Monday, August 29, 2011

Deactivating Facebook

In 2003, a friend told me to get on facebook. It was at www.thefacebook.com. I ignored his hipster request for an entire semester. I first signed during the winter of 2003. I added about 100 friends in a day. I was hooked.

Eight years ago, facebook addiction didn't exist. Now, it is mainstream (1). New statistics come out every once in awhile, and are now updated in real time at http://www.facebook.com/press/info.php?statistics. The statistics and growth rates are very common online (2). These numbers give us the "wow" factor but are essentially pointless. The number of users ceased to matter after facebook did away with user verification. It was a great service when it was college-specific, a good service when it added workplaces, and less-than-mediocre when it opened up to the general public. Now, we have serious issues with social media security, digital identity, and the duty of harvesting digital crops on time.

Recognizing my own addiction, I've decided to act upon it. I turned 27 in June. It took me that long to realize that you have to give up who you are in order to turn into who you want to become. Tonight, I want to become one of the elite few who do not have facebook. I want to be left alone. I told my heartbroken fiance that I would deactivate my account and that technically, her account will no longer show her as being engaged to me, which effectively ended our digital engagement. Luckily, she has a ring to prove it in real life.

Then again, there is always Google+.  



1) http://www.psychologytoday.com/blog/positively-media/201005/social-media-addiction-engage-brain-believing
2) http://www.checkfacebook.com/
3) http://www.computerworld.com/s/article/9135795/Study_Facebook_use_cuts_productivity_at_work

Monday, August 1, 2011

Technology Adoption vs. Social Technology Complexity



Everett Rogers’ “Diffusion of Innovations” is a popular graph that is useful for breaking up adopters into 5 different categories, depending on what time they opt to adopt a particular technology. For example, early adopters can either benefit extensively from new technology, or fall into “The Chasm” where the technology never takes off to be utilized by the majority. This can be due to several factors, including lack of interest, IT project failures, immature technologies, etc. Technologies that have fallen into “The Chasm” include Artificial Intelligence (AI), Computer-aided software engineering (CASE), a variety of Enterprise Resource Planning (ERP) systems, and Enterprise social media. There is a plethora of specific corporate examples including AMR Corp’s “Confirm” reservation system in 1992.

The problem with this chart, is that it doesn't take into account how rapidly "Innovators" become "Early Majority." The adoption process for social technologies depend on the complexity of the technology, over a specific period of time. Here is a chart that I've drawn to illustrate this: 



This proprietary graph provides us with three pieces of key information pertinent to modern IT that builds upon Everett Rogers’ idea. The adoption curve here has been divided into three categories based on the complexity of the technology and the rate of adoption.

The first stage shows an adoption increase along with the maturity of a new technology. At the end of this first stage, adoption rates will either increase exponentially (i.e. cloud computing) or cease to exist (The Chasm.) The technology is in its prototypical state, and offers a demonstration of a vision rather than a full fledged product.

During the second stage the technology is becoming the norm, and there is controlled risk in adopting the technology. Complexity in this stage continues to increase gradually, as the majority of users will demand new features.

During the last stage, the majority has already adopted the technology and those who do not adopt the technology will perish. For example, VMWare and virtual computing. In this stage, the technology will become increasingly complicated until it is no longer sustainable, or it is limited by currently available information and hardware.