User:Laurier Rochon/notes/proposalv0.1: Difference between revisions
(2 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
''I'm putting this up way in advance, because we all know how much it sucks to work all week-end.'' | ''I'm putting this up way in advance, because we all know how much it sucks to work all week-end.'' | ||
''Will amend every now and then.'' | ''Will amend every now and then.'' | ||
== Aim and objectives - TL;DR version== | == Aim and objectives - TL;DR version== | ||
I will attempt a research question, trying to identify what the "key issue" would be for myself. I think this question will be twofold: | I will attempt a research question, trying to identify what the "key issue" would be for myself. I think this question will be twofold: | ||
*1) what relationships exist between industry, government and users in | *1) what relationships exist between industry, government and users in regards to the production and use of internet technology? | ||
*2) how can I display, explain or model these relationships for an audience of non-technologists? | *2) how can I display, explain or model these relationships for an audience of non-technologists? | ||
In essence, I simply want to understand better the interactions between the different players in the world of internet technology. There | In essence, I simply want to understand better the interactions between the different players in the world of internet technology. There are complex inner workings and specific economies emerging from these interactions - I'm interested in discovering what they are, and mapping them in a comprehensible way. | ||
== Past "work" == | == Past "work" == | ||
Line 77: | Line 74: | ||
== Possible outcomes == | == Possible outcomes == | ||
In progress... | |||
*OS : After having read for the n-th time Neal Stephenson's "In the Beginning Was the Command Line" (which I highly recommend!), I perhaps would be interested in looking more closely at the functioning of operating systems. They are often the building blocks atop of which the different layers of the internet (4-7) connect with everyday user applications. They are probably the single most important piece of software at use today, and the OS war is as strong as ever. | |||
*HARDWARE : Albeit a harder endeavour, it could be great if I managed to make a physical artifact to demonstrate these relationships. The relationships I intend on unearthing are quite insidious, and giving them physicality would probably make for a strong argument. | |||
*1984 : Binaries : surveillance, security, identification. Although I'm not overly interested in these topics per se (but rather what creates these things, what kind of ecosystem breeds the values that reflect these things), it could be interesting to lean into one or the other specifically. They are all very double edged processes, where for example surveillance can increase security, but decrease individual liberty. Added security makes us less vulnerable to harm, but again constrains us in our liberty. | |||
*FLOSS : Open-source/closed source code. Open sourcing code can make governments more accountable for what they do. If "code is law", then it becomes critical "which kind" of code, if we can ever hope to change it. | |||
== Related works == | |||
''Coming soon to a theater near you.'' | |||
== | == Ever-growing bibliography == | ||
Latest revision as of 13:30, 22 October 2011
Proposal v0.2 > 2011
I'm putting this up way in advance, because we all know how much it sucks to work all week-end. Will amend every now and then.
Aim and objectives - TL;DR version
I will attempt a research question, trying to identify what the "key issue" would be for myself. I think this question will be twofold:
- 1) what relationships exist between industry, government and users in regards to the production and use of internet technology?
- 2) how can I display, explain or model these relationships for an audience of non-technologists?
In essence, I simply want to understand better the interactions between the different players in the world of internet technology. There are complex inner workings and specific economies emerging from these interactions - I'm interested in discovering what they are, and mapping them in a comprehensible way.
Past "work"
In the past year, I have made 3 projects. The first was a grumpy chat program that interfered with the normal flow of a conversation, the second one a subscription-based soap opera newsletter inspired by daily news reports, and the last one, an encryption/decryption algorithm that protected your message from scrutiny, but revelaed your intentions of communicating under the radar.
My main concern while making these works was to highlight the mediation power held by technologies. Some works did this more literally than others, but my goal was often to try and make visible certain characteristics of technology that make us believe that it could be apolitical, agnostic to influence or simply objective. If there is anything inherent at all to Internet technology, I believe it to be its immunity to complete objectivity from social, political, economical and legislative pressures. This is discussed more in depth later on. In addition to this subjectivity I attempted to reveal, the works I've produced cast cyberspace in a particular light in terms of its constitution - I believe it to be a highly narrative, open-ended space with different norms, rules and affordances.
Another important element to mention while discussing past "work" is the fact that I've spent many years working in commercial settings, building internet architecture and software for private interests. Therefore, I'm in a good position to understand the logic behind their decisions, and type of behavior can possibly be expected from such an industry. I understand rather well how the Internet startup scene is built, why and how large software companies became very successful, etc. I expect this to be asset while conceiving and contextualizing my work.
What, why, how
What (a few initial steps)
- Read, read and read more. I've stacked up a pile of interesting books on the subject, I think it's the absolute minimum that I go through them. My initial readings proved that I've read basically nothing of the important literature on this subject - and although much of what it is saying sounds familiar and confirms most of my views on the topic - I am looking forward to discovering the more recent works published in this respect, as well as revisiting old cyber-punk classics. This will evidently also feed into my essay.
- Look at other's work. Much has been said and done on this topic already, but one of the great challenges (and where much of this work fails, I think) is to communicate something that is quite complex is a simple, succinct manner. This will also help me very much in framing my work within contemporary art practices and movements.
- Try to sort and categorize works that are successful and not successful in achieving clarity. Then understand what are the characteristics of a good work that deals with this subject matter.
- Talk to specialists. I spend a lot of time reading internet columns, news, blogs, etc. (more than I would like, actually), and have come to "know" a few authors and editors that I believe could be interesting to get in touch with. Some of these are fiction authors, security researchers, software developers, etc.
Why
I have just written heaps on this below, so I'll make it short : there are powerful forces at work, shaping the way internet production tools are made. A lot of these forces rely on it's users' ignorance to them in order to be effective. They are often disguised, indirect and insidious, yet they have influenced in important ways the architecture of the internet of the past, and will continue to do so in the future. The structure of our network defines what possibilities lies within it (detailed this point below), and it is paramount that the influential decisions taken to change this architecture includes and reflects the values of a majority of people, and not a just a handful.
How (tentative schedule to xmas)
- mid Oct - mid Dec : continue reading and reporting on the topic, hoping to narrow it down
- by mid Dec : have a comprehensive list of (art)works that deal with this subject. perhaps having discussed some of them with my peers.
- by mid Dec : decide upon at least a vague direction in which medium to use for this project. something I can build on top of, experiment and discover.
Potential problems
- Drowning in too much material
- Changing my mind a few times
- more to come...
Context : code as architecture, code as law (the why of my why)
Real space is not cyberspace. Made possible by the advent of the Internet, cyberspace has different laws that governs it, different rules people adhere to and different morals people can choose to adopt. The reason these things are possible is simply that the architecture of the Internet is different from the one in real space. If a bowling ball is dropped from a skyscraper in real life, there’s not much to do except hope for the best. If the same is done is a MMORPG (massively multiplayer online role-playing game) or a MUD (multi-user dimension), the ball might drop, or it might not, depending on what the rules of these spaces. Hence the design, or architecture of a space defines what is possible and what is not within it. Many of the rules and conventions we must live by are either inherent to our world (we can’t decide if a meteor crashes onto earth or not) or simply outside of our reach (we cannot choose to escape the consequences or our actions). This is not the case in cyberspace.
The architecture of the Internet is made up of code. It is code that decides of these “rules” I have just mentioned, it is code that governs the world of possibilities in cyberspace. If the code says that gravity does not exist in a space, then bowling balls cannot drop from skyscrapers. If the code says that you can’t have access to certain data due to your geographical location, then there is not much you can do about it - this is implemented in the code, and will remain the same until the design of it changes. In short, “code is law” (Lessig). Cyberspace doesn’t have anything “inherent” or “natural” about it, although many believe this to be true. It has formed itself through an accumulation of decisions taken by different people at different times. Code cannot simply “grow” or “be found” anywhere, it is always the result of one or many taking certain decisions. In this light, coders are architects, they are the ones to decide what the Internet looks like, and how it functions. They are the ones creating the protocols used by the Internet, their work defines its design and its design informs its users of the agency it provides.
But as coding has shifted from “research circles” (initially, it was built by hackers and people in academic circles) to industry and commercial entities, we’ve seen an uproar in the popularity of Internet-based technology use. There are many reasons for this happening, one of them being the financial opportunities afforded by making “stuff that just works” for everyday users. This shift from “first” generation to “second” generation Internet (mid 1990s onwards - n.b. this is different depending on authors), from building out of curiosity and principle to building for commercial purposes, has deep implications for governments, industry and most importantly, citizens using such technology.
Cyberspace is still considered to be a vast jungle of non-regulable space by many, a far west of sorts where anything goes. This is hardly true anymore, as evidence seems to point out that we are moving at full speed towards a much more controlled Internet. The way this happens is immensely complex, but a part of it could be summarized by the graph below - the dance that occurs between government, industry and customers. In just a few words, governments can regulate technology directly by making laws, or indirectly by influencing the market (ex: subsidizing a technology). Industry, the makers of software and hardware, has much interest in obeying those laws. People buy and use their tools profusely, which at once serve the companies (money, the main reason corporations exist) and governments (regulation, which is one of the reasons why governments exist). This is the thick of what I intend on researching : the interactions between users, governments and commerce.
So we are faced with a strange situation, where the tools that make cyberspace more effective on the Internet (from a commercial perspective), are also the tools that make the Internet more regulable by governement. For example, technologies of identification reduce the chance of fraud for businesses, technologies that reveal your true geographical position (from your IP) allows for customized ads, more accurate shopping experiences while lessening the chance of fraud (again) and technologies that gather and analyze data more efficiently can reduce the chances of security threats by screening packets for malicious data. Simultaneously, better technologies of identification allow for more effective enforcement of laws by governments, technologies to reveal your geographical position are ideal for tracking people, and technologies that gather and analyze data are perfect to eavesdrop on citizens suspected of illegal activity. There is much to say on this topic, but the obvious problem here is that government doesn’t even have to nudge a single bit, and industry can (and seemingly will) provide all the tools needed to regulate the Internet effectively. As mentioned earlier, there is no inherent nature to the Internet. If, however, there is an invisible hand, it is clearly meant to transform the Internet into a tool for perfect control (Lessig).
Possible outcomes
In progress...
- OS : After having read for the n-th time Neal Stephenson's "In the Beginning Was the Command Line" (which I highly recommend!), I perhaps would be interested in looking more closely at the functioning of operating systems. They are often the building blocks atop of which the different layers of the internet (4-7) connect with everyday user applications. They are probably the single most important piece of software at use today, and the OS war is as strong as ever.
- HARDWARE : Albeit a harder endeavour, it could be great if I managed to make a physical artifact to demonstrate these relationships. The relationships I intend on unearthing are quite insidious, and giving them physicality would probably make for a strong argument.
- 1984 : Binaries : surveillance, security, identification. Although I'm not overly interested in these topics per se (but rather what creates these things, what kind of ecosystem breeds the values that reflect these things), it could be interesting to lean into one or the other specifically. They are all very double edged processes, where for example surveillance can increase security, but decrease individual liberty. Added security makes us less vulnerable to harm, but again constrains us in our liberty.
- FLOSS : Open-source/closed source code. Open sourcing code can make governments more accountable for what they do. If "code is law", then it becomes critical "which kind" of code, if we can ever hope to change it.
Related works
Coming soon to a theater near you.
Ever-growing bibliography
- Vincent Mosco ("The Digital sublime")
- Brian Arthur ("The Nature of Technology")
- Charles Dickens ("Tale of two cities")
- Howard Rheingold ("Smart mobs")
- Lawrence Lessig ("code v2")
- Tim Wu ("Network Neutrality, Broadband Discrimination")
- Goldsmith ("Who controls the net")
- Benkler ("The wealth of networks")
- Zittrain ("The generative internet")
- John Perry
- Neal Stephenson ("Anathem", "In the beginning was the command line")
- David Lyon
- William Gibson
- John Perry Barlow
- David Shenk
- Michael Geist
- Nudge (Richard Thaler and Cass Sunstein) (Steve's rec.)
- The Net Delusion (Evgeny Morozov) (Steve's rec.)