Search results for augmented

YouTube Preview Image
I’m currently doing field work in Kumasi, Ghana and will be back next week with some really great original content. Until then, I am sharing a piece of media that I have been looking forward to, but currently have absolutely no time to watch. Amy Goodman moderates a discussion between Lacanian Philosopher and pop-culture critic  Slavoj Zizek and Wikileaks founder Julian Assange. This is the first interview Assange has given since being put under house arrest without charges filed against him by Sweden or the UK. Zizek considers operations like Wikileaks are the “harbingers for the end of global capitalism as we know it.” Again, I haven’t watched this yet, but I go into it with the following questions in mind: Can we make this kind of conclusion? Or is this a matter of digital dualism mixing with the cautious optimism of the far left? Are we fetishizing information technology to such a degree that we conflate its revolutionary capacity to disrupt technological systems, with its ability to tear apart similar social systems? Technological and social systems can and do follow isomorphic and parallel organizational structures but that does not mean that a technology’s ability to disrupt one, is on par with its ability to disrupt the other.

This essay, like the one I posted last month on faux-vintage photography, is me hashing out ideas as part of my larger dissertation project on self-documentation and social media. Part II will argue that the media also overstate how public we have become, sensationalizing the issue to the point that the stigma associated with online imperfections erodes more slowly. It is no stretch to claim that we have become more public with social media. By “public” I mean that we are posting (1) more pieces information about ourselves online in (2) new ways (see the Zuckerberg Law of Information sharing), and are doing so more (3) honestly than ever before. We are connected to the web more often, especially given the rise of smart phones, and new layers of information are being invented, such as “checking in” geographically. And gone are the days when you could be anyone you want to be online; today we know that online activities are augmented by the physical world. People are mostly using their real names on Facebook and nearly everything one does there has everything to do with the offline world.

But we are not as public as this suggests. We need a balance to this so-called triumph of publicity and death of anonymity (as the New York Times and Zygmunt Bauman recently declared). “Publicity” on social media needs to be understood fundamentally as an act rife also with its conceptual opposite: creativity and concealment. And I am not talking just about those who use false identities on blogs (see Amina) and pseudonyms on Facebook, those with super-strict privacy settings or those who only post a selective part of their multiple identities (though, I am talking about these folks, too).  My point applies to even the biggest oversharers who intimately document their lives in granular detail.

I’ll describe below how each instance of sharing online is done so creatively instead of as simple truth-telling, but will start first by discussing how each new piece of information effectively conceals as much as it reveals. more...

Today, Google announced a new service called “Google+” that explicitly attempts to replicate offline social norms onto an online platform. Besides the conceptual consistency between this goal and the concept of “augmented reality” that I write about so often, I also find the timing of the announcement interesting.

When Eric Schmidt was CEO of Google, I critiqued his statement that having multiple identities online shows “a lack of integrity.” Schmidt stepped down in April of this year and less than two months later Google announces Google+ (which is an umbrella term for a whole host of services centered on better replicating physical world social norms in a digital social media environment).

The service is brand new and invite-only so we can only speculate at this point what it will actually provide. However, the announcement of Google+ on the company’s official blog provides some interesting statements about privacy. The post is an implicit retraction of Schmidt’s insensitive statements and perhaps a lesson-learned from Google’s Buzz debacle that angered and even endangered many of its users. Further, much of the post is also a direct attack on the Facebook platform and its inability to reflect offline social norms that long-since predate the Web (e.g., the platform’s often incorrect usage of the term “friend”). Some quotes from the Google blog: more...

 

The card being used to advertise the service
The SMS service will be advertised using an ad campaign that is based on field work from the previous year by Dr. Audrey Bennett of RPI's Language Literature and Communication Department..

Next month I’ll be in Kumasi, Ghana doing field research and I thought I’d share what I hope to accomplish over there, since my work is informed by much of what I write about on this blog. (I will be blogging over here.) We hope to set up an information system by which Ghanaians can find condom sellers nearby. The primary interface will be text messaging using a fantastic open-source project called FrontLineSMS. By texting a certain number, the user will be asked to send their district and a list of nearby landmarks. The database will send back a list of condom sellers within a reasonable walking distance. We also hope to have several other front-end access points that are already becoming popular places to socialize. Our aim is to increase access to condoms in order to reduce the infection rate of HIV/AIDS. As of 2009, according to UNICEF, 230,000 people (about 2% of the population) live with HIV in Ghana. I should also note that cell phones are not a luxury item in Ghana. Adoption has exploded over the past several years, and it is estimated that about 67% of Ghanians own a cell phone.

more...

Last winter, Cyborgology contributor David Banks described the Pentagon’s Gorgon Stare system—a nine-camera flying drone that can stay airborne for weeks at a time—as a “panopticon in the clouds.”  Like Jeremy Bentham’s infamous prison design (later adopted as a metaphor for all of contemporary society by Michel Foucault), the deployment of surveillance drones serves, in part, to limit the actions of militants by creating a perception that the US government was perpetually watching.  Banks argues that, ultimately, these sci-fi-esque surveillance regimes were made possible by recent refinements in automated data management that originally had mundane applications, such as helping spectators follow activity on the sports pitch or producing individualized film recommendations.

Compiled by PJ Rey

There is, thus, a double-sense in which the panopticon has entered the cloud(s).  Surveillance devices are not only omnipresent—flying through the air—but these devices are also linked remotely to command and control centers—large, centralized databases that store and process the information produced in surveillance operations.  Thus, unlike the historic spy operations conducted by manned U2 spy plans, drones never have to physically return home for data processing; instead, this information is transmitted in real-time. more...

Obama Texting
Credit: Charles Ommanney/Getty Images

On June 17th, an Obama 2012 campaign staffer made a post explaining that Obama’s Twitter and Facebook presence would be handled differently going forward.  As fellow Cyborgology editor Nathan Jurgenson recently discussed, Obama’s posts and updates have, up until now, been ghostwritten—leading Jurgenson to conclude that “Obama-as-president has thus far been a Web 1.0 leader” and, thus, to ask “when will we see a Web 2.0, social media president?”  Obama’s use of social media has been in sharp contrast to other nationally-recognized politicians, including former vice-presidential candidate Sarah Palin, whose tweets appear to be individually-authored, spontaneous, and personal, making them appear more authentic and more consistent with the norms of other Twitter users (spelling errors and all).  The president is now getting into the game by authoring his own tweets.

The campaign update, titled, “A New Approach to Facebook and Twitter,”  states:

Obama for America staff will now be managing both accounts, posting daily updates from the campaign trail, from Washington, and everywhere in between. You’ll be hearing from President Obama regularly, too; on Twitter, tweets from the President will be signed “-BO.”

more...

Mediating Mediums, an architectural augmented reality video. Via Wired’s Beyond the Beyond.

There is an important space between old and new media. This is the grey area between (1) the top-down gatekeeping of old media that separates producers and consumers of content and (2) the bottom-up nature of new, social media where producers and consumers come from the same pool (i.e., they are prosumers).

And in the middle are projects like Global Voices, what might be called curatorial media: where content is produced by the many in a social way from the bottom-up and is then mediated, filtered or curated by some old-media-like gatekeeper.

The current protests in Syria can serve as an important example of how curatorial media works. Especially because foreign journalists have been banned from the country, creating a dearth of information for old media. Alternatively, more...

piggy banks that say "college fund" and "shoe fund"
Found at a local Target store: Your education as a market commodity

In my Theorizing the Web presentation last April, I gave a presentation entitled Practical Cyborg Theory: Discovering a Metric for the Emancipatory Potential of Technology. I wanted to develop a cyborg theory that helps us understand the emancipatory potential of a given technology or technological system. My formal hypothesis was an addendum to Haraway’s definition of a cyborg in the Cyborg Manifesto:

A cyborg is a cybernetic organism, a hybrid of machine and organism, who’s existence and emancipatory potential is constructed as a function of the temporal and social environment within which it operates.

more...

Several weeks ago, David Strohecker wrote a post about Tattoos and the Augmented body.  In a response to this post, Ned Drummond wrote a thought provoking comment, in which she differentiates between “active” and “passive” cyborgs. I think this is an interesting distinction that deserves fleshing out.  A deeper exploration of this distinction will be fruitful in pushing the theoretical boundaries of of what it means to be a cyborg—or an inhabitant of augmented reality.

The first thing to acknowledge is that “active” and “passive” are necessarily fluid states, rather than hard dichotomies. This is something Ned and I fleshed out in the comments section of the above mentioned post. Specifically, I said:

I would venture to say that active and passive use of technology probably ranges on a continuum, and individual cyborgs are more or less active/passive in different moments.

I would add to this that individual cyborgs can be simultaneously active and passive—actively using one technology while passively using another, or even actively using one part of a technology while passively using another part.

Before I can offer examples of the activity/inactivity continuum, I must offer a definition of active and passive interaction with technology. When Ned wrote about it, the distinction hinged on rule following. Those who use a technology for its intended purpose(s) are more passive, while those who use a technology in unintended ways are more active.

more...