Search results for augmented

Stacks of Kente and cotton cloth sit in piles, waiting to be stamped with Adinkra patterns. Note the “pixelated” patterns in the center stack.

In part 1 I opened with a run down of the different kinds of “digital divides” that dominate the public debate about low income access to technology. Digital divide rhetoric relies on a deficit model of connectivity. Everyone is compared against the richest of the rich western norm, and anything else is a hinderance. If you access Twitter via text message or rely on an internet cafe for regular internet access, your access is not considered different, unique, or efficient. Instead, these connections are marked as deficient and wanting. The influence of capitalist consumption might drive individuals to want nicer devices and faster connections, but who is to say faster, always on connections are the best connections? We should be looking for the benefits of accessing the net in public, or celebrating the creativity necessitated by brevity. In short, what kinds of digital connectivity are western writers totally blind to seeing? The digital divide has more to do with our definitions of the digital, than actual divides in access. What we recognize as digital informs our critiques of technology and extends beyond access concerns and into the realms of aesthetics, literature and society. I think it is safe to say that most readers of this blog think they know better: Fetishizing the real is for suckers. The New Aesthetic, a nascent artistic network, is all about crossing the boarder between the offline and the online. Pixelated paint jobs confuse computer scanners and malfunctioning label makers print code on Levis. The future isn’t rocket-powered, its pixelated. Just as the rocket-fueled future of the 50s was painstakingly crafted by cold warriors, the New Aesthetic of today is the product of a very particular worldview. The New Aesthetic needs to be situated within its global context and reconsidered as the product of just one kind of future. more...

Discussing the relative strengths and weaknesses of education as it occurs on and offline, in and outside of a classroom, is important. Best pedagogical practices have not yet emerged for courses primarily taught online. What opportunities and pitfalls await both on and offline learning environments? Under ideal circumstances, how might we best integrate face-to-face as well as online tools? In non-ideal teaching situations, how can we make the best of the on/offline arrangement handed to us? All of us teaching, and taking, college courses welcome this discussion. What isn’t helpful is condemning a medium of learning, be it face-to-face or via digital technologies, as less real. Some have begun this conversation by disqualifying interaction mediated by digitality (all interaction is, by the way) as less human, less true and less worthy, obscuring the path forward for the vast majority of future students.

This is exactly the problem with the op-ed in yesterday’s New York Times titled, “The Trouble With Online Education.more...

Documentary consciousness entails the ever-present sense of a looming future failure.

In Part I this essay, I considered the fact that we are always connected to digital social technologies, whether we are connecting through them or not. Because many companies collect what I call second-hand data (data about people other than those from whom the data is collected), whether we leave digital traces is not a decision we can make autonomously. The end result is that we cannot escape being connected to digital social technologies anymore than we can escape society itself.

In Part II, I examined two prevailing privacy discourses to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequalities and larger issues of power.

In this third and final installment, I consider one of the many impacts that follow from being inescapably connected in a society that still masks issues of power and inequality through conceptualizations of ‘privacy’ as an individual choice. I argue that the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term documentary consciousness, or the abstracted and internalized reproduction of others’ documentary vision. Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) “visibility is a trap.” I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies. more...

The New York Times recently published a piece titled “At Times, Obama and His Cyberself Differ on Tactics” that opens with the passage:

For a moment on Friday, the cyber-Barack Obama was perfectly at odds with the flesh-and-blood version… Speaking to 1,400 supporters at a high school… President Obama voiced his familiar lament that “there is so much negativity and so much cynicism” in politics that he could understand if voters tuned out the election. Minutes earlier on Twitter, he had written, “Why Mitt Romney’s end date at his buyout firm matters,” linking to a blog post about the tempest over his Republican challenger’s departure from Bain Capital.

The article doesn’t really offer any deeper analysis of the topic raised in its headline, but the notion of this sort of technologically-mediated, or even, post-human, presidency is so provocative that it’s worth additional reflection. I can’t begin such a reflection, however, without first critiquing some of the vocabulary used in the article. The article contrasts “cyber-Barack Obama” (or Barack Obama’s “cyberself”) with “the flesh-and-blood version.” This problematically implies that there are two Barack Obamas: the real Obama and the Obama out there in cyberspace (cue creepy space music). Of course, once we even state such a claim, it becomes immediately apparent that it has zero face validity. Arguing that the Barack Obama who signs the messages he personally posts to Twitter with the initials “bo” is different than the Barack Obama out there giving the speeches makes about as much sense as arguing that when I call my mom on telephone, I’m talking to a different person than when I drive over for a visit. more...

A little over a year ago, I found myself conducting a focus group session with a handful of middle school students. As part of a research project looking to better understand how Internet safety programs conceptualize youth and Internet technologies, I became increasingly surprised – and at least somewhat frustrated – that cyberbullying rarely came during dozens of conversations with students, parents and school administrators. This particular focus group session was no different. Nearing the end of the session, I finally asked the students if they used the word cyberbullying when they talked to their friends. Their response, looking at me as if I was the most out-of-touch idiot they had ever spoken with, was a unanimous “Nooo!” I then asked them: If you do not use the word, who does? Various students replied with disgusted exclamations of “Parents!” or “Teachers!” and in what would be one of the defining moments of the project, a student said “It’s an old lady word” quietly under her breath. Looking beyond some problematic ageism and sexism that may be implied in her response, there is an element of truth behind what she was saying: children are using a very different interpretive frame than parents when it comes to so-called “cyber-bullying.” more...

An Ashanti enstooling ceremony, recorded (and presumably shared) through cell phone cameras (marked).

The “digital divide” is a surprisingly durable concept. It has evolved through the years to describe a myriad of economic, social, and technical disparities at various scales across different socioeconomic demographics. Originally it described how people of lower socioeconomic status were unable to access digital networks as readily or easily as more privileged groups. This may have been true a decade ago, but that gap has gotten much smaller. Now authors are cooking up a “new digital divide” based on usage patterns. Forming and maintaining social networks and informal ties, an essential practices for those of limited means, is described as nothing more than shallow entertainment and a waste of time. The third kind of digital divide operates at a global scale; industrialized or “developed” nations have all the cool gadgets and the global south is devoid of all digital infrastructures (both social and technological). The artifacts of digital technology are not only absent, (so the myth goes) but the expertise necessary for fully utilizing these technologies is also nonexistent. Attempts at solving all three kinds of digital divides (especially the third one) usually take a deficit model approach.The deficit model assumes that there are “haves” and “have nots” of technology and expertise. The solution lies in directing more resources to the have nots, thereby remediating the digital disparity. While this is partially grounded in fact, and most attempts are very well-intended, the deficit model is largely wrong. Mobile phones (which are becoming more and more like mobile computers) have put the internet in the hands of millions of people who do not have access to a “full sized” computer. More importantly, computer science, new media literacy, and even the new aesthetic can be found throughout the world in contexts and arrangements that transcend or predate their western counterparts. Ghana is an excellent case study for challenging the common assumptions of technology’s relationship to culture (part 1) and problematizing the historical origins of computer science and the digital aesthetic (part 2). more...

Art teacher Gregory Euclide did something interesting to the nature of his art when he decided to release prints of it.

Using sumi ink, Euclide had made a practice of creating fantastically complex images on his classroom’s whiteboard during lunch breaks in order, he says, to show students what someone skilled could create in a very short amount of time. But the duration of the process wasn’t the only point at which time came into play in these works: Euclide would then simply erase the images, often shocking his students by doing so. It was this shock — which was frequently mixed with dismay — that prompted him to release more permanent forms of some of his images (one of which has already graced the cover of Bon Iver’s self-titled album).

more...

Image by Sam Michel

This is a slight tonal change from what I normally write; given that it’s now topping a hundred degrees in the shade, this post is much more casually reflexive and much less overtly theoretical than usual.

People keep trying to add me on Facebook. This raises some interesting issues. Most of them have to do with the fact that I’m not on Facebook.

more...

This image is on the Internet. Whose fault is that? (Is it anyone's fault, per se?)

Last month in Part I (Distributed Agency and the Myth of Autonomy), I used the TtW2012 “Logging Off and Disconnection” panel as a starting point to consider whether it is possible to abstain completely from digital social technologies, and came to the conclusion that the answer is “no.” Rejecting digital social technologies can mean significant losses in social capital; depending on the expectations of the people closest to us, rejecting digital social technologies can mean seeming to reject our loved ones (or “liked ones”) as well. Even if we choose to take those risks, digital social technologies are non-optional systems; we can choose not to use them, but we cannot choose to live in a world where we are not affected by other people’s choices to use digital social technologies.

I used Facebook as an example to show that we are always connected to digital social technologies, whether we are connecting through them or not. Facebook (and other companies) collect what I call second-hand data, or data about people other those from whom the data is collected. This means that whether we leave digital traces is not a decision we can make autonomously, as our friends, acquaintances, and contacts also make these decisions for us. We cannot escape being connected to digital social technologies anymore than we can escape society itself.

This week, I examine two prevailing privacy discourses—one championed by journalists and bloggers, the other championed by digital technology companies—to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control, as something individuals can ‘own’. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequality and larger issues of power. more...

YouTube Preview Image

 

 

The original video I posted was taken down. Alexander calls cricket a “gay game” 5 minutes in.

In an interview with Craig Ferguson last week, Jason Alexander called the game of Cricket “a gay game.” It was clear (and you can see for yourself in the video above, starting at the 9 minute mark) that Alexander was equating “gay” with “effeminate” and juxtaposing words like “gay” and “queer” with notions of masculinity and being “manly.” After the show aired, the tweets started pouring in. This tweet by @spaffrath was pretty trypical: more...