76 Matching Annotations
  1. Apr 2020
    1. Unlike the previous model, the display is fused to the glass, which means replacing the LCD requires buying an expensive display assembly. The RAM is now soldered to the logic board—making future memory upgrades impossible. And the battery is glued to the case, requiring customers to mail their laptop to Apple every so often for a $200 replacement. The design may well be comprised of “highly recyclable alu-minum and glass”—but my friends in the electronics recycling industry tell me they have no way of recycling aluminum that has glass glued to it like Apple did with both this machine and the recent iPad.

      An example of how design can foster or discourage repair.

    2. technologies and practices which rise (or sink) to the level of infrastructure are frequently invisible until breakdown, and that special acts and moments of “infrastructural inversion” may be required to call these phenomena and their associated politics back to the center of thought and action.

      How relevant in the current moment.

    3. Can the fixer know and see different things—indeed, different worlds—than the better-known figures of “designer” or “user”?

      An important rhetorical question.

    4. vis-ibility may be tied crucially to systems of reward and recognition

      Interesting how "sheltering in place" has brought new attention/visibility to "essential workers."

    5. This chapter argues that breakdown, maintenance, and repair constitute crucial but vastly understudied sites or moments within the worlds of new media and technology today. It argues that much of what we care about as media and technology scholars is implicated or enacted in exactly such moments, and that the productivist bias of the field obscures this fact. It asks how we might begin to think differently around the phenomena of breakdown, maintenance, and repair, and how we might use this difference to launch other and more hopeful programs of research. And it argues for the contributions that broken world thinking and a repair-centered ethics might make to the project of defining an appropriate moral and practical stance vis-à-vis the world of media and technology today.

      Distillation of key concepts here.

    6. human value is preserved and extended

      Interesting to think about how maintaining a culture of repair (rather than a culture of replacement) might help preserve "human value," even a sense of meaning, usefulness, and pride which are threatened by throw-away culture.

    1. In addition to its main idea, this piece illustrates how vocabulary (here "the cloud") shapes perception -part of a larger pattern apparent in our readings.

    2. media studies should attend not only to the cloud’s externalities, but also the management strategies common to externalities and data alike. Microsoft’s data center placements, carbon offset purchases, and green energy buys are all structured by fungible mediation. It is this orientation that must be contested.

      Nice summary of the point and purpose of the piece.

  2. Mar 2020
    1. We usually only study "rubbish" of very old or long-lost cultures. Much time passes between deposit and analysis. But Gabrys is studying new rubbish (relatively speaking). This short span between deposit and analysis reflects the increasingly short lifespan not only of our of our technology but of our "now."

    2. In this place, “Plants and animals will be bred to reduce their useless parts: stringless beans, boneless chickens, skinless beets.”1 There would be no parasites, no weeds, no stray ani-mals, no trash, no dirt, no dust, and “no spills, no breakage, no smoke or smog.” Silence would prevail, and “friction” would be “reduced to the minimum needed to keep us erect and keep things in their place.” As part of this friction-free campaign, “the edges of the continents” would even be “smoothed to reduce the tidal losses.”2 This vision of a waste-free society seems as startling as the wasteful one.

      Zero-waste as dystopia.

    3. Silicon Valley Superfund site, hazardous waste log, 2005. (Photograph by author.)

      Very meta how the waste-inventory log (made of plastic) has itself become waste.

    4. This natural history method, then, signals a distinct approach to materiality—not just as raw stuff, but, rather, as materiality effects.27Electronic fossils are in many ways indicative of the economies and ecol-ogies of transience that course through these technologies. Electronics are not only “matter,” unfolding through minerals, chemicals, bodies, soil, water, environments, and temporalities. They also provide traces of the economic, cultural, and political contexts in which they circulate. To begin to develop a more material account of these dematerialized tech-nologies requires accounting for the multiple registers of what consti-tutes materiality—not as the raw matter of unproductive nature made productive, nor even as “second nature,”28 but as a complex set of mate-rial processes and relations.

      Important paragraph.

    5. discarded monitors and mobile phones, printers and central processing units, scattered on curbsides and stacked in the dark spaces between buildings.

      It's interesting to think about how electronic-hardware waste mirrors paper waste. Each was, at first, precious and rare, then ubiquitous, disposable, "trash."

    1. . a lot of people who didn ’ t have a clue what to do to create conversation would just type in their favorite song lyrics, or in the case of people at tech schools like [Rensselaer Polytechnic Institute], recite entire Monty Python routines verbatim.

      We've seen this etymology before, but these lines are different in they show spam as a conversation starter rather than a conversation disrupter.

    2. We continue to struggle with what the internet is (a place, a channel, a dimension…). If none of these fit, must we incorporate new language into our laws?

    3. One of the manifestations of this uncertainty is the struggle over metaphors, a struggle with very practical, physical, and technological consequences. What was spam like? To decide the answer to that question was to decide indirectly what the network itself was like and how people and their machines should behave on it. This question was played out to great effect in the shaping of law.

      We continue to see how metaphor (and the boundaries of metaphor) shape how we think about and deal with internet technology.

    4. Without having spam in the picture, we do not entirely understand much of the foundational conversations that continue to shape life together online.

      To what degree is spam necessary for understanding these conversations?

    5. One is the failure of previous meta-phors to accurately describe what spam is like for purposes of specifying laws or creating programs.

      Brunton points out the limits of metaphor here, a common theme in our readings.

    1. After all, junk, trash and waste have not traditionally been among the mostpopular topics in cultural theory.

      But academics have long studied the refuse of lost cultures. Is spam/porn different?

    2. egarded as little more than an anomaly or a social prob-lem associated with addiction and lack of control

      We see the anomaly theme again here. Is porn anomalous, or is it an inherent part of the system? The data (even if inflated) suggests the latter.

    3. It should also be noted that theproportional share of pornography is inflated for the purposes of filter soft-ware marketing.

      It's important to remember how squishy data can be.

    4. 33% to 66% ofall global e-mail traffic, although seasonal estimates have been as high as80%

      It's interesting to compare these numbers to Woolley's data on bots.

    1. The critical thing to understand is that the internet democratizes, if it does, only through its interaction with preexisting institutions and organizations—working with them and around them, and creating new alternatives that interact with them.

      Critical to democratization.

    2. five major failure modes

      These modes are:

      1. Failure to convert.
      2. Failure to sustain.
      3. Better informed/organized powers in the center move outward.
      4. Repression over participation.
      5. Susceptibility to disinformation & propaganda.
    3. here are important discrete interventions that can help alleviate the present sense of disorder. In particular, we emphasize efforts to make sure that political advertising becomes more transparent and susceptible to public scrutiny because we see large scale preference manipulation as the core of the platform business, and we see that core business presenting a profound future threat to democracy.

      While not the central argument, Benkler calls for a change in design here, something that we return to throughout our readings.

    4. ere, we suggest that a shift in emphasis in how journalists practice objectivity, from demonstrative neutrality to accountable verifiability, could help counteract some of the reinforcement and legitimation that the present practice creates on the background of highly asymmetric propaganda practices.

      Perhaps we could teach students to practice the same in our media literacy programs.

  3. Feb 2020
    1. Those inevitable en-counters will be less traumatic and shocking to th ose who are pre-pared and able to recognize the strategies they use to attack their targets—including how they use Greek and Roman antiquity to bol-ster their credibility.

      This is a noble purpose, and education is so important, but how far will education get us without modifications to online infrastructure?<br> ...How much traction can Zuckerberg's ideas gain within existing infrastructure? ...I suspect that the red-pill take on the classics might reach those who aren't even looking for it. Can the same be said for more legitimate interpretations?

    2. Dead White Men and Angry White Men

      I teach twelfth-grade English and have a significant say over my district's curriculum, so I'm particularly interested in in this section.

    3. Tolentino touches on digital architecture. Zuckerberg's book makes me wonder: To what degree does the software steer users toward or away from red-pill ideology? How might more legitimate takes on the classics gain equal exposure?

    4. Predictably, I became the target of a troll storm, and in the days and weeks following, I received hundreds of anti-Se mitic tweets and emails, many with attached images of my face (and th ose of my family members) photoshopped into a gas chamber or a concentra-tion camp. Others threatened me with sexual assault or detailed which gun they would like to use to shoot me.

      Jeung mentions intersections of harassment like this.

    5. If we believe that al-leged rapists are innocent until proven guilty, then on some level, do we also have to believe that victims might be lying until they can prove that they are telling the truth?This apparent paradox is the natura l extension of the approach to rape allegations in the Red Pill. It is also needlessly reductive, since both the accuser and the accused may be telling the truth as they see it, and th ere may not be an objective truth on which all par-ties can agree. Rather than accept this level of nuance, however, many find it easier to assume that women are natura l liars

      I like how Zuckerberg addresses this paradox.

    6. We cannot stop th ese men from using and abusing the history and literatu re of the ancient world in service of a patriarchal, white nationalist agenda. But by revealing how this self-mythologizing works, we can develop strategies for counteracting its pernicious influence.

      Perhaps a useful way to look at "garbage."

    1. s sssJ%-sJs ss%s -  s ss-  -ss    ssss s -

      This also brings to mind how the scope/scale/frequency of the internet trivializes everything and changes our threshold for what is shocking, funny, amazing, etc.

    2. sE  ss  s s'  Osiis   ss  s   ss ss  sss   s sN 

      This relates to the Dibble piece (Mr. Bungle).

    3. s> 9Gss.s  F. s ss ss  . <s..s<sss.s  <s.s  <s.s  ss  <s s.s  ss  , QSs

      The brings to mind the more recent social influencer phenomenon.

    4. s  sss    s ss  ss s Žsss )s   sss  s  ¦  s s    ss ssss s,s s ssss sss&sss sss sss  s s ss  s ss s ss ss s  s s   ss#š9  ,

      Jennifer Lawrence comes at this from a slightly different angle. In her situation, though, her photos were stolen.

    5. 3s s  ss  s ss s(s  s ss ss s ss   s s *ss s   s  s s §

      This illustrates the reactive structure of social media.

    1. Yet few were unaware of the ease with which the toad proscrip-tion could be circumvented -- all the toadee had to do (all the ur- Bungle at NYU presumably had done) was to go to the minor hassle of acquiring a new Internet account, and LambdaMOO’s character registration program would then simply treat the known felon as an entirely new and innocent person.

      This raises interesting questions re people vs. personas.

    1. the default internet identity is anecdotally white, male, and middle class, but there is sur-prisingly little research on how internet practice enacts these normative identity markers. J

      Is this also built into the code, the software, or UI?

    2. its lack of efficacy in shepherding mem-bers to “actual” political activity that would benefit Black communities

      Tolentino writes about this kind of expression over action in 'Trick Mirror.'

    3. Networked online identity distributes internal Black community discussions, ren-dering them visible to an audience who is primed to receive and respond to those struggles. Networked Black online identity also makes Black community discourses visible as a textual and multimedia archive to out-group audiences; these audiences are not always directly addressed in internal Black discourses but are always present as signifiers.

      This is interesting. Surely this has also accelerated appropriation.

    1. For example, computer scientists based atIBM’sTJWatson Research Centre

      Watson is the famous computer program that defeated Ken Jennings in Jeopardy, a turning point in AI.

    2. The anomalous objects discussed in this volume can therefore be takenas indices of this novel media condition in which complex transformationsoccur.

      I wonder if and how these anomalous objects might be preserved and curated as relics.

    3. Neil Postman)

      In "The Disappearance of Childhood" Postman writes about how media (especially TV) was leading to a disappearance of childhood. We are now coming to terms with how the internet is cutting childhood short.

    4. how various assemblages of bodies (whether technolog-ical, biological, political or representational) are composed in interactionwith each other and how they are defined, not by forms and functions, butby their capabilities or casual capacities. In other words, we are interested inhow one assemblage, a heterogeneous composition of forces, may affectanother.15

      This reminds me of the structuralism that we learn about in lit theory.

    1. Tolentino closes by reminding us how earlier media technologies were, in their own time, thought to be catastrophic. I've read/heard this before, from other thinkers who went on to ask whether concerns over the internet would prove to be just as overblown as concerns over writing, radio, etc. Tolentino takes a stance here when she describes a "complete identification with the online marketplace."

  4. Jan 2020
    1. The term “spam,” which today is interchangeable with “junk mail,” started off as simply denoting annoying behavior. On early chat systems, people would often type “spam, spam, spam, spammity spam”—a reference to a Monty Pythonsketch where a couple’s breakfast is repeatedly interrupted by Vikings singing about Spam

      This is an interesting etymology. It would be interesting to explore what it is about us that finds this kind of behavior funny, what is is that might motivate a certain percentage of us to behave like this in real-life and/or online (I'm not sure if there is a distinction between the two), and how the internet might exacerbate these impulses.

    2. Harassment exists on two spectrums at once—one that is defined by behavior and one that is defined by content.

      A certain amount of human wisdom is needed in making distinctions like these. Will AI ever be able to apply this kind of wisdom, or will humans always need to be involved?

    3. “A week before the change, players reported that more than 80% of chat between opponents was negative. But a week after switching the default, negative chat had decreased by more than 30% while positive chat increased nearly 35%. The takeaway? Creating a simple hurdle to abusive behavior makes it much less prevalent.”

      This is nudge theory applied to UI.

    4. You should make a budget that supports having a good community, or you should find another line of work.

      This echoes the quote often attributed to Jim Wallis, "A budget is a moral document."<br> ...Perhaps a code script is also a moral document.