Search results for twitter

Stacks of Kente and cotton cloth sit in piles, waiting to be stamped with Adinkra patterns. Note the “pixelated” patterns in the center stack.

In part 1 I opened with a run down of the different kinds of “digital divides” that dominate the public debate about low income access to technology. Digital divide rhetoric relies on a deficit model of connectivity. Everyone is compared against the richest of the rich western norm, and anything else is a hinderance. If you access Twitter via text message or rely on an internet cafe for regular internet access, your access is not considered different, unique, or efficient. Instead, these connections are marked as deficient and wanting. The influence of capitalist consumption might drive individuals to want nicer devices and faster connections, but who is to say faster, always on connections are the best connections? We should be looking for the benefits of accessing the net in public, or celebrating the creativity necessitated by brevity. In short, what kinds of digital connectivity are western writers totally blind to seeing? The digital divide has more to do with our definitions of the digital, than actual divides in access. What we recognize as digital informs our critiques of technology and extends beyond access concerns and into the realms of aesthetics, literature and society. I think it is safe to say that most readers of this blog think they know better: Fetishizing the real is for suckers. The New Aesthetic, a nascent artistic network, is all about crossing the boarder between the offline and the online. Pixelated paint jobs confuse computer scanners and malfunctioning label makers print code on Levis. The future isn’t rocket-powered, its pixelated. Just as the rocket-fueled future of the 50s was painstakingly crafted by cold warriors, the New Aesthetic of today is the product of a very particular worldview. The New Aesthetic needs to be situated within its global context and reconsidered as the product of just one kind of future. more...

Discussing the relative strengths and weaknesses of education as it occurs on and offline, in and outside of a classroom, is important. Best pedagogical practices have not yet emerged for courses primarily taught online. What opportunities and pitfalls await both on and offline learning environments? Under ideal circumstances, how might we best integrate face-to-face as well as online tools? In non-ideal teaching situations, how can we make the best of the on/offline arrangement handed to us? All of us teaching, and taking, college courses welcome this discussion. What isn’t helpful is condemning a medium of learning, be it face-to-face or via digital technologies, as less real. Some have begun this conversation by disqualifying interaction mediated by digitality (all interaction is, by the way) as less human, less true and less worthy, obscuring the path forward for the vast majority of future students.

This is exactly the problem with the op-ed in yesterday’s New York Times titled, “The Trouble With Online Education.more...

Documentary consciousness entails the ever-present sense of a looming future failure.

In Part I this essay, I considered the fact that we are always connected to digital social technologies, whether we are connecting through them or not. Because many companies collect what I call second-hand data (data about people other than those from whom the data is collected), whether we leave digital traces is not a decision we can make autonomously. The end result is that we cannot escape being connected to digital social technologies anymore than we can escape society itself.

In Part II, I examined two prevailing privacy discourses to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequalities and larger issues of power.

In this third and final installment, I consider one of the many impacts that follow from being inescapably connected in a society that still masks issues of power and inequality through conceptualizations of ‘privacy’ as an individual choice. I argue that the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term documentary consciousness, or the abstracted and internalized reproduction of others’ documentary vision. Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) “visibility is a trap.” I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies. more...

This is part of a series of posts highlighting the Theorizing the Web conference, April 14th, 2012 at the University of Maryland (inside the D.C. beltway). It was originally posted on 3.30.12 and was updated to include video on 7.19.12. See the conference website for

Presider: Kari Kraus (@karikraus)

Drawing on a diverse range of approaches–from media archaeology and ethnography to queer theory and critical code studies–the “Politics of Design” panel will collectively consider where and how power pools and collects in the designed, value-laden spaces of the internet. Individual panelists will take up digital networks and anonymity (Moesch); established and proposed internet architectures (Shilton and Neal); slick Web 2.0 and grungy “dirt style” interfaces (Kane); and the failed rhetoric of the digital sublime by the founders of Google and Second Life (Chia).  Not content to dwell on surface design features, each speaker unearths hidden variables–whether technological, social, or historical–that affect the systems, platforms, and communication structures under discussion. In the process, they expose the faultlines in those structures that allow us to envision them otherwise; the politics of design, that is to say, ultimately point–directly or indirectly–to alt-design and re-design.

Please join us on 4/14 for what promises to be a fabulous #TtW12 panel!

[Paper titles and abstracts are after the jump.] more...

The New York Times recently published a piece titled “At Times, Obama and His Cyberself Differ on Tactics” that opens with the passage:

For a moment on Friday, the cyber-Barack Obama was perfectly at odds with the flesh-and-blood version… Speaking to 1,400 supporters at a high school… President Obama voiced his familiar lament that “there is so much negativity and so much cynicism” in politics that he could understand if voters tuned out the election. Minutes earlier on Twitter, he had written, “Why Mitt Romney’s end date at his buyout firm matters,” linking to a blog post about the tempest over his Republican challenger’s departure from Bain Capital.

The article doesn’t really offer any deeper analysis of the topic raised in its headline, but the notion of this sort of technologically-mediated, or even, post-human, presidency is so provocative that it’s worth additional reflection. I can’t begin such a reflection, however, without first critiquing some of the vocabulary used in the article. The article contrasts “cyber-Barack Obama” (or Barack Obama’s “cyberself”) with “the flesh-and-blood version.” This problematically implies that there are two Barack Obamas: the real Obama and the Obama out there in cyberspace (cue creepy space music). Of course, once we even state such a claim, it becomes immediately apparent that it has zero face validity. Arguing that the Barack Obama who signs the messages he personally posts to Twitter with the initials “bo” is different than the Barack Obama out there giving the speeches makes about as much sense as arguing that when I call my mom on telephone, I’m talking to a different person than when I drive over for a visit. more...

Just some of my favorite quotes from what I read this past week on tech&society:

there’s blood dripped from fast-clouding retinas onto all of our computer chips

Why is it that, unlike buildings, old websites never have any prestige?

What is lost when we’re building a social Web that only caters to a select few options in the vast, vast catalog of human emotions?

society’s farcical inability to accept the fluidity of a new paradigm. A paradigm represented by technologies it is constantly told are disruptive and fractious

Do templated spaces of identity construction necessarily do violence to experience?

using social media the same way a rat in the maze “uses” the scientists to get cheese

 There is rarely any point speaking of [the Web] as if it was separate from the rest of the world – which is a cyberspace too

will [drones] deliver through technology the “post-gender world” Donna Haraway describes in her “Cyborg Manifesto”?

How does the documentation of my life change my experience of my present and my imagination of my future?

Our idea of “nature” owes something to the advance of technology

now the novelty isn’t being online, it’s being offline

Friendship’s path,” a 1937 AT&T ad declared, “often follows the trail of the telephone wire.

what’s the point of doing something awesome if you can’t brag about it online?

Kids don’t as deeply distinguish between online & offline bullying

anything that you see in the real world needs to be in our database

An Ashanti enstooling ceremony, recorded (and presumably shared) through cell phone cameras (marked).

The “digital divide” is a surprisingly durable concept. It has evolved through the years to describe a myriad of economic, social, and technical disparities at various scales across different socioeconomic demographics. Originally it described how people of lower socioeconomic status were unable to access digital networks as readily or easily as more privileged groups. This may have been true a decade ago, but that gap has gotten much smaller. Now authors are cooking up a “new digital divide” based on usage patterns. Forming and maintaining social networks and informal ties, an essential practices for those of limited means, is described as nothing more than shallow entertainment and a waste of time. The third kind of digital divide operates at a global scale; industrialized or “developed” nations have all the cool gadgets and the global south is devoid of all digital infrastructures (both social and technological). The artifacts of digital technology are not only absent, (so the myth goes) but the expertise necessary for fully utilizing these technologies is also nonexistent. Attempts at solving all three kinds of digital divides (especially the third one) usually take a deficit model approach.The deficit model assumes that there are “haves” and “have nots” of technology and expertise. The solution lies in directing more resources to the have nots, thereby remediating the digital disparity. While this is partially grounded in fact, and most attempts are very well-intended, the deficit model is largely wrong. Mobile phones (which are becoming more and more like mobile computers) have put the internet in the hands of millions of people who do not have access to a “full sized” computer. More importantly, computer science, new media literacy, and even the new aesthetic can be found throughout the world in contexts and arrangements that transcend or predate their western counterparts. Ghana is an excellent case study for challenging the common assumptions of technology’s relationship to culture (part 1) and problematizing the historical origins of computer science and the digital aesthetic (part 2). more...

This is part of a series of posts highlighting the Theorizing the Web conference, April 14th, 2012 at the University of Maryland (inside the D.C. beltway). It was originally posted on 4.2.12 and was updated to include video on 7.11.12. See the conference website for

Any study of politics is going to be fundamentally about power, and about who is free to exercise it and how: How policy is made, how the public sphere is constituted and how boundary lines are drawn around it, who has a voice and who is excluded from

Presider: Sarah Wanenchak

discussion or consideration, who is central and who is marginalized. By the same token, the study of contentious politics – as it focuses on dissent and protest – is fundamentally about how those who have been marginalized, denied a voice, and left without power act to seize the things that have been denied them: How activist communities form and frame themselves, how their objectives and tactics change over time, how they seek entry into the public sphere and engage the actors they find there, how the voiceless find a voice and what they use it to say. Moreover, it’s about what is visible and recognized: How we understand political action in light of what’s gone before and what might come in the future.

All of this would be complex enough without communications technology, and what this panel highlights is how technology changes and enriches this already-complicated picture. Communications technology has the potential to change what we understand by “public sphere” and how we construct meanings around events, as well as how different collective actors organize and react to each other. If knowledge and information are vital to the development of a social movement, then understanding how knowledge and information flow is additionally vital.

Given recent and ongoing global protest movements, the intersection of technology and protest is a subject both broad and deep. Rather than attempt to capture all aspects of it, the excellent papers in this panel call attention to more tightly focused corners of the political picture, and in so doing, illuminate further potential avenues for research and exploration. Additionally, the geographical and cultural focus of this panel is truly diverse, allowing us to push back a bit against the American-and-Eurocentric bias that appears too often in research of this kind.

Titles and abstracts are after the cut.

more...

Just some of my favorite quotes from what I read this past week on tech&society:

The appeal of TED comes as much from its presentation as from its substance

Just because the picture looks artsy doesn’t mean you are

consuming & owning the present moment has become more important than capturing an experience

many-to-many communication is becoming impossible without a for-profit many-to-one infrastructure

one of the first names considered for the iPhone was actually “iPad

Scholars tend not to think about writing sentences that will make readers throw panties or send flowers

computational social science may make surveillance, profiling, and targeting overly accessible

FB eager to make “connection” an addictive substance, make it instrumental, gratifying, mood regulating rather than given of consciousness

I never really felt safe on Facebook

Image by Sam Michel

This is a slight tonal change from what I normally write; given that it’s now topping a hundred degrees in the shade, this post is much more casually reflexive and much less overtly theoretical than usual.

People keep trying to add me on Facebook. This raises some interesting issues. Most of them have to do with the fact that I’m not on Facebook.

more...