Herding Anarchists

Anarchy in the UKThere is a fascinating culture emerging around distributed version control systems (DVCS), facilitated by software, but responding to (and suggesting) shifts in collaboration styles. It is very easy to imagine these practices percolating through other areas of information production.

I am still a bit new to distributed versioning, but a primary difference between distributed versioning and traditional centralized versioning is how easy/hard it is for an outsider to contribute ideas/expressions/work back to the project. Part of what makes this all work smoothly are very good tools to help merge disparate branches of work – it sounds chaotic and unmanageable, but so did concurrent version control when it first became popular (that is, allowing multiple people to check out the same file at the same time, instead of locking it for others while one person was working on it).

This post, Sharing Code, for What its Worth, does a great job explaining some of the advantages of distributed version control systems. Sometimes you just want to share/publish your work, not start a social movement. Sometimes you want to contribute back to a project w/out going through masonic hazing rituals. DVCS facilitates these interactions, far more easily than traditional centralized/hierarchical version control systems.

Wikipedia runs on a centralized version control system, but the Linux Kernel is developed on DVCS (as Linus Trovalds explains/insists himself here). We are just starting to use github at work, and I have watched it increase the joy of sharing – reducing the disciplined overhead of perfecting software for an imagined speculative use and coordinating networks of trusted contributors. The practice really emphasizes the efficient laziness of agile programming, and helps you concentrate on what you need now, not what you think you might need later.

In some ways, this style of collaboration is more free-loving than an anonymously editable wiki, since all versions of the code can simultaneously exist – almost in a state of superposition. However, there is a hidden accumulation of technical debt that accrues the longer you put of combining different branches of work. And, sometimes you may actually want to start a community or social movement around your software, which is still possible, but is now decoupled and needs to be managed carefully.

I think we can start to see hints of this approach breaking free from the software development world in this recent piece of intention-ware described in Crowdsourcing the Filter.  (I met some of the Ushahidi team earlier this year –  -and was impressed by how competent and grounded they seemed – tempering both the hype and nostalgia). As Benkler has argued, ranking and filtering is itself just another information good, and amenable to peer production, but the best ways of organizing and coordinating – distributing and then reassebling – this production, still need to be worked out.

The Tweets of War

The current tragedy unfolding in the Middle East right now deserves a more powerful and direct response than I am prepared to deliver. The media coverage is very difficult to sift through and judge, as the reporting has been marinated in propaganda campaigns more sophisticated than anything I have personally experienced. Many people I talk to seem to be unwittingly “on message”, faithfully echoing the sound bites they have been fed on a steady basis.

I am connected to people with very deep convictions about this issue. I know this is a divisive wedge issue, but I am not sure how many social networks contain the extremes it feels like mine does.

I have not found it productive to weigh in on the questions of morality and entitlement, but I have come across a few pieces that I think do a good job discussing the long term strategic stakes, from a more detached and rational perspective. I feel like I can more successfully engage staunch supporters of Israel by challenging the long term wisdom of these attacks, not their justification.

Proportionality And Terror

Even Israeli newspapers and human rights groups are far more nuanced, vocal and divided than the homogenized dichotomy I am subjected to in the US.

At times like these, I also return to read the wise Kabbalistic reflections of the Meru Foundation’s Stan Tenen and his series Making Peace with Geometry (and the recent How Mother Nature Keeps the Peace).

Meanwhile, this is all occurring in an environment awash in participatory media, and I am trying to track the online tactics emerging around this showdown. This is a decent run-down on the cyber-debate the gaza conflict has precipitated. However, beyond the viral video games (newsgaming as the new political cartoon? Raid Gaza!), facebook status updates (qussam count, support gaza), interactive visual propoganda, and virtual protests (which I predicted last year), there is something different happening that is really worth noting.

Computer users are installing software on their computers to donate their computing power to attacking the opposing side’s infrastructure. Conceptually, this is a bit like donating your computer cycles to search for aliens with Seti@Home, except for destructive purposes. Technically, you are installing a trojan on your own computer, so that it can be taken over on demand to join a botnet army of other zombie computers and launch a Denial of Service attack.  (And, there really is no way to verify the actions or intensions of these combatants. For all we know, the russian mafia might be working both sides of the conflict to capture credit card numbers.)

Denial of Service attacks are pretty serious. If the infrastructure you are attacking runs mission critical services, like hospitals, airports, traffic lights, or whatever, suddenly you might actually be participating directly in the destruction, not just debating about it.

It’s scary and important to recognize the dark side of collaboration – the side that leads to lynchings and mob justice.  I have to wonder whether the constant visceral immersion in this carnage has anything to do with its spillover beyond the Mediterranean – NYC police officers have even been injured in this conflict.

Imagine.

Update (11/28/09): I have learned that the World Flag image I used in this post was created by the world flag project “to raise awareness and funding for non-profits and individuals working in the areas of education, world health, human rights, and the environment.”  I had chosen this flag since during these internet campaigns it is common for people to declare their allegiance to one side or another with a national flag, but I was unaware there was an organized project behind this fabulous image.

The year of the hybrid?

Economies, not cars.

Last night I saw Larry Lessig present “Remix: Making Art and Commerce Thrive in the Hybrid Economy” as a part of Evan Korth’s amazing Computers and Society speaker series.  The talk was an improved iteration on the talk I saw him present at Wikimania ’06, but it was much tighter – concentrated, but not too dense. He included a few new examples and anecdotes, collapsed earlier presentations into compact sub-segments, and has incorporated Benkler’s hybrid economies (articulated in The Wealth of Networks) into the Read-Only->Read/Write->Hybrid progression.

It really is a pleasure listening to a world-class orator (he has argued cases in front of the supreme court) deliver an argument, and I was trying to pay attention to his rhetorical style, and the ways he has honed the structure of his argument over time.

First, a small bone – For a while, Lessig has been making a bold and provocative assertion that text has become the Latin of our time, and audio and video are the vulgar. Arguments over the correctness of tense aside, I sure wish he would start using the word ‘vernacular’ instead of ‘vulgar’.  ‘Vulgar’ makes the argument sound, well, a bit elitist to me, and when I repeat this claim, I remix it to ‘vernacular’.

More important than quibbling over this choice of words I was a little thrown off by the direction that Lessig wants to take IP reform. Last night he spent a bit of time outlining a scheme that hinges on the analytic distinction between professionals and amateurs. I think he may have been trying to appeal to an intuitive sense of fairness, or perhaps pragmatics, over how professional creators work might be protected by IP while amateurs should be free to create w/out regulation or restriction.

I thought it was downright odd that in one breath he was persuading us that we live in a hybrid world, and in the next trying to maintain the line between amateurs and professionals.  The line between professionals and amateurs is clearly blurring, as the difficulties in applying shield laws to journalists attests. Nowadays, who exactly is The Press, whose freedoms may never be abridged according to the First Amendment? I am really unclear about the definition of a creative professional in a hybrid economy. Would we need to introduce licenses to certify creative professionals? Even in the example of the baby video with Prince music playing in the background, would the situation change if the mother was making money off of google ad-words aside the video?

To me, if you take Benkler’s argument to heart, in a networked world many everyday interactions will be commodified, and favors will turn into transactions. We’ll all become some hybrid of amateur and professional. This doesn’t sound all good to me, as I am not sure I want to live in a world where everything has an exchange value… This paper by Nigel Thrift, Re-inventing invention: new tendencies in capitalist commodification, paints a grimmer picture than Benkler does about the sophisticated ways that knowledge workers are being exploited in the hybrid world we are hurtling towards.

Giving Chickens Microphones

By now you may have heard of the innovative citizen-driven election monitoring system, Twitter Voter Report (they are getting great press cycles, with purportedly more to come).  I actually wrote up and submitted the post that appears on infosthetics.com, a wonderful blog that tracks innovations in data visualization.

This projects represents a really innovative use of Twitter as a “just-add-water” (gratis, but not truly free) infrastructure for distributed structured-data collection. It reminded me of a free platform a group at  UNICEF is building to collect distributed structured-data in the third world (for places w/out easy access to the internet, but with cellular connectivity) –  RapidSMS.

Imagine how many millions of dollars the government would have spent to build a cell-phone enabled election monitoring system (that likely wouldn’t work). Instead, a group of volunteer activists, weaned on the open-source, do-it-yourself culture of code jams, shared repositories, and issue trackers, decided less than a month ago that they could build this themselves on a shoestring.

This is definitely a big deal, and relates closely to a new tier of participatory media which I began to describe at my talk at CCNMTL’s New Media in Education conference this month. It also has everything in the world to do with the TagMaps tool I wrote about last November in my post Crowded Wisdom. Systems are coming online which are helping us synthesize vast volumes of tiny fragments of information into meaningful knowledge.

Twitter Vote Report allows anyone to report voter suppression, and problems with specific voting machines, but it support tracking wait times, which will be aggregated and mapped on the website.

Previously, when a voter had a complaint, he had to go through election officials who might have little incentive to admit a mistake – what tech executive Logan calls “a fox guarding the chickens” scenario.

“What this technology does,” he says, “is give the chickens a microphone.” [Baltimore Sun]

Finally, while we are on the topic, this was a great letter to the next president on what he can/should do with technology. How will President Obama utilize the historically unprecedented social networks he mobilized during his campaign?

Dear Mr. Tech President

For more information on Twitter Vote Report see their press page.

Domestically Spooked

This Fall I am taking a great class on Transparency & Democracy (syllabus) taught by Prof. Michael Schudson. We are talking about the history of the Freedom of Information Act (FOIA), and trying to puzzle out what sorts of cultural forces accounted for an indisputable rise in transparency and openness in American society. We are taking a fascinating journey through the history of social movements in the 60s and 70s and reading about the Free Speech movement, SDS, the feminist movement, the gay liberation movement, and tabloid talk shows.

This summer I had also heard a great presentation by Phil Lapsley at the Last HOPE conference on The Hackers View of FOIA. I learned a great deal of practical information about how to properly file a FOIA request, a few fun FOIA hacks (hint: an agency’s FOIA logs are FOIA’able), and about www.getmyfbifile.com (the NSA has their own easy to use FOIA form).  The main value of Get My FBI file are the office addresses it contains. Although requesting your intelligence files may put an end to any of your delusions that you were important enough to have a file about you, I decided to take the plunge. In my case, I imagined I might not have the security clearance to see my own file – I’m one of those “disposable spooks” whose very existence will always be fervently denied.

As it turned out, my ego didn’t even get brushed, never mind bruised. The NSA has now officially responded that they can “neither confirm nor deny” any intelligence records. In fact, I think I received a boilerplate response letter, which sure makes it sound like the NSA is engaged in widespread domestic spying. So, judge for yourselves and get involved and support the EFF! The spirit of FOIA wants information to be free – Does the NSA answer to anyone for any of its activities anymore?

You may aware that the NSA/CSS targets unspecified persons or entities involved in terrorism as part of the nation’s efforts to prevent and protect against terrorist attacks. However, because of the classified nature of the National Security Agency’s efforts, we can neither confirm nor deny whether intelligence records relating to you exist, or whether any specific technique method or activity is employed in those efforts.

[1][2]

Prophetic Fulfillment

It is virtually uncontested that the McCain campaign has attempted to divisively identify Obama as the Anti-Christ through a systematic campaign of allusions and coded associations. This innuendo was largely missed by people who don’t believe in the literal reading of Revelations, but the sophisticated tactics make it unlikely the multitude of associations were coincidental. “The One” advertisement alludes to the cover art and even the title fonts of the popular “Left Behind” series, and there are numerous biblical associations as well.

But, what confuses me is that by the logic of fundamentalist Christianity, if Obama really were “The One”, wouldn’t they be obliged to vote for him to fulfil prophesy and usher in the rapture? Isn’t this the logic behind the Christian right’s support for Israel? Kinda reminds me of seating Jesus on a white donkey, but really, whatever it takes to bring about a change we can all believe in…

Free Energy Redux

No, this post isn’t about the LHC creating black holes, time machines, or perpetual motion – its an update on my ~2 year old post on Free Energy – where I reflected on what the environmental movement might learn from the free software movement…

Looks like environmental labelling, one of the ideas I discussed, is actually starting to happen in the UK:

What is your dinner doing to the climate?

Synchronously, this week I am reading an excellent treatment of the rise of transparency as a form of (meta)-regulation for my seminar on Transparency and Democracy

Democracy by Disclosure: The Rise of Technopopulism

Now I finally have the theoretical apparatus to completely obfuscate my ideas 😉

BTW – Happy Software Freedom Day!

Open Letter to the FDA

To: Sandy Walsh <sandy.walsh@fda.hhs.gov>
Cc: World
Subject: Establishing the Validity of Pediatric Bipolar Disorder

Dear Miss Walsh,

I am a professional educator, software architect, and a doctoral candidate at Columbia University’s School of Journalism. I am outraged that the FDA is abusing its power and violating the public trust by supporting the corporate interests of the pharmaceutical lobby. The drug companies are shamefully maneuvering to expand the market for the multi-billion dollar a year anti-psychotic industry by extending the diagnostic criteria of the purported mental illnesses their toxic pills are prescribed to treat.

The FDA has recently taken the unprecedented action of effectively legislating the existence of a disease, a disease whose existence is denied by many experts on both mind and body. The diagnosis of Pediatric Bipolar Disorder does not exist in the DSM IV, is not recognized by public or private insurance companies, and is the subject of intense debate between psychiatrists, psychologists, social workers, and therapists. When did the FDA become authorized to construct/validate new diagnoses or decide who is mentally ill?

I have been closely following the heated controversy surrounding the diagnosis of Bipolar Disorder in children since the tragic death of Rebecca Riley. Rebecca was diagnosed with Bipolar disorder at 2 years old, and was killed when she was 4 by an overdose of anti-psychotics. This past year, Frontline aired The Medicated Child, a provocative investigation of the widespread experiment being conducted on the innocent children of America. I beg you to watch this documentary before making any more decisions about the existence of this alleged disorder. The piece demonstrates how our children are being chemically swaddled, and how these drugs are being systematically deployed as instruments of discipline and control.

The public has a right to full disclosure on this important matter of public health! I am shocked that you have still not issued a statement explaining your position on Pediatric Bipolar Disorder – What behavioural symptoms constitute this alleged disease, and how were these criteria arrived at? What is the progression of this illness and what are the mechanisms are involved in its treatment? Who was consulted in the validation of this disease, and have their research findings been vetted by a disinterested scientific community?

The FDA’s complicit involvement in a mass experiment on an entire generation of American children demands transparent accounting. It is absolutely imperative that the FDA shine some light on its backroom dealings with the Big Pharma.

Sincerely,
Jonah Bossewitch

Location, location, location (and timing)


A few weeks back I attended a symposium (The Focus on Locus) at the Columbia Business school on the coming tusnami of location based services. For some reason I mistakenly believed the day might include discussions and demonstrations of visualizations and mapping UIs, but it was actually more about the other end of the equation – how every device on the planet will soon be aware of its own location, and the sorts of privacy, policy, and commercial implications of this emerging reality.

Henning Schulzrinne, the chair of the CS dept kicked of the day from 1000m up by pointing out that, nowadays,  just about every device on the planet knows what time it is (non-trivial when you consider the standards, protocols, and apis that needed to be resolved for this to happen so smoothly everywhere), and reminded us that less than 10 years ago you still needed to set the time on your cell phone. Knowing the time has become completely transparent on many electronic and networked devices, and has become part of the fabric of the digital age. We search for emails, pictures, documents and more based on timestamps – they are so common it is even hard to imagine computing without them.

Extrapolate a few years out, and the dimensional quartet of space-time will be reunited once more. Everything will know where it is, and not just geo coordinates – devices will know the street block they are on, the room they occupy in relation to floor plans, etc etc. Henning is even working on the standards and protocols to facilitate this ubiquity. Once you say this out load it becomes obvious – many of the systems that we use to figure out where we are rely on knowing when you are to do so. This dates back to the solution to the Royal Academy’s Longitude X-Prize, all the way up to the triangulation used by modern GPS.

Location based services have also finally creeped out the 99% of the people who don’t seem to grok the privacy issues posed by the tracks our digital footprints leave behind. Perhaps its more visceral, immediate, and concrete, but people are buggin. In a very surreal moment, I realized that many of the privacy concerns raised at the Columbia Business School symposium were very similar to the privacy conversations happening at the hacker conference (the Last HOPE) I attended the week afterwards. (yeah yeah – the groups are both stereotypically libertarian, but would you have predicted the similarity?)

Refreshingly, some of the models and thought experiments I have been developing in relation to my End of Forgetting work held up really well throughout both conferences. The information flux model remains relatively unique, and continues to suggest alternate ways of retying the gordian knot of that is strapping us to the petabyte age.

It’s always fun attending a meeting like this and trying to maintian a critical perspective – paying attention to the omissions, the assumptions, and even the construction of the instruments (like the standards which might be used to indicate the privacy levels of data). Speak now or forever hold your place.

Passing Virtual Cars

I’ve got a wonderful summer backlog of posts piling up, but I really want to try to keep these posts short(er) and sweet, so I’ll try to compose staccato.

My explorations into virtual worlds have taken a turn for the surreal lately, as I have made a few new close friends who have been graciously teaching me how they play. I feel like I might be coming ridiculously late to the conversation (I don’t often play video games), but my experiences have given me new pause about the raging debate over the potential influence of sex and violence in games/media on people (not just youth).

I have learned first-hand how Second Life encourages people to articulate their fantasies in intricate detail – trying on new fashions, tattoos, piercings, behaviours, and lifestyles. From a few conversations, I am also pretty sure that much of this identity-play sometimes sticks, and often crosses back over into real life.

The whole process is spookily reminiscent of the “manifesting principle,” described in magickal/mystical systems like Chaos Magick (e.g. Carol’s Liber Kaos) and even Kabballah (The Three Abrahamic Covenants and The Car Passing Trick):

  1. Know what you want. Clearly and precisely understand what you want by doing the intellectual work needed to really know what you want and how much it costs (or how impossible it is.)
  2. Sacrifice your(ego)self to the task. Put your heart and soul into your endeavour. Do real work in the physical world towards your goal. Care deeply about the work you are doing. Work (and pray) well beyond your normal point of giving up. Do the work and show your caring anyway, even if it seems that [God] is not listening.
  3. Return your personal will to [God]. Give up, be infinitely patient, and pay attention.

The manifesting principle only works when a person has made a real sacrifice and has continued to work even while they have let go of their expectations of the outcome they desire. When a person short-circuits the full process, nothing happens. When there has been no sacrifice, there is nothing for [God] to respond to. (Stan Tenen, The Purpose of Prayer).

So, while Halo or even Grand Theft Auto might not cross some yet unknown threshold, I am mildly concerned about the World of Warcraft players. Sure, many of them are just playing, but some might be inflicting real emotional harm on other real people. Something to ponder.

I haven’t really worked this out in detail yet, but I also wonder if Geertz’s notion of “deep play” (introduced in Deep Play: Notes on a Balinese Cock Fight) might be useful and relevant here. The deep play he describes shares many characteristics with these mystical formulas and the magical substrate that Second Life has clearly become for some people. Something the Stanford lab is trying to systematically measure and observe, though I don’t think they have floating this particular hypothesis yet 😉

In many ways my conversations and immersion in the wonderful Play as Being project and community have helped me think about these relationships (especially ‘letting go’, the final step in manifesting), but I will save some of the direct connections for a future post.

« Previous PageNext Page »
/* reset the net - http://resetthenet.tumblr.com/post/84330794665/the-reset-the-net-splash-screen */