the adversarial system so that biased advocates could present both sides of a case to an impartial jury.
  • Newspapers full of lies evolved into professional journalistic enterprises, with norms that required seeking out multiple sides of a story, followed by editorial review, followed by fact-checking.
  • Universities evolved from cloistered medieval institutions into research powerhouses, creating a structure in which scholars put forth evidence-backed claims with the knowledge that other scholars around the world would be motivated to gain prestige by finding contrary evidence.
  • Part of America’s greatness in the 20th century came from having developed the most capable, vibrant, and productive network of knowledge-producing institutions in all of human history
  • But this arrangement, Rauch notes, “is not self-maintaining; it relies on an array of sometimes delicate social settings and understandings, and those need to be understood, affirmed, and protected.”
  • This, I believe, is what happened to many of America’s key institutions in the mid-to-late 2010s. They got stupider en masse because social media instilled in their members a chronic fear of getting darted
  • it was so pervasive that it established new behavioral norms backed by new policies seemingly overnight
  • Participants in our key institutions began self-censoring to an unhealthy degree, holding back critiques of policies and ideas—even those presented in class by their students—that they believed to be ill-supported or wrong.
  • The stupefying process plays out differently on the right and the left because their activist wings subscribe to different narratives with different sacred values.
  • The “Hidden Tribes” study tells us that the “devoted conservatives” score highest on beliefs related to authoritarianism. They share a narrative in which America is eternally under threat from enemies outside and subversives within; they see life as a battle between patriots and traitors.
  • they are psychologically different from the larger group of “traditional conservatives” (19 percent of the population), who emphasize order, decorum, and slow rather than radical change.
  • The traditional punishment for treason is death, hence the battle cry on January 6: “Hang Mike Pence.”
  • Right-wing death threats, many delivered by anonymous accounts, are proving effective in cowing traditional conservatives
  • The wave of threats delivered to dissenting Republican members of Congress has similarly pushed many of the remaining moderates to quit or go silent, giving us a party ever more divorced from the conservative tradition, constitutional responsibility, and reality.
  • The stupidity on the right is most visible in the many conspiracy theories spreading across right-wing media and now into Congress.
  • The Democrats have also been hit hard by structural stupidity, though in a different way. In the Democratic Party, the struggle between the progressive wing and the more moderate factions is open and ongoing, and often the moderates win.
  • The problem is that the left controls the commanding heights of the culture: universities, news organizations, Hollywood, art museums, advertising, much of Silicon Valley, and the teachers’ unions and teaching colleges that shape K–12 education. And in many of those institutions, dissent has been stifled:
  • Liberals in the late 20th century shared a belief that the sociologist Christian Smith called the “liberal progress” narrative, in which America used to be horrifically unjust and repressive, but, thanks to the struggles of activists and heroes, has made (and continues to make) progress toward realizing the noble promise of its founding.
  • It is also the view of the “traditional liberals” in the “Hidden Tribes” study (11 percent of the population), who have strong humanitarian values, are older than average, and are largely the people leading America’s cultural and intellectual institutions.
  • when the newly viralized social-media platforms gave everyone a dart gun, it was younger progressive activists who did the most shooting, and they aimed a disproportionate number of their darts at these older liberal leaders.
  • Confused and fearful, the leaders rarely challenged the activists or their nonliberal narrative in which life at every institution is an eternal battle among identity groups over a zero-sum pie, and the people on top got there by oppressing the people on the bottom. This new narrative is rigidly egalitarian––focused on equality of outcomes, not of rights or opportunities. It is unconcerned with individual rights.
  • The universal charge against people who disagree with this narrative is not “traitor”; it is “racist,” “transphobe,” “Karen,” or some related scarlet letter marking the perpetrator as one who hates or harms a marginalized group.
  • The punishment that feels right for such crimes is not execution; it is public shaming and social death.
  • anyone on Twitter had already seen dozens of examples teaching the basic lesson: Don’t question your own side’s beliefs, policies, or actions. And when traditional liberals go silent, as so many did in the summer of 2020, the progressive activists’ more radical narrative takes over as the governing narrative of an organization.
  • This is why so many epistemic institutions seemed to “go woke” in rapid succession that year and the next, beginning with a wave of controversies and resignations at The New York Times and other newspapers, and continuing on to social-justice pronouncements by groups of doctors and medical associations
  • The problem is structural. Thanks to enhanced-virality social media, dissent is punished within many of our institutions, which means that bad ideas get elevated into official policy.
  • In a 2018 interview, Steve Bannon, the former adviser to Donald Trump, said that the way to deal with the media is “to flood the zone with shit.” He was describing the “firehose of falsehood” tactic pioneered by Russian disinformation programs to keep Americans confused, disoriented, and angry.
  • artificial intelligence is close to enabling the limitless spread of highly believable disinformation. The AI program GPT-3 is already so good that you can give it a topic and a tone and it will spit out as many essays as you like, typically with perfect grammar and a surprising level of coherence.
  • Renée DiResta, the research manager at the Stanford Internet Observatory, explained that spreading falsehoods—whether through text, images, or deep-fake videos—will quickly become inconceivably easy. (She co-wrote the essay with GPT-3.)
  • American factions won’t be the only ones using AI and social media to generate attack content; our adversaries will too.
  • In the 20th century, America’s shared identity as the country leading the fight to make the world safe for democracy was a strong force that helped keep the culture and the polity together.
  • In the 21st century, America’s tech companies have rewired the world and created products that now appear to be corrosive to democracy, obstacles to shared understanding, and destroyers of the modern tower.
  • What changes are needed?
  • I can suggest three categories of reforms––three goals that must be achieved if democracy is to remain viable in the post-Babel era.
  • We must harden democratic institutions so that they can withstand chronic anger and mistrust, reform social media so that it becomes less socially corrosive, and better prepare the next generation for democratic citizenship in this new age.
  • Harden Democratic Institutions
  • we must reform key institutions so that they can continue to function even if levels of anger, misinformation, and violence increase far above those we have today.
  • Reforms should reduce the outsize influence of angry extremists and make legislators more responsive to the average voter in their district.
  • One example of such a reform is to end closed party primaries, replacing them with a single, nonpartisan, open primary from which the top several candidates advance to a general election that also uses ranked-choice voting
  • A second way to harden democratic institutions is to reduce the power of either political party to game the system in its favor, for example by drawing its preferred electoral districts or selecting the officials who will supervise elections
  • These jobs should all be done in a nonpartisan way.
  • Reform Social Media
  • Social media’s empowerment of the far left, the far right, domestic trolls, and foreign agents is creating a system that looks less like democracy and more like rule by the most aggressive.
  • it is within our power to reduce social media’s ability to dissolve trust and foment structural stupidity. Reforms should limit the platforms’ amplification of the aggressive fringes while giving more voice to what More in Common calls “the exhausted majority.”
  • the main problem with social media is not that some people post fake or toxic stuff; it’s that fake and outrage-inducing content can now attain a level of reach and influence that was not possible before
  • Perhaps the biggest single change that would reduce the toxicity of existing platforms would be user verification as a precondition for gaining the algorithmic amplification that social media offers.
  • One of the first orders of business should be compelling the platforms to share their data and their algorithms with academic researchers.
  • Prepare the Next Generation
  • Childhood has become more tightly circumscribed in recent generations––with less opportunity for free, unstructured play; less unsupervised time outside; more time online. Whatever else the effects of these shifts, they have likely impeded the development of abilities needed for effective self-governance for many young adults
  • Depression makes people less likely to want to engage with new people, ideas, and experiences. Anxiety makes new things seem more threatening. As these conditions have risen and as the lessons on nuanced social behavior learned through free play have been delayed, tolerance for diverse viewpoints and the ability to work out disputes have diminished among many young people
  • Students did not just say that they disagreed with visiting speakers; some said that those lectures would be dangerous, emotionally devastating, a form of violence. Because rates of teen depression and anxiety have continued to rise into the 2020s, we should expect these views to continue in the generations to follow, and indeed to become more severe.
  • The most important change we can make to reduce the damaging effects of social media on children is to delay entry until they have passed through puberty.
  • The age should be raised to at least 16, and companies should be held responsible for enforcing it.
  • et them out to play. Stop starving children of the experiences they most need to become good citizens: free play in mixed-age groups of children with minimal adult supervision
  • while social media has eroded the art of association throughout society, it may be leaving its deepest and most enduring marks on adolescents. A surge in rates of anxiety, depression, and self-harm among American teens began suddenly in the early 2010s. (The same thing happened to Canadian and British teens, at the same time.) The cause is not known, but the timing points to social media as a substantial contributor—the surge began just as the large majority of American teens became daily users of the major platforms.
  • What would it be like to live in Babel in the days after its destruction? We know. It is a time of confusion and loss. But it is also a time to reflect, listen, and build.
  • In recent years, Americans have started hundreds of groups and organizations dedicated to building trust and friendship across the political divide, including BridgeUSA, Braver Angels (on whose board I serve), and many others listed at BridgeAlliance.us. We cannot expect Congress and the tech companies to save us. We must change ourselves and our communities.
  • when we look away from our dysfunctional federal government, disconnect from social media, and talk with our neighbors directly, things seem more hopeful. Most Americans in the More in Common report are members of the “exhausted majority,” which is tired of the fighting and is willing to listen to the other side and compromise. Most Americans now see that social media is having a negative impact on the country, and are becoming more aware of its damaging effects on children.
Javier E

Elusive 'Einstein' Solves a Longstanding Math Problem - The New York Times - 0 views

  • after a decade of failed attempts, David Smith, a self-described shape hobbyist of Bridlington in East Yorkshire, England, suspected that he might have finally solved an open problem in the mathematics of tiling: That is, he thought he might have discovered an “einstein.”
  • In less poetic terms, an einstein is an “aperiodic monotile,” a shape that tiles a plane, or an infinite two-dimensional flat surface, but only in a nonrepeating pattern. (The term “einstein” comes from the German “ein stein,” or “one stone” — more loosely, “one tile” or “one shape.”)
  • Your typical wallpaper or tiled floor is part of an infinite pattern that repeats periodically; when shifted, or “translated,” the pattern can be exactly superimposed on itself
  • ...18 more annotations...
  • An aperiodic tiling displays no such “translational symmetry,” and mathematicians have long sought a single shape that could tile the plane in such a fashion. This is known as the einstein problem.
  • black and white squares also can make weird nonperiodic patterns, in addition to the familiar, periodic checkerboard pattern. “It’s really pretty trivial to be able to make weird and interesting patterns,” he said. The magic of the two Penrose tiles is that they make only nonperiodic patterns — that’s all they can do.“But then the Holy Grail was, could you do with one — one tile?” Dr. Goodman-Strauss said.
  • now a new paper — by Mr. Smith and three co-authors with mathematical and computational expertise — proves Mr. Smith’s discovery true. The researchers called their einstein “the hat,
  • “The most significant aspect for me is that the tiling does not clearly fall into any of the familiar classes of structures that we understand.”
  • “I’m always messing about and experimenting with shapes,” said Mr. Smith, 64, who worked as a printing technician, among other jobs, and retired early. Although he enjoyed math in high school, he didn’t excel at it, he said. But he has long been “obsessively intrigued” by the einstein problem.
  • Sir Roger found the proofs “very complicated.” Nonetheless, he was “extremely intrigued” by the einstein, he said: “It’s a really good shape, strikingly simple.”
  • The simplicity came honestly. Mr. Smith’s investigations were mostly by hand; one of his co-authors described him as an “imaginative tinkerer.”
  • When in November he found a tile that seemed to fill the plane without a repeating pattern, he emailed Craig Kaplan, a co-author and a computer scientist at the University of Waterloo.
  • “It was clear that something unusual was happening with this shape,” Dr. Kaplan said. Taking a computational approach that built on previous research, his algorithm generated larger and larger swaths of hat tiles. “There didn’t seem to be any limit to how large a blob of tiles the software could construct,”
  • The first step, Dr. Kaplan said, was to “define a set of four ‘metatiles,’ simple shapes that stand in for small groupings of one, two, or four hats.” The metatiles assemble into four larger shapes that behave similarly. This assembly, from metatiles to supertiles to supersupertiles, ad infinitum, covered “larger and larger mathematical ‘floors’ with copies of the hat,” Dr. Kaplan said. “We then show that this sort of hierarchical assembly is essentially the only way to tile the plane with hats, which turns out to be enough to show that it can never tile periodically.”
  • some might wonder whether this is a two-tile, not one-tile, set of aperiodic monotiles.
  • Dr. Goodman-Strauss had raised this subtlety on a tiling listserv: “Is there one hat or two?” The consensus was that a monotile counts as such even using its reflection. That leaves an open question, Dr. Berger said: Is there an einstein that will do the job without reflection?
  • “the hat” was not a new geometric invention. It is a polykite — it consists of eight kites. (Take a hexagon and draw three lines, connecting the center of each side to the center of its opposite side; the six shapes that result are kites.)
  • “It’s likely that others have contemplated this hat shape in the past, just not in a context where they proceeded to investigate its tiling properties,” Dr. Kaplan said. “I like to think that it was hiding in plain sight.”
  • Incredibly, Mr. Smith later found a second einstein. He called it “the turtle” — a polykite made of not eight kites but 10. It was “uncanny,” Dr. Kaplan said. He recalled feeling panicked; he was already “neck deep in the hat.”
  • Dr. Myers, who had done similar computations, promptly discovered a profound connection between the hat and the turtle. And he discerned that, in fact, there was an entire family of related einsteins — a continuous, uncountable infinity of shapes that morph one to the next.
  • this einstein family motivated the second proof, which offers a new tool for proving aperiodicity. The math seemed “too good to be true,” Dr. Myers said in an email. “I wasn’t expecting such a different approach to proving aperiodicity — but everything seemed to hold together as I wrote up the details.”
  • Mr. Smith was amazed to see the research paper come together. “I was no help, to be honest.” He appreciated the illustrations, he said: “I’m more of a pictures person.”
Javier E

Opinion | Tesla suffers from the boss's addiction to Twitter - The Washington Post - 0 views

  • For some perspective on what’s happening with Elon Musk and Twitter, I suggest spending a few minutes familiarizing yourself with one of Twitter’s sillier episodes from the past, a fight that erupted almost a year ago between the “shape rotators” of Silicon Valley and the “wordcels” (aspersion intended) of journalism and related professions. Many of the combatants were, at first, merely fighting over which group should have higher social status (theirs), but the episode also highlighted real divisions between West Coast and East — math and verbal, free-speech culture and safety culture, people who make things happen and people who talk about them afterward.
  • For years now, conflict between the two groups has been boiling over onto social media, into courtrooms and onto the pages of major news outlets. Team Shape Rotator believes Team Wordcel is parasitic and dangerous, ballyragging institutions into curbing both free speech and innovation in the name of safety. Team “Stop calling me a Wordcel” sees its opponents as self-centered and reckless, disrupting and mean-meming their way toward some vaguely imagined doom.
  • his audacity seems to be backfiring, as of course did Napoleon’s eventually.
  • ...5 more annotations...
  • You can think of Musk’s acquisition of Twitter as the latest sortie, a takeover of the ultimate wordcel site by the world’s most successful shape rotator.
  • more likely, he fell prey to a different delusion, one in which the shape rotators and the wordcels are united: thinking of Twitter in terms of words and arguments, as a “digital public square” where vital questions are hashed out. It is that, sometimes, but that’s not what it’s designed for. It’s designed to maximize engagement, which is to say, it’s an addiction machine for the highly verbal.
  • Both groups theoretically understand what the machine is doing — the wordcels write endless articles about bad algorithms, and the shape rotators build them. But both nonetheless talk as though they’re saving the world even as they compulsively follow the programming. The shape rotators bait the wordcels because that’s what makes the machine spit out more rewarding likes and retweets. We wordcels return the favor for the same reason.
  • Musk could theoretically rework Twitter’s architecture to downrank provocation and make it less addictive. But of course, that would make it a less profitable business
  • More to the point, the reason he bought it is that he, like his critics, is hooked on it the way it is now. Unfortunately for Tesla shareholders, Musk has now put himself in the position of a dealer who can spend all day getting high on his own supply.
Javier E

Why It's So Hard To Pay Attention, Explained By Science - Fast Company - 0 views

  • Today, each of us individually generates more information than ever before in human history. Our world is now awash in an unprecedented volume of data. The trouble is, our brains haven’t evolved to be able to process it all.
  • information “tumbles faster and faster through bigger and bigger computers down to everybody’s fingertips, which are holding devices with more processing power than the Apollo mission control.”
  • Information scientists have quantified all this: In 2011, Americans took in five times as much information every day as they did in 1986—the equivalent of 174 newspapers.
  • ...18 more annotations...
  • During our leisure time, not counting work, each of us processes 34 gigabytes, or 100,000 words, every day
  • The world’s 21,274 television stations produce 85,000 hours of original programming every day as we watch an average of five hours of television daily, the equivalent of 20 gigabytes of audio-video images
  • That’s not counting YouTube, which uploads 6,000 hours of video every hour.
  • We’ve created a world with 300 exabytes (300,000,000,000,000,000,000 pieces) of human-made information. If each of those pieces of information were written on a 3-by-5-inch index card and then spread out side by side, just one person’s share—your share of this information—would cover every square inch of Massachusetts and Connecticut combined.
  • Neurons are living cells with a metabolism; they need oxygen and glucose to survive, and when they’ve been working hard, we experience fatigue. Every status update you read on Facebook, every tweet or text message you get from a friend, is competing for resources in your brain with important things like whether to put your savings in stocks or bonds,
  • The processing capacity of the conscious mind has been estimated (by the researcher Mihaly Csikszentmihalyi and, independently, by Bell Labs engineer Robert Lucky) at 120 bits per second. That bandwidth, or window, is the speed limit for the traffic of information we can pay conscious attention to at any one time.
  • While a great deal occurs below the threshold of our awareness, and this has an impact on how we feel and what our life is going to be like, in order for something to become encoded as part of your experience, you need to have paid conscious attention to it.
  • What does this bandwidth restriction—this information speed limit—mean in terms of our interactions with others? In order to understand one person speaking to us, we need to process 60 bits of information per second. With a processing limit of 120 bits per second, this means you can barely understand two people talking to you at the same time
  • We’re surrounded on this planet by billions of other humans, but we can understand only two at a time at the most! It’s no wonder that the world is filled with so much misunderstanding.
  • With such attentional restrictions, it’s clear why many of us feel overwhelmed by managing some of the most basic aspects of life. Part of the reason is that our brains evolved to help us deal with life during the hunter-gatherer phase of human history
  • Attention is the most essential mental resource for any organism. It determines which aspects of the environment we deal with, and most of the time, various automatic, subconscious processes make the correct choice about what gets passed through to our conscious awareness. For this to happen, millions of neurons are constantly monitoring the environment to select the most important things for us to focus on.
  • These neurons are collectively the “attentional filter.” They work largely in the background, outside of our conscious awareness. This is why most of the perceptual detritus of our daily lives doesn’t registe
  • The attentional filter is one of evolution’s greatest achievements. In nonhumans, it ensures that they don’t get distracted by irrelevant things
  • When our protohuman ancestors left the cover of the trees to seek new sources of food, they simultaneously opened up a vast range of new possibilities for nourishment and exposed themselves to a wide range of new predators. Being alert and vigilant to threatening sounds and visual cues is what allowed them to survive; this meant allowing an increasing amount of information through the attentional filter.
  • Ten thousand years ago, humans plus their pets and livestock accounted for about 0.1% of the terrestrial vertebrate biomass inhabiting the earth; we now account for 98%
  • Humans are, by most biological measures, the most successful species our planet has seen. We have managed to survive in nearly every climate our planet has offered (so far), and the rate of our population expansion exceeds that of any other known organism
  • Our success owes in large part to our cognitive capacity, the ability of our brains to flexibly handle information. But our brains evolved in a much simpler world with far less information coming at us. Today, our attentional filters easily become overwhelmed.
  • Successful people—or those who can afford it—employ layers of other people whose job it is to narrow their own attentional filters.
  •  
    This article is adapted from The Organized Mind: Thinking Straight in the Age of Information Overload by Daniel J. Levitin (Plume/Penguin Random House, 2014).
« First ‹ Previous 61 - 71 of 71
Showing 20 items per page