problem
statement
1
Mesoscale as a descriptor has until now most commonly been used in fields such as meteorology, oceanography, and atmospheric sciences. In these contexts, key characteristics of mesoscale phenomena include a spatial scale ranging from two to 2,000 kilometers horizontally, and a temporal scale lasting from a few hours to several days. Examples of such mesoscale structures include thunderstorms, squall lines, and certain types of convective systems
2
Professor Jeremy Adelman from personal correspondence with the author.
3
www.amazon.com/Overcomplicated-Technology-at-Limits-Comprehension/dp/0143131303
motivation
This macro- versus micro-view dichotomy has dominated how social scientists have traditionally analyzed the big problems of society. The micro- approach (social psychology, micro-economics, micro-history, micro-politics) became particularly fashionable in the 2000s with the turn to behavioral explanations. The macro- framework (world systems, global regimes, earth sciences, macro-economics) has come back into vogue as the post-Cold War stability has faded and the geopolitics of rivalry have re-emerged as a dominant theme.
In less technical terms, operating systems are the macro level that determine much about how users ultimately interact with a computer (think of the difference between using a laptop running macOS versus one running an open source variant of Linux). Individual applications are the micro level where a user makes particular choices about how to carry out particular functions (should I watch one more video on TikTok or should I go to sleep?). Most of us at least know the name of the operating system we are functioning on and have an appreciation for its general characteristics; and most of us make clear choices about whether to use a particular application like TikTok, or not. What almost none of us perceive or understand is the web of enabling middleware that makes the online world function by abstracting away the technical details described above.
There are a number of important design considerations in building middleware solutions:
Purpose & Position
- Middleware: Designed to facilitate communication and integration between different technology systems, acting as an intermediary layer that connects disparate components
- Other Solutions: Typically designed as standalone products with specific functions, direct user interaction, or to address particular business needs
Requirements Gathering
- Middleware: Requires understanding multiple technologies' specifications, limitations, and interfaces
- Other Solutions: More straightforward requirements focused on solving specific problems
Architecture
- Middleware: Typically employs adaptable, flexible designs; Must accommodate various formats, signals, and operational parameters; Often serves as a translation layer between incompatible systems.
- Other Solutions: Can be more specialized and optimized for their specific function
Integration Focus
- Middleware: Primary focus is on compatibility, connectivity, and seamless operation between different technologies
- Other Solutions: Often prioritize specific functionality, performance in their domain, or user experience
Performance Considerations
- Middleware: Must optimize to avoid becoming a bottleneck, often requires balancing between compatibility and efficiency
- Other Solutions: Performance requirements typically defined by their specific use case
Stakeholder Complexity
- Middleware: Must satisfy requirements from multiple systems, technologies, and their respective stakeholders
- Other Solutions: Generally focused on a discrete set of end-users or specific business requirementsTechnical Requirements
- Middleware needs: Strong emphasis on standards compliance and interoperability; Must support multiple protocols and interfaces; Requires higher reliability as it impacts multiple systems; More complex handling of cross-system failures and exceptions
Value Proposition
- Middleware: Value derived from enabling connections and workflows across technology ecosystems
- Other Solutions: Value typically measured in direct functionality or problem-solving capability
Security Implications
- Middleware: Often bridges security domains, requiring specialized security approaches
- Other Solutions: Security concerns are generally more contained within system boundaries
4
UN Development Programme, Human Development Report, 1994 (OUP) p. 22 (quoted in Roland Paris, Human Security - Paradigm Shift or Hot Air?, p.89).
5
The ideas and language in these two paragraphs are derived from University of Cambridge Professor Jeremy Adelman via personal correspondence with the author.
6
Mesoscale as a descriptor has until now most commonly been used in fields such as meteorology, oceanography, and atmospheric sciences. In these contexts, key characteristics of mesoscale phenomena include a spatial scale ranging from two to 2,000 kilometers horizontally, and a temporal scale lasting from a few hours to several days. Examples of such mesoscale structures include thunderstorms, squall lines, and certain types of convective systems.
7
Professor Jeremy Adelman from personal correspondence with the author.
8
www.redhat.com/en/topics/middleware/what-is-middleware
9
NB, how this legal middleware is implemented is somewhat in flux as a result of the Supreme Court case Loper Bright Enterprises v. Raimondo in which a 6-3 decision by Chief Justice John Roberts overruled the 1984 case of Chevron U.S.A. v. Natural Resources Defense Council. The question before the court in Loper focused on the so-called Chevron deference, an administrative law concept that says courts should defer to a federal agency’s reasonable interpretation of an ambiguous statute. The Loper decision overturned the 40-year-old Chevron precedent writing “[the Administrative Procedure Act] requires courts to exercise their independent judgment in deciding whether an agency has acted within its statutory authority, and courts may not defer to an agency interpretation of the law simply because a statute is ambiguous; Chevron is overruled.”
10
See www.amazon.com/Overcomplicated-Technology-at-Limits-Comprehension/dp/0143131303
curation
BOOKS
Overcomplicated: Technology at the Limits of Comprehension
Samuel Arbesman / Portfolio / 2017
A field guide to living with complex technologies that defy human comprehension.
PAPERS
Red Hat / 2002
Middleware is a software layer that connects the operating system to applications, data, and users. It provides common services and capabilities, like single-sign on (SSO) or application programming interface (API) management.
next steps
Security middleware development ideas in process include:
Regional Health Security Hubs
AI-coordinated networks connecting academic and community medical centers, public health agencies, and community organizations within geographic regions, creating integrated research-practice ecosystems that respond to local health security needs.
Misinformation Response Systems
Health security is particularly vulnerable to misinformation. Research organizations would need AI systems capable of tracking and responding to health misinformation in real-time while maintaining public trust.
Privacy-Preserving AI Governance
Health security research requires particularly careful balancing of surveillance capabilities with privacy protections. New governance frameworks would be needed to enable AI analysis of sensitive health data without compromising individual rights.
Open Source Communications Protocol for Human Security
Protocols “push the power and decision making out to the ends of the network, rather than keeping it centralized among a small group of very powerful companies. At the same time, it would likely lead to new, more innovative features as well as better end-user control over their own data. Finally, it could help usher in a series of new business models that don’t focus exclusively on monetizing user data.”
See, e.g., Bluesky: “Bluesky is powered by an open-source protocol, a sort of instruction manual and set of data standards that allows anyone to build compatible software on top of it.” Bluesky is built upon the AT Protocol, which is an open-source protocol for building social applications. This means the AT Protocol provides the underlying framework and standards for building social media applications, allowing anyone to create compatible software on top of it. The AT Protocol is designed to be open, interoperable, and to allow users to have more control over their data and experience.
essays + notes
NOTES
COMMUNICATE
To receive periodic updates on our work, sign up below: