{"id":15110,"date":"2013-04-04T09:36:04","date_gmt":"2013-04-04T13:36:04","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=15110"},"modified":"2013-04-04T09:36:04","modified_gmt":"2013-04-04T13:36:04","slug":"a-request-for-methods-studying-the-development-of-software","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2013\/04\/04\/a-request-for-methods-studying-the-development-of-software\/","title":{"rendered":"A Request for Methods: Studying the Development of Software"},"content":{"rendered":"<figure id=\"attachment_15111\" aria-describedby=\"caption-attachment-15111\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-15111\" alt=\"IBM\u2019s SAGE, a large semi-automated air defense system from the Cold War era. C\/o Wikimedia Commons\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/04\/512px-IBMs_10_Billion_Machine-400x263.jpg\" width=\"400\" height=\"263\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/04\/512px-IBMs_10_Billion_Machine-400x263.jpg 400w, https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/04\/512px-IBMs_10_Billion_Machine-250x164.jpg 250w, https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/04\/512px-IBMs_10_Billion_Machine-500x329.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/04\/512px-IBMs_10_Billion_Machine.jpg 512w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-15111\" class=\"wp-caption-text\">IBM\u2019s SAGE, a large semi-automated air defense system from the Cold War era. <a href=\"http:\/\/commons.wikimedia.org\/wiki\/File:IBM%27s_$10_Billion_Machine.jpg\">C\/o Wikimedia Commons<\/a><\/figcaption><\/figure>\n<p>I just left my department\u2019s colloquium lecture series where <a href=\"http:\/\/www.albany.edu\/womensstudies\/fac-eubanksv.shtml\">Dr. Virginia Eubanks<\/a> from SUNY- Albany was giving an excellent talk on the computer systems that administer and control (to varying degrees) earned benefits programs like social security, Medicaid, and Medicare. The talk was really fascinating and a question from <a href=\"http:\/\/www.sts.rpi.edu\/pl\/faculty\/abby-kinchy\">Dr. Abby Kinchy<\/a>\u00a0during the Q&amp;A really stuck with me: How do we study different (and often long-outdated) versions of software? Particularly, how do we chart the design of software that runs on huge closed networks owned by large companies or governments? Are these decisions lost to history, or are there methods for ferreting out <a href=\"http:\/\/en.wikipedia.org\/wiki\/Ross_Perot#Business\">Ross Perot\u2019s old wares<\/a>?<!--more--><\/p>\n<p>In open source projects and free software there are plenty of ways of charting version histories and <a href=\"http:\/\/en.wikipedia.org\/wiki\/Fork_(software_development)\">forks<\/a>. The code is out in the open and is typically posted to <a href=\"https:\/\/github.com\/\">Github<\/a> or a server running <a href=\"http:\/\/subversion.apache.org\/\">Subversion<\/a>. There is a small but growing collection of <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/12\/31\/book-review-coding-freedom-the-ethics-and-aesthetics-of-hacking\/\">ethnographies of open source and free software communities<\/a> that outline the design decisions and politics of horizontally organized development projects. What is missing \u2013and I don\u2019t know how to go about filling this gap\u2014is thick descriptions of <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/02\/17\/watson-the-benevolent-boy-king-of-the-future\/\">IBM enterprise suites<\/a> and server-side management software.<\/p>\n<p>Corporate software is a \u201chard case\u201d because there are dozens of institutional, legal, and technological barriers to software revision documentation. Hard cases are topics that typically \u201cresist\u201d ethnographic research. Typically because they are so normal, objective, or elite that they are considered \u201cbeyond\u201d or outside of cultural critique or ethnographic investigation. Other examples of hard cases include mathematics, corporate boardrooms, and the federal government. There\u2019s some great literature on all of these topics, but it is\u00a0minuscule\u00a0in comparison to \u201csofter\u201d subjects like kinship or social movements.<\/p>\n<p>Another way to describe this research is \u201cstudying up.\u201d That is, studying the elite and powerful. No one except the decision makers and their superiors have physical, virtual, and\/or legal access to documents, code, or any other definitive text. Even if a researcher were to gain access to the documents, there is no guarantee that they would make sense to an outside observer. Proprietary systems are closely tied to the expertise that makes and administers them. In other words, you cannot understand the technical system without convincing someone that programmed the thing to talk to you. Access to these systems and people are made difficult by an array of barriers \u2013guard gates and busy schedules just to name two common ones\u2014 that shield elites from unwanted attention. Studying up is extremely difficult but well worth the effort. As Laura Nader writes: \u201c\u2026our findings have often served to help manipulate rather than aid those we study.\u201d\u00a0She goes on to write:\u00a0\u201cWe cannot, as responsible scientists, educate \u2018managers\u2019 without educating those \u2018being managed.\u201d \u00a0<strong>In order to bring about an egalitarian society, social scientists must help reveal the inner workings of elite institutions.<\/strong><\/p>\n<p>I wouldn\u2019t go so far as to say these systems <i>control<\/i> everyone\u2019s lives, but they do control some, and influence many others\u2019 day-to-day lives. This kind of research is important because knowing what affordances and priorities are built into these systems tells us a lot about our technologically augmented society: Who should control what? What should be more efficiently administered? What does efficiency look like? What should be delegated to software and what is better accomplished by humans? Even if you\u2019re not on welfare or food stamps you\u2019re still going to the DMV, using a customer loyalty card, walking through TSA checkpoints, and relying on the myriad of networks run by insurance companies, credit agencies, and any employer with more than a few dozen employees.<\/p>\n<p>What tools do social scientists need to study enterprise software? <a href=\"http:\/\/homepages.rpi.edu\/~eglash\/eglash.htm\">Dr. Ron Eglash<\/a>, in that same colloquium Q&amp;A suggested that interviewing retired engineers was extremely useful in his research on the widely used<a href=\"http:\/\/courseweb.lis.illinois.edu\/~katewill\/fall2009-lis590co\/eglash%202007%20broken%20metaphor.pdf\"> master\/slave engineering metaphor<\/a> [PDF]. Indeed, countless journal articles could be written from the contents of dusty attics and office basements.That might be a start, but it doesn\u2019t let us see current iterations of software, nor does it give us the kind of fine-grained detail that we get from free software projects.<\/p>\n<p>Consider this a Call for Methods. <strong>What can we, as social scientists interested in science and technology, do to illuminate this dark and unknown world of corporate software?<\/strong> How do we get at the hard cases that control or influence everyday life? What would it take to get our hands on the design decisions and product development for child protective services? How many other government systems use open source components like the Veteran\u2019s Adminstration\u2019s VistA system? Do widely used open source components provide a starting point for analysis, or are the more interesting cases when there are no open source components? I can\u2019t wait to hear what you all come up with.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What can we, as social scientists interested in science and technology, do to illuminate this dark and unknown world of corporate software?<\/p>\n","protected":false},"author":1512,"featured_media":15111,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[18447,12835,19787,884,139,2913,12665,45,747,12],"class_list":["post-15110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commentary","tag-affordances","tag-augmented-society","tag-free-software","tag-ibm","tag-institutions","tag-iq","tag-objective","tag-social-movements","tag-sts","tag-technology"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/04\/512px-IBMs_10_Billion_Machine.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/15110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1512"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=15110"}],"version-history":[{"count":3,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/15110\/revisions"}],"predecessor-version":[{"id":15114,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/15110\/revisions\/15114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media\/15111"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=15110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=15110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=15110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}