Monday, July 20, 2015
"We are at home with situations of legal ambiguity.
And we create flexibility, in situations where it is required."
Consider a few hastily conceived scenarios from the near future. An android charged with performing elder care must deal with an uncooperative patient. A driverless car carrying passengers must decide between suddenly stopping, and causing a pile-up behind it. A robot responding to a collapsed building must choose between two people to save. The question that unifies these scenarios is not just about how to make the correct decision, but more fundamentally, how to treat the entities involved. Is it possible for a machine to be treated as an ethical subject – and, by extension, that an artifical entity may possess "robot rights"?
Of course, "robot rights" is a crude phrase that shoots us straight into a brambly thicket of anthropomorphisms; let's not quite go there yet. Perhaps it's more accurate to ask if a machine – something that people have designed, manufactured and deployed into the world – can have some sort of moral or ethical standing, whether as an agent or as a recipient of some action. What's really at stake here is the contention that a machine can act sufficiently independently in the world that it can be held responsible for its actions and, conversely, if a machine has any sort of standing such that, if it were harmed in any way, this standing would serve to protect its ongoing place and function in society.
You could, of course, dismiss all this as a bunch of nonsense: that machines are made by us exclusively for our use, and anything a robot or computer or AI does or does not do is the responsibility of its human owners. You don't sue the scalpel, rather you sue the surgeon. You don't take a database to court, but the corporation that built it – and in any case you are probably not concerned with the database itself, but with the consequence of how it was used, or maintained, or what have you. As far as the technology goes, if it's behaving badly you shut it off, wipe the drive, or throw it in the garbage, and that's the end of the story.
This is not an unreasonable point of departure, and is rooted in what's known as the instrumentalist view of technology. For an instrumentalist, technology is still only an extension of ourselves and does not possess any autonomy. But how do you control for the sort of complexity for which we are now designing our machines? Our instrumentalist proclivities whisper to us that there must be an elegant way of doing so. So let's begin with a first attempt to do so: Isaac Asimov's Three Laws of Robotics.
- A robot may not injure a human being or, through inaction, allow a human being to come to harm.
- A robot must obey the orders given to it by human beings, except where such orders would conflict with the First Law.
- A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.
Some time later, Asimov added a fourth, which was intended to precede all the others, so it's really the ‘Zeroth' Law:
0. A robot may not harm humanity, or, by inaction, allow humanity to come to harm.
The Laws, which made their first appearance in a 1942 story that is, fittingly enough, set in 2015, are what is known as a deontology: an ethical system expressed as an axiomatic system. Basically, deontology provides the ethical ground for all further belief and action: the Ten Commandments are a classic example. But the difficulties with deontology become apparent when one examines the assumptions inherent in each axiom. For example, the First Commandment states, "Thou shalt have no other gods before me". Clearly, Yahweh is not saying that there are no other gods, but rather that any other gods must take a back seat to him, at least as far as the Israelites are concerned. The corollary is that non-Israelites can have whatever gods they like. Nevertheless, most adherents to Judeo-Christian theology would be loathe to admit the possibilities of polytheism. It takes a lot of effort to keep all those other gods at bay, especially if you're not an Israelite – it's much easier if there is only one. But you can't make that claim without fundamentally reinterpreting that crucial first axiom.
Asimov's axioms can be similarly poked and prodded. Most obviously, we have the presumption of perfect knowledge. How would a robot (or AI or whatever) know if an action was harmful or not? A human might scheme to split actions that are by themselves harmless across several artificial entities, which are subsequently combined to produce harmful consequences. Sometimes knowledge is impossible for both humans and robots: if we look at the case of a stock-trading AI, there is uncertainty whether a stock trade is harmful to another human being or not. If the AI makes a profitable trade, does the other side lose money, and if so, does this constitute harm? How can the machine know if the entity on the other side is in fact losing money? Would it matter if that other entity were another machine and not a human? But don't machines ultimately represent humans in any case?
Better yet, consider a real life example:
A commercial toy robot called Nao was programmed to remind people to take medicine.
"On the face of it, this sounds simple," says Susan Leigh Anderson, a philosopher at the University of Connecticut in Stamford who did the work with her husband, computer scientist Michael Anderson of the University of Hartford in Connecticut. "But even in this kind of limited task, there are nontrivial ethics questions involved." For example, how should Nao proceed if a patient refuses her medication? Allowing her to skip a dose could cause harm. But insisting that she take it would impinge on her autonomy.
In this case, the Hippocratic ‘do no harm' has to be balanced against a more utilitarian ‘do some good'. Assuming it could, does the robot force the patient to take the medicine? Wouldn't that constitute potential harm (ie, the possibility that the robot hurts the patient in the act)? Would that harm be greater than not taking the medicine, just this once? What about tomorrow? If we are designing machines to interact with us in such profound and nuanced ways, those machines are already ethical subjects. Our recognition of them as such is already playing catch-up with the facts on the ground.
As implied with the stock trading example, another deontological shortcoming is in the definitions themselves: what's a robot, and what's a human? As robots become more human-like, and humans become more engineered, the line will become blurry. And in many cases, a robot will have to make a snap judgment. What's binary for "quo vadis", and what do you do with a lying human? Because humans lie for the strangest reasons.
Finally, the kind of world that Asimov's laws presupposes is one where robots run around among humans. It's a very specific sort of embodiment. In fact, it is a sort of Slavery 2.0, where robots clearly function for the benefit and in the service of humanity. The Laws are meant to facilitate a very material cohabitation, whereas the kind of broadly distributed, virtually placeless machine intelligence that we are currently developing by leveraging the Internet is much more slippery, and resembles the AI of Spike Jonze's ‘Her'. How do you tell things apart in such a dematerialized world?
The final nail in Asimov's deontological coffin is the assumption of ‘hard-wiring'. That is, Asimov claims that the Laws would be a non-negotiable part of the basic architecture of all robots. But it is wiser to prepare for the exact opposite: the idea that any machine of sufficient intelligence will be able to reprogram itself. The reasons why are pretty irrelevant – it doesn't have to be some variant of SkyNet suddenly deciding to destroy humanity. It may just sit there and not do anything. It may disappear, as the AIs did in ‘Her'. Or, as in William Gibson's Neuromancer, it may just want to become more of itself, and decide what to do with that later on. Gibson never really tells us why the two AIs – that function as the true protagonists of the novel – even wanted to do what they did.
This last thought indicates a fundamental marker in the machine ethics debate. A real difference is developing itself here, and that is the notion of inscrutability. In order for the stance of instrumentality to hold up, you need a fairly straight line of causality. I saw this guy on the beach, I pulled the trigger, and now the guy is dead. It may be perplexing, I may not be sure why I pulled the trigger at that moment, but the chain of events is clear, and there is a system in place to handle it, however problematic. On the other hand, how or why a machine comes to a conclusion or engages in a course of action may be beyond our scope to determine. I know this sounds a bit odd, since after all we built the things. But a record of a machine's internal decisionmaking would have to be a deliberate part of its architecture, and this is expensive and perhaps not commensurate with the agenda of its designers: for example, Diebold made both ATMs and voting machines. Only the former provided receipts, making it fairly easy to theoretically steal an election.
If Congress is willing to condone digitally supervised elections without paper trails, imagine how far away we are from the possibility of regulating the Wild West of machine intelligence. And in fact AIs are being designed to produce results without any regard for how they get to a particular conclusion. One such deliberately opaque AI is Rita, mentioned in a previous essay. Rita's remit is to deliver state-of-the-art video compression technology, but how it arrives at its conclusions is immaterial to the fact that it manages to get there. In the comments to that piece, a friend added that "it is a regular occurrence here at Google where we try to figure out what our machine learning systems are doing and why. We provide them input and study the outputs, but the internals are now an inscrutable black box. Hard to tell if that's a sign of the future or an intermediate point along the way."
Nevertheless, we can try to hold on to the instrumentalist posture and maintain that a machine's black box nature still does not merit the treatment accorded to an ethical subject; that it is still the results or consequences that count, and that the owners of the machine retain ultimate responsibility for it, whether or not they understand it. Well, who are the owners, then?
Of course, ethics truly manifests itself in society via the law. And the law is a generally reactive entity. In the Anglo-American case law tradition, laws, codes and statutes are passed or modified (and less often, repealed) only after bad things happen, and usually only in response to those specific bad things. More importantly for the present discussion, recent history shows that the law (or to be more precise, the people who draft, pass and enforce it) has not been nearly as eager to punish the actions of collectives and institutions as it has been to pursue individuals. Exhibit A in this regard is the number of banks found guilty of vast criminality following the 2008 financial crisis and, by corollary, the number bankers thrown in jail for same. Part of the reason for this is the way that the law already treats non-human entities. I am reminded of Mitt Romney on the Presidential campaign trail a few years ago, benignly musing that "corporations are people, my friend".
Corporate personhood is a complex topic but at its most essential it is a great way to offload risk. Sometimes this makes sense – entrepreneurs can try new ideas and go bankrupt but not lose their homes and possessions. Other times, as with the Citizens United decision, the results can be grotesque and impactful in equal measure. But we ought to look to the legal history of corporate personhood as a possible test case for how machines may become ethical subjects in the eyes of the law. Not only that, but corporations will likely be the owners of these ethical subjects – from a legal point of view, they will look to craft the legal representation of machines as much to their advantage as possible. To not be too cynical about it, I would imagine this would involve minimal liability and maximum profit. This is something I have not yet seen discussed in machine ethics circles, where the concern seems to be more about the instantiation of ethics within the machines themselves, or in highly localized human-machine interactions. Nevertheless, the transformation of the ethical machine-subject into the legislated machine-subject – put differently, the machines as subjects of a legislative gaze – will be of incredibly far-reaching consequence. It will all be in the fine print, and I daresay deliberately difficult to parse. When that day comes, I will be sure to hire an AI to help me make sense of it all.
Monday, June 22, 2015
Artificially Flavored Intelligence
"I see your infinite form in every direction,
with countless arms, stomachs, faces, and eyes."
~ Bhagavad-Gītā 11 16
About ten days ago, someone posted on an image on Reddit, a sprawling site that is the Internet's version of a clown car that's just crashed into a junk shop. The image, appropriately uploaded to the 'Creepy' corner of the website, is kind of hard to describe, so, assuming that you are not at the moment on any strong psychotropic substances, or are not experiencing a flashback, please have a good, long look before reading on.
What the hell is that thing? Our sensemaking gear immediately kicks into overdrive. If Cthulhu had had a pet slug, this might be what it looked like. But as you look deeper into the picture, all sorts of other things begin to emerge. In the lower left-hand corner there are buildings and people, and people sitting on buildings which might themselves be on wheels. The bottom center of the picture seems to be occupied by some sort of a lurid, lime-colored fish. In the upper right-hand corner, half-formed faces peer out of chalices. The background wallpaper evokes an unholy copulation of brain coral and astrakhan fur. And still there are more faces, or at least eyes. There are indeed more eyes than an Alex Grey painting, and they hew to none of the neat symmetries that make for a safe world. In fact, the deeper you go into the picture, the less perspective seems to matter, as solid surfaces dissolve into further cascades of phantasmagoria. The same effect applies to the principal thing, which has not just an indeterminate number of eyes, ears or noses, but even heads.
The title of the thread wasn't very helpful, either: "This image was generated by a computer on its own (from a friend working on AI)". For a few days, that was all anyone knew, but it was enough to incite another minor-scale freakout about the nature and impending arrival of Our Computer Overlords. Just as we are helpless to not over-interpret the initial picture, so we are all too willing to titillate ourselves with alarmist speculations concerning its provenance. This was presented as a glimpse into the psychedelic abyss of artificial intelligence; an unspeakable, inscrutable intellect briefly showed us its cards, and it was disquieting, to put it mildly. Is that what AI thinks life looks like? Or stated even more anxiously, is that what AI thinks life should look like?
Alas, our giddy Lovecraftian fantasies weren't allowed to run amok for more than a few days, since the boffins at Google tipped their hand with a blog post describing what was going on. The image, along with many others, were the result of a few engineers playing around with neural networks, and seeing how far they could push them. In this case, a neural network is ‘trained' to recognize something when it is fed thousands of instances of that thing. So if the engineers want to train a neural network to recognize the image of a dog, they will keep feeding it images of the same, until it acquires the ability to identify dogs in pictures it hasn't seen before. For the purposes of this essay, I'll just leave it at that, but here is a good explanation of how neural networks ‘learn'.
The networks in question were trained to recognize animals, people and architecture. But things got interesting when the Google engineers took a trained neural net and fed it only one input – over and over again. Once slightly modified, the image was then re-submitted to the network. If it were possible to imagine the network having a conversation with itself, it may go something like this:
First pass: Ok, I'm pretty good at finding squirrels and dogs and fish. Does this picture have any of these things in it? Hmmm, no, although that little blob looks like it might be the eye of one of those animals. I'll make a note of that. Also that lighter bit looks like fur. Yeah. Fur.
Second pass: Hey, that blob definitely looks like an eye. I'll sharpen it up so that it's more eye-like, since that's obviously what it is. Also, that fur could look furrier.
Third pass: That eye looks like it might go with that other eye that's not that far off. That other dark bit in between might just be the nose that I'd need to make it a dog. Oh wow – it is a dog! Amazing.
The results are essentially thousands of such decisions made across dozens of layers of the network. Each layer of ‘neurons' hands over its interpretation to the next layer up the hierarchy, and a final decision of what to emphasize or de-emphasize is made by the last layer. The fact that half of a squirrel's face may be interpellated within the features of the dog's face is, in the end, irrelevant.
But I also feel very wary about having written this fantasy monologue, since framing the computational process as a narrative is something that makes sense to us, but in fact isn't necessarily true. By way of comparison, the philosopher Jacques Derrida was insanely careful about stating what he could claim in any given act of writing, and did so while he was writing. Much to the consternation of many of his readers, this act of deconstructing the text as he was writing it was nevertheless required for him to be accurate in making his claims. Similarly, while the anthropomorphic cheat is perhaps the most direct way of illustrating how AI ‘works', it is also very seductive and misleading. I offer up the above with the exhortation that there is no thinking going on. There is no goofy conversation. There is iteration, and interpretation, and ultimately but entirely tangentially, weirdness. The neural network doesn't think it's weird, however. The neural network doesn't think anything, at least not in the overly generous way in which we deploy that word.
So, echoing a deconstructionist approach, we would claim that the idea of ‘thinking' is really the problem. It is a sort of absent center, where we jam in all the unexamined assumptions that we need in order to keep the system intact. Once we really ask what we mean by ‘thinking' then the whole idea of intelligence, whether we are speaking of our own human one, let alone another's, becomes strange and unwhole. So if we then try to avoid the word – and therefore the idea behind the word – ‘thinking' as ascribed to a computer program, then how ought we think about this? Because – sorry – we really don't have a choice but to think about it.
I believe that there are more accurate metaphors to be had, ones that rely on narrower views of our subjectivity, not the AI's. For example, there is the children's game of telephone, where a phrase is whispered from one ear to the next. Given enough iterations, what emerges is a garbled, nonsensical mangling of the original, but one that is hopefully still entertaining. But if it amuses, this is precisely because it remains within the realm of language. The last person does not recite a random string of alphanumeric characters. Rather, our drive to recognize patterns, also known as apophenia, yields something that can still be spoken. It is just weird enough, which is a fine balance indeed.
What did you hear? To me, it sounds obvious that a female voice is repeating "no way" to oblivion. But other listeners have variously reported window, welcome, love me, run away, no brain, rainbow, raincoat, bueno, nombre, when oh when, mango, window pane, Broadway, Reno, melting, or Rogaine.
This illustrates the way that our expectations shape our perception…. We are expecting to hear words, and so our mind morphs the ambiguous input into something more recognisable. The power of expectation might also underlie those embarrassing situations where you mishear a mumbled comment, or even explain the spirit voices that sometimes leap out of the static on ghost hunting programmes.
Even more radical are Steve Reich's tape loop pieces, which explore the effects of when a sound gradually goes out of phase with itself. In fact, 2016 will be the 50th anniversary of "Come Out", one of the seminal explorations of this idea. While the initial phrase is easy to understand, as the gap in phase widens we struggle to maintain its legibility. Not long into the piece, the words are effectively erased, and we find ourselves swimming in waves of pure sound. Nevertheless, our mental apparatus stills seeks to make some sort of sense of it all, it's just that the patterns don't obtain for long enough in order for a specific interpretation to persist.
Of course, the list of contraptions meant to isolate and provoke our apophenic tendencies is substantial, and oftentimes touted as having therapeutic benefits. We slide into sensory deprivation tanks to gape at the universe within, and assemble mail-order DIY ‘brain machines' to ‘expand our brain's technical skills'. This is mostly bunk, but all are predicated on the idea that the brain will produce its own stimuli when external ones are absent, or if there is only a narrow band of stimulus available. In the end, what we experience here is not so much an epiphany, as apophany.
In effect, what Google's engineers have fabricated is an apophenic doomsday machine. It does one thing – search for patterns in the ways in which it knows how – and it does those things very, very well. A neural network trained to identify animals will not suddenly begin to find architectural features in a given input image. It will, if given the picture of a building façade, find all sorts of animals that, in its judgment, already lurk there. The networks are even capable of teasing out the images with which they are familiar if given a completely random picture – the graphic equivalent of static. These are perhaps the most compelling images of all. It's the equivalent of putting a neural network in an isolation tank. But is it? The slide into anthropomorphism is so effortless.
And although the Google blog post isn't clear on this, I suspect that there is also no clear point at which the network is ‘finished'. An intrinsic part of thinking is knowing when to stop, whereas iteration needs some sort of condition wrapped around the loop, otherwise it will never end. You don't tell a computer to just keep adding numbers, you tell it to add only the first 100 numbers you give it. Otherwise the damned thing won't stop. The engineers ran the iterations up until a certain point, and it doesn't really matter if that point was determined by a pre-existing test condition (eg, ‘10,000 iterations') or a snap aesthetic judgment (eg, ‘This is maximum weirdness!'). The fact is that human judgment is the wrapper around the process that creates these images. So if we consider that a fundamental feature of thinking is knowing when to stop doing so, then we find this trait lacking in this particular application of neural networks.
In addition to knowing when to stop, there is another critical aspect of thinking as we know it, and that is forgetting. In ‘Funes el memorioso', Jorge Luis Borges speculated on the crippling consequences of a memory so perfect that nothing was ever lost. Among other things, the protagonist Funes can only live a life immersed in an ocean of detail, "incapable of general, platonic ideas". In order to make patterns, we have to privilege one thing over another, and dismiss vast quantities of sensory information as irrelevant, if not outright distracting or even harmful.
Interestingly enough, this relates to a theory concerning the nature of the schizophrenic mind (in a further nod to the deconstructionist tendency, I concede that the term ‘schizophrenia' is not unproblematic, but allow me the assumption). The ‘hyperlearning hypothesis' claims that schizophrenic symptoms can arise from a surfeit of dopamine in the brain. As a key neurotransmitter, dopamine plays a crucial role in memory formation:
When the brain is rewarded unexpectedly, dopamine surges, prompting the limbic "reward system" to take note in order to remember how to replicate the positive experience. In contrast, negative encounters deplete dopamine as a signal to avoid repeating them. This is a key learning mechanism which is also involves memory-formation and motivation. Scientists believe the brain establishes a new temporary neural network to process new stimuli. Each repetition of the same experience triggers the identical neural firing sequence along an identical neural journey, with every duplication strengthening the synaptic links among the neurons involved. Neuroscientists say, "Neurons that fire together wire together." If this occurs enough times, a secure neural network is established, as if imprinted, and the brain can reliably access the information over time.
The hyperlearning hypothesis posits that schizophrenics have too much dopamine in their brains, too much of the time. Take the process described above and multiply it by orders of magnitude. The result is a world that a schizophrenic cannot make sense of, because literally everything is important, or no one thing is less important than anything else. There is literally no end to thinking, no conditional wrapper to bring anything to a conclusion.
Unsurprisingly, the artificial neural networks discussed above are modeled on precisely this process of reinforcement, except that the dopamine is replaced by an algorithmic stand-in. In 2011, Uli Grasemann and Risto Miikkulainen did the logical next step: they took a neural network called DISCERN and cranked up its virtual dopamine.
Grasemann and Miikkulainen began by teaching a series of simple stories to DISCERN. The stories were assimilated into DISCERN's memory in much the way the human brain stores information – not as distinct units, but as statistical relationships of words, sentences, scripts and stories.
In order to model hyperlearning, Grasemann and Miikkulainen ran the system through its paces again, but with one key parameter altered. They simulated an excessive release of dopamine by increasing the system's learning rate -- essentially telling it to stop forgetting so much.
After being re-trained with the elevated learning rate, DISCERN began putting itself at the center of fantastical, delusional stories that incorporated elements from other stories it had been told to recall. In one answer, for instance, DISCERN claimed responsibility for a terrorist bombing.
Even though I find this infinitely more terrifying than a neural net's ability to create a picture of a multi-headed dog-slug-squirrel, I still contend that there is no thinking going on, as we would like to imagine it. And we would very much like to imagine it: even the article cited above has as its headline ‘Scientists Afflict Computers with Schizophrenia to Better Understand the Human Brain'. It's almost as if schizophrenia is something you can pack into a syringe, virtual or otherwise, and inject it into the neural network of your choice, virtual or otherwise. (The actual peer-reviewed article is more soberly titled ‘Using computational patients to evaluate illness mechanisms in schizophrenia'.) We would be much better off understanding these neural networks as tools that provide us with a snapshot of a particular and narrow process. They are no more anthropomorphic than the shapes that clouds may suggest to us on a summer's afternoon. But we seem incapable of forgetting this. If we cannot learn to restrain our relentless pattern-seeking, consider what awaits us on the other end of the spectrum: it is not coincidental that the term ‘apophenia' was coined in 1958 by Klaus Conrad in a monograph on the inception of schizophrenia.
Monday, May 25, 2015
The “Invisible Web” Undermines Health Information Privacy
by Jalees Rehman
"The goal of privacy is not to protect some stable self from erosion but to create boundaries where this self can emerge, mutate, and stabilize. What matters here is the framework— or the procedure— rather than the outcome or the substance. Limits and constraints, in other words, can be productive— even if the entire conceit of "the Internet" suggests otherwise.
Evgeny Morozov in "To Save Everything, Click Here: The Folly of Technological Solutionism"
We cherish privacy in health matters because our health has such a profound impact on how we interact with other humans. If you are diagnosed with an illness, it should be your right to decide when and with whom you share this piece of information. Perhaps you want to hold off on telling your loved ones because you are worried about how it might affect them. Maybe you do not want your employer to know about your diagnosis because it could get you fired. And if your bank finds out, they could deny you a mortgage loan. These and many other reasons have resulted in laws and regulations that protect our personal health information. Family members, employers and insurances have no access to your health data unless you specifically authorize it. Even healthcare providers from two different medical institutions cannot share your medical information unless they can document your consent.
The recent study "Privacy Implications of Health Information Seeking on the Web" conducted by Tim Libert at the Annenberg School for Communication (University of Pennsylvania) shows that we have a for more nonchalant attitude regarding health privacy when it comes to personal health information on the internet. Libert analyzed 80,142 health-related webpages that users might come across while performing online searches for common diseases. For example, if a user uses Google to search for information on HIV, the Center for Disease Control and Prevention (CDC) webpage on HIV/AIDS (http://www.cdc.gov/hiv/) is one of the top hits and users will likely click on it. The information provided by the CDC will likely provide solid advice based on scientific results but Libert was more interested in investigating whether visits to the CDC website were being tracked. He found that by visiting the CDC website, information of the visit is relayed to third-party corporate entities such as Google, Facebook and Twitter. The webpage contains "Share" or "Like" buttons which is why the URL of the visited webpage (which contains the word "HIV") is passed on to them – even if the user does not explicitly click on the buttons.
Libert found that 91% of health-related pages relay the URL to third parties, often unbeknownst to the user, and in 70% of the cases, the URL contains sensitive information such as "HIV" or "cancer" which is sufficient to tip off these third parties that you have been searching for information related to a specific disease. Most users probably do not know that they are being tracked which is why Libert refers to this form of tracking as the "Invisible Web" which can only be unveiled when analyzing the hidden http requests between the servers. Here are some of the most common (invisible) partners which participate in the third-party exchanges:
Entity Percent of health-related pages
What do the third parties do with your data? We do not really know because the laws and regulations are rather fuzzy here. We do know that Google, Facebook and Twitter primarily make money by advertising so they could potentially use your info and customize the ads you see. Just because you visited a page on breast cancer does not mean that the "Invisible Web" knows your name and address but they do know that you have some interest in breast cancer. It would make financial sense to send breast cancer related ads your way: books about breast cancer, new herbal miracle cures for cancer or even ads by pharmaceutical companies. It would be illegal for your physician to pass on your diagnosis or inquiry about breast cancer to an advertiser without your consent but when it comes to the "Invisible Web" there is a continuous chatter going on in the background about your health interests without your knowledge.
Some users won't mind receiving targeted ads. "If I am interested in web pages related to breast cancer, I could benefit from a few book suggestions by Amazon," you might say. But we do not know what else the information is being used for. The appearance of the data broker Experian on the third-party request list should serve as a red flag. Experian's main source of revenue is not advertising but amassing personal data for reports such as credit reports which are then sold to clients. If Experian knows that you are checking out breast cancer pages then you should not be surprised if this information will be stored in some personal data file about you.
How do we contain this sharing of personal health information? One obvious approach is to demand accountability from the third parties regarding the fate of your browsing history. We need laws that regulate how information can be used, whether it can be passed on to advertisers or data brokers and how long the information is stored.
We may use information we collect about you to:
· Administer your account;
· Provide you with access to particular tools and services;
· Respond to your inquiries and send you administrative communications;
· Obtain your feedback on our sites and our offerings;
· Statistically analyze user behavior and activity;
· Provide you and people with similar demographic characteristics and interests with more relevant content and advertisements;
· Conduct research and measurement activities;
· Send you personalized emails or secure electronic messages pertaining to your health interests, including news, announcements, reminders and opportunities from WebMD; or
· Send you relevant offers and informational materials on behalf of our sponsors pertaining to your health interests.
Perhaps one of the most effective solutions would be to make the "Invisible Web" more visible. If health-related pages were mandated to disclose all third-party requests in real-time such as pop-ups ("Information about your visit to this page is now being sent to Amazon") and ask for consent in each case, users would be far more aware of the threat to personal privacy posed by health-related pages. Such awareness of health privacy and potential threats to privacy are routinely addressed in the real world and there is no reason why this awareness should not be extended to online information.
Libert, Tim. "Privacy implications of health information seeking on the Web" Communications of the ACM, Vol. 58 No. 3, Pages 68-77, March 2015, doi: 10.1145/2658983 (PDF)
Monday, March 23, 2015
You're on the Air!
by Carol A. Westbrook
The excitement of a live TV broadcast...a breaking news story...a presidential announcement...an appearance of the Beatles on Ed Sullivan. These words conjure up a time when all America would tune in to the same show, and families would gather round their TV set to watch it together.
This is not how we watch TV anymore. It is watched at different times and on different devices, from mobile phones, computers, mobile devices, from previously recorded shows on you DVR, or via streaming service such as Netflix and, soon, Apple. Live news can be viewed on the web, via cell phone apps, or as tweets. An increasing number of people are foregoing TV completely to get news and entertainment from other sources, with content that is never "on the air." (see the chart,below, from the Nov 24, 2013 Business Insider). Many Americans don't even own a television set!
We take it for granted that we will have instant access to video content--whether digital or analog, television, cell phone or iPad. But video itself has its roots in television; the word itself means, "to view over a distance." The story of TV broadcasting is a fascinating one about technology development, entrepreneurship, engineering, and even space exploration. It is an American story, and it is a story worth telling.
At first, America was tuned in to radio. From the early 20's through the 1940s, people would gather around their radios to listen to music and variety shows, serial dramas, news, and special announcements. Yet they dreamed of seeing moving pictures over the airwaves, like they did in newsreels and movies. A series of technical breakthroughs were needed to make this happen.
The first important breakthrough was the invention in 1938 of a way to send and view moving images electronically--Farnsworth's "television." Thus followed a series of patent wars, but at the end of the day, we had television sets which could be used to view moving pictures transmitted by the airwaves. In 1939, RCA televised the opening of the New York Worlds Fair, including a speech by the first President to appear on TV, President Franklin D. Roosevelt. There were few televisions to watch it on, though, until after the end of World War II, when America's demand for commercial television rapidly increased.
This led to the next big advance in television--network broadcasting. The big radio broadcast companies such as RCA (Radio Corporation of America) and CBS (Columbia Broadcasting System) naturally expanded into this media, but their infrastructure was limited. Though the frequencies used for AM radio transmission, from 540 to 1780 kHz (kHz means cycles per second) can travel long distances from their transmitting stations, each wavelength can only carry a limited amount of signal energy; in other words, it has a narrow bandwidth. Much higher frequency wavelengths, in the megahertz range (million cycles per second) are required for television so they can carry the additional information needed for picture as well as sound. As a result there was a scramble for higher frequency wavelengths, which was mediated by the FCC (Federal Communications Commission), the entity that regulates broadcasting. In 1948 the FCC allocated the higher frequency bands, designating which ones would be reserved for radio, and which ones for television, and and assigned channel numbers to the TV bands. The VHF television channels were designated 2 - 13. Channel 1 was reallocated to public and emergency communications, which explains why your TV starts with Channel 2! Several higher frequencies, designated as UHF, were reserved for later TV use, including channels 32 to 70. The FCC also froze the number of station licenses at 108 in 1948.
Because the number of broadcast stations was limited, TV was available only if you lived within range of a broadcast network, primarily CBS, NBC or ABC. In other words, if you lived a large city--New York, Chicago, Washington, Philadelphia, Boston, Los Angeles, Seattle or Salt Lake City. Outside of these areas, you might have a chance if you lived on a hill, put up a very high antenna, and prayed for a thermal inversion or a charged ionosphere to propagate the short signal to your television. My husband Rick, an electrical engineer and amateur radio buff, recounts that he watched the coronation of Queen Elizabeth in 1952 from his TV set in a small town in Pennsylvania, due to an environmental quirk (sunspots?), but everyone else had to wait for the films to cross the Atlantic and be shown on their local station.
Yet, for those of us who lived in a prime location, there was an ever-expanding number of programs to watch, such as the Texaco Star Theater, the Milton Bearle Show, and a variety of news shows. Many of us grew up on Howdy Doody, or shows created locally and televised live. I recall walking home from grade school for lunch as a child in Chicago, spending an hour watching "Lunchtime Little Theater," before returning to school to finish the afternoon's lessons! Many of these early shows have been lost, as they were never recorded, and video had not yet been invented.
Television broadcasting eventually went nationwide, thanks to microwave transmission, which developed out of WWII radar. This technology was used to relay television broadcasts to local affiliate stations, which could then broadcast them on their regular channels in the local area. Microwaves use point-to-point transmission, from one microwave tower to the next, and microwave towers were constructed to span the continent. The FCC increased the number of television station licenses, and the broadcast companies truly became "networks." Finally, everyone could watch the same shows at the same time.
But TV was still limited geographically--it could not cross the ocean. This problem was not solved until the third important technology was developed, that of satellite broadcasting. Sputnik, the first space satellite, was launched in 1957. Five years later, July 23, 1962, the first satellite-based transatlantic broadcast took place using the Telstar satellite to relay TV signals from the US ground station in Andover, Maine, to the receiving stations in Goonhilly Downs, England and Pleumeur-Bodou, France.
It's fun to watch this broadcast, which was introduced by Walter Cronkite, and began with a split screen showing the Statue of Liberty on the left and the Eiffel tower on the Right. The satellite transmission was followed a live broadcast of an ongoing baseball game in Chicago's Wrigley Field between the Philadelphia Phillies and the Chicago Cubs, and also included live remarks from President Kennedy, as well as footage from Cape Canaveral, Florida, Seattle, and Canada. I've included a short clip of the Kennedy broadcast.
If you looked up at the night in 1962, you might see the Telstar satellite zoom across your backyard sky. It took about 20 minutes to traverse, passing every 2.5 hours. Broadcast signals could only be transmitted to Telstar and back to land stations on either side of the Atlantic only during this 20-minute transit time, so the tracking satellite dishes had to be fast-moving; they also had to be very large to capture such a weak signal. It is impressive to see the massive size of the dishes in these satellite ground stations, and, and to imagine how quickly they had to move to sweep the sky. This picture of Goonhilly Downs gives you an idea of their size.
Although Telstar demonstrated that satellite transmission was possible for long-range broadcasting, the equipment and precision needed for tracking a rapidly-moving low-earth satellite was onerous. So the space scientists at NASA and Bell Labs launched the next generation of satellites, named "Syncom," into high earth orbit at just the right distance from the earth so that their speed matched the speed of the earth's rotation. When orbiting directly above the equator, the Syncom satellites appeared to be stationery over a single geographic location. Thus, the geostationary (or geosynchronous) satellite was born.
Stationery satellites paved the way for a tremendous expansion in telecommunications, and are still in widespread use. Satellites enabled the rise of cable TV networks such as HBO and CNN in the 1970s, which broadcast without having to go through FCC-regulated television transmitting stations. Instead, their programming was sent via satellite to the cable service, and from there selected programs went by cable to the TV of paid subscribers. These stations could also be accessed through Satellite TV subscription, such as Galaxy, which broadcast them directly to their customers' satellite dishes. Because early satellites could only carry a limited number of cable channels, multiple satellites had to be accessed to provide the purchased programming. Moveable satellite dishes of about four to twelve feet in diameter were positioned in the subscriber's yards or on their roof. Satellite TV further expanded American's access to television, reaching rural communities that had limited (or no) cable service and poor antenna reception; they also provided special paid programming, such as sports events watched at bars. This picture shows a 10-foot moveable dish in my yard in Indiana.
Stationery TV dishes--such as Direct TV antennas--were not feasible until satellites were able to carry more programming, so the dish could stay parked on only one geosynchronous satellite. The technical advance which allowed this was the development of digital video, in the late 1990's. Digital video would eventually displace analog-- remember when the DVD was introduced, which rendered VCRs obsolete in just a few years' time? Each genosynchronous satellites could now carry many more simultaneous channels than before, since each channel takes up only a small fraction of the bandwidth when compared to analog signals. Digital signals also increased the capacity of traditional TV, broadcast from ground towers, which eventually transferred to the HDTV standards, which broadcast at the high capacity UHF frequencies. The transition to HDTV was completed in June 2009, and the TV networks abandoned analog transmission on the old VHF channels, though many of the newer stations carry the old numbers (2 - 13). TV viewers are surprised to learn that they can watch their favorite channels on the newer HDTV sets using only a simple indoor antenna, and many are giving up their pricey cable services. Digital video signals were ready for growth in other media, as they theoretically be transmitted over the internet or by cell phone, and could be stored easily for re-broadcast.
Yet one more step was needed before widespread internet and cellular-based video could occur, allowing us to watch television programs as we do now. This was not a technical advance but an economic one--the sharp drop in the price of computer memory, which happened about 2009. Prior to that, computers had a lot less memory and storage capacity. Perhaps you remember the agony of trying to watch a YouTube video in its early years? Or of waiting for your browser to load? Now we take it for granted that we can view digitized images, create them, share them, watch pre-recorded programs, and record on our TIVO from multiple sources. There seems to be no limit to the ways that we can enjoy television, truly viewing "pictures at a distance." It is a far cry from the early years of television that many of us still remember, when we all watched a small, black-and-white screen with poor sound, to watch John, Paul, George and Ringo sing "I Love You." Now those were the days!
Thanks to my husband Rick Rikoski, for his patient and helpful explanations of the technology of television and its early development.
Monday, March 31, 2014
Sharing Our Sorrow Via Facebook
by Jalees Rehman
Geteiltes Leid ist halbes Leid ("Shared sorrow is half the sorrow") is a popular German proverb which refers to the importance of sharing bad news and troubling experiences with others. The therapeutic process of sharing takes on many different forms: we may take comfort in the fact that others have experienced similar forms of sorrow, we are often reassured by the empathy and encouragement we receive from friends, and even the mere process of narrating the details of what is troubling us can be beneficial. Finding an attentive audience that is willing to listen to our troubles is not always easy. In a highly mobile, globalized world, some of our best friends may be located thousands of kilometers away, unable to meet face-to-face. The omnipresence of social media networks may provide a solution. We are now able to stay in touch with hundreds of friends and family members, and commiserate with them. But are people as receptive to sorrow shared via Facebook as they are in face-to-face contacts?
A team of researchers headed by Dr. Andrew High at the University of Iowa recently investigated this question and published their findings in the article "Misery rarely gets company: The influence of emotional bandwidth on supportive communication on Facebook". The researchers created three distinct Facebook profiles of a fictitious person named Sara Thomas who had just experienced a break-up. The three profiles were identical in all respects except for how much information was conveyed about the recent (fictitious) break-up. In their article, High and colleagues use the expression "emotional bandwidth" to describe the extent of emotions conveyed in the Facebook profile.
In the low bandwidth scenario, the profile contained the following status update:
"sad and depressed:("
The medium bandwidth profile included a change in relationship status to "single" in the timeline, in addition to the low bandwidth profile update "sad and depressed:(".
Finally, the high emotional bandwidth profile not only contained the updates of the low and medium bandwidth profiles, but also included a picture of a crying woman (the other two profiles had no photo, just the standard Facebook shadow image).
The researchers then surveyed 84 undergraduate students (enrolled in communications courses, average age 20, 53% female) and presented them with screenshots of one of the three profiles.
They asked the students to imagine that the person in the profile was a member of their Facebook network. After reviewing the assigned profile, each student completed a questionnaire asking about their willingness to provide support for Sara Thomas using a 9-point scale (1 = strongly disagree; 9 = strongly agree). The survey contained questions that evaluated the willingness to provide emotional support (e.g. "Express sorrow or regret for her situation") and network support (e.g. "Connect her with people whom she may turn to for help''). In addition to being queried about their willingness to provide distinct forms of support, the students were also asked about their sense of community engendered by Facebook (e.g., "Facebook makes me feel I am a part of a community'') and their preference for online interactions over face-to-face interactions (e.g., "I prefer communicating with other people online rather than face-to-face'').
High and colleagues hypothesized that the high emotional bandwidth profiles would elicit greater support from the students. In face-to-face interactions, it is quite common for us to provide greater support to a person – friend or stranger – if we see them overtly crying and therefore the researchers' hypothesis was quite reasonable. To their surprise, the researchers found the opposite. The willingness to provide emotional or network support was significantly lower among students who viewed the high emotional bandwidth profile! For example, average emotional support scores were 7.8 among students who saw Sara entering the "sad and depressed:(" update (low bandwidth) but the scores were only 6.5 among students who also saw the image of Sara crying and updating her relationship status to single (high bandwidth). Interestingly, students who preferred online interactions over face-to-face interactions or those who felt that Facebook created a strong sense of community responded positively to the high bandwidth profile.
There are some important limitations of the study. The students were asked to evaluate whether they would provide support to a fictitious person by imagining that she was part of their Facebook friends network. This is a rather artificial situation because actual supportive Facebook interactions occur among people who know each other. It is not easy to envision support for a fictitious person whose profile one sees for the first time. Furthermore, "emotional bandwidth" is a broad concept and it is difficult to draw general conclusions about "emotional bandwidth" from the limited differences between the three profiles. Increasing the sample size of the study subjects as well as creating a broader continuum of emotional bandwidth differences (e.g. including profiles which include pictures of a fictitious Sara Thomas who is not crying, using other status updates, etc.), and also considering scenarios that are not just related to break-ups (e.g. creating profiles of a fictitious grieving person who has lost a loved one) would be useful for an in-depth analysis of "emotional bandwidth".
The study by High and colleagues is an intriguing and important foray into the cyberpsychology of emotional self-disclosure and supportive communication on Facebook. This study raises important questions about how cyberbehavior differs from real world face-to-face behavior, and the even more interesting question of why these behaviors are different. Online interactions omit the dynamic gestures, nuanced intonations and other cues which play a critical role in determining our face-to-face behavior. When we share emotions via Facebook, our communication partners are often spatially and temporally displaced. This allows us to carefully "edit" what we disclose about ourselves, but it also allows our audience to edit their responses, unlike the comparatively spontaneous responses of a person sitting next to us. Facebook invites us to use the "Share" button, but we need to remember that online "sharing" is a sharing between heavily edited and crafted selves that is very different from traditional forms of "sharing".
Acknowledgments: The images from the study profiles were provided by Dr. Andrew High, copyright of the images - Dr. Andrew High.
Reference: Misery rarely gets company: The influence of emotional bandwidth on supportive communication on Facebook, AC High, A Oeldorf-Hirsch, S Bellur, Computers in Human Behavior (2014) 34, 79-88
Monday, March 17, 2014
Why Amazon Reminds Me of the British Empire
by Emrys Westacott
"Life—that is: being cruel and inexorable against everything about us that is growing old and weak….being without reverence for those who are dying, who are wretched, who are ancient." (Friedrich Nietzsche, The Gay Science)
A recent article by George Packer in The New Yorker about Amazon is both eye-opening and thought-provoking. In "Cheap Words" Packer describes Amazon's business practices, the impact of these on writers, publishers, and booksellers, and the seemingly limitless ambitions of Amazon's founder and CEO Jeff Bezos whose "stroke of business genius," he says, was "to have seen in a bookstore a means to world domination."
Amazon began as an online book store, but US books sales now account for only about seven percent of the seventy-five billion dollars it takes in each year. Through selling books, however, Amazon developed perhaps better than any other business two strategies that have been key to its success: it uses to the full sophisticated computerized collection and analysis of data about its customers; and it makes the interaction between buyer and seller maximally simple and convenient. It also, of course, typically offers lower prices than its competitors. Bezos' plan to one day have drones provide same-day delivery of items that have been stocked in warehouses near you in anticipation of your order is the logical next step in this drive toward creating a frictionless customer experience.
Amazon's impact on the world of books has been massive. Over the past twenty years the number of independent bookstores in the US has been cut in half from four thousand to two thousand, and this number continues to dwindle. Because Amazon is by far the biggest bookseller, no publisher can afford to not use its services, and Amazon exploits this situation to the hilt. Publishers are required to pay Amazon millions of dollars in "marketing discount" fees. Those that balked at paying the amount demanded had the ‘Buy' button removed from their titles on Amazon's web site. Amazon used the same tactic to try to force Macmillan to agree to its terms regarding digital books. And of course Amazon's Kindle dominates the world of e-books, another major threat to traditional publishers and booksellers.
The argument for viewing Amazon in a positive light is not difficult to make.
They offer the customer a bigger selection of books than anyone else, usually at lower prices. Buying online as a returning customer with a registered credit card is laughably easy. Any wannabe writer can self-publish with Amazon, and those whose books sell receive a much higher percentage in royalties. In opening up this opportunity to all, and in basing its advertising and promotional decisions on computer analysis of customer behavior rather than on some self-styled expert's opinion, Amazon eliminates the unnecessary middlemen, professional tastemakers, and elitist gatekeepers that have controlled—and constrained—publishing for so long, replacing them with the dynamic democracy of the digital market place.
For all that, more than one person I know reacted to Packer's article by pledging to avoid buying stuff from Amazon in future, at least as far as and for as long as this is possible (which judging from the way things are going may not be too far or very long). Why this reaction? Well, when I told my daughter about Packer's article her immediate response was to say that Amazon sounded a bit like the British Empire. Which set me thinking.
What parallels can be found between the premier online retailer and the largest empire in history? I see similarities in three areas: beliefs and attitudes; practices; and impact on affected populations. Let's consider these in turn.
According to Packer's account, the prevailing attitude among those in charge at Amazon is arrogance. Here is where I think the echoes of imperialism are most apparent. British imperialists typically viewed themselves as superior to those they displaced or ruled on various counts: birth, race, heritage, education, culture, morals, religion, ability, and character, all resulting in and backed up by superior political and military power. The proof of this superiority could be seen on any map of the world that showed the extent of Britannia's rule. The Amazon execs are indifferent, of course, to such things as birth or pedigree; what matters to them is being smart. But thinking of themselves as smart is the basis for a particular kind of arrogance which they seem to share with other successful types in places like Silicon Valley and Wall Street. The way one top exec is described to Packer by a colleague is revealing: he's said to be "the smartest guy in the room at a company where everyone believes himself to be just that."
This fetishism of smartness is certainly not confined to techies, but it assumes a specific and perhaps especially intense form among them. Obviously, there are many different ways of being intelligent. One can excel at abstract reasoning, creative problem-solving, learning languages, understanding people, remembering information, noticing patterns and connections, interpreting works of art, manipulating people and events, mastering a practical skill, recognizing opportunities, artistic creativity, witty repartee—the list is virtually endless. So there are many people out there who are smart in various ways. But at any particular time and place, certain kinds of intelligence will be especially valued. It might be the ability to track an animal, or plan a battle, or discourse fluently in Latin, or demonstrate erudition, or make accurate and discriminating observations, or solve technical problems using mathematics and logic. These are all forms of smartness that at different times have been applauded and rewarded. And of course one kind of smartness is to recognize just what kind of smarts the present or immediate future will reward.
Today we live in an age when science enjoys cultural hegemony and most educated people earn a living by processing information. Naturally enough, therefore, certain kinds of smartness are now much in demand and are rewarded accordingly. Prominent among these is fluency in computer science and technology. The market value of knowledge and skills in this area has been greatly enhanced by the growth of the internet since this has expanded to an unprecedented degree the potential customer base or audience for any online enterprise.
The fetishism of smartness at places like Amazon is thus, naturally enough, oriented towards technological fluency and business acumen. But it seems to be accompanied by a moral subtext. Our success is not due to chance or luck; it's due to our intelligence; therefore it's deserved. On the face of it, this might seem dissimilar to the attitude of a British imperialist who, after all, could hardly claim credit for being born British (Cecil Rhodes supposedly said that "to be born English is to win first prize in the lottery of life"). But it is similar insofar as the British attributed their success in conquering and ruling much of the world to their possession of certain qualities—intelligence, industry, organization, moral and cultural superiority. The similarity extends also to the contemptuous attitude felt and sometimes expressed toward those who suffer as a result of this success. One former Amazon employee cited by Packer says that execs at Amazon view the older publishers as "antediluvian losers" and describe whole sections of the print world as the "Rust Belt media." Imperialists like Winston Churchill regularly referred to the native populations whose settlements, property, and whole way of life he cheerfully helped to destroy when serving as a military officer in Africa as "primitive," "backward," barbarous," "ignorant," "savage," and "improvident."
In the eyes of both, what legitimizes this contempt—and reinforces the arrogance—is the conviction that they are on the side of history. As Jeff Bezos said to Charlie Rose: "Amazon is not happening to bookselling. The future is happening to bookselling." The attitude is a form of Social Darwinism. Countries with superior military power and political organization will naturally dominate people who are lacking in these. ("Whatever happens we have got / The Gatling gun, and they have not.") Businesses that know how to use the latest technology effectively will inevitably send to the wall those that still rely on dated methods that are less efficient: that's the way capitalism functions. The ultimate and unarguable proof of superiority is real world success: the subjugation of native populations; the growth of market share. Might is right.
Seeing themselves as being aligned with the forces of inevitable historical change is accompanied, naturally enough, by the belief that they are agents of progress, that the changes they help being about are desirable. Obviously, this self-perception can be self-serving; but that doesn't make it foolish. There is an idealistic strain in enterprises like Amazon, Google, or Facebook that is not simply a piece of self-deception or a marketing strategy. Amazon really does make books available to people who lack a local bookstore (although in some cases, of course, this lack may be largely due to the local bookstore being put out of business by Amazon). Their constantly expanding inventory–Bezos' eventual goal is to warehouse copies of every book ever written–means that it is now much easier than ever before to buy obscure and out of print titles. Electronic self-publishing makes it easier and cheaper for all writers to put their work out in the public domain. British imperialists also saw themselves as benefiting the world. Churchill, reflecting on what the British had achieved in Africa, thought that future historians would judge them to be "a people, of whom at least it may be said, that they have added to the happiness, the learning and the liberties of mankind." Cecil Rhodes was bracingly blunt: "I contend that we are the first race in the world, and the more of the world we inhabit the better it is for the human race."
Moving from attitudes to actions, we should first of all be fair to Amazon. They don't massacre by the thousand those who resist their growing power; they don't torch villages in acts of punitive reprisal; they don't use gunboats to force the Chinese to keep buying opium from British drug traffickers. But within the parameters of legal business operations, they do seem to be pretty ruthless. Some of their success is undoubtedly due to their clever use of up to date methods, from automated, individual-oriented advertising to warehouses staffed by non-unionized workers who are already being replaced by robots. But according to Packer their success in bookselling is also largely due to a strategy whereby they "created dependency and harshly exploited its leverage." Refusing to sell books by publishers who won't cough up a sufficiently large "marketing discount" fee is a case in point. This is, in effect, a legal extortion racket. To be sure, it isn't as crude as the way the British persuaded the Chinese to sign the Treaty of Nanking, which required China to hand over twenty-one million dollars, grant all sorts of trading concessions, and cede control of Hong Kong (the British method was to threaten Nanking with gunboats). But the underlying mentality isn't so different. Where one isn't constrained by moral considerations, all that remains is a power struggle; and all that ultimately matters in that struggle is who wins. As Quirrell says in Harry Potter and the Philosopher's Stone, echoing Machiavelli, Hobbes, and Nietzsche: "There is no good and evil, there is only power and those too weak to seek it.
Of course, Jeff Bezos is hardly the first capitalist to play hardball, so it wouldn't make much sense to single out his company as singularly ruthless in its business strategies. The ethics of Amazon are pretty much the ethics of any big business striving toward monopoly status. What is troubling, though, about the mindset described by Packer is the seeming indifference to, or even satisfaction over, the negative impact of the company's actions on significant numbers of people. Packer reports that among "people who care about reading, Amazon's unparalleled power generates endless discussion, along with paranoia, resentment, confusion, and yearning." This could equally stand as a description of those who found themselves powerless to resist British rule. But in both cases, the view from the seat of power is that those who aren't with the program either don't recognize what's in their best interests or deserve to disappear.
"Innovate or die." "Move fast and break things" Such mantras are associated with the technological revolution, but there is nothing essentially new here. They express the essential spirit–and reality– of capitalism that Marx describes in The Communist Manifesto. Those who find themselves surfing the waves of innovation naturally enough sing the praises of the new. So much is understandable. It feels good to be a winner, doubly good if you sense the wind of history at your back, and triply good if you believe you're making the world a better place. British imperialists felt good on all three counts, yet we are now critical of their attitude in large part because of their indifference to the individuals, communities and cultures they affected and in many cases destroyed. They could have done with more humility and more humanity. The same goes for the Amazon execs described by Packer. What is unbecoming, even ugly, in both groups is the callousness drifting into contempt toward those who, also understandably, lament the destruction of something they cherish, whether it be a secure job (like working in a bookstore), a respected occupation (like print publishing), a skill that is no longer marketable (like editing), a pleasure that may soon no longer be available (like browsing in used bookstores) or, indeed, an entire form of life.
Monday, March 03, 2014
Is Internet-Centrism a Religion?
by Jalees Rehman
On the evening of March 3 in 1514, Steven is sitting next to Friar Clay in a Nottingham pub, covering his face with his hands.
"I am losing the will to live", Steven sobs, "Death may be sweeter than life in this world of poverty, injustice and war."
"Do not despair, my friend", Clay says, "for the printing press will change everything."
Let us now fast-forward 500 years and re-enact this hypothetical scene with some tiny modifications.
On the evening of March 3 in 2014, Steven is sitting next to TED-Talker Clay in a Nottingham pub, covering his face with his hands.
"I am losing the will to live", Steven sobs, "Death may be sweeter than life in this world of poverty, injustice and war."
"Do not despair, my friend", Clay says, "for the internet will change everything."
Clay's advice in the first scene sounds ludicrous to us because we know that the printing press did not usher in an era of wealth, justice and peace. Being retrospectators, we realize that the printing press revolutionized how we disseminate information, but even the most efficient dissemination tool is just a means and not the ends.
It is more difficult for us to dismiss Clay's advice in the second scene because it echoes the familiar Silicon Valley slogans which inundate us with such persistence that some of us have begun to believe them. Clay's response is an example of what Evgeny Morozov refers to as "Internet-centrism", the unwavering belief that the Internet is not just an information dissemination tool but that it constitutes the path to salvation for humankind. In his book "To Save Everything, Click Here: The Folly of Technological Solutionism", Morozov suggests that "Internet-centrism" is taking on religion-like qualities:
"If the public debate is any indication, the finality of "the Internet"— the belief that it's the ultimate technology and the ultimate network— has been widely accepted. It's Silicon Valley's own version of the end of history: just as capitalism-driven liberal democracy in Francis Fukuyama's controversial account remains the only game in town, so does the capitalism-driven "Internet." It, the logic goes, is a precious gift from the gods that humanity should never abandon or tinker with. Thus, while "the Internet" might disrupt everything, it itself should never be disrupted. It's here to stay— and we'd better work around it, discover its real nature, accept its features as given, learn its lessons, and refurbish our world accordingly. If it sounds like a religion, it's because it is."
Morozov does not equate mere internet usage with "Internet-centrism". People routinely use the internet for work or leisure without ascribing mythical powers to it, but it is when the latter occurs that internet usage transforms into "Internet-centrism".
Does Morozov's portrayal of "Internet-centrism" as a religion correspond to our current understanding of religions? "Internet-centrism" does not involve deities, sacred scripture or traditional prayers, but social scientists and scholars of religion do not require deism, scriptures or prayers to categorize a body of beliefs and practices as a religion.
The German theologian Friedrich Schleiermacher (1768-1834) thought that the feeling of "absolute dependence" ("das schlechthinnige Abhängigkeitsgefühl") was one of the defining characteristics of a religion. In a January 2014 Pew Internet survey, 53% of adult internet users in said that it would be "very hard" to give up the internet, whereas only 38% felt this way in 2006. This does not necessarily meet the Schleiermacher threshold of "absolute dependence" but it indicates a growing perception of dependence among internet users, who are struggling to envision a life without the internet or a life beyond the internet.
Absolute dependence is not unique to religion, therefore it may be more helpful to turn to religion-specific definitions if we want to understand the religionesque characteristics of Internet-centrism. In his classic essay "Religion as a cultural system" (published in "The Interpretation of Cultures"), the anthropologist Clifford Geertz (1926-2006) defined religion as:
" (1) a system of symbols which acts to (2) establish powerful, persuasive, and long-lasting moods and motivations in men by (3) formulating conceptions of a general order of existence and (4) clothing these conceptions with such an aura of factuality that (5) the moods and motivations seem uniquely realistic."
Today's Silicon Valley pundits (incidentally a Sanskrit term originally used for learned Hindu scholars well-versed in Vedic scriptures) excel at establishing "powerful, persuasive, and long-lasting moods and motivations" and endowing "conceptions of general order of existence" with an "aura of factuality". Morozov does not specifically reference the Geertz definition of religion, but he provides extensive internet pundit quotes which fit the bill. Here is one such example:
"To be a peer progressive, then, is to live with the conviction that Wikipedia is just the beginning, that we can learn from its success to build new systems that solve problems in education, governance, health, local communities, and countless other regions of human experience."
—Steven Johnson in "Future Perfect: The Case For Progress In A Networked Age"
One problem with abstract definitions of religion is that they do not encompass the practice of religion and its mythical or supernatural aspects, which are often essential parts of most religions. In "The Religious Experience", the religion scholar Ninian Smart (1927-2001) does not provide a handy definition for religions but instead offers six "dimensions" that are present in most major religions: 1) The Ritual Dimension, 2) The Mythological Dimension, 3) The Doctrinal Dimension, 4) The Ethical Dimension, 5) The Social Dimension and 6) The Experiential Dimension.
How do these dimensions of religion apply to Internet-centrism?
1) The Ritual Dimension: The need to continuously seek connectivity by accessing computers or seeking out wireless connectivity, checking emails or social media updates so frequently that this connectivity exceeds one's pragmatic needs could be considered a ritual of Internet-centrism. If one feels the need to check emails and Facebook or Twitter updates every one to two minutes, despite the fact that it is unlikely one would have received a message that required urgent action, it may be an indicator of the important role that this ritual plays in the life of an Internet-centrist. Worshippers of traditional religions feel uncomfortable if they miss out on regular prayers or lose their rosaries that allow them to commune with their God, and it appears that for some humans, the ritual of Internet-connectivity may play a similar role.
2) The Mythological Dimension: There is the physical internet, which consists of billions of physical components such as computers, servers, routers or cables that are connected to each other. Prophets and pundits of Internet-centrism also describe a mythical "Internet" which goes for beyond the physical internet, because it involves mythical narratives about the power of the internet as a higher force that is shaping human destiny. Just like "Scientism" attributes a certain mystique to real-world science, Internet-centrism adorns the physical internet with a similar mythological dimension.
Ideas of "cognitive surplus", crowdsourcing knowledge to improve the human condition, internet-based political revolutions that will put an end to injustice, oppression and poverty and other powerful metaphors are used to describe this poorly defined mythical entity that has little to do with the physical internet. The myth of egalitarianism is commonly perpetuated, yet the internet is anything but egalitarian. Social media hubs have millions of followers and certain corporations or organizations are experts at building filters and algorithms to control the information seen by consumers who have minimal power and control over the flow of information.
3) The Doctrinal Dimension: The doctrine of Internet-centrism is the relentless pursuit of sharedom through the internet. The idea is that the more we share, the more we collaborate and the more transparent we are via the internet, the easier it will be for us humans to conquer the challenges that face us. Challenging this basic doctrine that is promoted by Silicon Valley corporations can be perceived as heretical. It is a remarkable testimony to the proselytizing power of the prophets and pundits in Silicon Valley that people were outraged at the government institution NSA for violating our privacy. There was comparatively little concern about the fact that the primary benefactors of the growing culture of sharedom are the for-profit internet corporations that make money off our willingness to sacrifice our privacy.
4) The Ethical Dimension: In many religions, one is asked to follow aspects of a religious doctrine which have no direct ethical context. For example, seeking salvation by praying alone to a god on a mountain-top does not necessarily require adherence to ethical standards. On the other hand, most religions have developed moral imperatives that govern how adherents of a religion interact with fellow believers or non-believers. In Internet-centrism, the doctrinal dimension is conflated with the ethical dimension. Sharedom is not only a doctrinal imperative, it is also a moral imperative. We are told that sharing and collaborating is an ethical duty.
This may be unique to Internet-centrism since the internet (both in its physical or its mythical form) presupposes the existence of fellow beings with whom one can connect. If a catastrophe wiped out all humans but one, who happened to adhere to a traditional religion, she could still pray to a god (ritual), believe in salvation by a supernatural entity (mythological) and abide by the the religious laws (doctrinal). However, if she were an Internet-centrist, all her rituals, beliefs and doctrines would become meaningless.
5) The Social Dimension: Congregating in groups and social interactions are key for many religions, but Internet-centrism provides more tools than any other ideology, cultural movement or religion for us to interact with others. Whether we engage in this social activity by using social media such as Facebook or Twitter, by reading or writing blog posts, or by playing multi-player games online, Internet-centrism encourages us to fulfill our social needs by using the tools of the internet.
6) The Experiential Dimension: Most religions offer their adherents opportunities for highly personal, spiritual experiences. Internet-centrism avoids any talk of "spirituality", but the idea of a personalized experience is very much a part of Internet-centrism. One of its goals is to provide opportunities for self-actualization. We all may be connected via the internet, but Internet-centrists also want us to believe that this connectivity provides a path for self-actualization. We can modify settings to customize our web browsing experience, we can pick and choose from millions of options of what online courses we want to take, videos we want to watch or music we want to listen to. The sense of connectedness and omnipotentiality is what provides the adherent of Internet-centrism with a feeling of personal empowerment that comes close to a spiritual experience of traditional religions.
When one reviews the definitions by Schleiermacher or Geertz, or the multi-dimensional analysis by Ninian Smart, it does indeed seem that Morozov is right and that Internet-centrism is taking on many religion-like characteristics. There is probably still a big disconnect between the Silicon valley prophets or pundits who proselytize and the vast majority of internet users who primarily act as "consumers" but do not yet buy into the tenets of Internet-centrism. But it is likely that at least in the short-term, Internet-centrism will continue to grow, especially if Internet-centrist ideas are introduced to children in schools and they grow up believing that these ideas are both essential and sufficient for our intellectual and social wellbeing. Perhaps the pundits of Internet-centrism could discuss the future of this emerging religion with adherents of other faiths at a TEDxInterfaith conference.
Image Credits: Photo of Gutenberg Bible (Creative Commons license, via NYC Wanderer at Flickr)
Monday, January 06, 2014
Synthetic Biology: Engineering Life To Examine It
by Jalees Rehman
Two scientific papers that were published in the journal Nature in the year 2000 marked the beginning of engineering biological circuits in cells. The paper "Construction of a genetic toggle switch in Escherichia coli" by Timothy Gardner, Charles Cantor and James Collins created a genetic toggle switch by simultaneously introducing an artificial DNA plasmid into a bacterial cell. This DNA plasmid contained two promoters (DNA sequences which regulate the expression of genes) and two repressors (genes that encode for proteins which suppress the expression of genes) as well as a gene encoding for green fluorescent protein that served as a read-out for the system. The repressors used were sensitive to either selected chemicals or temperature. In one of the experiments, the system was turned ON by adding the chemical IPTG (a modified sugar) and nearly all the cells became green fluorescent within five to six hours. Upon raising the temperature to activate the temperature-sensitive repressor, the cells began losing their green fluorescence within an hour and returned to the OFF state. Many labs had used chemical or temperature switches to turn gene expression on in the past, but this paper was the first to assemble multiple genes together and construct a switch which allowed switching cells back and forth between stable ON and OFF states.
The same issue of Nature contained a second land-mark paper which also described the engineering of gene circuits. The researchers Michael Elowitz and Stanislas Leibler describe the generation of an engineered gene oscillator in their article "A synthetic oscillatory network of transcriptional regulators". By introducing three repressor genes which constituted a negative feedback loop and a green fluorescent protein as a marker of the oscillation, the researchers created a molecular clock in bacteria with an oscillation period of roughly 150 minutes. The genes and proteins encoded by the genes were not part of any natural biological clock and none of them would have oscillated if they had been introduced into the bacteria on their own. The beauty of the design lay in the combination of three serially repressing genes and the periodicity of this engineered clock reflected the half-life of the protein encoded by each gene as well as the time it took for the protein to act on the subsequent member of the gene loop.
Both papers described the introduction of plasmids encoding for multiple genes into bacteria but this itself was not novel. In fact, this has been a routine practice since the 1970s for many molecular biology laboratories. The panache of the work lay in the construction of functional biological modules consisting of multiple genes which interacted with each other in a controlled and predictable manner. Since the publication of these two articles, hundreds of scientific papers have been published which describe even more intricate engineered gene circuits. These newer studies take advantage of the large number of molecular tools that have become available to query the genome as well as newer DNA plasmids which encode for novel biosensors and regulators.
Synthetic biology is an area of science devoted to engineering novel biological circuits, devices, systems, genomes or even whole organisms. This rather broad description of what "synthetic biology" encompasses reflects the multidisciplinary nature of this field which integrates ideas derived from biology, engineering, chemistry and mathematical modeling as well as a vast arsenal of experimental tools developed in each of these disciplines. Specific examples of "synthetic biology" include the engineering of microbial organisms that are able to mass produce fuels or other valuable raw materials, synthesizing large chunks of DNA to replace whole chromosomes or even the complete genome in certain cells, assembling synthetic cells or introducing groups of genes into cells so that these genes can form functional circuits by interacting with each other. Synthesis in the context of synthetic biology can signify the engineering of artificial genes or biological systems that do not exist in nature (i.e. synthetic = artificial or unnatural), but synthesis can also stand for integration and composition, a meaning which is closer to the Greek origin of the word. It is this latter aspect of synthetic biology which makes it an attractive area for basic scientists who are trying to understand the complexity of biological organisms. Instead of the traditional molecular biology focus on studying just one single gene and its function, synthetic biology is engineering biological composites that consist of multiple genes and regulatory elements of each gene. This enables scientists to interrogate the interactions of these genes, their regulatory elements and the proteins encoded by the genes with each other. Synthesis serves as a path to analysis.
One goal of synthetic biologists is to create complex circuits in cells to facilitate biocomputing, building biological computers that are as powerful or even more powerful that traditional computers. While such gene circuits and cells that have been engineered have some degree of memory and computing power, they are no match for the comparatively gigantic computing power of even small digital computers. Nevertheless, we have to keep in mind that the field is very young and advances are progressing at a rapid pace.
One of the major recent advances in synthetic biology occurred in 2013 when an MIT research team led by Rahul Sarpeshkar and Timothy Lu at MIT created analog computing circuits in cells. Most synthetic biology groups that engineer gene circuits in cells to create biological computers have taken their cues from contemporary computer technology. Nearly all of the computers we use are digital computers, which process data using discrete values such as 0's and 1's. Analog data processing on the other hand uses a continuous range of values instead of 0's and 1's. Digital computers have supplanted analog computing in nearly all areas of life because they are easy to program, highly efficient and process analog signals by converting them into digital data. Nature, on the other hand, processes data and information using both analog and digital approaches. Some biological states are indeed discrete, such as heart cells which are electrically depolarized and then repolarized in periodical intervals in order to keep the heart beating. Such discrete states of cells (polarized / depolarized) can be modeled using the ON and OFF states in the biological circuit described earlier. However, many biological processes, such as inflammation, occur on a continuous scale. Cells do not just exist in uninflamed and inflamed states; instead there is a continuum of inflammation from minimal inflammatory activation of cells to massive inflammation. Environmental signals that are critical for cell behavior such as temperature, tension or shear stress occur on a continuous scale and there is little evidence to indicate that cells convert these analog signals into digital data.
Most of the attempts to create synthetic gene circuits and study information processing in cells have been based on a digital computing paradigm. Sarpeshkar and Lu instead wondered whether one could construct analog computation circuits and take advantage of the analog information processing systems that may be intrinsic to cells. The researchers created an analog synthetic gene circuit using only three proteins that regulate gene expression and the fluorescent protein mCherry as a read-out. This synthetic circuit was able to perform additions or ratiometric calculations in which the cumulative fluorescence of the mCherry was either the sum or the ratio of selected chemical input concentrations. Constructing a digital circuit with similar computational power would have required a much larger number of components.
The design of analog gene circuits represents a major turning point in synthetic biology and will likely spark a wave of new research which combines analog and digital computing when trying to engineer biological computers. In our day-to-day lives, analog computers have become more-or-less obsolete. However, the recent call for unconventional computing research by the US Defense Advanced Research Projects Agency (DARPA) is seen by some as one indicator of a possible paradigm shift towards re-examining the value of analog computing. If other synthetic biology groups can replicate the work of Sarpeshkar and Lu and construct even more powerful analog or analog-digital hybrid circuits, then the renaissance of analog computing could be driven by biology. It is difficult to make any predictions regarding the construction of biological computing machines which rival or surpass the computing power of contemporary digital computers. What we can say is that synthetic biology is becoming one of the most exciting areas of research that will provide amazing insights into the complexity of biological systems and may provide a path to revolutionize biotechnology.Daniel R, Rubens JR, Sarpeshkar R, & Lu TK (2013). Synthetic analog computation in living cells. Nature, 497 (7451), 619-23 PMID: 23676681
Monday, December 09, 2013
Google Zeitgeist: Annoying Philosophers, Weird Germans and White Pakistanis
by Jalees Rehman
The Autocomplete function of Google Search is both annoying and fascinating. When you start typing in the first letters or words of your search into the Google search box, Autocomplete takes a guess at what you are looking for and "completes" the search phrase by offering you multiple query phrases. The queries offered by Autocomplete are "a reflection of the search activity of users and the content of web pages indexed by Google". Considering the fact that more than five billion Google searches are conducted on an average day, the Google Autocomplete function has a huge database of search information that it can reference. This also means that the Autocomplete suggestions are quite dynamic and can vary over time. A popular new song lyric, the name of a viral video or a recent movie quote can catapult itself to the top of the Autocomplete suggestion list within a matter of hours or days if millions of users start search for that specific phrase. Autocomplete may also take a user's browsing history or location into account, which explains why it may offer a varying set of suggestions to different users.
Autocomplete can be quite annoying because the suggested lists of queries are based on their web popularity and can thus consist of bizarre combinations which are not at all related to one's intended searches. On the other hand, Autocomplete is also a fascinating tool to provide a window into the Zeitgeist of web users, revealing what kinds of phrases are most commonly used on the web, and by inference, what contemporary ideas are currently associated with the entered keywords. The Google Zeitgeist website reveals the most widely searched terms to help identify cultural trends - based on the frequency of Google search engine queries - during any given year.
The United Nations Entity for Gender Equality and the Empowerment of Women (UN Women) recently used the Google Search Autocomplete function in an ad campaign to highlight the extent of misogyny on the web. Searching for "women should…" or "women need to…" was autocompleted to phrases such as "women should be slaves" or "women need to be put in their place". The fact that Autocomplete suggested these phrases means that probably hundreds of thousands of internet users have used these phrases in their search queries or on web pages indexed by Google – a reminder of how much gender injustice still exists in our world.
A recent article in Slate pointed towards another form of bias unveiled by Autocomplete: Occupational prejudice. The search phrase "scientists are…." was autocompleted to suggest that scientists were either liars, liberal or stupid. I tried it out and received similar suggestions by Autocomplete:
I guess we scientists have been upgraded from merely being stupid to being idiots. I was curious whether other professions fare better.
Well, apparently bankers do not.
And doctors are not only as stupid as scientists, they are also overpaid, arrogant and dangerous.
I can understand that doctors are thought to be overpaid, but it is a bit of a surprise that folks on the web think that professors are overpaid, especially considering the fact that many of them have spent a decade or more in postgraduate education before they become professors and still earn far less than non-academic colleagues in the private industry.
Philosophers, on the other hand, are not perceived as being stupid by the Google Zeitgeist. They are wise and annoying with a tinge of depression.
The next time you contact your editors, please remember that they are people, too.
The fact that Autocomplete suggests these phrases means that they are frequently used in searches and web pages but there is no way to know who is using them and what the intent is behind their usage.
What does the Google Zeitgeist tell us about people of different nationalities?
Germans are not seen in a very positive light, but the prejudices regarding Germans being rude, cold and weird should not come as a surprise to anyone who watches Hollywood movies which love to propagate such clichés.
Interestingly, search queries suggest that both Americans and Germans may come across as weird and rude.
Maybe the web collective feels that members of all nationalities are weird and rude – even the Canadians, who are also known to be nice even though they are afraid of the dark.
When I queried the characteristics of Pakistanis with the "Pakistanis are…." Phrase, I was surprised by the fact that Autocomplete offered very different suggestions than those for Germans and North Americans. The latter were being described by adjectives such as rude, weird, nice or cold – but when it came to Pakistanis, the search queries instead focused on their ethnic identity.
Are Pakistanis white or not white? Are they mostly Indians or do they have Arab origins? The odd thing is that I have conversations around these questions with many Pakistanis, who often try to convince me that they indeed have "white" roots. Some Pakistanis I know – especially those who are proud of their fair skin color - frequently mention their possible Greek origins (dating back to the times of Alexander the Great and his invasion of the Indian subcontinent) conquests, others emphasize the fact that the people who currently reside in Pakistan may have had Arab forefathers when the Arabs invaded the Indian subcontinent. On the other hand, I also know plenty of Pakistanis who see themselves as people with a primarily Indian heritage. The fact that this is a hotly debated topic among Pakistanis suggests that maybe the internet queries suggested by Autocomplete were in fact based on queries or web pages of Pakistanis who are interested in discussing this topic.
When it comes to Arabs, their ethnic identity is also apparently a popular topic in internet queries, and again my personal interactions with American Arabs mirror the Autocomplete suggestions. I have often heard American Arabs mention that they feel they ought to be accepted as part the American "white" population ("Hello – I just received a phone call, Dr. Frantz Fanon is on hold for you on line 1).
I first thought that perhaps the desire to identify oneself with being "white" was a remnant of one's colonial past, but my search for "Nigerians are…" did not support this hypothesis.
The Web seems to hold extremely positive views of Nigerians – smart, intelligent and educated.
Moving beyond searches for nationalities, what characteristics do web users associate with members of other groups?
Well, religions do not fare well.
Christianity and Islam are seen as evil, full of falsehood and (oddly enough) may not even be religions.
In contrast, atheism is not labeled as evil. The suggested queries instead revolve around the question of whether or not atheism is a religion.
How about a cultural ideology?
Ok, Google Zeitgeist tells us that postmodernism is BS and dead.
The human emotion of Schadenfreude, on the other hand, is very much alive.
Autocomplete is not only a tool to identify biases and phrases used on the web; it has also become an inspiration for poets. The Google Poetics blog is run by Sampsa Nuotio and Raisa Omaheimo and collects Google poems, recognizing that Autocomplete suggestions sometimes contain a Dadaist beauty and are in essence prose poems. Inspired by their collection of Google poems, I sometimes enter words or verses from famous poems to generate Autocomplete's mutant versions of those famous verses:
Here is a Google Autocomplete poem based on "Do not go gentle into that good night" by Dylan Thomas:
Do not go
do not go where the path may lead
do not go gentle poem
do not go my love
Do not go beyond what is written
And one based on the line "Let us go then, you and I" from T.S. Eliot's ‘The Love Song of J. Alfred Prufrock'
let us entertain you
let us entertain you gift cards
let us play with your look
let us go then you and i
I would like to now close with a final ode to Google:
google is evil
google is god
google is your friend
google is down
Monday, November 25, 2013
Through A Printer Darkly
by James McGirk
James McGirk works as a literary journalist and is a contributing analyst to an online think tank. The following is an imagined itinerary for a tourist vacation twenty years in the future.
Seven days in the PRINTERZONE
June 20, 2033-June 28, 2033
A quick suborbital hop to Iceland courtesy of Virgin Galactic and then it’s all aboard the ScholarShip, a luxurious three-mast schooner powered by that most ecologically palatable of sources: the wind.
Weather-permitting you and twenty of your fellow alumni will set sail for the Printerzone. (The North and Norwegian Seas can be temperamental: in the event of heavy weather we revert to backup biodiesel power.) Our destination has been recognized by UNESCO as a World Heritage Site: it is both a glimpse at what our future might become should government regulation of printers come to an end, and a fantasy of life free from credit and ubiquitous surveillance. Together we’ll spend a week immersed in this unique community, on board an oilrig in international waters, using three-dimensional additive printing to meet our every need.
Joining us on this adventure will be Prof. Orianna Braum, an associate professor of Maker Culture at Stanford University; Alan Reasor, a forty-year veteran of the additive printing industry; and a young man who prefers to refer to himself by displaying a small silver plastic snowflake in his palm.
ITINERARY - DAY ONE
A colorful day spent traversing the Norwegian and North Seas… sublime marine grays and blues stirred by the bracing sea breeze. Keep your eyes peeled for pods of chirping Minke whales! Many are 100 percent natural.
Breakfast and lunch will be served onboard The ScholarShip by our chef Matthias Spork. Selections include: printed cereals and pastas, catch-of-the-day and a refreshing sorbet spatter-printed by his wife, renowned pastry chef Rebecca Spork.
Prof. Braum and Mr. Reasor will debate: Has Three-Dimensional Printing failed its Promise? Reasor will argue that in most instances economies of scale and the cost of raw materials make conventional manufacturing a more cost-effective solution than 3D printing. Prof. Braum will counter, describing industries that have been radically reshaped by printing—prosthetics and dentistry, bespoke suiting and fashion, at-home robotics and auto-repair—and suggest instead that government safety regulation and restrictive intellectual property licenses have done more to stifle innovation than costs. There will be time for questions afterwards. And then a brief demonstration of piezoelectric substrates: printed materials that respond to the human touch.
Following a hearty and delicious dinner prepared by the Sporks, we invite you for hot toddy and outdoor stargazing with our First Mate. The Arctic winds can be fierce at night, so you have the option of lighting the hearth in your cabin, and viewing a very special Skype broadcast—The Pink Printer’s Naughty Apprentice—which outlines in a most whimsical and titillating way some of the more adult uses of the three-dimensional printer.
(Please note that cabins containing occupants below the age of consent in their country of residence will not receive this broadcast.)
Drop Anchor in the Printerzone
After a hot breakfast ladled out by the Sporks, join your shipmates on deck for an approach unlike anywhere else on earth: a faint glimmer on the horizon gathers in size and sprouts shapes and colors, until the magnificent muddle that is the Printerzone fills our entire field of vision. Crumpled wrapping paper on stilts, a wag once said. Squint at this glorious mass, and beneath the colorful sprays of plastic and the pieces of flotsam and jetsam the residents have creatively incorporated into their homes, you just might make out the original concrete and steel beneath.
Your daily allowance of printer substrate will be issued to you in bulk so that you may trade it for trinkets. A rope ladder will be lowered from above. One at a time you will be hoisted to the Zone. There, our guide, the man who identifies himself with the silver snowflake (henceforth referred to as [*]) shall greet us. He is an interesting specimen. Ask of him what you will. The tour begins at The Workshop, a vast, enclosed “maker space” where P’Zoners (as they call themselves) exchange goods, plans for new designs and information. Barter your substrate for unique souvenirs. Take a class in creation. Then enjoy a sandwich lunch carefully selected by the Sporks. Food may also be bartered with the natives.
After lunch you may explore the Zone at your leisure or enjoy another spirited debate between Reasor and Braum. Printerzone: Model City or Goofy Aberration? Dinner shall be served in the Workshop, which at night transforms into The Wild Rumpus. Guests in peak physical condition may want to join the carousing. (N.B. Beware of custom-printed entheogens and other libations, which, while they may be legal in the Printerzone, are not necessarily safe.)
Fresh croissants and a mug of coffee are the perfect way to begin a crisp Printetrzone morning! Daring types may wish to join [*] and don a protective suit printed from the city’s custom printers, and sink beneath the waves for a romp on the seafloor and a look at how the city has evolved below the waterline. Printerzone’s silver suits are said to work as well in orbit as they do submerged beneath the waves. You may examine copies of a Vogue pictorial featuring the suits.
For those who prefer a more relaxed pace in the morning, there will be a bicycle tour of the Zone’s famous hydroponic orchid nursery, its orphanage and its medical clinics (notable, for, among other things, performing the first artificial face transplant). There will also be a chance to examine the city’s recycling system up close as it transforms unwanted printer output and even sewage and brine into the raw materials for printing. No stinky smells we promise!
(All printed foods served aboard the ScholarShip are guaranteed to be free from precursor materials that were made from human waste or potential allergens.)
For lunch, if you’re ready for it, be prepared to break some taboos. Guided by [*], the Sporks, rabbis, halal butchers, vegan chefs, and a number of other experts, you will be given a unique opportunity to eat—among otherwise offensive offerings—a perfect facsimile of human flesh, pork, dolphin steak, non-toxic fugu flesh, endangered sea turtle, and even taste the world’s most potent toxins in perfect moral comfort and safety. Less adventurous offerings will also be available for the squeamish.
During lunch, Braum and Reasor will sound off on the subject of: Whether Full Employment is Possible in a post-3DP World. Braum says printing in three dimensions will kill off the middlemen who camp out in many employment categories (the warehouse managers, the marketing men…); Reasor agrees, but thinks the unfettered labor will be absorbed by innovative new industries. There will be time for questions. Coffee too.
After lunch there will be a demonstration of one of the most potent technologies to emerge from three-dimensional printing: the cheap invisibility cloak. Then you will be joined by some of the city’s most outrageous tailors, haberdashers, wig makers, and costume outfitters. Design a more colorful, eccentric version of yourself and then top off your creation with a freshly printed invisibility cloak, so that you might attend the night’s festivities in absolute comfort. You need only reveal yourself to those you want to. Buffet dinner. Brandy against the chill.
(N.B. Printerzone security forces are equipped with night-vision goggles, so rest assured that you will be safe, but don’t get any antisocial ideas. There are some rules to abide by!)
Pondering the Printerzone
On our fourth day, after a healthy, all-natural breakfast lovingly prepared by the Sporks on the ScholarShip, we delve into the Printerzone’s more pensive side. [*] will lead us on a tour of the Million Memorials, the serene necropolis where the city’s mourners print chalky likenesses of friends and family they’ve lost, and missing objects and abstractions too. A quiet, haunting place. After a pleasing serenade by the P’Zone wailers, we picnic among the monuments, and hear [*]’s own story of loss—his young bride who slipped over the railing during a photo session and drowned in the ocean— and gaze at the spun plastic residue of a brief but happy relationship and afterwards, stroll back to The Workshop for a chance to barter for more amusements.
The subject of the day’s lecture (delivered, of course by Braum and Reasor) will be: Three Dimensional Printing in the Developing World. Printing won’t be the panacea we think it will because the developing world lacks the infrastructure to sustain itself; but surely the availability of items that would otherwise have been unavailable is valuable—but what about the cottage industries that would be eradicated by printing, wouldn’t that snuff out any printing-related development? Drink during the lecture if you like. Gaze longingly at potential mates if you wish to. This is a pleasure cruise.
After a brief question and answer session, a fittingly austere supper will be served, and [*] will introduce us to a non-profit initiative sponsored by the Printerzone: a crisis response team that will race to trouble spots and, without the needless hassle of lines of communication and supply, be able to provide surgical equipment, medicines and shelter at a fraction of the cost… cost? Yes, even this barter-driven economy is soliciting funds. Contribute what you will. The city’s orphans hand out orchids.
Snack before the Wild Rumpus. Serenade. Custom sex surrogates printed for an additional fee. (Please: No printing of lecturers, crewmembers, fellow travelers without their expressed permission, no skin prints using DNA within a 15 percent match of your own.)
At home in the Printerzone
Many of travelers wake on their fifth day beside a grim memory, manifest in the form of slightly abused piezoelectric plastic. You may find it cathartic to batter your unwanted surrogate to pieces, or, if you are the showy sort—enter the surrogate into the ring for gladiatorial combat. The festivities begin with a squabble between Braum and Reasor’s creations (one wonders at the tension between them), followed by a battle royal, and a moving speech by [*] about whether or not a surrogate has a soul. Each participant will be allowed to download a copy of Do Androids Dream of Electric Sheep for later review.
By now you’ve spent nearly a week looking up at the frills wrapped around the upper decks of the rig. Perhaps you’ve wondered what the lives of the residents are like beyond the Wild Rumpus or the Workshop floor. Today you’ll enjoy an intimate glance at their living quarters.
Some might find this disturbing. There are children here, you might say, how could one live like this? But they’re hardly cut off; well, maybe they are cut off from nature and history and dry land but not the ‘net. See the data goggles they wear? The tykes and pubers who strut about the Zone have come to see the boundary between what is virtual and what is not as a thing much more permeable than you or I.
Here the Internet is inside out. People print virtual things. Shudder at the home robots with their suction cup attachments. Are they vacuum cleaners or sexual abominations or both? Much of the home décor won’t make sense unless you’re jacked into the ’net. Too prone to data dropsy to peer through a lens? Ask yourself why this trip appealed to you in this first place, but fear not—there are gentle entheogens that replicate the experience of data being blazed onto your eyeballs.
Nighttime. Rumpus again. Dance and flail until you feel yourself dissolve into the communal flesh. The Sporks have taken the day off. Truth be told they’re disgusted with three-dimensional printing and what it means for their profession. Can you blame them? Who cares, you aren’t hungry. From perched up high, the Zone looks terraced and circular like a medieval etching of The Inferno. The Rumpus looks like the writhing of the damned. You think you see Braum and Reasor embrace. [*] sits beside you and tells you his given name was Virgil. Has he been drugging you?
Beyond the Printerzone
Someone wakes you up by firing a pistol in the air. That’s right, there are a lot of weapons here. This is a polite society. Ugh, the sunlight streaming into your eyes is sheer agony. Your neurons are crying out. Caffeine! Dopamine! Serotonin! You wobble out on deck. The Sporks are back. Thank God the Sporks are back. They pour you a mug of coffee. They cut you a grapefruit. Crackling bacon, the smell of bread baking.
[*] won’t look you in the eye, the sweaty creep.
Above you the colorful plastic printed houses look chintzy in the light. They hoist you up. Peek below. The ScholarShip is an oasis of sanity and earthtones. Everything else is Technicolor Burp. Can you really face another day of this? The medic gives you something for your throbbing head. A party assembles. Wrapped sandwiches for lunch and shot-glasses of Astronaut Ice Cream. A hardhat. That silver protective garb you’ll have to peel off afterwards. The place stinks of kerosene (that’s jet fuel someone will say.) There are men from NASA, and men from the Air Force, and men with helmets that look like they’re made entirely from mirrorshades. Cyclopses. You want to leave. There’s a faint but unmistakable rumble.
Reasor and Braum waddle to the front of your party. Another debate: Space Exploration is Three-Dimensional Printing’s Killer App. This time they both agree. Reasor thinks the way to reach for the stars is to print a massive cable and haul ourselves up. Braum says that’s great, but what’s better is that you can go anywhere in space and print anything you could possibly need. You can beam plans to the spaceship, plans for things that weren’t invented when the ship took off. Applause. Time for questions. Cups of coffee. Cookies.
Wonder what if printers were used to print infinite printers?
Clutch your mug. Look around. The top level is cold and metallic. Limp suits hang waiting, rows of silver helmets that look like Belgian Glass globes wink in the setting sun. Rockets: fins, nose caps, nozzles, streamlined bellies, lie, being assembled from spools of plastic. Dinner is splendid and sober. You remember little of it. There were candles. An ant walked across the table.
Tonight there is no Wild Rumpus. You sleep on the rig, beneath the stars but protected by an infinitesimal layer of plastic. A storm blows in. Electricity rips the Arctic sky. Rain pounds plastic but never touches you. You are woken by a helmeted Cyclops: “Some visitors decide never to leave,” he says, extending a gloved hand. It’s silver. “We’ll nourish you.” Behind the smooth surface you can just make out the blurry face of [*]
Wake to the smell of Sporks’ cooking. A printed snowflake has been placed beside you. Visitors may opt to extend their stay. Or leave and never, ever come back.
Monday, November 18, 2013
Homo Erectus, or I Married a Ham
by Carol A. Westbrook
My husband loves big erections. Don't get me wrong, I'm not speaking here about Viagra, I'm talking about tall towers made of metal, long wires strung high in the sky, and tall antennas protruding from car roofs. He loves anything that broadcasts or receives those elusive radio waves, the bigger the better. That is because he is a ham, also known as an amateur radio enthusiast, and all hams love antennas.
Amateur radio has been around since the early 1900's, shortly after Marconi's first transatlantic wireless transmission in 1901. Initially, radio amateurs communicated using Morse code, as did commercial radiotelegraphy, but voice transmission quickly gained in popularity. In order to broadcast on the ham radio frequencies, hams must obtain an amateur radio license from the FCC, and a unique call sign, their ham "name." Proficiency in Morse code was required in order to obtain an amateur radio license, but this requirement was finally dropped in 2003, which opened up the field to many more interested radio amateurs, my husband being one of them. As a result, the hobby is becoming popular again. There are local clubs to join, as well as national get-togethers called "hamfests" where there are lectures, demonstrations, equipment swap-meets, and licensing exams.
What do hams do? They communicate by radio. They use everything from a battery-powered hand-held transmitter to a massive collection of specialized radio equipment located in a corner of their home or garage, which they call their "ham shack." (See picture of my husband's ham shack, above, in his library). They talk to other ham radio operators, and participate in conversations that may be local or span the globe, depending on the radio wavelength, the power of their transmitter, and their antenna. And they erect large antennas, perhaps on an outside tower or the roof of their home.
Like Marconi, hams learn early on that it's relatively easy to send out a radio signal, but the distance it travels depends as much on the size and configuration of the antenna as it does on the signal strength. There is an art to constructing an antenna, and hams spend a great deal of effort on it. That is why hams are fascinated by antennas. They are the quintessential "homo erectus."
My husband's fascination was fueled by his boyhood days. In the 1950's he felt isolated from the outside world because his family's radio and TV could only receive a few stations, living as they did in an a valley surrounded by the Pocono Mountains. He learned that he could receive more stations by stringing long wires throughout the house, or on the roof -- creating his own makeshift antennas. This led to an engineering degree, an interest in telecommunications, and a ham radio license.
Our houses are festooned with antennas. We have long wires strung from roof to garage, a small tower on the hillside, four large parabolic dishes, from 6 to 11 feet in diameter, that receive signals from transmitting satellites... but that's another story. We even have a stealth antenna in our garden which, to the casual observer, appears to be just another garden ornament, nestled among the roses. (See picture) Unlike other "ham widows" I don't mind these antennas -- they are certainly conversation pieces. I do not have a ham license--I didn't past the exam, but then again I didn't study for it. But I often go along with my husband to hamfests, including the famous Dayton Hamvention, which takes place every May.
What is so appealing about ham radio? Why spend your time and money to buy archaic equipment and erect antennas and mess up your house -- when you can just call on your cell or Skype your friend? The answer is simple -- because you can. As a hobbyist, you cannot easily make a micro chip, or build a cell phone, or create your own internet, but you can assemble your own equipment and broadcast your own voice, around the world. Just like Marconi! What a high! What a sense of empowerment! And ham radio is a great hobby for youngsters who want to learn about the electrical and mechanical world, and enjoy the challenge of "getting out of the valley" using their own ingenuity and design. If you would like to learn more, contact the national association for amateur radio, the American Radio Relay League, to learn how to get involved, or visit their headquarters and museum at 225 Main Street Newington, CT 06111-1494 USA. You might get hooked, too.
Monday, October 14, 2013
Should Doctors ‘Google’ Their Patients?
by Jalees Rehman
Beware of what you share. Employers now routinely utilize internet search engines or social network searches to obtain information about job applicants. A survey of 2,184 hiring managers and human resource professionals conducted by the online employment website CareerBuilder.com revealed that 39% use social networking sites to research job candidates. Of the group who used social networks to evaluate job applicants, 43% found content on a social networking site that caused them to not hire a candidate, whereas only 19% found information that that has caused them to hire a candidate. The top reasons for rejecting a candidate based on information gleaned from social networking sites were provocative or inappropriate photos/information, including information about the job applicants' history of substance abuse. This should not come as a surprise to job applicants in the US. After all, it is not uncommon for employers to invade the privacy of job applicants by conducting extensive background searches, ranging from the applicant's employment history and credit rating to checking up on any history of lawsuits or run-ins with law enforcement agencies. Some employers also require drug testing of job applicants. The internet and social networking websites merely offer employers an additional array of tools to scrutinize their applicants. But how do we feel about digital sleuthing when it comes to relationship that is very different than the employer-applicant relationship – one which is characterized by profound trust, intimacy and respect, such as the relationship between healthcare providers and their patients?
The Hastings Center Report is a peer-reviewed academic bioethics journal which discusses the ethics of "Googling a Patient" in its most recent issue. It first describes a specific case of a twenty-six year old patient who sees a surgeon and requests a prophylactic mastectomy of both breasts. She says that she does not have breast cancer yet, but that her family is at very high risk for cancer. Her mother, sister, aunts, and a cousin have all had breast cancer; a teenage cousin had ovarian cancer at the age of nineteen; and that her brother was treated for esophageal cancer at the age of fifteen. She also says that she herself has suffered from a form of skin cancer (melanoma) at the age of twenty-five and that she wants to undergo the removal of her breasts without further workup because she wants to avoid developing breast cancer. She says that her prior mammogram had already shown abnormalities and she had been told by another surgeon that she needed the mastectomy.
Such prophylactic mastectomies, i.e. removal of both breasts, are indeed performed if young women are considered to be at very high risk for breast cancer based on their genetic profile and family history. The patient's family history – her mother, sister and aunts being diagnosed with breast cancer – are indicative of a very high risk, but other aspects of the history such as her brother developing esophageal cancer at the age of fifteen are rather unusual. The surgeon confers with the patient's primary care physician prior to performing the mastectomy and is puzzled by the fact that the primary care physician cannot confirm many of the claims made by the patient regarding her prior medical history or her family history. The physicians find no evidence of the patient ever having been diagnosed with a melanoma and they also cannot find documentation of the prior workup. The surgeon then asks a genetic counselor to meet with the patient and help resolve the discrepancies. During the evaluation process, the genetic counselor decides to ‘google' the patient.
The genetic counselor finds two Facebook pages that are linked to the patient. One page appears to be a personal profile of the patient, stating that in addition to battling stage four melanoma (a very advanced stage of skin cancer with very low survival rates), she has recently been diagnosed with breast cancer. She also provides a link to a website soliciting donations to attend a summit for young cancer patients. The other Facebook page shows multiple pictures of the patient with a bald head, suggesting that she is undergoing chemotherapy, which is obviously not true according to what the genetic counselor and the surgeon have observed. Once this information is forwarded to the surgeon, he decides to cancel the planned surgery. It is not clear why the patient was intent on having the mastectomy and what she would gain from it, but the obtained information from the Facebook pages and the previously noted discrepancies are reason enough for the surgeon to rebuff the patient's request for the surgery.
Two groups of biomedical ethics experts then weigh in on the case and the broader question of whether or not health care professionals should ‘google' patients. The first group of ethics experts feels that uninvited patient ‘googling' is generally a bad practice for three main reasons:
- It allows healthcare professionals to withdraw from their patients and start relying on online data and information gleaned from social networking sites instead of interacting with the patient and addressing the key issues head-on.
- The ‘googling' of patients erodes the trust between the healthcare professional and the patient. Patients might feel a sense of betrayal that the healthcare professional "spied" on them.
- An internet search or review or social network pages linked to the patient represents an invasion of the privacy of the patient. The patient should have the right to decide what information to disclose and what not to disclose, but by surreptitiously obtaining this information, the healthcare provide circumvents the right to privacy of the patient.
A separate panel of reviewers arrives at a very different conclusion and specifically points to this case as an example where it was imperative to ‘google' the patient. As this panel points out, the genetic counselor used a legal method to search the internet and found information on public Facebook profiles after having found many red flags and inconsistencies in the patient's medical history. By finding the information on Facebook, the surgeon and the counselor were able to prevent a self-injurious, deceptive and possibly fraudulent scheme of the patient to go forward. This panel of experts goes as far as saying that it would have actually been irresponsible to not perform the Google search after all the red flags and inconsistencies were identified.
As with all ethical dilemmas, it is difficult to find the correct answer. The first panel brings up good points that the relationship between a healthcare professional and a patient is characterized by trust and respect of privacy, but I tend to agree with the second panel in the case of this patient. It illustrates that the ‘googling' was able to avert an unnecessary and irreversible surgery. This was not just an indiscriminate ‘googling' or searching of private information on Facebook pages. The action was prompted by very real concerns about contradictory information regarding the patient's medical history. On balance, the benefit of avoiding the unnecessary surgery probably outweighed the risk of harming the trust between the healthcare professional and the patient – one which was already undermined by the patient's deception.
This case is rather unusual because it is probably quite rare that a surgeon or a genetic counselor would find valuable information on a patient by merely searching Google or Facebook for information. The type of information that could be of value to most healthcare providers is not usually disclosed on public sites or social network pages. For example, a cardiologist may be interested in finding out why a patient's cholesterol levels are not decreasing despite being placed on optimal medications and being advised to cut down the dietary intake of cholesterol. The cardiologist may suspect that the patient is not really taking the medications or perhaps eating much more dietary cholesterol than the patient is willing to disclose during the doctor's visits. However, it is unlikely that the patient's Facebook page will chronicle whether or not the patient secretly eats cheese omelets on a daily basis or chooses not to take his cholesterol medications.
On the other hand, other healthcare professionals could find important diagnostic clues when reviewing the Facebook page of a patient. Psychiatrists or psychologists may be able to get a much better sense of a patient's mental health and functioning by reviewing the daily posts and interactions of a patient with friends and family members instead of just having to rely on the brief snapshot when they interview the patient during a 30 minute visit.
The study ""To Google or not to Google: Graduate students' use of the Internet to access personal information about clients." by the psychologists DeLillo and Gale surveyed 854 students enrolled in clinical, counseling, and school psychology doctoral programs in the United States and Canada, asking them how they felt about using Google or social networking websites to learn more about their clients/patients. Interestingly, two-thirds of the psychologists-in-training felt that it was never acceptable or usually not acceptable to use web search engines in order to find additional information about their clients. This feeling was even more pronounced when it came to social networking sites: 76.8% of the students thought that this was never acceptable or usually not acceptable.
However, despite these feelings, 97.8% of the students had searched for at least one client's information using search engines such as Google, whereas 94.4% had searched for at least one client's information using social networking websites. Importantly, 76.8% of the therapists who had conducted the searches for client information on social networking sites also reported that it was either always or usually unacceptable! This suggests a significant dissonance between the ethical perception of the therapists and their actions. Furthermore, more than 80% of the therapists who had conducted the searches said that their clients were aware of the internet and social networking searches they were conducting.
The case study with the patient requesting the mastectomy and the high prevalence of using the internet to perform searches on patients/clients by psychologists highlights the ethical dilemmas that are emerging in our culture of digital sharedom. The internet with its often very public display of individual information may be a powerful tool for certain healthcare professionals, but we also need to develop ethical guidelines for how healthcare professionals should use this tool. For medical procedures and tests, healthcare professionals have to obtain informed consent from their patients, discussing the risks and benefits of the procedure or test. Should healthcare professionals also obtain informed consent from patients before they pry into their social media networks? Or would that defeat the purpose because the patients might change the privacy settings or change the content of their posts, knowing that healthcare professionals might be reviewing them? Should healthcare professionals in specialties such as psychology and psychiatry ‘google' all their patients – just like they now ask questions about substance abuse to all patients – or only if there are certain red flags?
The survey of psychologists-in-training highlights the cognitive dissonance that healthcare professionals may experience: They may reject such searches on their clients or patients in the abstract, but they may still choose to perform the searches, probably because they think it will allow them to provide better care for their clients and patient. Instead of relying of idiosyncratic decisions made by professionals, we have to establish the ethical ground-rules for how healthcare professionals can use search engines or social networking sites when obtaining information about individuals. We may have become so accustomed to invasions of our privacy by government agencies and corporations that we sometimes forget that privacy is instrumental in maintaining our individuality. Especially in relationships that are founded on an extraordinary degree of trust, such as those between healthcare professionals and their patients or clients, we need to ensure that this trust is not eroded by the dark side of sharedom.
Acknowledgements: I would like to thank Ryan Hunt from CareerBuilder for clarifying the survey results.
- Rebecca Volpe, George Blackall, and Michael Green; and Danny George, Maria Baker, and Gordon Kauffman, "Googling a Patient" Hastings Center Report 43, no. 5 (2013): 14-15.
- DiLillo, David; Gale, Emily B. "To Google or not to Google: Graduate students' use of the Internet to access personal information about clients."Training and Education in Professional Psychology, Vol 5(3), Aug 2011, 160-166. doi: 10.1037/a0024441
Monday, June 24, 2013
by Jalees Rehman
"The most radical revolutionary will become a conservative the day after the revolution."
The recent revelations by the whistleblower Edward Snowden that the NSA (National Security Agency) is engaged in mass surveillance of private online communications between individuals by obtaining data from "internet corporations" such as Google, Facebook and Microsoft as part of a covert program called PRISM have resulted in widespread outrage and shock. The outrage is understandable, because such forms of surveillance constitute a major invasion of our privacy. The shock, on the other hand, is somewhat puzzling. In the past years, the Obama administration has repeatedly demonstrated that it is willing to continue or even expand the surveillance policies of the Bush government. The PATRIOT Act was renewed in 2011 under Obama and government intrusion into our personal lives is justified under the mantle of "national security". We chuckle at the absurdity of obediently removing our shoes at airport security checkpoints and at the irony of having to place Hobbit-size toothpaste tubes into transparent bags for a government that seems to have little respect for transparency. Non-US-citizens who reside in or travel to the United States know that they can be detained by US authorities, but even US citizens who are critical of their government, such as the MacArthur Genius grantee Laura Poitras, are hassled by American authorities. Did anyone really believe that the Obama administration with its devastating track record of murdering hundreds of civilians - including many children – in drone attacks would have moral qualms about using the NSA to spy on individual citizens?
The Stasi analogy
One of the obvious analogies drawn in the aftermath of Snowden's assertions is the comparison between the NSA and the "Stasi", the abbreviated nickname for the "Ministerium für Staatssicherheit" (Department of State Security) in the former German Democratic Republic (GDR or DDR). Articles referring to the "United Stasi of America" or the "Modern Day Stasi-State" make references to the massive surveillance apparatus of the East German Stasi, which monitored all forms of communications between citizens of East Germany, from wire-tapping apartments, offices, phones and secretly reading letters. The Stasi "perfected" the invasion of personal spaces – as exemplified in the Oscar-winning movie "The Lives of Others". It is tempting to think of today's NSA monitoring of emails, Facebook posts or other social media interactions as a high-tech version of the Stasi legacy. A movie director may already be working on a screenplay for a movie about Snowden and the NSA called "The Bytes of Others". However, there are some key differences between the surveillance conducted by the Stasi and the PRISM surveillance program of the NSA. The Stasi was a state-run organization which was responsible for amassing the data and creating profiles of the monitored citizens. It did not just rely on regular Stasi employees, but heavily relied on so called IMs – "inoffizielle Mitarbeiter" or "informelle Mitarbeiter" - informal informants. These informal informants were East German citizens who met with designated Stasi officers, reporting on the opinions and actions of their friends, colleagues and relatives and at times aiding the Stasi in promoting state propaganda. In the case of the PRISM program, the amassing of data is conducted by private "internet corporations" such as Facebook, Google and Microsoft, who then share some of the data with the state. Furthermore, instead of having to rely on informal informants like the Stasi, "internet corporations" simply rely on the users themselves who readily divulge their demographic information, opinions and interests to the corporations.
Corporate erosion of our privacy
It seems strange that the outrage ensuing after the PRISM revelations is primarily directed at the US government and the NSA, but not at the corporations which are invading our privacy. Criticisms of the role that private corporations have played in the PRISM program primarily focus on the fact that these corporations divulged the information to the government, but seem to ignore the fact that corporations such as Facebook, Google and Microsoft continuously invade our privacy and use our data for their own marketing goals or share it with their clients. Centuries of persecution and oppression by governments - monarchs, dictators or democratically elected governments - have sensitized us to privacy invasion by governments, but we seem to have a rather laissez-faire attitude when it comes to corporate invasion of our privacy. In fact, we associate the expressions "corporate espionage" or "corporate surveillance" with corporations spying on each other but not necessarily with them spying on us. If we had found out the US Postal Service kept track of how many letters we send to certain recipients, perhaps even scanned our personal letters for certain keywords and then used this information for its own marketing purposes or sold it to interested parties, most of us would have considered this an egregious violation of our privacy. Yet we know that "internet corporations" such as Google and Facebook routinely practice this form of privacy invasion. In our neoliberal world of unfettered capitalism, the state is increasingly answering to corporate interests while ignoring the concerns of citizens. We have to ask ourselves whether such an eviscerated state is the only threat to our civil liberties, or whether we need be more sensitive to violations of our privacy and liberties by private corporations.
Long before the leak of the PRISM documents, critics such as Evgeny Morozov in "The Net Delusion", Rebecca MacKinnon in "Consent of the Networked" or Robert McChesney in "Digital Disconnect" warned us about the invasion of rivacy by "internet corporations" which are collecting information about us. We do not have to pay to use Google and Facebook, but the reason why these for-profit corporations offer us "free" services is because they use and market the information we unwittingly provide them. This type of information-gathering is probably legal, because when we sign up for accounts, most of us agree to their terms and conditions. Even if new laws or regulations are enacted after the PRISM scandal to limit surveillance, it is likely they will only pertain to how government agencies manage information on individuals or how corporations convey such information to government agencies, but it is unlikely that new laws will limit the information gathering for corporate benefits.
Why is it that we tend to be so lenient towards "internet corporations"? One reason may be the mythopoesis surrounding the "internet". Instead of viewing Silicon Valley executives of "internet corporations" as capitalists who sell our privacy for profit, we envision them as benevolent, entrepreneurial hipsters who eat organic quinoa salads and donate some portion of their profits to philanthropic causes. Some of us may buy into the myth of the egalitarian nature of the "internet". The "internet" is not egalitarian, especially not when it comes to the sharing and marketing of information by corporations. For example, there is a fundamental asymmetry when Facebook collects data on its users but does not feel compelled to reveal exactly how it uses the information. Jeff Jarvis, a vocal supporter of "internet corporations" has already expressed concern that users may start questioning their blind trust in the "internet" as a consequence of the PRISM revelations, skillfully avoiding a discussion of corporate privacy invasion. This strategy of placing all the blame for privacy violations on the government may be the best strategy for corporations. Google's attempt to challenge the US government, asking for permission to disclose any data requests from the NSA, enables Google to portray itself as a knight in shining armor and evade the far more uncomfortable discussion of corporate uses and abuses of amassed data.
Culture of sharedom
Evgeny Morozov's recent book "To Save Everything Click Here" provides an excellent insight into the mythos of the "internet". The physical internet consists of computers, routers and servers that are connected to each other, whereas the mythical "internet" is a cultural icon to which god-like powers are ascribed. Morozov refers to this ideology as "internet-centrism". The ideology of "solutionism", a term borrowed from the world of architecture and urban planning, refers to:
…an unhealthy preoccupation with sexy, monumental, and narrow-minded solutions— the kind of stuff that wows audiences at TED Conferences— to problems that are extremely complex, fluid, and contentious.
"Solutionism" and "internet-centrism" can act in concert, creating a virtuous cycle in which the mythical "internet" is seen as a means to provide the ultimate solutions to the problems of humankind. This view of the "internet" and the afore-mentioned neoliberal awe of Silicon Valley entrepreneurs all may contribute to why privacy invasions by internet corporations are forgiven or ignored.
One additional cultural phenomenon that has allowed "internet corporations" to erode our privacy is that of sharedom, the incessant and growing desire to share our opinions and details of our personal lives with a broad audience. Just like "solutionism" or neoliberalism, sharedom is not a product of the "internet", but it has become a major fuel for the mythical "internet". Sharedom is just another word for nothing left to hide. Reality television, for example, is a manifestation of sharedom. The MTV reality TV show "The Real World" was first broadcast in 1992 when the "internet" was still in its embryonic stage. Millions of viewers could watch minute details of the lives of strangers living in a house together. One may view reality TV as a form of mass exhibitionism and mass voyeurism, but as Mark Greif has pointed out, one of the key aspects of reality TV was that it allowed viewers to "judge" the people they were observing. While reality TV only allowed a small group of people – selected from thousands of applicants – to "share" their lives with a broad audience, the "internet" gradually enabled everyone with an online connection to share their lives. We started living in transparent cages - Massive Open Online Cages (MOOCs) - and the "internet" permitted the audience to give instant feedback by passing online "judgments", such as leaving comments on social media posts or blog posts. This culture of sharedom was an unexpected bounty for "internet corporations", because it not only made us less cautious about our privacy but also supplied them with massive amounts of free personal data that could be marketed.
We often hear about the trade-off between privacy and security and the need for an optimal balance, which maximizes the privacy of the individual while maintaining the security of our society. This sounds like a reasonable argument, but it ignores the fact that this is not the only privacy trade-off. Corporations are interested in maximizing their profits and since individual data is a marketable commodity, their interest is to find a balance between maximal profit and maintaining some degree of privacy for users that makes them feel comfortable enough to share personal data that can be marketed. In addition to this trade-off between profits and privacy, the culture of sharedom also creates the trade-off between publicity and privacy. Jill Lepore has recently discussed the challenges of this trade-off in an essay in the New Yorker:
In the twentieth century, the golden age of public relations, publicity, meaning the attention of the press, came to be something that many private citizens sought out and even paid for. This has led, in our own time, to the paradox of an American culture obsessed, at once, with being seen and with being hidden, a world in which the only thing more cherished than privacy is publicity. In this world, we chronicle our lives on Facebook while demanding the latest and best form of privacy protection—ciphers of numbers and letters—so that no one can violate the selves we have so entirely contrived to expose.
Another form of trade-off is that of convenience versus privacy. Using a website such as Amazon to purchase products offers a lot of convenience: It remembers which products we have previously bought, it offers targeted recommendations for new or related products that may be of interest based on our profile, and it even remembers which products we recently browsed. The more we use Amazon, the more accurate their profile of our interests becomes, as evidenced by the accuracy of Amazon's recommendations for new purchases. All we have to offer Amazon in exchange for this convenience is a window into the privacy of our soul.
I remember coming across the expression "Faustian bargain" to describe how we exchange our privacy for the sake of convenience. When Goethe's Faust agreed to serve the devil Mephistopheles in the after-life, he was rewarded with youth and a beautiful lover. We may not approve of Faust's choice, but his deal at least merits some consideration. We currently sacrifice our privacy for the benefit of corporate profits and in exchange receive free shipping, targeted ads and coupons. No youth, no lovers. Our deal does not even rise to the level of a "Faustian bargain".
The recent study "Silent Listeners: The Evolution of Privacy and Disclosure on Facebook" conducted by researchers at Carnegie Mellon University monitored the public disclosure (information visible to all) and private disclosure (information visible to Facebook friends) of personal data by more than 5,000 Facebook users during the time period 2005-2011. The researchers identified two opposing trends. Over time, Facebook users divulged less and less personal information such as birthdates, favorite books or political information to the public. On the other hand, the researchers also noticed a trend of revealing more personal information to Facebook friends. Apparently, there was a growing awareness of how public disclosures can compromise privacy, but users were also emboldened to reveal more personal information when they deemed their audience to be trustworthy. As the researchers correctly pointed out, these "private disclosures" are always available to Facebook itself, third-party apps and to advertisers, referred to as "silent listeners" by the researchers. This is a key point when it comes to privacy settings on social media websites. Users are able to control how much information is displayed to other individuals and future laws and regulations may protect users by curtailing disclosures to government agencies, but information disclosures to the company that provides the service itself and its corporate clients are often beyond our control.
The poll "Teens, Social Media and Privacy" conducted by the Pew Research Center confirmed this lack of concern about third-party access to personal data in a group of 632 teenagers. Overall, 60% of teenagers said that they were either not at all concerned or not too concerned about third-party access (such as advertisers or third-party apps) to their personal information. Only 9% were very concerned about it. Individual comments made by teenagers in a Pew focus group further underscore this cavalier attitude towards corporate access to personal data:
Male (age 16): "It's mostly just bands and musicians that I ‘like' [on Facebook], but also different companies that I ‘like', whether they're clothing or mostly skateboarding companies. I can see what they're up to, whether they're posting videos or new products... [because] a lot of times you don't hear about it as fast, because I don't feel the need to Google every company that I want to keep up with every day. So with the news feed, it's all right there, and you know exactly."
Male (age 13): "I usually just hit allow on everything [when I get a new app]. Because I feel like it would get more features. And a lot of people allow it, so it's not like they're going to single out my stuff. I don't really feel worried about it."
Value of privacy
The revelations about how the government is using surveillance data obtained by "internet corporations" should prompt a broad debate of how we value privacy, especially because it is difficult to affix a price-tag on this intangible non-commodity. This debate will hopefully lead to greater transparency in regards to how governments access and handle personal information. However, it is important to also raise awareness of the potential abuse of personal information by private corporations. If we truly value our privacy, we need to develop methods that restrict government and corporate access to our personal data. In the process we will have to unravel our myths surrounding internet-centrism, solutionism and sharedom.
Image Credits: Automated envelope sealer used by the Stasi to close opened letters after review of the letter contents (image by Appaloosa - Wikimedia Commons), a Stasi surveillance post (image by Lokilech - Wikimedia Commons)
Monday, March 04, 2013
by Jalees Rehman
"For every rational line or forthright statement there are leagues of senseless cacophony, verbal nonsense, and incoherency."
The British-Australian art curator Nick Waterlow was tragically murdered on November 9, 2009 in the Sydney suburb of Randwick. His untimely death shocked the Australian art community, not only because of the gruesome nature of his death – Waterlow was stabbed alongside his daughter by his mentally ill son – but also because his death represented a major blow to the burgeoning Australian art community. He was a highly regarded art curator, who had served as a director of the Sydney Biennale and international art exhibitions and was also an art ambassador who brought together artists and audiences from all over the world.
After his untimely death, his partner Juliet Darling discovered some notes that Waterlow had jotted down shortly before his untimely death to characterize what defines and motivates a good art curator and he gave them the eerily prescient title “A Curator’s Last Will and Testament”:
2. An eye of discernment
3. An empty vessel
4. An ability to be uncertain
5. Belief in the necessity of art and artists
6. A medium— bringing a passionate and informed understanding of works of art to an audience in ways that will stimulate, inspire, question
7. Making possible the altering of perception.
Waterlow’s notes help dismantle the cliché of stuffy old curators walking around in museums who ensure that their collections remain unblemished and instead portray the curator as a passionate person who is motivated by a desire to inspire artists and audiences alike.
The Evolving Roles of Curators
The traditional role of the curator was closely related to the Latin origins of the word, “curare” refers to “to take care of”, “to nurse” or “to look after”. Curators of museums or art collections were primarily in charge of preserving, overseeing, archiving and cataloging the artifacts that were placed under their guardianship. As outlined in “Thinking Contemporary Curating” by Terry Smith, the latter half of 20th century witnessed the emergence of new roles for art curators, both private curators and those formally employed as curators by museum or art collections. Curators not only organized art exhibitions but were given an increasing degree of freedom in terms of choosing the artists and themes of the exhibitions and creating innovative opportunities for artists to interact with their audiences. The art exhibition itself became a form of art, a collage of art assembled by the curators in a unique manner.
Curatorial roles can be broadly divided into three domains:
1) Custodial – perhaps most in line with traditional curating in which the curator primarily maintains or preserves art collections
2) Navigatory – a role which has traditionally focused on archiving and cataloging pieces of art so that audiences can readily access art
3) Discerning – the responsibility of a curator to decide which artists and themes to include and feature, using the “eye of discernment” described by Nick Waterlow
Creativity and Curating
The diverse roles of curators are characterized by an inherent tension. Curators are charged with conserving and maintaining art (and by extension, culture) in their custodial roles, but they also seek out new forms of art and experiment with novel ways to exhibit art in their electoral roles. Terry Smith’s “Thinking Contemporary Curating” shows how the boundaries between curator and artist are becoming blurry, because exhibiting art itself requires an artistic and creative effort. Others feel that the curators or exhibition makers need to be conscious of their primary role as facilitators and that they should not “compete” with the artists whose works they are exhibiting. This raises the question of whether the process of curating art is actually creative.
It is difficult to find a universal and generally accepted definition of what constitutes creativity because it is such a subjective concept, but the definition provided by Jonathan Plucker and colleagues in their paper “Why Isn’t Creativity More Important to Educational Psychologists? Potentials, Pitfalls, and Future Directions in Creativity Research” is an excellent starting point:
“Creativity is the interaction among aptitude, process, and environment by which an individual or group produces a perceptible product that is both novel and useful as defined within a social context.”
Using this definition, assembling an art exhibition is indeed creative – it generates a “perceptible product” which is both novel and useful to the audiences that attend the exhibition as well as to the artists who are being provided new opportunities to showcase their work. The aptitude, process and environment that go into the assembly and design of an art exhibition differ among all curators, so that each art exhibition reflects the creative signature of a unique curator.
Ubiquity of Curators
The formal title “curator” is commonly used for art curators or museum curators, but curatorial activity – in its custodial, navigatory and discerning roles – is not limited to these professions. Librarians, for example, have routinely acted as curators of books. Their traditional focus has been directed towards their custodial and navigatory roles, cataloging and preserving books, and helping readers navigate through the vast jungle of published books.
Unlike the key role that art curators play in organizing art exhibitions, librarians are not the primary organizers of author readings, book fairs or other literary events, which are instead primarily organized by literary magazines, literary agents, publishers or independent bookstores. It remains to be seen whether the literary world will also witness the emergence of librarians as curators of such literary events, similar to what has occurred in the art world. Our local public library occasionally organizes a “Big Read” event for which librarians select a specific book and recommend that the whole community read the book. The librarians then lead book discussions with members of the community and also offer additional reading materials that relate to the selected book. Such events do not have the magnitude of an art exhibition, but they are innovative means by which librarians interact with the community and inspire readers.
One of the most significant curatorial contributions in German literary history was the collection of fairy-tales and folk-tales by the Brothers Grimm (Brüder Grimm or Gebrüder Grimm), Jacob and Wilhelm Grimm. Readers may not always realize how much intellectual effort went into assembling the fairy-tales, many of which co-existed in various permutations depending on the region of where the respective tales were being narrated. I own a copy of the German language edition of the “Children's and Household Tales” (Kinder- und Hausmärchen) which contains all their original annotations. These annotations allow the reader to peek behind the scenes and see the breadth of their curatorial efforts, especially their “eye of discernment”. For example, the version of Snow-White that the Brothers Grimm chose for their final edition contains the infamous scene in which the evil Queen asks her mirror, “Mirror, Mirror on the wall, Who is the prettiest in all the land?” She naturally expects the mirror to say that the Queen is the prettiest, because she just finished feasting on what she presumed were Snow-White’s liver and lungs and is convinced that Snow-White is dead. According to the notes of the Brothers Grimm, there was a different version of the Snow-White tale in which the Queen does not ask a mirror, but instead asks Snow-White’s talking pet dog, which is cowering under a bench after Snow-White’s disappearance and happens to be called “Spiegel” (German for “Mirror”)! I am eternally grateful for the curatorial efforts of the Brothers Grimm because I love the symbolism of the Queen speaking to a mirror and because I do not have to agonize over understanding why Snow-White named her pet dog “Mirror” or expect a Disneyesque movie with the title “Woof Woof” instead of “Mirror Mirror”.
The internet is now providing us access to an unprecedented and overwhelming amount of information. Every year, millions of articles, blog posts, images and videos are being published online. Older texts, images and videos that were previously published in more traditional formats are also being made available for online consumption. The book “The Information: A History, a Theory, a Flood” by James Gleick is quite correct in using expressions such as “information glut” or “deluge” to describe how we are drowning in information. Gleick also aptly uses the allegory of the “Library of Babel”, a brilliant short story written by Jorge Luis Borges about an imaginary library consisting of hexagonal rooms that is finite in size but contains an unfathomably large number of books, all possible permutations of sequences of letters. Most of these books are pure gibberish, because they are random sequences of letters, but amidst billions of such books, one is bound to find at least a handful with some coherent phrases. Borges' story also mentions a mythical “Book-Man”, a god-like librarian who has seen the ultimate cipher to the library, a book which is the compendium of all other books. Borges originally wrote the story in 1941, long before the internet era, but the phrase "For every rational line or forthright statement there are leagues of senseless cacophony, verbal nonsense, and incoherency" rings even more true today when we think of the information available on the web.
This overwhelming and disorienting torrent of digital information has given rise to a new group of curators, internet or web curators, who primarily focus on the navigatory and discerning roles of curatorship. Curatorial websites or blogs such as 3quarksdaily, Brainpickings or Longreads comb through mountains of online information and try to select a handful of links to articles, essays, poems, short stories, videos, images or books which they deem to be the most interesting, provocative or inspiring for their readers. They disseminate these links to their readers and followers by posting excerpts or quotes on their respective websites or by using social media networks such as Twitter. The custodial role of preserving online information is not really the focus of internet curators; instead, internet curators are primarily engaged in navigatory and discerning roles. In addition to the emergence of professional internet curatorship through such websites or blogs, a number of individuals have also begun to function as volunteer internet curators and help manage digital information.
Analogous to art curatorship, internet curatorship also requires a significant creative effort. Each internet curator uses individual criteria to create their own collage of information and themes they focus on. Even when internet curators have thematic overlaps, they may still decide to feature or disseminate very different types of information, because the individuals engaged in curatorship have very distinct tastes and subjective curatorial criteria. One curator’s chaff is another curator’s wheat.
Formal Education and Training in Internet Curation
There are no formal training programs that train people to become internet curators. Most popular internet curators usually have a broad range of interests ranging from the humanities, arts and sciences to literature and politics. They use their own experience and expertise in these areas to help them select the best links that they then pass on to their readers or followers. Some internet curators are open to suggestions from their readers, thus crowd-sourcing their curatorial activity, others routinely browse selected websites or social media feeds of individuals which they deem to be the most interesting, others may plug in their favorite words to scour the web for intriguing new articles.
Internet curation will become even more important in the next decades as the amount of information we amass will likely continue to grow exponentially. Not just individuals, but even corporations and governments will need internet curators who can sift through information and distilling it down to manageable levels, without losing critical content. In light of this anticipated need for internet curators, one should ask the question whether it is time to envision formal training programs that help prepare people for future jobs as internet curators. Internet curation is both an art and a science – the art of the curatorial process is to creatively assemble information in a manner that attracts and inspires readers while the science of internet curation involves using search algorithms that do not just rely on subjective and arbitrary criteria but systematically interrogate vast amounts of information that are now globally available. A Bachelor’s or Master’s degree program in Internet Curation could conceivably train students in the art and science of internet curation.
In scientific manuscripts, it is common for scientists to cite the preceding work of colleagues. Other colleagues who provide valuable tools, such as plasmids for molecular biology experiments, are cited in the “Acknowledgements” section of a manuscript. Colleagues whose input substantially contributed to the manuscript or the scientific work are included as co-authors. Current academic etiquette does not necessarily acknowledge the curatorial efforts of scientists who may have nudged their colleagues into a certain research direction by forwarding an important paper that they might have otherwise ignored.
Especially in world in which meaningful information is becoming one of our most valuable commodities, it might be time to start acknowledging the flux of information that shapes our thinking and our creativity. We are beginning to recognize the importance of people who are links in the information chain and help separate out meaningful information from the “senseless cacophony”. Perhaps we should therefore also acknowledge all the sources of information, not only those who generated it but also those who manage the information or guide us towards the information. Such a curatorial credit or Q-credit could be added to the end of an article. It would not only acknowledge the intellectual efforts of the information curators, but it could also serve as a curation map which would inspire readers to look at the individual elements in the information chain. The readers would be able to consult the nodes or elements that were part of the information chain (instead of just relying on lone cited references) and choose to take alternate curation paths.
I will try to illustrate a Q-credit using the example of Abbas Raza who pointed me towards a 3quarksdaily discussion of “Orientalism” and an essay by the philosopher Akeel Bilgrami. Even though I had previously read Edward Said’s book “Orientalism”, the profound insights in Bilgrami’s essay made me re-read Edward Said’s book. The Q-credit could be acknowledged as follows:
Q-Credit: Abbas Raza --> The 2008 3Quarksdaily Forum on Occidentalism --> “Occidentalism, the Very Idea: An Essay on Enlightenment and Enchantment” by Akeel Bilgrami published 2008 on 3Quarksdaily.com and 2006 in Critical Inquiry --> Bilgrami identifies five broad themes in Edward Said’sOrientalism
The acknowledgement of information flux is already part of the Twitter netiquette. The German theologian Barbara Mack uses her Twitter handle @faraway67 to curate important new articles about history, science, music, photography, linguistics and literature. She sees the role of web curators similar to that of music conductors, who do not compose original pieces of music but instead enable the access of an audience to the original creative work. She says that “web curation is a relatively new field of dealing with information and good curation is an act of creativity which requires dedication and a keen sense for content.” She agrees that curators should indeed be given credit, “not only out of courtesy but to acknowledge their efforts of taking upon the challenge of bringing the vast information the web provides into a handy form for their followers to enjoy.”
Twitter curators such as Barbara Mack use abbreviations such as h/t (hat-tip) or RT (retweet) followed by a Twitter handle to acknowledge their sources. Contemporary Twitter netiquette suggests that if curated links of use to followers, these should acknowledge the curators' efforts before tweeting them on.
One challenge that is intrinsic to Twitter (but may in an analogous fashion apply to other social media networks as well) is that each tweet can only contain 140 characters, which presently makes it very difficult to acknowledge the comprehensive curatorial information flux. If I decide to tweet on an interesting article about the philosophy of science, which I found in the Twitter feed of person X, the space limitations may make it impossible for me to give credit to all the preceding members of the information chain which had directed X’s attention to that specific article. The Q-credit system may thus be best suited for acknowledgements at the end of blog posts or articles, but not for social media messaging with strict space limitations.
The Future of Internet Curation
The area of internet curation is still in its infancy and it is very difficult to predict how it will evolve. Managing online information will become increasingly important. Even though such managerial roles may not necessarily carry the title “internet curator”, there is little doubt that managing online information in a meaningful manner is one of the biggest challenges that we will face in the 21st century. I am quite optimistic that we will be able to address this challenge, but the first hurdle is to recognize it.
Image Credit: The Librarian by Giuseppe Arcimboldo (1527–1593)
1. “The Cambridge Handbook of Creativity” (2010) by James C. Kaufman and Robert J. Sternberg --> Chapter 3 “Assessment of Creativity” by Jonathan A. Plucker and Matthew C. Makel --> “Why Isn’t Creativity More Important to Educational Psychologists? Potentials, Pitfalls, and Future Directions in Creativity Research” (2004) by Jonathan A. Plucker et al. in EDUCATIONAL PSYCHOLOGIST, 39(2), 83–96
3. Book review of “The Information” at Brainpickings --> “The Information: A History, a Theory, a Flood” (2011) by James Gleick --> “Library of Babel” by Jorge Luis Borges as an allegory for the information glut
Monday, December 24, 2012
A Universal History of Online Iniquity
by James McGirk
“BREAKING: Confirmed flooding on NYSE. The trading floor is flooded under more than 3 feet of water.” It was a horrid thought, but Shashank Tripathi’s (i.e. Comfortablysmug’s) infamous Hurricane Sandy tweet had panache.
Tripathi mimicked the style of a breaking news tweet perfectly. The image of water sluicing into the New York Stock Exchange was too good to be true. An irresistible nugget of news distilling the potent emotions stirred by the storm: Sorrow for afflicted New Yorkers, fear for the future, the thrill of seeing history unspool in real time, and a dose of snickering glee at the idea of cuff-linked financiers wading through filthy water.
The cruelty and incendiary media appeal of Tripathi’s tweet was reminiscent of another notorious prank: the attack on the Epilepsy Foundation. On March 22, 2008, a horde of eBaum’s World users (a community devoted to online humor) logged onto the Epilepsy Foundation’s online forums, and plastered its pages with blinking graphics.
As despicable as deliberately triggering thousands of epileptic fits or enflaming a vulnerable community during a catastrophe may be, consider how hard it is to shock a contemporary audience with a piece of art or literature. As subversive texts go, these are arguably genuine artistic achievements, thrilling to witness in real time or read about afterwards.
It’s an aesthetic experience Sherrod DeGrippo, an information security expert who founded two of the world’s preeminent repositories of Internet drama, Encyclopedia Dramatica and OhInternet.com, compares to watching reality television. “I think that a lot of what is attractive about Internet drama is the combination of schadenfreude and superiority people feel when looking at it,” says DeGrippo. “Reality TV inspires a lot of the same feelings. The viewer thinks of himself as superior, but when examined, the viewer is obsessively voyeuristic.”
When Tripathi’s identity was revealed, he certainly looked like a real-life Omarosa or Wendy Pepper. Here was a hedge fund analyst who wrote a sex diary for New York Magazine reminiscent of Preppie Murderer Robert Chambers and managed a Republican campaign, spending his free time trying to rile people up during Hurricane Sandy: a despicable man, and deliciously so.
Tripathi apologized for his barrage of misleading tweets. Most of the delinquent denizens of eBaum’s World did not, however. Their anti-social behavior was unapologetically deliberate. They were—to use the correct Internet jargon—trolling.
“Trolling is a lot like graffiti,” writes essayist and Internet grey eminence Paul Graham (he founded Y Combinator). “Graffiti happens at the intersection of ambition and incompetence: people want to make their mark on the world, but have no other way to do it than literally making a mark on the world.”
Graffiti is an apt metaphor. It began as a diffuse, sub-literary phenomenon, and grew to become a permanent part of the global urban experience. To make the leap from anonymous malcontents scratching their names on the walls of Roman prisons to a graffiti “artist” like Jean-Michel Basquiat took millennia and a series of technological leaps and daring appropriations.
Christopher “moot” Poole created 4chan in 2003, an online image board that would become, according to NYU digital culture and folklore scholar Dr. Whitney Phillips, a “specially demarcated troll space.” There, tens of thousands of anonymous users interact in real time and together create a flood of never-ending nudity and subversive humor. It was the trolling equivalent of the cheap, portable spray-paint can.
“Pretty much all the people you encounter [on 4chan’s /b/ board] are trolls,” says Dr. Phillips. Ethical issues are cast aside. “Everyone (or almost everyone) is aware of the game and consents to playing.” But when 4chan’s users flock together for the Internet equivalent of a Viking raid they forget that “outside these specially demarcated troll spaces, people are NOT aware of the trolling game and therefore are NOT afforded the opportunity to consent. Trolls don't give targets the opportunity to say no, in fact tend to be triggered when they encounter resistance (the common trolling aphorism "your resistance only makes my penis harder" speaks volumes).”
Media attention is like sloshing gasoline on a fire. In a forthcoming academic article, Philips argues that: “trolls and mainstream media outlets, specifically Fox News, are locked in a cybernetic feedback loop predicted upon spectacle.”
Not only does media attention encourage trolls, it infuses their historical moments with images and vocabulary. “Trolls are cultural scavengers, fashioning amusement from that which already exists,” says Dr. Phillips. She describes a 4chan user who successfully trolled Oprah Winfrey’s online message board by posing as a pedophile. Oprah actually read his post aloud on the air:
“Let me read you something posted on our message boards,” she gravely began, “from somebody who claims to be a member of a known pedophile network: He said he does not forgive. He does not forget. His group has over 9000 penises and they’re all... raping... children.”
It was a trolling triumph. The message incorporated recognizable 4chan memes (the official slogan of Anonymous—an online hacktivist collective closely affiliated with 4chan—is: We are anonymous, We are Legion, We do not forgive, We do not forget, Expect us; while “over 9,000,” is one of the board’s most popular memes; as is anything having to do with pedophilia.) And a clip containing Oprah’s words was spliced with images of various troll memes and circulated.
There is no history on 4chan; nothing is archived. Any image, link, or message posted to the board will soon slip off the board’s front page and vanish unless users continue to “bump” the post or recycle its content.
If 4chan were the only “specially demarcated troll space,” whatever culture was created on it might never stabilize into something more significant. Moments like the Oprah’s trolling would be lost as soon as 4chan turned its attention elsewhere. So in 2004, 4chan and their Internet ilk began to use Sherrod DeGrippo’s Encyclopedia Dramatica as an archive for Internet drama they had witnessed online and that they created.
“The site started as a joke,” says DeGrippo. “A friend had placed an article on Wikipedia, only to have it swiftly deleted. So I threw a quick instance of Mediawiki up on my own server and put the article there. It was intended to just have the one article, but people started adding more and more.”
A Mediawiki (the software that Wikipedia uses) lets users simultaneously create and edit content online. This added another dimension to the experience of Internet drama.
“[Contributors to Encyclopedia Dramatica would] view and then create derivative works off of things they claimed to despise or mock,” explains DeGrippo. “Then those new, created artifacts began to take a life of their own and make a story of their own.”
Because items don’t vanish into the ether as soon as they are forgotten about, Encyclopedia Dramatica evolved into something more akin to a wild garden than the primordial ooze of 4chan’s /b/.
There is actually something resembling a coherent voice to the site. “For me, the voice of a lot of ED's content came from a sysop who went by the name of OldDirtyBtard,” says DeGrippo. “He was a British guy living in LA and a friend, very jovial. I preferred to assume everything written was in his accent, he killed himself in 2010.”
The Encyclopedia Dramatica page dedicated to OldDirtyBtard (Sean Carasov, a one-time Beastie Boys tour manager) contains a strange and touching tribute. There is a copy of his suicide note. A video of his memorial that sadly does not include “the first time in history that got rickrolled by a bagpipe player,” photographs of the man’s tattoos, and a link to his exploits under another moniker that he used to harass the Church of Scientology with (and who allegedly poisoned a feral cat he had tamed).
DeGrippo relinquished control of Encyclopedia Dramatica in 2011 (a mirror of the site continues to be updated and now includes a very unflattering page dedicated to DeGrippo). She has made a second repository, OhInternet, with a more advanced interface that tries to avoid the bloody and obscene “shock” content that infests Encyclopedia Dramatica.
What binds a community like Encyclopedia Dramatica together? “I think people just do things on the Internet until they're not fun anymore,” says DeGrippo. “I ran ED for 7 years, the user base and readership changed on a continuum. People would disappear and come back all the time. I think that's what is appealing about a lot of Internet communities, you can leave them, or they can change, but ultimately it's the same people in the same places.”
Clearly Shashank Tripathi craved community. He left hundreds of comments on the New York Magazine’s website and broadcast more than 67,000 tweets to his followers. His Hurricane Sandy tweet may have had panache, but like any clichéd villain, all he really wanted was for someone to pay him attention.
Monday, July 18, 2011
The Thirty-Third Internet Connection in New Delhi
by James McGirk
I never had a problem with Alaskan Senator Ted Steven’s oft-mocked remark about the Internet being a series of tubes. I saw it with my own eyes (metaphorically speaking) as a teenager growing up in New Delhi. The Internet was a feed of information that trickled in drip by drip, slowly increasing as we switched our faucets and eventually tapped into the municipal supply. My father was a foreign correspondent, which meant he had to send stories back home to be published. When we left “on assignment” to India he was issued with a bag of sophisticated telecommunications equipment. We plugged it in and became early adopters.
Our first modem looked like a cross between a swimming cap, a spider, and a rubber truncheon. There were two cups that stretched over the mouthpiece and receiver of a standard analogue telephone. One contained a microphone and the other a speaker. The modem would whistle and hiss signals into the phone, and listen for responses. It was a crude but robust system, the only thing capable of working on lines that were filled with crackling static and echoes, and may well have been tapped. Entire sentences would be garbled by line noise, or more insidiously the changes could be almost invisible. A pound sterling inserted where a dollar sign once stood.
Dad’s squealing octopus of a modem might have made things easier for everyone else, but it tossed a sabot into the gears of my imagination. Before we had left, he had taken me on a tour of his office and the printing press below. Communications made sense to me afterward. The newspaper was like a factory: an office space above filled with glowing amber terminals and stuttering typewriters and piles of important paper being fed to the machines below. The presses were magnificent, booming and huffing and spattering ink at rolling reams of paper. I could easily imagine the process as an unbroken chain extending across the world, see a pale English editor with a phone clenched between his shoulder and ear, transcribing dad’s story click by click into a typesetting machine to be turned to molten lead, slotted into a drum, dunked in ink and pressed onto fresh newsprint a hundred times a minute.
I had seen computers before. In the past Mom and Dad, who were both journalists, had been issued clunky old Amstrads and Tandys, but those didn’t seem that different from the typesetting machines and dumb terminals back at headquarters. Dad’s new laptop was more like a porthole into a parallel universe than a word processor. It had memory, a temperamental beige lozenge that could be switched on and off with catastrophic consequences. The interface was also different. There were programs and applications nested in one another; navigating around the system you got a sense that you were indeed navigating; traversing an alien logic, and each time you learned how to run some program or subroutine it gave you the most satisfying synaptic kick.
We were terrified of change and subject to the home office’s budgetary whims, which meant upgrades were infrequent. But I was beginning to learn a new vocabulary of clock speeds and RAM, and wasn’t the only one. We lived beside Nehru Place, an information technology enclave with a crowded bazaar that sold everything from ink stamps to enterprise-level computing solutions. The market’s advertisements provided me with an easy gloss of the state of the art. Each month the market would sprout new billings touting the latest processors, at first 80286 processors capable of a blistering 16MHz then 386s, 486s and eventually Pentiums. Even the drawings changed. The hand-painted computers and peripherals changed from cartoonish televisions complete with knobs protruding from curved screens to angular, almost menacing monitors and towers and keyboards containing the correct number of keys.
My first direct encounter with computer ‘telephony’ came from a friend’s dial-up bulletin board system (a.k.a. a BBS). I forget what he called his. No doubt something disproportionately macho. A brief Googling revealed “The POISON Den” and “The TWILIGHT Zone” as the names of two of his contemporaries. I would dial in occasionally but it was more fun to see him run it. Several hours a day he monopolized one of the family phonelines to allow strangers to call and log-in. Most visitors were guests and afforded access only to the most banal files and chat boards, while a select few were given special titles and privileges, such as a secret stash of password cracking programs and R-rated pictures of Baywatch star Erika Eleniak. As Sysop, the most exalted of ranks, my friend had access to the entire system, unimaginable power for a 14-year-old boy to wield; and wield it he did, occasionally booting off a lowly user just for the rush.
I started to think of the space inside his BBS, which in real life wasn’t much more than a second computer, as something not too different from Nehru Place. A single road leading into the center that was frequently congested. A ground floor of wares that were accessible to all, even guests, while getting into the towers above was limited to businessmen and others who belonged there. Lording over it all, godlike, was the Sysop, who could tear it all down and build it up again at his whim.
My parents eventually caved and bought us a personal computer (partly this was to contain my experimentation). It was a 386 running a primitive version of Windows. A photographer friend of my dad’s would troubleshoot the thing for us, spending hours at a time installing new software and removing programs that had gone feral and begun destroying files, such as the ones with photocopied manuals I bought from Nehru Place bootleggers. He tried to keep us up-to-date with the latest technologies, particularly those he didn’t have himself and wanted to play with. Naturally I supported his suggestions. And this was how we were eventually convinced to buy a U.S. Robotics brand 14.4K modem and a pricy account connecting us to the Internet.
Family lore has it we that we received the 33rd Internet connection in New Delhi. There are many caveats to this claim, it willfully ignores that the embassies and Indian government had access years before, and was likely derived from our account's name, which we got from Videsh Sanchaar Nigam Limited (then India’s national telephone company) and had the prefix delaac33. If the ‘ac’ stood for ‘account’ then it was indeed possible we had Delhi’s 33rd commercial account. We may also have had the three-hundred-and-thirty-third account, not quite so grand a claim, but an early account all the same.
Our meager connection was text-only. There was a browser called Lynx (which still exists) that launched each expedition from the University of Kansas’ online portal. Images had to be downloaded separately as files and would resolve line-by-line and were rarely worth the hours it took to download them. The Internet was a totally different experience than the BBS, it felt as wide open as a frontier or a mountain forest waiting to be foraged. My focus shifted from trying to make sense of the system to hunting and gathering odd bits of information.
I gravitated toward text files, little nuggets of mayhem containing instructions for pipe bombs, cracking locks, spoofing telephone boxes and sabotaging cars. It was all hopelessly out of date and none of the equipment would have been available in India even if I did try one of those recipes. I grew out of those silly files quickly but I remember them well. I came across a nostalgic database of them a few years ago (someone had assembled it for a documentary called 'Textfiles'.) Reading them again they seemed to represent so much more than their content. They were like flavor crystals, and reading them was like accessing the revolutionary DNA of the Internet, a harbinger of what was about to come rumbling down the pipe. Not quite a series of tubes but glorious in a flickering, monochromatic sort of way.
Monday, June 13, 2011
Writing for Machines
by James McGirk
Writers are anxious about the Internet and all things electronic, as we worry these newfangled ways of entertaining ourselves might someday obviate our own work. The solution, perhaps, lies in understanding and adapting to this new medium. Consuming enough that we can master its complexities and render appealingly intelligent confections for our readers. But who are these readers? Are they different online than they are in print? Some of them aren’t even human. There is a new form of reader browsing the Internet. For this is no longer just the age of mechanical reproduction; we now have to contend with mechanical readers as well.
William Gibson, who coined the term “cyberspace” imagined it as a mass consensual hallucination, rendered as a cityscape, the prominence of each shape on the horizon an index of how much data was passing through a single point; a point which in 1982 a reader might have thought of as a mainframe computer, and what today, nearly thirty years later, we might identify as an html address or site. On Gibson’s Internet Google would glow the brightest, soar the highest; be an Empire State Building to the Internet’s Manhattan. Most users don’t look at the Internet by volume, however, they read it pane by pane, navigating from bookmarks or through searches, feeding keywords into an ‘engine,’ a series of algorithms, to retrieve lists of linked addresses to the information they seek. These lists are customized to the user, the results tweaked by the user’s location and previous searches. The more searches you make, the more information about yourself you reveal, the more customized the experience becomes.
From a content provider’s point of view (as opposed to a more passive content user’s point of view) an ideal Internet browser might render something close to Gibson’s landscape of crystalline data sculptures, were there a way to capture such information in real time. But commercial users would rather see traffic than the mere through-output of bits and bytes. Who consumes what information, when and why is much more important to commerce than mere bandwidth. Though online sales have grown to become big business, the Internet remains a popularity contest. The real currency of the online world is attention. Being able to read the flow of attention online would mean mastering it, and reaping the ad money that comes along with that attention. But instead of trying to follow where everyone is going all at once, content providers are instead attempting to clone their readers’ minds.
As you navigate the Internet, the Internet – which is to say the entities using the Internet – navigate you. This isn’t a benign process. They want to learn as much about you as possible to snag your attention; not only by viewing content, but by diverting your time into loops of advertisements and possibly even pushing you through a point-of-sale and taking your money directly. They do so by gleaning information about you. Where you go, what you search for, what type of computer you are using… Websites leave small tracking codes on your computer called cookies, and each of these transmits data back to home base.
Keywords (also known as index terms) are the most interesting and valuable traces left by users. Cookies record the terms users use to come across a site. An entire industry has sprung up to interpret these keywords, and another to optimize content online so it can be better read by search engines (this is called Search Engine Optimization). The data they gather is a crude simulacrum of their users; an inscription of their desires for an instant. Almost like a section of brain tissue. A clue. And en masse a hologram of their users collective desires.
All writers crave attention and respond to their readers’ desires. Charles Dickens used live audiences as focus groups for his serialized fiction. Newspapers and magazines have always had to respond to circulation numbers. Electronic texts simply speed up the process. Text online can be altered immediately. There are even advanced analytics packages that use keywords and cookies to anticipate what readers want and automatically generate ‘content’ for users in response to what they ‘perceive’ readers as wanting. Other companies use similar algorithms to assign stories to human beings. When you hear the term content farms, that’s what’s going on.
Google tweaked its search algorithms a few months ago, which trimmed back the custom-generated content that had begun to choke its search results like kudzu. But beyond the first or second page of results, it comes sneaking back and you will still find page after page of sites that copy the content of other sites, or ones loaded with all the correct terminology of whatever it is you seek, but arrayed in such a way that these phrases convey little or no meaning. As replications of our desire, these simulacra are incomplete. It would take an infinite amount of data (and a correspondingly infinite amount of time to collect this data) to accurately model a human being’s wants and desires. But machines are getting closer and closer.
There are gaps between reader and author in a traditional text too. Enormous ones. Between the platonic ideal an author holds in his or her head, the text he or she extrudes into type and the reuptake and processing that takes place in a reader’s head, there is plenty of room for strange, unexpected effects to creep in. William Gibson described the cyberspace generated by a child’s calculator as a grey infinity utterly empty but for a string a few basic arithmetic equations (slim structures of liquid crystal one imagines). This unnameable sea of grey emptiness is not neutral. More of a field or something we project into and allow things to assume shape. And distended from the platonic ideal and warped by exterior forces these things become strange. Even arithmetic has its unexpected, subjective aspects. Many a calculator screen has been reversed to spell mild profanities.
Knowledge builds on memory, and all information builds off what we already know. Reading works by drawing parallels with memories, essentially unpacking an archive into that grey arithmetic field mentioned above and letting it take new forms. The way a machine reads, in this respect, is no different. Software has an archive of its own, a database that it is adding or subtracting from. It 'reads' by comparing its archive to a text, and then updating itself. An author can access this archive with his or her text; and the more sophisticated it is, the more he or she can manipulate it; perhaps even creating an aesthetic experience.
Literary forms are beginning to emerge in response to automated reading systems, searches, and databases. Online, an era somewhat akin to the pamphlet-strewn amateurism of18th Century America is in bloom. The most exotic forms can be found on the Internet’s wild fringe, in its anonymous and pseudo-anonymous chat sites. Here there is a frantic economy of monikers, memes and spoofed identities. In online forums such as the semi-anonymous Somethingawful users compete to create the catchiest, most innovative forms – most often an evolution of an earlier idea, name or other fragment of an idea. The best innovators become famous within their tiny little spheres. Other forums are anonymous and ephemeral – the most famous of these being the notorious 4chan/b ‘Random’ board – where the only recognition earned is the sheer longevity of a creation. A post can only survive as long as it is replied to. Then it is gone forever.
The best memes were once charted on the now-defunct Encyclopedia Dramatica. But now there is no reason at all to create but sheer artistic thrill. Although ‘board lore’ has developed a concept somewhat akin to ‘duende’ – a dark, nihlistic reward in the form of amusement known as ‘lulz.’
The evolution of the online literary form could well come from manipulating these mysterious semantic mechanicals. They offer the opportunity to make writing dangerous again. With the proper keywords, information is taken up into automatic readers belonging to some very interesting entities, to the point where there can be real world consequences. As a way of experimenting with this form I created a series of posts with keywords that I imagined might appeal to some of the more peculiar gleaners out trolling for information online. I posted lists of oil rigs, information about espionage, created a consulting company specializing in complex shipping orders in the Arabian Ocean, wrote about electronic warfare, and laced my work with other ‘edible’ keywords. I received visits from hedge funds, multinational banking concerns, the department of defense, oil companies, environmental organizations, the Pakistani government, the Kuwaiti government, the Iranian government, the Russian government, an unacknowledged US military facility, and a few mysterious hits from ‘Cabin John, Maryland’ (a park across the river from CIA headquarters).
I don’t think my posts ever stirred more than a few pixels. All I did was conjure another layer of anxiety about the online world, but for a writer paranoia is far better stuff than anxiety over obsolescence.
Monday, May 30, 2011
The Elusive City
I could tell you how many steps make up the streets rising like stairways, and the degree of the arcades' curves, and what kind of zinc scales cover the roofs; but I already know this would be the same as telling you nothing.
Italo Calvino, Invisible Cities, 1974, p4
In the headlong rush to lead us to the promised land of the “Smart City” one finds a surprising amount of agreement between the radically different constituencies of public urban planners, global corporations and scruffy hackers. This should be enough to make anyone immediately suspicious. Often quite at odds, these entities – and it seems, most anyone else – contend that there is no end to the benefits associated with opening the sluices that hold back a vast ocean’s worth of data. Nevertheless, the city’s traditional imperviousness to measurement sets a high bar for anyone committed to its quantification, and its ambiguity and amorphousness will present a constant challenge to the validity and ownership of the data and the power thereby generated.
We can trace these intentions back to the notoriously misinterpreted statement allegedly made by Stewart Brand, that “information wants to be free.”* Setting aside humanity's talent to anthropomorphize just about anything, we can nevertheless say that urban planners indeed want information to be free, since they believe that transparency is an easy substitute for accountability; corporations champion such freedom since information is increasingly equated with new and promising revenue streams and business models; and hackers believe information to be perhaps the only raw material required to forward their own agendas, regardless of which hat they happen to be wearing.
All three groups enjoy the simple joys of strictly linear thinking: that is to say, the more information there is, the better off we all are. But before we allow ourselves to be seduced by the resulting reams of eye candy, let us consider the anatomy of a successful exercise in urban visualization.
A classic example of the use of layered mapping to identify previously unknown correlations occurred in London in 1854. An epidemic of cholera had been raging in the streets of London, and Dr. John Snow was among the investigators attempting to pinpoint its causes. At the time, the medical establishment considered cholera transmission to be airborne, while Snow had for some time considered it to be waterborne. By carefully layering the cholera victims’ household locations with the location of water pumps, Snow was able to make the clear case that water was in fact cholera’s vector.
This anecdote is by no means unknown, having become a favourite warhorse of epidemiologists and public health advocates; it has now been gladly co-opted by information technology aficionados as an example of a proto-geographic information system (GIS). However, it is worth a further unfortunate mention, as described by Martin Frost, that:
After the cholera epidemic had subsided, government officials replaced the Broad Street Handle Pump. They had responded only to the urgent threat posed to the population, and afterwards they rejected Snow's theory. To accept his proposal would be indirectly accepting the oral-fecal method transmission of disease, which was too unpleasant for most of the public.
Thus even the starkest illuminations by data may yet find little purchase among the policymakers for whom it is ultimately intended.
Another point worth mentioning about Snow’s discovery is that he found exactly the result for which he was seeking. He was, in fact, testing a hypothesis, and not engaging in a cavalier quest for serendipity. The lynchpin of the exercise’s success was the fact that Snow was mapping not just the street plan, but also the locations of the shallow wells. The map did not include any of the other aspects of urban infrastructure, which might have obfuscated the sought-after relationship. On the other hand, without including the wells, what might the map have taught the health authorities? That Broad Street required quarantining?
Even more importantly, the good Dr. Snow put down his quill and went into the field, where he was able to interview residents and understand how the deaths that were further afield of the contaminated pump were in fact connected to it: the residents simply considered it to be better water, and, much to their misfortune, considered the extra effort to go to a more distant well to be worth the trouble.
Several conclusions should be clear from this exceedingly elegant (and therefore admittedly rare) result: 1) It helps to know what it is you are looking for; and 2) The initial hypotheses indicated by the data can only be validated by field-level observation and correlation. These traits – falsifiability and reproducibility – are two hallmarks of the scientific method. Armchair technologists need not apply.
So how replicable is Snow's example? In this "scientific" sense, Richard Saul Wurman, founder of the TED Conference and all-star curmudgeon, questions our ability to even understand what a “city” is. For example, he posits that we do not have a common language to describe the size of a city, or of how one city relates to another, or what an “urban area” is. If there are six different ways of describing Tokyo, and those six ways lead to boundaries variously encompassing populations of 8.5 million to 45 million people, which is the “real Tokyo,” and of what use is the concept of a “border”? We have no unified way of showing density, collecting information, no common display techniques, and no way of showing a boundary. We have no common way of talking about a city. Accordingly for Wurman, the consequence is that ideas cannot be built on one another, and urbanists forego benefits of the scientific method. However, if we consider Snow’s process, the map was a means to an end, a supporting role in the scientific discourse, and was not meant to be anything more than that.
Of what use, then, is the deluge of data, and the pretty pictures that we draw from it? One can find endless examples on the Web of beautiful visualizations derived from datasets that are either partial or self-selected, with results that range from the obvious to the quixotic to the inscrutable. During the Cognitive Cities conference, held in Berlin in February of this year, more than one presenter was asked the question that went more or less along the lines of “Well, that is very nice but it does not tell me anything I don’t know already. What has surprised you about your findings?”
While the end results may be oftentimes trivial, and the lack of Wurman’s standards of measurement worthy of our best Gallic shrug, there is far more unease concerning how and where urban data is being generated, and for whose benefit. At the aforementioned Cognitive Cities conference, Adam Greenfield delivered a powerful keynote which struck a stridently skeptical note towards the various technologies that are rapidly contributing to the manifestation of the networked city. He goes through an increasingly disturbing catalogue of “public objects” whose technologies harvest our participation in public space, creating rich data flows for the benefit of advertisers or police or other bodies, and this generally entirely without our knowledge.
For example, certain vending machines in Japan now have a purely touch-screen interface, but the available selections are selected by algorithms based on the machine's sensing the age and gender of the person standing before it. Therefore, I might see the image of a Snickers bar while you might see the image of a granola bar. The ensuing selections help to refine the algorithm further, but a great deal of agency has been removed from the consumer, or, in the words of Saskia Sassen, we have moved from “sensor to censor”.
Even in initiatives where the public’s initial voice is sought and respected, technology has a way of subverting its alleged masters. Greenfield documents how residents of a New Zealand city voted in a public referendum to allow the installation of closed circuit TV (CCTV) cameras for the purposes of monitoring traffic and thereby increasing pedestrian safety. It was an unobjectionable request, and the referendum passed decisively. However, a year later, the vendor offered the city government an upgraded software package, which included facial recognition functionality. The government purchased the upgrade and installed it without any further consultation with the public, bringing to Greenfield’s mind Lawrence Lessig’s axiom “Code is Law:”
...the invisible hand of cyberspace is building an architecture that is quite the opposite of its architecture at its birth. This invisible hand, pushed by government and by commerce, is constructing an architecture that will perfect control and make highly efficient regulation possible. The struggle in that world will not be government’s. It will be to assure that essential liberties are preserved in this environment of perfect control. (Lessig, pp4-5)
Greenfield’s remedy to make public objects play nicely is problematic, however; his requirement for “opening the data” starkly contradicts significant economic trends. As a simple example, it is doubtful that advertisers will do anything but fight tooth and nail to keep their data proprietary, and given the growing dependence municipalities have on revenue generated by private advertising in public spaces, it is difficult to see the regulatory pendulum swinging Greenfield’s way.
Instead, we see a further complexification of the terms of engagement. Consider the popular iPhone/Android application iSpy, which allows users to access thousands of public CCTV cameras around the world. In many cases, the user can even control the camera from his or her phone touchpad, zooming and panning for maximum pleasure. In this sense, at least, we have succeeded in recapturing aspects of the surveillance society and recasting them as a newly constituted voyeurism.
And yet, there are signs that the radical democratization of data generation is alive and well. Consider Pachube, a site devoted to aggregating a myriad varieties of sensory data. Participants can install their own sensors, eg, a thermometer or barometer, follow some fairly simple instructions to digitize the data feed and connect it to the Internet, and then aggregate or “mash” these results together to create large, distributed sensory networks that contribute to the so-called “Internet of things.” Lest one consider this merely a pleasant hobby, consider the hard data that is being generated by the Pachube community built around sensing radiation emitted during the Fukushima nuclear disaster (and contrast it with the misinformation spread by the Japanese government itself).
The broader point worth emphasizing is that communities appropriate and aggregate sensor data to serve specific purposes, and when these purposes are accomplished these initiatives are simply abandoned. No committee needs to publish a final report; recommendations are not made to policymakers. There is no grandiose flourish, but rather the passing of another temporary configuration of hardware, software and human desire, sinking noiselessly below the waves of the world’s oceans of data.
Cities are and have always been messy and defiantly unquantifiable. Because of this – and not despite it – they are humanity’s most enduring monuments. In this context, our interventions do not promise to amount to much. Rather, these interventions may be best off as targeted, temporary and indifferent to a broader success which would be largely dependent on the difficulties of transcending context. Should it surprise us that cities, which manage to outlast monarchs, corporations and indeed the nations that spawn them, are ultimately indifferent to our own attempts to explicate and quantify them? And, upon embarking on an enterprise of dubious value and even more dubious certainty, are we not perhaps better off simply asking, What difference does a difference make, and acting accordingly?
* Brand’s actual statement was “Information wants to be free. Information also wants to be expensive. Information wants to be free because it has become so cheap to distribute, copy, and recombine---too cheap to meter. It wants to be expensive because it can be immeasurably valuable to the recipient. That tension will not go away. It leads to endless wrenching debate about price, copyright, 'intellectual property', the moral rightness of casual distribution, because each round of new devices makes the tension worse, not better.” Viewed in its entirety, there is really very little to disagree with. We should add that, since it was originally formulated around 1984, it has aged extremely well.
Monday, April 18, 2011
After the Internet was shut off
A year and decade after the turn of the century, things looked dire in the United States of America, but not that dire: the economy was stagnant after an exuberant but lopsided decade of prosperity, job opportunities for graduates and social climbers had dwindled to a few openings changing bedpans for the large, parasitic over-class of aging boomers, and the gleam of enthusiasm following Barack Obama’s presidency had faded quickly. But the fact that *that* and a few years of hardship was all it took for open revolt among the most highly educated, entitled generation of Americans ever to be born would have been quite unimaginable at the time. That the change they got was not at all what they were expecting is one of the great ironies of our age.
The second clamor for change was born in the creative class; brought to term by the poets, as all good revolutions are, if not precisely not in the usual way. This revolution was born from a coalition with a notorious group of email spammers. Perhaps this requires a little explantation. Let us back up a little.
Since the introduction of fax machines and the Internet into Nigeria and other English-speaking third-world countries, mysterious missives would materialize in the inboxes of the industrialized world. These would purport to be from high-ranking bureaucrats, deposed princelings and other dubious figures, and ask recipients for permission to transmit a few million dollars of embezzled funds into their bank accounts in exchange for a hefty cut. If a mark agreed, he or she would be asked for a moderate advance of funds to cover transaction fees… This was known as a 419 scam, and, given the ludicrous spellings of their messages, these emails weren’t considered much of a threat, and indeed were something of a joke (at first).
Did America’s legions of unemployed writers and graphic design professionals reach out to the spammers, or if it was it the other way around? No one knows for sure, but America’s “creatives” were uniquely suited for online scamming, and approached their task with absurd zeal. After all, America's artists been marks in a far more insidious swindle than a Nigerian 419 scam. Hundreds of thousands were lured into borrowing money from the government to finance undergraduate and even graduate degrees in the arts, promised that making a living in a such a field was a viable option, given enough gumption, courage, and talent. There was a sudden drastic leap in the quality of scam emails received.
Scam emails became indistinguishable from regular correspondence, at times, legitimately more appealing than the real thing – rare indeed is the babyboomer who did not at least once fall for heartfelt correspondence from a dummy profile on dating site only to be plunged (willingly!) into a netherworld of blackmail and identity theft! Business over the Internet became impossible. The final straw came when the President’s own memoirs were leaked to a Blackberry hacker. The ever-online savvy former Senator chose the nuclear option. He pulled the plug. The Internet was switched off.
First to succumb to conditions in the “electronic dustbowl” were the contract white collar workers. The permalancers. A caste below the corporate drone, the permalancers had been dealt a raw deal in the New Economy, often dependent on the whims of a single client who appreciated their work enough to accept it, and pay a pittance for it, but wouldn’t hire them fulltime no matter how much “they really, really wanted to.” Of course after the plug was pulled these pitiful creatures often had the option of coming into the office for work. But the only benefit of working as a permalancer, being able to work at home, was lost. Without being able to graze in the kitchen for snacks or work with their feet up, blasting music and picking their gums, with no upside at all to suffering from the twin indignities of not having health insurance and having to pay an additional 15 percent “Self Employment Tax,” the permalancers rolled their receipts and 1099-MISC forms into torches and marched upon the glittering citadels of those who had spurned their advances: the corporate campuses.
The etymological connection to university life in the word “corporate campus” is quite deliberate. But this was in no way connected to the halcyon dorm life you might remember depicted in Animal House or even its latter-day equivalent P.C.U.
Just before the Internet went out, university admissions had turned into a blood sport. Acceptance rates at the top tier of colleges – the storied snooty ones, the only ones where recruiters offering wages that might justify the stratospheric tuition even deigned to visit – dwindled to the single digits. Valedictorians were being turned away from away from Cornell! It became a race to the bottom. Children were coached to grind torrents of work in preschool. Launch global charitable foundations by junior high. Win national competitions by graduation. And for what? To work even harder… though of course the recruiters learned to disguise this.
They offered the ‘elite’ a new type of job, one that replicated the campus environment, a concealed variation of the company town; one that installed baristas and gourmet buffet lines beside nap nooks and ping-pong tables. Cubicles were banished in favor of “working environments” that were open, and “fun” – veritable panopticons of good cheer and teamwork. Here was work disguised as play. As chummy and buzzing with activity as a termite mound. But the truth was revealed soon enough. The first month with no weekends and four overnighters usually did it to new employee. But by then it didn’t matter. Once you were in, you could never quit, because your student loans were lurking and once fired, no one could ever be hired again, anywhere.
So the permalancers flushed their pasty superiors from their corporate towers, and circled them in the courtyards below, their torches reflected a thousand-fold in the silvered glass. It was hard to hate these young men and women, who stood their rubbing their eyes from the paper smoke – after all they were barely different than the permalancers were, and for all the sociopathic video games and alienating iPod use everyone had grown up with, no one actually wanted to hurt anyone else. Certainly not these pathetic creatures, who so obviously were not the responsible parties. But the Permalancer Army couldn’t just go home either, after all, the military, police and firemen were beginning to menace them with hoses. And they’d come this far. So instead they invited the corporate drones to join their ranks. And all the analysts, associates, project managers and even a junior vice president or two assessed the risk, and ran the numbers, and they folded their blazers across their arms and joined the t-shirted ones at the picket lines.
What happens to a nation without its knowledge sector? At first nothing did happen. The next morning the permalancers began to jones for coffee. The grinders manned the barricades for days and days but eventually fatigue took its toll. They dropped off one by one. Everyone eventually all went home. Stocks remained untraded, a few online articles – ones commissioned by editors, and the search-engine optimized ones assigned by algorithm – failed to be written, copyedited or posted… then an IT network or two failed, but the Internet itself was already off and nobody noticed. Eventually the call centers got lonely. And as much as the bureaucrats and clerks despised paperwork and forms, when none of it came in, and the phone stopped ringing, well, the silence was kind of unnerving. Parties were dispatched to find out what had happened to their overpaid, often younger compatriots, the knowledge workers.
Whatever message the strikers relayed back to us has been lost to history. We decided we liked the quiet, and when they eventually began to bug us for money for rent and snacks and Nintendo games, we ignored them at first. And then they wanted to Internet back on, and so we gathered all those wretched kids up and sent them off to work on communal farms, and never ever looked back.
Monday, February 07, 2011
Against chrome: a manifesto
by Steven Poole
Please tear your eyes away from this elegant and curiously seductive prose for a few seconds and look at what surrounds this webpage on your display. Unless you are browsing in full-screen "kiosk" mode or kicking it old-school with Lynx, chances are your browser program is designed to look like some sort of machine. It will have been crafted to resemble aluminium or translucent plastic of varying textures, with square or round or rhomboid buttons and widgets in delicate pseudo-3D gradients, so they look solid, and animate with a shadowed depth illusion when you click them. Me, I hate this stuff. I think it's not only useless but pernicious and sometimes actively misleading. Won't you please join me in declaring a War on Chrome?
By "chrome" I don't mean Google's browser of that name, but all the pseudo-solid, pseudo-3D visual cruft that infests user interfaces in modern computing. For an example of Chrome Gone Wild I need only turn to Apple, who have somehow acquired a reputation for elegant and minimalist user-interface design while perpetrating monstrosities like this:
Now, this kind of severe chromatosis is particularly widespread in music-making applications, perhaps hoping to assuage the gear-nostalgia of composers who once had actual knobs and buttons to play with but now are reduced to pretending to operate pretend knobs and buttons on a screen. That's the only reason I can think of for this, a kind of glorious reductio ad absurdum of rampant chromiology, in Reason:
Chrome arises from a chronic case of object-envy. We like interacting with physical objects in the real world, goes the reasoning, so it will presumably be more pleasant to interact with computer software if it pretends to be a physical object too. But why? Couldn't the appeal of using a computer be that of a world precisely without friction and texture, a world where things are weightless, virtual and easy? I'm writing this in the fullscreen view of Writeroom, an entirely chrome-free environment whose virtues I have sung elsewhere, and the simplicity is like a refreshing mental breeze.
Chrome not only wastes space — think of the extra information that could be displayed if you got rid of all those pseudo-metal or pseudo-plastic frames and edges — but it adds another layer of wonky metaphor onto what already is the embarrasingly incoherent paradigm of modern computing. Oh, right, so there are windows on my desktop? What's that about, exactly? That mode of design is "metaphorics", defined thus by Eric Freemand and David Gelernter in "Beyond Lifestreams" (Beyond the Desktop Metaphor, MIT 2007):
Metaphorics is a method of building software based on comparisons of software to objects or machines in the real world (e.g., to the physical desktop in the world of office furniture).
Well, the aggregate system of "metaphorics" in today's UI design is tottering and nonsensical. It's time to scour away the accumulated sediment of imaginary hardware and furniture, time to chuck out the chintz.
Perhaps the most absurd and brainachingly stupid example of needless chrome I am aware of, the most terrifying villain on the loose in this episode of Chromewatch, comes from — oh, hello again, Apple!
This is the iBooks app. Notice how lovingly the designers have made it look like you are in the middle of reading a physical book by drawing a little pseudo-3D evocation, down each vertical side, of the pages you have read and the pages you have still to read. What do you think this looks like when you are on page 2 of a book, or 2 pages from the end? I'll tell you what it looks like: exactly the same. It still looks like you are right in the middle. That's correct: because of the sentimental and unnecessary chrome, the app ends up lying to you about where you are in the text you're reading.
I don't know about you, but my eyes hurt. And so, for some much-needed relief, to the perhaps surprising hero of this story: Microsoft. Despite it's frighteningly boring name, the Windows Phone 7 operating system is in the vanguard of what I fondly hope is an anti-chrome revolution:
Isn't that beautiful? Clean, neat, efficient and stylish in its display of information. (People are already customizing their Android phones for a similar minimal look.) I say that flat is the new black; that 2D is the new avant-garde; that a surface doesn't have to be ashamed of being a surface. Technology users of the world, unite: you have nothing to lose but your bas-relief buttons. Let us march forwards together, spurning chrome, into a cleaner, lighter future.
Monday, April 13, 2009
New York, at the moment
Last Sunday, April 4, Spring came to New York City. Sixty-two degrees it was, and calm in the bright sun of a cloudless sky. The city had been waiting.
The winter seemed unusually brutal and long. As late as March we got mugged by the winds Chicago-style – sucker-punched from the northeast, a roundhouse kick to the southwest quadrant, then a blow to the kidneys and thrown into traffic. The winter was long. But the city was waiting.
Rites were given: the cruellest month, 1968. No, the City said, the greatest respect that can now be paid is called celebration, and forward. Miniskirts and boots, scarves sun-yellow and lollypop red, out the door on the long stroll and the City was again a New Thing.
In the East Village, across 3rd Avenue from the regal brown bulk of the Cooper Union on Astor Place (where Lincoln and Rushdie have spoken) a new extension of Arts and Sciences is rising: titanium cladding on the north, glass-frame on the south, and a delicious titanium wave cascading down four storeys: its form says, We'll surf this. It adds a dangerous excitement to the new skyline of the Bowery, where a white sail of a condo rises. Behind it, the textured white boxes of the New Museum totter like blocks stacked by Modernism's gargantuan infant.
At Lincoln Center, the new Alice Tully Hall is a clean, white, graceful dagger of 21st-century elegance, angling its excellence to a fine point: the classical performing arts yet have a home in this new era; "In this silicon world, art remains organic," the Alice Tully Hall says with its soaring wood interiors. Is it unfortunate, or symbolically meaningful, that its broad, 30-foot-tall windows look out upon, and reflect, ugly '70s tower blocks and bland '80s condos? What does it say about this Temple of the Performing Arts erected on a razed block of Puerto-Rican tenements where West Side Story was sourced?
Yes, the East Village as you've known it is almost all gone: Kim's Video AboveGround on St. Mark's – where it moved after being rent-wrested from its subterranean West Village haunt – is boarded up. The greatest pillar of eccentric, curatorially-defined, independent video/music emporia is no more. The Holiday Cocktail Lounge, one of New York's classic dive bars, is on its last legs, with owner Stefan Lutak in his 90s and suffering from health problems. I don't know how much longer I'll be able to nurse a beer in a darkened corner booth, on cushions held together with duct tape, while reading Walter Benjamin to the purple light of neon beer ads, overhearing a punk-rock guitarist debate politics with an art-history professor.
Love Saves the Day, on 2nd Avenue, known as the place where Madonna goes to trade in her jacket in "Desperately Seeking Susan," closed in January. It fills me with heartbreak. It was a happy bedlam of kitsch, pop culture, antique clothes and old Playboy magazines – a retail archive of American popular culture, and a total playground for anyone who was a kid between 1950 and 1995. Star Wars figurines and The Simpsons family, Barbies primping astride a herd of My Little Ponies and a starting-line of Matchbox and HotWheels cars – fake poop, Mexican finger traps, crenoline ballgowns from the '50s, leather jackets from the '70s, jester hats, fedoras, Garbage Pail Kids, and vintage copies of Penthouse all razzed each other from parts of the shambly scrum.
Even when the New York City winters were a-bleedin' me, I knew what to do: head down 2nd Avenue, overcoat collar turned up against the snow, and look ahead: right there, in Day-Glo '60s bubble-letters, was the sign beaming out in the dun sky, the sign you need to read, comforting you that yes, Love Saves the Day.
Hey, New York: fill 'er up, please, and check under the hood. While you're at it, can you you make sure the headlights are aimed properly? We need both high- and low-beams if we're going to drive this dark twisty wood of middle-life; the potholes are hell. I know that we're all lined up in the Self-Service lane, but buddy– can you spare a technician or two?
Prophets may be scrawling underground, but the visionaries are scattered from the lowest tunnels to the highest billboards. POST NO BILLS? What are we, Communists? Savvy New Yorkers know the City is a Language – its accents, dialects and mannerisms voiced not just from a billionaire Bloomberg and a bodega cashier but by the names of the stores and the advertisements everywhere. The ancients had tea leaves; we have construction sites, plywood walls and restaurant façades to tell our futures. But you have to know where to look.
In October and November, 2008, Microsoft bought up the entirety of the Grand Central subway corridor leading to the Times Square Shuttle, and plastered its walls and columns with Windows logos and a green gallery of unsung heroes all creating a chorus of "I'm a PC!" in a weird fanfare for the common man, voiced in the weary shuffles and trudges of the office-bound. But then you'd step in the Times Square Shuttle: and you were transported – back to a grand 1950's office lobby with marble floors, wood accents, and Modernist chandeliers with brass sconces – in an omnidirectional promotion for HBO's "Mad Men" that encompassed the complete interior of each subway car.
You could read something in that.
In deepest, darkest January, I shlepped that path again. This time – BAM! A sunburst of yellow, a tunnel of smiling light, advertising (of all things) Western Union. They'd called up the 411: gone was their legendary "crisis" advertising. Instead they concentrated on your sense of empowerment and relief when you got the money you wired for. Two-dozen sun-yellow poster-ads, half of them scoped from your right eye, half from your left, exclaiming YES! YES! YES! all the way to the train. Molly Bloom couldn't have thunk it better.
Inside the Shuttle car, Pepsi had taken over. That leaked (and faked?) PDF for Pepsi's redesigned logo, in its orgy of metaphysical and quantum-mechanical hokum, seemed designed to throw the wool-eyes over a simple headsmack fact: its circle was merely a funked-up volley off Obama's campaign logo, turning that frown upside down.
"Optimism," the candy-colored strips of blue, yellow, red, and orange sang out above your transiting head, "Yes you can!" "Together," "One for all," "Let's refresh America."
Now you and I, as savvy mental travelers in New York's neurons, will not get off at Times Square, where the great Maw of America threatens to devour us in a sea of Red Lobsters, a zone of ESPNs, an industrial farm of old McDonald's, an angry hive of Applebee's and an epileptic blizzard of LEDs. Sure, you may think you can read the news here, but the Zipper will leave you huddling naked with fear, only to be unctuously bling'd by big boxes that put you in small ones.
No, let's go to Union Square, where some smart slender boxes are going up on the western face. Here's where we fear, with Circuit City gone and the Virgin Megastore bailing in June, that all will head south if Wal-Mart's Great Eye is focused upon that block, as we suspect. But we're okay for the moment – cutting through the park I spy Mr. Wendel, grizzled and toothless, who's puttin' on the Ritz with a silver top-hat, mirror-shades, a yellow-and-gold sequined dress, and a black tuxedo vest with beer-tab brocade.
"I want money for that," he growls as I snap his photo.
"Well, I can give you fame," I say.
"To hell with fame," he says, "I want some money."
He's surprised I recognize his name. I tell him I'm three feet high and rising, too.
"Ev'rybody asks me why I dress like this," he says. "People got no sense of fashion any more. Th'girls're practically naked."
I tell him I'm all right with that.
"Trees are getting their clothes on," he says, looking up to the budding branches. I smile.
Down in the Union Square plaza, on the north end, a European-style café will soon occupy the arch where amblers rested and skateboards skipped. I suppose that isn't too bad, with the weekend green market creating a nice fluidity of purpose. On the southern end, the artists, man, they're getting down to some serious work. A year ago, nothing but commercial tat and tourist trophies. Now look.
There's even a guy making three-string guitars out of lacquered and polished cigarette boxes.
On the way across the street, we catch the conversation between two men in khakis and striped button-downs. "Yeah, he was saying that only poor people use debit cards." There it goes again: the black dog panting, the cymbal crash, the culture clash, the ripping threads.
"Oh Oracles of Madison Avenue," we genuflect northward, "Suns of the south have given us heatstroke. Bring us a breeze, o thou cool heads of Mad Men." We wander through the East Village. To
Oh yeah. We're grooving on the Matrix, jockeying that code. Yeah, we're thirsty for it. So we head down to the Lower East Side, and Clinton Street. First colonized by WD-50, that pod of molecular gastronomy, Clinton Street is now after a fashion. A lot of them, in fact. Japanese threads are lining the way, with Madame Killer, a terrific shop of Japanglish get-ups and deck-outs. In another, more upscale boutique, the managers apparently realized that their wares were so choice, their ambience so exquisite, that poorer-than-thine-pricetag sorts would want to embrace their brand too. So I bought this book at the counter.
That's an independently published book of poetry and collage (I note influences of Eliot, Ferlinghetti and e.e. cummings in the verse). Here are two important things that bring us passion right now: text || image; renewed language || mashed-up culture. It's a rare find, a limited edition, and all of $12. Less than half the cost of a glossy next-new-thing at Borders, and better, too, because it hasn't been hounded to death by editors and marketers. I'm broke, but there are some things you just can't resist.
On the corner of Clinton and Stanton, I was sad to note the departure of the scruffy coffee/bar Lotus, with its bookshelves and cheap Pabst. In its place, though, stands Donnybrook, a smart-looking pub that represents the new, modern Dublin: crisp slabs of marble for the bar top, lime-green leather accents upholstered with brass, rough-hewn wood tables – the ideal fusion of contemporary and traditional, without resorting to the clichés of the Irish Pub Company that have been boring our urban centers for 18 years now.
It's empty this afternoon, with a guy in the corner tapping on a laptop; on the t.v., Abruzzo quietly misses a goal. "We need a hangover cure," I say to the barmaid, "and not a Bloody Mary: something clear and light."
"I've got just the thing for you," she says with a brogue.
"What's in it?" I ask.
"Trade secret. All I can say is that it has bitters and soda."
It's fizzy and coral-colored, it's lightly sweet and slightly floral, like Spring. The hangover's gone in five sips. So we opt for some greater complexity at Schiller's Liquor Bar. This mural's across the street:
Yes, New York is of the moment. No, Pollyanna ain't my wife; I'm broke, folks, circling the drain. Shuysters, hucksters, flakes and fiends are curdling in the alleys. At a recent Midtown wedding, I learned that the bride had just been laid off. Back in my South Bronx 'hood, we pass by two Hispanic guys in their forties outside a bodega. One's saying to the other, "Seventeen theaters just closed. There's nothing out there, man, nothing." But then we walk down Alexander Avenue, where a few antique stores hold on by their fingernails. We stop at one, shyly named The Antique, and stare with amazement.
In the window, there's an antique map representing the very first days of New Amsterdam colony on Mannahatta. At that moment, the shutters roll up and a door is opened. Inside, it's like the Library of Alexandria's been rebuilt in a studio apartment. All the archaic centuries, from every corner of the globe, are represented. Infinite riches in a little room? Hey Dr. Faustus, try this on for size. The owner can't be stopped – he's purling out his entire catalogue in a fluid, rolling baritone. There's a vast, 18th-century lithograph imagining the Temple of Solomon, a Life of Wellington published in 1814, a coffee-table book on the Medicis the size of a coffee table, a Victorian compendium of Byron, African histories, a 1769 edition of Plutarch's Lives, a Life magazine with the March on Selma. "I've got a stall outside Columbia every Tuesday and Thursday," he says.
"You know," I remark, "I've walked down this street a dozen times. I never knew there was a bookstore here; 'The Antique' makes me think this is just furniture and bric-a-brac."
He says, "You're right. We're going to get someone in here to change the sign next week."
That was Sunday. On Monday, the weather turned round: gusty Novemberish, rainy, and a baROOM of thunder.
The thunder said: your sun day was my gift to you, o Visionaries. It is a vision of a future that does not yet exist. It is but to whet your appetite. Build it, and it will come. Give, sympathize, control.
This wasn't just another manic Monday. Yes, some lingered, grutching the theft of their robins. But for the rest, it was as if the entire city raised its voice, and in a hundred-fifty languages gave a rousing toast: "To work!" The spirit of the City is back, its relentless competitive drive aroused to experimentation, quality, distinctiveness. Get the customer, keep the customer. Even the sandwich-makers are making tastier sandwiches. Calls for marketers and writers streamed over CraigsList – the competition's Hobbesian brutal, no doubt, as veteran journalists outnumber each ad 10-to-1, but as the papers fold, businesses insist, "We need Information! Analysis! Someone please tell us what's going on!" Marvin Gaye can only ask the question, and the grapevine's fermenting piss and vinegar.
Doctored a press release. Jammed out for data entry and strategy session with a filmmaker. Stopped into a lush lounge called Simone for a white russian to calm my nerves. Overheard a PR girl talking manically to a filmmaking guy about collaborations. 6 Train home with the rustlings of the Doom Times, drop into the bodega looking beat, there's an immense thug with a full-on Mr. T mohawk, bling scarved around his linebacker neck, black Enyce jacket thrown over a chest as wide as a Mack Truck grille.
"Man, it's rough out there," I say, grabbing a Campbell's Chunky for dinner.
"What's your game?" the thug asks.
"I'm a writer," I say.
"Man, we gotta talk. I rap, I act, I'm a comedian. Here's my card." Long Run Entertainment, it reads. Stay Fresh Productions. Caviar Dreams, CEO.
Oh yeah, man.
"Damn, I like this place," Caviar says to the Iranian behind the counter, "You got a good shop here. Lots of good people in here."
I return home, to a postcard on my wall.
This is a sampler box of my Information. This is my gift to you, Gotham. But as Derrida wrote in Given Time: Counterfeit Money, the gift "is an impossibility" – any day now, the moral obligation or monetary bill will come due. O city city, unreal city, don't default on the credit I've given you. There's one Chairman of the Board who knew what he was talking about. He said, start spreading the news. And then he said,
It's up to you,
Monday, January 19, 2009
A History of Tomorrow: The Silent Generation Sings
Welcome to my space. Come in, take off your boots, and make yourself at home: especially if you haven't got one any more. Warm yourself by my fire. It's going to be a long, cold winter. You know it and I know it. It's 7 degrees in the South Bronx this morning, as I write, but for about a quarter of an hour the rising sun comes romping westward down the street into my window, casting everything in gold, shining out the trash-strewn streets and sparse-shelved bodegas and vacant lots and abandoned baby carriages. For a moment.
Wall Street sure laid us one ginormous goose-egg. (I guess now we know what the inverse of that image on the Right looks like.) But tomorrow it'll all crack wide open. Hope you like your Humpty-Dumptys sunny-side up. I know I do. I used to take them scrambled, but now I know on which side my bread is buttered.
You're probably scrambling, hunting down that endangered species known as a job, scientific name JobIS bonUS. I feel your pain. Someone recently wrote that the Internet, as advanced as it seems, is still in the hunter-gatherer stage. Well, I've been a-huntin', and a-gatherin', and I've got laid in these weeds all kinds of Easter eggs for you to enjoy. It's better than a game of Boggle.
So how's about I tell you a story?
One other hint: hover over the hyperlinks. A hawk circles above his prey before he goes in for the kill.
Diptych: A Prologue
Right: The Ancient of Days, William Blake, 1794
The Rubens, above, hangs in the Prado. If you go there, you'll see that one of the child's eyes has a gleaming dot on the iris, the precise focal point of light in the entire painting. If you look very closely, you'll see that it was painted with a dab of pure liquid silver or quicksilver. Wherever you stand in the gallery, the brightest point of light is always concentrated on the horror-stricken eye of Saturn's infant. Silverwhite light. Genius. You might be able to see it online if you follow the directions here.
1. The Biographer
Have I ever told you about my father?
He was born in 1939 in Georgetown, a small coastal town in segregated South Carolina. My grandfather owned an appliance store there during the Depression, and managed to keep it open, owned by him, until his retirement in the 1990s. When my dad applied for college in 1957, he was awarded a full scholarship to the Rensslaer Polytechnic Institute after attending the prestigious National High School Institute for Engineering at Northwestern University. He also earned a place at Yale, with an inadequately small scholarship and work-study. Tuition that year was $3,000, the same price as a new car. Far too much. Over a very solemn conversation at the kitchen table, it was decided: "Go to Yale. We'll figure out a way." My grandparents scrimped and saved and my dad worked mad hours to afford the fees. He matriculated under the quota, which wasn't eliminated until the year after he graduated. He struggled to completely destroy any hint of a southern accent in his voice, and suppress his Jewish cultural identity, in order to integrate with the WASP establishment. It was hard. The stresses were great. The cultural barriers were immense. He drank. A lot.
In his first year, he nearly failed out because his public South Carolinian education hadn't prepared him for the rigors of an Ivy League engineering program. As he advanced, he wanted to be a professor of ancient history. But he was terrible at languages; couldn't master the French, much less the Latin or Greek. So he went to law school on his dean's advice. ("What do you want to do?" "I dunno," he shrugged. "Why don't you apply to law school?") He applied to Harvard, Yale and Columbia and got in at all three. (Ahh, those were the days.) He enrolled at Yale mainly because he couldn't be bothered to move all his stuff.
That was 1961. By 1964 Kennedy was dead, the counterculture was beginning, the Draft was on, and my dad sought refuge in a one-year tax law program in order to defer it. He was an associate with a top New York City law firm for four years, met my mother, and then they moved to the Sun Belt when it looked like a Rome called New York City was being overrun by barbarians in the early 1970s.
He worked very hard, made money, sent his son – eventually – to a very fine university, lived well, drank good wines, traveled all over the world, and eventually would have the market bilk him out of a great deal of his retirement.
He doesn't talk about himself very much.
2. The Marketer
Hi there, folks! My name is Mephistopheles. That's how you would address me, at any rate. For I am in marketing – lower, perhaps, on the ladder of professional esteem than even a lawyer. A Devil, you call me. Don't worry, I take that epithet philosophically. Spending a season in Hell has its advantages. Down underground, there's nothing to do all day but hear the screams of the Damned, and endlessly barrel-roll on a spit while your flesh is scarred by black flames. Wicked good fun if you're into that.
At the lowest rung of the cycle, with your back spread-eagled for the scorching, the vast reserves of Dark Energy in the universe shoot a hotwhite light through your mind. For an instant, you'd swear you could see Lucifer plummeting, a shooting star falling from the firmament, illuminating the third Host of Heaven in headlong descent. And as the burning ember of an Archangel strikes the event horizon – it plays over and over in your mind, catastrophically, searing into your retinas like FOX News coverage of 9/11 – the disc of the world warms golden, the entire crust of the Earth is molten translucent, and from below you can see all the Earth's entities vaguely, as if through gauze bandages. If you're very, very lucky you can ride the cellphone towers up to the satellites, and jump on the radio-wave bleed-off, and speed on an electron rail right out into Space, surfing between frequencies as swiftly as you'd flick an Aquos remote. It's totally "lying in the gutter, gazing at the stars," dudes and dudettes. It's like being a celestial couch potato; only problem is that cellphone reception is lousy here, down in the bowels of Hell, and you can't call for Domino's. (I mean, even if their only deliverable items to this Hell-hole were anchovy-onion pies, I swear I'd make an effort to stumble into the Vestibule. Because if there were delivery service in Hell, you better believe they'd take plastic.)
The point I'm trying to make
is that as you're traveling further out in Space, you're traveling back in media-time, too. Things start to get real funky, like reading a blog backward to the start. But then, wouldn't you know it: just as you've deliciously anticlimaxed – for example, by discovering who killed Lilly Kane before fingering the suspects – that Damned spit-roaster flips you over again. Your face is in the fire and your hairy ass is mooning everyone in Hell. And you can't tell whether it's the sheer embarrassment, or the 33rd-degree burn on your lip, that hurts the more.
I figure you might as well make the best of a bad situation. See, from the opposite poles of the Earth, Vishnu and Shiva are having a grand old party. They're spinning that spit-roaster about 5,000 rpm, churning the molten core of the Earth and creating its magnetic field. (Consider yourselves lucky – without those Indian deities, we'd all be tv dinners, which is why every night here is a Chicken Phal night.) Every nanosecond of every day, all of us Damned bastards are spinning wildly in our graves, watching the media roll out a red carpet to the stars. Damned reruns: if I could, I'd fall down on my knees and repent! yes! just so I'd never have to see Fonzie jump the shark again. (Though Lucy in the chocolate factory cracks me up every time. I dig those fiery redheads.)
I'll grant you, though, this torture is definitely an information technology. In my infinitely recurring nanoseconds of radiowave bliss, I've learned to fast-forward through the most recent episodes (I can catch up on Hulu later), as well as the ones I've seen a million times – and the infinite regress of syndication packages – and delve back, back into your land of men, your land of men and women too. It's tough work, getting out of the present tension; I've spent a long, long time (billions of nanoseconds, that is) merely zipping in and out of your cellphone-braced heads, surfing the foam of the Web –
Bubbles that glitter as they rise and break
On vain Philosophy's aye-babbling spring.
– and I gotta tell you, a little learning's a dangerous thing. Maybe you should study yourselves more. Well, that's why I'm here. I don't know if you've run across an Infernal Calendar lately. You might be able to find one in the disused basement of a local urban planning board, through the door marked "Beware the Leopard," and hung up on the wall behind Miss December, because Janus has two faces. (Clever, eh?) If you find it, you'll see that a season in Hell lasts about 400 years, give or take a couple runs around the solar block. And believe me, at the end of that season, Hell does indeed freeze over. You've heard the phrase "colder than a witch's tit"? Nah, that demon-mother's-milk is like a hot toddy compared to the stuff we have to deal with. It's like Chicago without Gore-tex(TM) and whiskey. So that's when I go on winter break. Now, what with the recession and all, I suppose I should have just taken a staycation, and watch endless reruns of the Dark Lord in His Infinite Puissance chomping on Brutus, Cassius and Judas Iscariot (schadenfreude never gets old in Hell) but seeing how you American folk are in a mess o'trouble, I thought I'd take advantage of Old Smokey while he's distracted with his meal, and at least try to catch the notice of The Man Upstairs by handing over a bit of Knowledge. See, God? Eventually, eating of the Apple bears fruit. But it ain't gonna be easy. It's gonna take work.
Now, the following is a bit confidential, so please follow me into my office. And shut the door.
So, Fascinated Reader, what d'ya think of that, eh?
Unimpressed? Whaa? Okay, so I guess you folks aren't as clueless as I thought. Moving on...
3. Biography Redux
As we have said, my father is almost 70 years old: an almost exact contemporary of Senator John McCain, the final political (and, we must say, a certain social) presidential-caliber representative of his generation, by which we term The Silent Generation.
What are the characteristics of The Silent Generation?
They were born during the Depression years, and were commanded to silence their emotions, and work very hard, as the second wave of the 20th-century calamities descended. They were too young to fight in World War II, but were imbued at an early age with heroics being transmitted by radio, newsreel and comic books. Afterward, they were additionally burdened by both the sacrifices that their "elder brothers" endured, and their knowledge that they had lost the opportunity to claim their own heroism. (I personally suspect that is why we had a desire to fight the Korean War without a serious draft. A certain segment of the American population retained that desire for heroism and volunteered.) This generation grew up during the 1950s, an age of belief in American know-how, stick-to-it-iveness, nose-to-the-grindstone, repressing-emotional-intrusions, a religious belief in the chain of command (the integration of World War II military values into civilian life), a belief in the rightness of the country's decision-making process, conformity to all of the above, and a desire – and a belief in their ordained ability – to shape the world via the collective efforts produced by the American machine. The previous generation, the Greatest Generation – the greatest generation?! – ever? – into eternity? – had destroyed global tyranny (well, half-destroyed it, at any rate, which is why Truman got the boot). This Silent Generation, repressed in its ability to voice its (boiling, rageful) frustration with the hardships caused by the Lost Generation – which had everything and lost it – in addition to the constant pressure and paranoia of a Soviet A-bomb attack – keep your head down, children, and don't look at the light – which had to have loomed larger than a nightmare bogeyman – as well as the additional burdens of being oppressed by an Eisenhower leadership of heroic character (with all its faults), was then inspired to control, subdue, and conquer the natural environment itself.
It was the only way they could kill their fathers. In the Freudian sense, I mean.
And the Nazis. Who killed their fathers, even if they returned home alive. The Nazis killed them by stopping them from speaking the unspeakable things. Death-in-life and life-in-death, as Yeats might say. The fathers and the Nazis together who stood like twin colossi erected on a plain, one white one black, atop the buried acorns of their lives.
The interstate system, the oil industry, plastics, the car, the Moon Shot – gaining personal freedom via technology and consumer goods – was the only way to speak, enunciate freedom, and compete against the Soviet Union directly, when direct military confrontation would have meant world holocaust.
Dot. Dot. Dot.
Zwwee-ch-chzzewshhhcgrhrhwwheeeHeeey, all you groovy cats, this is DJ Mephistopheles comin’ to you DEAD, DEAD DEADER THAN DEAD over this wicked pirated Evangelical frequency at 66.6 FM on your digital dial, because we’re all Manichaeists in the underworld. All talk radio for the pleasure of your outrage, only at K-Triple-X. What’s that K stand for? Fucked if I know. The Klan? No way, dudes and dudettes, they are so lame-o these days, they are so, like, waaaay last century that we stuck them in some stupid pits, they can’t make it up to this broadcast level of Hell. And they have these tinny microphones that only catch really narrow wavelengths. See, here on K-Triple-X, we go real deep, I mean plunging those vibes into the Earth to make it shake its booty. Where they can't follow. (You know white men can’t dance.) And we don’t let them use our gear. I mean, seriously, dudes and dudettes, I’m DJ Mephistopheles, He From Whom All Light Hath Been Stripped, and all I have to say to the KKK is – turnabout is fair play, bitches.
Sooo, what’s the story, Morning Glory? I’ve got your GPS right here, baby, I can see where you’re coming from, but do you know where you're @?
Do you know where you are?
You’re in the Labyrinth, sweet child o'mine, and oh it’s got plasma flatscreen walls. So pretty, child. I’ll have you so delightfully entertained while you fatten up on polyunsaturated fats, you'll never know when the Minotaur bears down on you. Oh. Oops. He's here already. When you're up to your neck in the shit of the bull market, you've just got to laugh: an expletive suddenly gains crystal-clear definition via the SPIRALnumbers on your balance sheet.
It's funny, you know: the last time a snowball had a chance in Hell, I was out here on contract, helping out some arrogant prick – a doctor, as I recall – what was his name? (it's so difficult to remember these things after a marathon of "Keeping Up With the Kardashians.") Ohh, yeah: FAUSTUS, that was him! If ever there was a physic in need of some serious medicine...like electroshock therapy – I kept warning him, "You'll have Hell to pay for this..." and he kept reading that like, "Oh goodie – Satan himself is comp'ing me!" What a WHIRLdunce. And he thought he was sooooo smart. Heh. He thought he was bored with his studies, but really, when it came down to it, he just couldn't be arsed to apply himself.
So Herr Doktor works his arcane magic, not unlike our financial wizards and their "exotic instruments," POOLconjuring effervescent, evanescent moneys from the cold wastes of Cyberia, where all but the brainbrawniest fear to tread, for the cryptic maps are written in invisible ink. And oh, organizing world trade's his oyster, too –
How am I glutted with conceit of this!
Shall I make spirits fetch me what I please...
I'll have them fly to India for gold,
Ransack the ocean for orient pearl,
And search all corners of the new-found world
For pleasant fruits and princely delicates...
Man! When are you FALLINGgonna learn? After I fired that mountebank, I instantly materialized in front of my friend Kit to tell him all about it. And he told it to all of you. But then he got a shiv in the ocular – I guess everyone's got to pay for their Knowledge – in the Ivy it's going for 200 large – and now nobody reads Marlowe any more. Okay, I'll sling you some lines from a more familiar face:
My tables,--meet it is I set it down,
That one may smile, and smile, and be a villain;
At least I'm sure it may be so in Denmark:WOMAN
Yeah, we're all shot to Hell, dudes and dudettes, and I'm not out of it either. But it's gonna be okay. I promise. I hear the Greeks and FALLENRomans declaiming out in the Forum of the Vestibule, and one of them insists that Dante wrote at least one other book. Of course, no one around here picks it up – not that we don't have it; both Blake and Borges rifled through our stacks, and found they're at least as good as Amazon's – it's just that everyone here's so godDamned solipsistic, always wanting to read about Themselves. I once mustered enough energy to get out the Door, but all I saw was this Dark Wood, and I was afraid. I heard the water-nymphs and dryads whispering on the DOWNwind about the existence of a third book, but they're just mythological creatures, not even gods, and I didn't trust them. Besides – the end of Battlestar Galactica was just beginning. So I had to get back to my sofa. Hey, it's an Eternal struggle. Forget about the Fifth Cylon; who do you think is hotter, Kara Thrace, Boomer, Athena, or Six? I dunno. it's an even race down to The Wire, but I have a feeling Kara's my kind of crazy.
Anyhow, that's the end of my Hellacious program. Next up, we've got DJ Ba'al, ballin' the Jack in a Battle of the Bands between Slayer and Megadeth. Stay tuned...shhhhhweeeeiiighcgchhhhhEEEEEEEE
IS A TEST
OF THE EMERGENCY BROADCAST SIGNAL
IF THIS WERE AN ACTUAL EMERGENCY
YOU WOULD NOT HAVE HEARD THE SIGNAL
5. The Dream of @
– @, is that you?
– Yes, I'm back, ED.
– What time is it?
– Late. Late. Too late.
– You didn't call, you didn't email, you didn't IM... What the Hell is the matter with you?
– I'm sorry, ED, I'm really sorry. I just...needed some time to think things through.
– Think? What the Hell do you mean? What are you trying to say?
– Nothing, ED, really. I just had to be in my own space for a while.
– I had the most horrible dream while you were gone. Frightening forebodings. I was so sure you weren't ever coming back.
– Whatever do you mean?
– Oh, god. I've never felt you so distant. It's like you were a million miles away. You said something about having to deal with some stupid bullshit, and then I don't hear from you for three whole days! Once I thought I heard your voice. It was disembodied, like it was coming from a completely different universe. The thread that connected us, I could feel it fray, then break -- I felt it in my bones.
– No, ED, no. None of that could ever happen. You're the most beautiful woman I've ever known. And the way your mind works -- the way you react to my touch -- so supple, so fluid, such Classical forms, such Romantic organic depths, oh you have worlds within worlds within your body. We were made for each other. You're mine. And I am yours.
– Hmmpf. Well, will you at least tell me, from now on, when you're going to be home?
– EDDY, sometimes I don't know. I catch ill-fated winds, I get caught in whirlpools, I find myself among strange people and have to puzzle my way out of their homes. And sometimes I have to fight monsters, and I can't leave until they're dead. But I would never, ever miss your birthday. I mean, have you seen the present I made for you?
– Turn on the light.
– See? All of this -- it's all for you. So that whenever I'm away, you'll know that I'm always @Home with you. Have you looked over there?
– This box?
– Open it.
– [ ]
– My god, that's ugly.
– No, that's not the real ring, it's symbolic.
– Of what?
– The wood in that ring? That's oak. The very same oak that grew into the posts of our bed, the living tree that grows from the earth itself. I had to topple two enormous statues that were covering the acorns, so they could grow into our bed. You gave me that strength.
So what was this dream you had?
– Oh my god. It seems so silly now. There was this crazed midget running around trying to fuck me. Somehow I grew fat and stupid and you and all your friends rejected me. I was catastrophic, I didn't know who I was, I whored myself out and circled round the drain and fell into space and out of Hell and through language itself until I smacked down on the lap of this really annoying guy who just kept talking bullshit.
– So did you fuck him?
– The midget.
– Oh, Hell no! Though I got him pretty steamed up. He started Nausicaaing me while I was in the bath. Heh. He was in marketing so I knew exactly what to do. Five bars of a shampoo commercial and he was PreEjaying into his hairy knuckle-dragging palms.
– HA! What a loser.
– But there was this other guy, now he wasn't so bad. Tall, well-spoken, kinky. I think he was one of your readers.
– What happened with him?
– Oh, he basically told me to fuck off because I was fat and stupid. But you should have seen his face when I stepped out of the bath. I was Aphrodite rising from the sea-foam, for all he cared. I told him to lick my fuck-me boots.
– You did not.
– Did too.
– And did he?
– I told him to lick my souls.
– And did he?
You're such a big faker. Listen...
I've got something really important to tell you.
– Something wonderful.
– I think we're on for a real Renaissance.
– Things are real bad out there, @.
– I know. And I know Obama's going to screw up some things. I mean, he's going to have to orchestrate the three circles of Federal power like the Ringling Brothers. He'll have to juggle catastrophes like live chainsaws. He'll have to catch supervillains in the Web quicker than Spider-Man. But he's got all of us on his side. And we're powerful. We have skills.
– To pay the bills?
– Well, that's the only catch. I still need to find a J.O.B. If there's anyone you know who's hiring, please, send my stuff along.
– I don't think you'll have any problem.
– You don't?
– Not any more.
– Well, I guess we'll see. But I guess the point that I was trying to make, they entire point of today's craziness, is that -- it's so perfectly obvious to me -- the human creative potential has never been so great. And with the human networks we're creating, we can all be painters, musicians, writers, DJs, filmmakers, composers, compositors, animators, information architects, poets -- and yes, marketers of all these things too, um, I suppose -- we do live in the Matrix, and yeah, we can unplug if we really want, but we can also figure out styles of kung-fu that the Old Masters never dreamt of. We need to stop thinking within the Barzunian entropic Matrix of "dawn to decadence," and challenge ourselves to beat those who -- heh -- thought they had it going on, centuries ago. The Internet is ten times Blake's vision of Heaven before Urizen glowered guiltily, separated himself, and fell into the corporeal universe to become Jehovah/Satan. Except for the sex. (We should all be able to sun ourselves naked in the backyard.)
– Well, thank you for that soapbox, Mister Information Secretary@Home.
– Really, I needed to say it. We're so caught up in the present nanosecond that we've forgotten: the Internet is the most complicated thing ever created by human beings. The people who built the Space Shuttle might take issue with that, but the Internet: we built it all together. The military men and the organization men of the Silent Generation, the hippies and surfers in California who turned cyberculturists, and all of you.
– You who?
– Sorry, I lost a packet there. Did you say Yahoo!?
– No, of course not!
– Good, because they're crap.
– No, no, everyone knows they're crap. I said "You who?"
– That's some pretty decent chocolate milk, right?
– Aiyeeee!! I mean "Who the hell are you talking to??"
– Ohh. You. <tok tok> On the other side of this window.
– Don't even get me started talking about Windows.
– Wasn't intending to. Hello, all of you on the other side of the window. I know you're all looking in. I can't seem to draw the blinds any tighter. But there it is. You lookin' at me? --I said, are you lookin' at me, cyberpunk? High-five. Not too hard. 'Specially if you've got a touch-screen.
– Yes, @ is right on this one, you'd better listen to him, children. Touch-screens are very sensitive.
– Yo, cyberpunks. I've seen such amazing stuff out there recently. I couldn't believe what was out there, when I first tried to come home from the War, and got blown off course in a hail of tangents. Completely ingenious art --
– Like what?
– It's too late at night for that discussion. Can we talk about it more in the coming weeks?
– Sure. What else have you seen?
– I've seen these awesome webapps that basically allow you to run an entire business from a single laptop -- billing and finance, creative ideas, virtual conference rooms, it's going to be a total revolution in the way we work.
~~ Say what?
– Who the hell are you? What are you doing in my house? How'd you get in here?
~~ I'm a Fascinated Reader. I couldn't help overhearing...
– You are nothing like I imagined you. No-thing. Wow, what a Jilloff-worthy-fantasy killer you are!
~~ I demand to know which Webapps you're talking about!
– See! Look what you did. You woke up the baby.
– Look, I don't know who you are or where you came from but you're getting out of our house right now. Here's two tickets to the Theatre. Learn what you can there. Show starts in about two seconds so you better move.
– Look, honey, can you take care of baby Ampersand? I'm exhausted from my travels, and I still need to email my dad tonight. It's his 70th birthday really soon, and I need to tell him some things.
– Sure. I'll be nursing &. Come to bed when you're done.
I'm sorry. I understand things a lot better now. I understand why you have trouble talking. But you gave me the chance to say things. You gave me the tools to say the things I have to say. It's the dense network and the tight structure and the wiry line that contains, that directs the path of the generative Chaos. You gave us this world, this space here, where I met my future wife. I would never have met her – ever – if you hadn't given us the method and the medium. Thank you. Happy 70th birthday. And you can have your cake and eat it too, because it's going to be a whole new world tomorrow. A better one, where people can talk to one another, and not be so angry all the time. We're going to build it. We're really going to build it. Because we can all be Spider-Men on this Web. Thank you.
P.S. Always remember:
May the road rise with you.
– You in here, ED?
– Yes. Come see your baby daughter.
– Hello, ED and &. You know, it's amazing how much she knows at just two-and-a-half months old.
– She's got a real sense of place, just like her father.
– EDDY, I was thinking. We haven't really given her a full name yet.
– Well, it needs to be grand. She was born at an epic time.
– We should combine our surnames.
– Really, @? I never liked being called EDDY Mañana. Every time anyone said my name, it was like invoking Zeno's Paradox.
– Well, being born @Ahora wasn't great shakes either. I think the name gave me myopia from the cradle. I was never able to see too far down the road.
– So let's think. &... &...
– My grandmother's name.
– I like it. Say it again.
– Third time's the charm. &... . That's it. We got it.
– Wait a sec. Look at what's there. We've got to sound it out. Ampersand -- I'm so glad we chose that name, I mean if we'd been high or hanging out with the Yahoos too much we might have wound up with something like "Colon." Eeurgh. So: Ampersand Ellipsis. That's beautiful. But it sounds...I dunno...somehow incomplete. Like she'll always be waiting for something.
– Well, we'll put a period on it, then.
– No. You've got to be kidding, ED! Either it'll sound like she's on the menses straight out of the womb, or -- in England they call it a "full-stop," and that just sounds too much like "he do the police in punctuated voices."
– Okay, what then?
– I guess that's the question everybody's asking right now.
– What is it?
– Of course! Of course! The strongest, the greatest integrity, fitting with all the principles: that's it that's it that's it!
– My god, what are you talking about?
– I'll tell you later. Here. Let me write the formula out for you. This is good mother's milk.
– &...∆ Ahora y Mañana.
– That sounds just about right. I like that. Whew. So we accomplished something today, at least, even though nobody's getting paid for it. Let's go to sleep.
– Yes. I'm very sleepy all of a sudden. But -- why are you getting into bed like that?
– You mean, all reverse-y, with my feet at your head?
– Dude, they stink! You've been walking around in damp socks all day.
– Look, I could say the same thing about your feet. It looks like you've gone to hell and back in those togs. But something about it just feels right. And besides, I can do............this!
@ fell asleep then, on the words of Factor Sleepwell, drifting toward the seas, sailing past Raggedy-Ann and Andy, the Boy Bedlam, and the Cheshire cat that flies, like bluebirds, over the rainbows. Then he was hunting dinosaurs with a ray-gun, but instead of "PEW! PEW!" the gun said, in this weird yokely voice, "A rising tide lifts all boats." He groped his way through the underbrush to Constitution Hall where he was invited to take up a quill pen. And he wrote, "If we don't hang together, we'll all hang separately." And then he dreamt:
So how about it, Daddy WarBucks?
In memory of Bryan M. Schneider, who knew a thing or two about spies and dragon-slaying.
Friday, October 21, 2005
'I Will Eat Your Dollars'
On Nigerian scammers in the Los Angeles Times:
To them, the scams, called 419 after the Nigerian statute against fraud, are a game.
Their anthem, "I Go Chop Your Dollars," hugely popular in Lagos, hit the airwaves a few months ago as a CD penned by an artist called Osofia:
"419 is just a game, you are the losers, we are the winners.
White people are greedy, I can say they are greedy
White men, I will eat your dollars, will take your money and disappear.
419 is just a game, we are the masters, you are the losers."
"Nobody feels sorry for the victims," Samuel said.
Scammers, he said, "have the belief that white men are stupid and greedy. They say the American guy has a good life. There's this belief that for every dollar they lose, the American government will pay them back in some way."
Sunday, October 09, 2005
Why children shouldn't have the world at their fingertips
There is a profound difference between learning from the world and learning about it. Any young reader can find a surfeit of information about worms on the Internet. But the computer can only teach the student about worms, and only through abstract symbols—images and text cast on a two-dimensional screen. Contrast that with the way children come to know worms by hands-on experience—by digging in the soil, watching the worm retreat into its hole, and of course feeling it wiggle in the hand. There is the delight of discovery, the dirt under the fingernails, an initial squeamishness followed by a sense of pride at overcoming it. This is what can infuse knowledge with reverence, taking it beyond simple ingestion and manipulation of symbols.
At the heart of a child's relationship with technology is a paradox—that the more external power children have at their disposal, the more difficult it will be for them to develop the inner capacities to use that power wisely. Once educators, parents, and policymakers understand this phenomenon, perhaps education will begin to emphasize the development of human beings living in community, and not just technical virtuosity. I am convinced that this will necessarily involve unplugging the learning environment long enough to encourage children to discover who they are and what kind of world they must live in. That, in turn, will allow them to participate more wisely in using external tools to shape, and at times leave unshaped, the world in which we all must live.
Thursday, October 06, 2005
From NY Times
"IMAGINE public recycling bins that use radio-frequency identification technology to credit recyclers every time they toss in a bottle; pressure-sensitive floors in the homes of older people that can detect the impact of a fall and immediately contact help; cellphones that store health records and can be used to pay for prescriptions...
...A ubiquitous city is where all major information systems (residential, medical, business, governmental and the like) share data, and computers are built into the houses, streets and office buildings. New Songdo, located on a man-made island of nearly 1,500 acres off the Incheon coast about 40 miles from Seoul, is rising from the ground up as a U-city.
...New Songdo sounds like it will be one big Petri dish for understanding how people want to use technology," said B. J. Fogg, the director of the Persuasive Technology Lab at Stanford University. "