Adema
The Ethics of Emergent Creativity: Can We Move Beyond Writing as Human Enterprise, Commodity and Innovation?
2019


# 3\. The Ethics of Emergent Creativity: Can We Move Beyond Writing as Human
Enterprise, Commodity and Innovation?

Janneke Adema

© 2019 Janneke Adema, CC BY 4.0
[https://doi.org/10.11647/OBP.0159.03](https://doi.org/10.11647/OBP.0159.03)

In 2013, the Authors’ Licensing & Collecting Society
(ALCS)[1](ch3.xhtml#footnote-152) commissioned a survey of its members to
explore writers’ earnings and contractual issues in the UK. The survey, the
results of which were published in the summary booklet ‘What Are Words Worth
Now?’, was carried out by Queen Mary, University of London. Almost 2,500
writers — from literary authors to academics and screenwriters — responded.
‘What Are Words Worth Now?’ summarises the findings of a larger study titled
‘The Business Of Being An Author: A Survey Of Authors’ Earnings And
Contracts’, carried out by Johanna Gibson, Phillip Johnson and Gaetano Dimita
and published in April 2015 by Queen Mary University of
London.[2](ch3.xhtml#footnote-151) The ALCS press release that accompanies the
study states that this ‘shocking’ new research into authors’ earnings finds a
‘dramatic fall, both in incomes, and the number of those working full-time as
writers’.[3](ch3.xhtml#footnote-150) Indeed, two of the main findings of the
study are that, first of all, the income of a professional author (which the
research defines as those who dedicate the majority of their time to writing)
has dropped 29% between 2005 and 2013, from £12,330 (£15,450 in real terms) to
just £11,000. Furthermore, the research found that in 2005 40% of professional
authors earned their incomes solely from writing, where in 2013 this figure
had dropped to just 11.5%.[4](ch3.xhtml#footnote-149)

It seems that one of the primary reasons for the ALCS to conduct this survey
was to collect ‘accurate, independent data’ on writers’ earnings and
contractual issues, in order for the ALCS to ‘make the case for authors’
rights’ — at least, that is what the ALCS Chief Executive Owen Atkinson writes
in the introduction accompanying the survey, which was sent out to all ALCS
members.[5](ch3.xhtml#footnote-148) Yet although this research was conducted
independently and the researchers did not draw conclusions based on the data
collected — in the form of policy recommendations for example — the ALCS did
frame the data and findings in a very specific way, as I will outline in what
follows; this framing includes both the introduction to the survey and the
press release that accompanies the survey’s findings. Yet to some extent this
framing, as I will argue, is already apparent in the methodology used to
produce the data underlying the research report.

First of all, let me provide an example of how the research findings have been
framed in a specific way. Chief Executive Atkinson mentions in his
introduction to the survey that the ALCS ‘exists to ensure that writers are
treated fairly and remunerated appropriately’. He continues that the ALCS
commissioned the survey to collect ‘accurate, independent data,’ in order to
‘make the case for writers’ rights’.[6](ch3.xhtml#footnote-147) Now this focus
on rights in combination with remuneration is all the more noteworthy if we
look at an earlier ALCS funded report from 2007, ‘Authors’ Earnings from
Copyright and Non-Copyright Sources: a Survey of 25,000 British and German
Writers’. This report is based on the findings of a 2006 writers’ survey,
which the 2013 survey updates. The 2007 report argues conclusively that
current copyright law has empirically failed to ensure that authors receive
appropriate reward or remuneration for the use of their
work.[7](ch3.xhtml#footnote-146) The data from the subsequent 2013 survey show
an even bleaker picture as regards the earnings of writers. Yet Atkinson
argues in the press release accompanying the findings of the 2013 survey that
‘if writers are to continue making their irreplaceable contribution to the UK
economy, they need to be paid fairly for their work. This means ensuring
clear, fair contracts with equitable terms and a copyright regime that support
creators and their ability to earn a living from their
creations’.[8](ch3.xhtml#footnote-145) Atkinson does not outline what this
copyright regime should be, nor does he draw attention to how this model could
be improved. More importantly, the fact that a copyright model is needed to
ensure fair pay stands uncontested for Atkinson and the ALCS — not surprising
perhaps, as protecting and promoting the rights of authors is the primary
mission of this member society. If there is any culprit to be held responsible
for the study’s ‘shocking’ findings, it is the elusive and further undefined
notion of ‘the digital’. According to Atkinson, digital technology is
increasingly challenging the mission of the ALCS to ensure fair remuneration
for writers, since it is ‘driving new markets and leading the copyright
debate’.[9](ch3.xhtml#footnote-144) The 2013 study is therefore, as Atkinson
states ‘the first to capture the impact of the digital revolution on writers’
working lives’.[10](ch3.xhtml#footnote-143) This statement is all the more
striking if we take into consideration that none of the questions in the 2013
survey focus specifically on digital publishing.[11](ch3.xhtml#footnote-142)
It therefore seems that — despite earlier findings — the ALCS has already
decided in advance what ‘the digital’ is and that a copyright regime is the
only way to ensure fair remuneration for writers in a digital context.

## Creative Industries

This strong uncontested link between copyright and remuneration can be traced
back to various other aspects of the 2015 report and its release. For example,
the press release draws a strong connection between the findings of the report
and the development of the creative industries in the UK. Again, Atkinson
states in the press release:

These are concerning times for writers. This rapid decline in both author
incomes and in the numbers of those writing full-time could have serious
implications for the economic success of the creative industries in the
UK.[12](ch3.xhtml#footnote-141)

This connection to the creative industries — ‘which are now worth £71.4
billion per year to the UK economy’,[13](ch3.xhtml#footnote-140) Atkinson
points out — is not surprising where the discourse around creative industries
maintains a clear bond between intellectual property rights and creative
labour. As Geert Lovink and Ned Rossiter state in their MyCreativity Reader,
the creative industries consist of ‘the generation and exploitation of
intellectual property’.[14](ch3.xhtml#footnote-139) Here they refer to a
definition created as part of the UK Government’s Creative Industries Mapping
Document,[15](ch3.xhtml#footnote-138) which states that the creative
industries are ‘those industries which have their origin in individual
creativity, skill and talent and which have a potential for wealth and job
creation through the generation and exploitation of intellectual property’.
Lovink and Rossiter point out that the relationship between IP and creative
labour lies at the basis of the definition of the creative industries where,
as they argue, this model of creativity assumes people only create to produce
economic value. This is part of a larger trend Wendy Brown has described as
being quintessentially neoliberal, where ‘neoliberal rationality disseminates
the model of the market to all domains and activities’ — and this includes the
realm of politics and rights.[16](ch3.xhtml#footnote-137) In this sense the
economization of culture and the concept of creativity is something that has
become increasingly embedded and naturalised. The exploitation of intellectual
property stands at the basis of the creative industries model, in which
cultural value — which can be seen as intricate, complex and manifold —
becomes subordinated to the model of the market; it becomes economic
value.[17](ch3.xhtml#footnote-136)

This direct association of cultural value and creativity with economic value
is apparent in various other facets of the ALCS commissioned research and
report. Obviously, the title of the initial summary booklet, as a form of
wordplay, asks ‘What are words worth?’. It becomes clear from the context of
the survey that the ‘worth’ of words will only be measured in a monetary
sense, i.e. as economic value. Perhaps even more important to understand in
this context, however, is how this economic worth of words is measured and
determined by focusing on two fixed and predetermined entities in advance.
First of all, the study focuses on individual human agents of creativity (i.e.
creators contributing economic value): the value of writing is established by
collecting data and making measurements at the level of individual authorship,
addressing authors/writers as singular individuals throughout the survey.
Secondly, economic worth is further determined by focusing on the fixed and
stable creative objects authors produce, in other words the study establishes
from the outset a clear link between the worth and value of writing and
economic remuneration based on individual works of
writing.[18](ch3.xhtml#footnote-135) Therefore in this process of determining
the economic worth of words, ‘writers’ and/or ‘authors’ are described and
positioned in a certain way in this study (i.e. as the central agents and
originators of creative objects), as is the form their creativity takes in the
shape of quantifiable outputs or commodities. The value of both these units of
measurement (the creator and the creative objects) are then set off against
the growth of the creative industries in the press release.

The ALCS commissioned survey provides some important insights into how
authorship, cultural works and remuneration — and ultimately, creativity — is
currently valued, specifically in the context of the creative industries
discourse in the UK. What I have tried to point out — without wanting to
downplay the importance either of writers receiving fair remuneration for
their work or of issues related to the sustainability of creative processes —
is that the findings from this survey have both been extracted and
subsequently framed based on a very specific economic model of creativity (and
authorship). According to this model, writing and creativity are sustained
most clearly by an individual original creator (an author) who extracts value
from the work s/he creates and distributes, aided by an intellectual property
rights regime. As I will outline more in depth in what follows, the enduring
liberal and humanist presumptions that underlie this survey continuously
reinforce the links between the value of writing and established IP and
remuneration regimes, and support a vision in which authorship and creativity
are dependent on economic incentives and ownership of works. By working within
this framework and with these predetermined concepts of authorship and
creativity (and ‘the digital’) the ALCS is strongly committed to the upkeep of
a specific model and discourse of creativity connected to the creative
industries. The ALCS does not attempt to complicate this model, nor does it
search for alternatives even when, as the 2007 report already implies, the
existing IP model has empirically failed to support the remuneration of
writers appropriately.

I want to use this ALCS survey as a reference point to start problematising
existing constructions of creativity, authorship, ownership, and
sustainability in relation to the ethics of publishing. To explore what ‘words
are worth’ and to challenge the hegemonic liberal humanist model of creativity
— to which the ALCS adheres — I will examine a selection of theoretical and
practical publishing and writing alternatives, from relational and posthuman
authorship to radical open access and uncreative writing. These alternatives
do not deny the importance of fair remuneration and sustainability for the
creative process; however, they want to foreground and explore creative
relationalities that move beyond the individual author and her ownership of
creative objects as the only model to support creativity and cultural
exchange. By looking at alternatives while at the same time complicating the
values and assumptions underlying the dominant narrative for IP expansion, I
want to start imagining what more ethical, fair and emergent forms of
creativity might entail. Forms that take into consideration the various
distributed and entangled agencies involved in the creation of cultural
content — which are presently not being included in the ALCS survey on fair
remuneration, for example. As I will argue, a reconsideration of the liberal
and humanist model of creativity might actually create new possibilities to
consider the value of words, and with that perhaps new solutions to the
problems pointed out in the ALCS study.

## Relational and Distributed Authorship

One of the main critiques of the liberal humanist model of authorship concerns
how it privileges the author as the sole source and origin of creativity. Yet
the argument has been made, both from a historical perspective and in relation
to today’s networked digital environment, that authorship and creativity, and
with that the value and worth of that creativity, are heavily
distributed.[19](ch3.xhtml#footnote-134) Should we therefore think about how
we can distribute notions of authorship and creativity more ethically when
defining the worth and value of words too? Would this perhaps mean a more
thorough investigation of what and who the specific agencies involved in
creative production are? This seems all the more important given that, today,
‘the value of words’ is arguably connected not to (distributed) authors or
creative agencies, but to rights holders (or their intermediaries such as
agents).[20](ch3.xhtml#footnote-133) From this perspective, the problem with
the copyright model as it currently functions is that the creators of
copyright don’t necessarily end up benefiting from it — a point that was also
implied by the authors of the 2007 ALCS commissioned report. Copyright
benefits rights holders, and rights holders are not necessarily, and often not
at all, involved in the production of creative work.

Yet copyright and the work as object are knit tightly to the authorship
construct. In this respect, the above criticism notwithstanding, in a liberal
vision of creativity and ownership the typical unit remains either the author
or the work. This ‘solid and fundamental unit of the author and the work’ as
Foucault has qualified it, albeit challenged, still retains a privileged
position.[21](ch3.xhtml#footnote-132) As Mark Rose argues, authorship — as a
relatively recent cultural formation — can be directly connected to the
commodification of writing and to proprietorship. Even more it developed in
tandem with the societal principle of possessive individualism, in which
individual property rights are protected by the social
order.[22](ch3.xhtml#footnote-131)

Some of the more interesting recent critiques of these constructs of
authorship and proprietorship have come from critical and feminist legal
studies, where scholars such as Carys Craig have started to question these
connections further. As Craig, Turcotte and Coombe argue, IP and copyright are
premised on liberal and neoliberal assumptions and constructs, such as
ownership, private rights, self-interest and
individualism.[23](ch3.xhtml#footnote-130) In this sense copyright,
authorship, the work as object, and related discourses around creativity
continuously re-establish and strengthen each other as part of a self-
sustaining system. We have seen this with the discourse around creative
industries, as part of which economic value comes to stand in for the creative
process itself, which, according to this narrative, can only be sustained
through an IP regime. Furthermore, from a feminist new materialist position,
the current discourse on creativity is very much a material expression of
creativity rather than merely its representation, where this discourse has
been classifying, constructing, and situating creativity (and with that,
authorship) within a neoliberal framework of creative industries.

Moving away from an individual construct of creativity therefore immediately
affects the question of the value of words. In our current copyright model
emphasis lies on the individual original author, but in a more distributed
vision the value of words and of creative production can be connected to a
broader context of creative agencies. Historically there has been a great
discursive shift from a valuing of imitation or derivation to a valuing of
originality in determining what counts as creativity or creative output.
Similar to Rose, Craig, Turcotte and Coombe argue that the individuality and
originality of authorship in its modern form established a simple route
towards individual ownership and the propertisation of creative achievement:
the original work is the author’s ownership whereas the imitator or pirate is
a trespasser of thief. In this sense original authorship is
‘disproportionately valued against other forms of cultural expression and
creative play’, where copyright upholds, maintains and strengthens the binary
between imitator and creator — defined by Craig, Turcotte and Coombe as a
‘moral divide’.[24](ch3.xhtml#footnote-129) This also presupposes a notion of
creativity that sees individuals as autonomous, living in isolation from each
other, ignoring their relationality. Yet as Craig, Turcotte and Coombe argue,
‘the act of writing involves not origination, but rather the adaptation,
derivation, translation and recombination of “raw material” taken from
previously existing texts’.[25](ch3.xhtml#footnote-128) This position has also
been explored extensively from within remix studies and fan culture, where the
adaptation and remixing of cultural content stands at the basis of creativity
(what Lawrence Lessig has called Read/Write culture, opposed to Read/Only
culture).[26](ch3.xhtml#footnote-127) From the perspective of access to
culture — instead of ownership of cultural goods or objects — one could also
argue that its value would increase when we are able to freely distribute it
and with that to adapt and remix it to create new cultural content and with
that cultural and social value — this within a context in which, as Craig,
Turcotte and Coombe point out, ‘the continuous expansion of intellectual
property rights has produced legal regimes that restrict access and downstream
use of information resources far beyond what is required to encourage their
creation’[27](ch3.xhtml#footnote-126)

To move beyond Enlightenment ideals of individuation, detachment and unity of
author and work, which determine the author-owner in the copyright model,
Craig puts forward a post-structuralist vision of relational authorship. This
sees the individual as socially situated and constituted — based also on
feminist scholarship into the socially situated self — where authorship in
this vision is situated within the communities in which it exists, but also in
relation to the texts and discourses that constitute it. Here creativity takes
place from within a network of social relations and the social dimensions of
authorship are recognised, as connectivity goes hand in hand with individual
autonomy. Craig argues that copyright should not be defined out of clashing
rights and interests but should instead focus on the kinds of relationships
this right would structure; it should be understood in relational terms: ‘it
structures relationships between authors and users, allocating powers and
responsibilities amongst members of cultural communities, and establishing the
rules of communication and exchange’.[28](ch3.xhtml#footnote-125) Cultural
value is then defined within these relationships.

## Open Access and the Ethics of Care

Craig, Turcotte and Coombe draw a clear connection between relational
authorship, feminism and (the ideals of) the open access movement, where as
they state, ‘rather than adhering to the individuated form of authorship that
intellectual property laws presuppose, open access initiatives take into
account varying forms of collaboration, creativity and
development’.[29](ch3.xhtml#footnote-124) Yet as I and others have argued
elsewhere,[30](ch3.xhtml#footnote-123) open access or open access publishing
is not a solid ideological block or model; it is made up of disparate groups,
visions and ethics. In this sense there is nothing intrinsically political or
democratic about open access, practitioners of open access can just as well be
seen to support and encourage open access in connection with the neoliberal
knowledge economy, with possessive individualism — even with CC licenses,
which can be seen as strengthening individualism —[31](ch3.xhtml#footnote-122)
and with the unity of author and work.[32](ch3.xhtml#footnote-121)

Nevertheless, there are those within the loosely defined and connected
‘radical open access community’, that do envision their publishing outlook and
relationship towards copyright, openness and authorship within and as part of
a relational ethics of care.[33](ch3.xhtml#footnote-120) For example Mattering
Press, a scholar-led open access book publishing initiative founded in 2012
and launched in 2016, publishes in the field of Science and Technology Studies
(STS) and works with a production model based on cooperation and shared
scholarship. As part of its publishing politics, ethos and ideology, Mattering
Press is therefore keen to include various agencies involved in the production
of scholarship, including ‘authors, reviewers, editors, copy editors, proof
readers, typesetters, distributers, designers, web developers and
readers’.[34](ch3.xhtml#footnote-119) They work with two interrelated feminist
(new materialist) and STS concepts to structure and perform this ethos:
mattering[35](ch3.xhtml#footnote-118) and care.[36](ch3.xhtml#footnote-117)
Where it concerns mattering, Mattering Press is conscious of how their
experiment in knowledge production, being inherently situated, puts new
relationships and configurations into the world. What therefore matters for
them are not so much the ‘author’ or the ‘outcome’ (the object), but the
process and the relationships that make up publishing:

[…] the way academic texts are produced matters — both analytically and
politically. Dominant publishing practices work with assumptions about the
conditions of academic knowledge production that rarely reflect what goes on
in laboratories, field sites, university offices, libraries, and various
workshops and conferences. They tend to deal with almost complete manuscripts
and a small number of authors, who are greatly dependent on the politics of
the publishing industry.[37](ch3.xhtml#footnote-116)

For Mattering Press care is something that extends not only to authors but to
the many other actants involved in knowledge production, who often provide
free volunteer labour within a gift economy context. As Mattering Press
emphasises, the ethics of care ‘mark vital relations and practices whose value
cannot be calculated and thus often goes unacknowledged where logics of
calculation are dominant’.[38](ch3.xhtml#footnote-115) For Mattering Press,
care can help offset and engage with the calculative logic that permeates
academic publishing:

[…] the concept of care can help to engage with calculative logics, such as
those of costs, without granting them dominance. How do we calculate so that
calculations do not dominate our considerations? What would it be to care for
rather than to calculate the cost of a book? This is but one and arguably a
relatively conservative strategy for allowing other logics than those of
calculation to take centre stage in publishing.[39](ch3.xhtml#footnote-114)

This logic of care refers, in part, to making visible the ‘unseen others’ as
Joe Deville (one of Mattering Press’s editors) calls them, who exemplify the
plethora of hidden labour that goes unnoticed within this object and author-
focused (academic) publishing model. As Endre Danyi, another Mattering Press
editor, remarks, quoting Susan Leigh Star: ‘This is, in the end, a profoundly
political process, since so many forms of social control rely on the erasure
or silencing of various workers, on deleting their work from representations
of the work’.[40](ch3.xhtml#footnote-113)

## Posthuman Authorship

Authorship is also being reconsidered as a polyvocal and collaborative
endeavour by reflecting on the agentic role of technology in authoring
content. Within digital literature, hypertext and computer-generated poetry,
media studies scholars have explored the role played by technology and the
materiality of text in the creation process, where in many ways writing can be
seen as a shared act between reader, writer and computer. Lori Emerson
emphasises that machines, media or technology are not neutral in this respect,
which complicates the idea of human subjectivity. Emerson explores this
through the notion of ‘cyborg authorship’, which examines the relation between
machine and human with a focus on the potentiality of in-
betweenness.[41](ch3.xhtml#footnote-112) Dani Spinosa talks about
‘collaboration with an external force (the computer, MacProse, technology in
general)’.[42](ch3.xhtml#footnote-111) Extending from the author, the text
itself, and the reader as meaning-writer (and hence playing a part in the
author function), technology, she states, is a fourth term in this
collaborative meaning-making. As Spinosa argues, in computer-generated texts
the computer is more than a technological tool and becomes a co-producer,
where it can occur that ‘the poet herself merges with the machine in order to
place her own subjectivity in flux’.[43](ch3.xhtml#footnote-110) Emerson calls
this a ‘break from the model of the poet/writer as divinely inspired human
exemplar’, which is exemplified for her in hypertext, computer-generated
poetry, and digital poetry.[44](ch3.xhtml#footnote-109)

Yet in many ways, as Emerson and Spinosa also note, these forms of posthuman
authorship should be seen as part of a larger trend, what Rolf Hughes calls an
‘anti-authorship’ tradition focused on auto-poesis (self-making), generative
systems and automatic writing. As Hughes argues, we see this tradition in
print forms such as Oulipo and in Dada experiments and surrealist games
too.[45](ch3.xhtml#footnote-108) But there are connections here with broader
theories that focus on distributed agency too, especially where it concerns
the influence of the materiality of the text. Media theorists such as N.
Katherine Hayles and Johanna Drucker have extensively argued that the
materiality of the page is entangled with the intentionality of the author as
a further agency; Drucker conceptualises this through a focus on ‘conditional
texts’ and ‘performative materiality’ with respect to the agency of the
material medium (be it the printed page or the digital
screen).[46](ch3.xhtml#footnote-107)

Where, however, does the redistribution of value creation end in these
narratives? As Nick Montfort states with respect to the agency of technology,
‘should other important and inspirational mechanisms — my CD player, for
instance, and my bookshelves — get cut in on the action as
well?’[47](ch3.xhtml#footnote-106) These distributed forms of authorship do
not solve issues related to authorship or remuneration but further complicate
them. Nevertheless Montfort is interested in describing the processes involved
in these types of (posthuman) co-authorship, to explore the (previously
unexplored) relationships and processes involved in the authoring of texts
more clearly. As he states, this ‘can help us understand the role of the
different participants more fully’.[48](ch3.xhtml#footnote-105) In this
respect a focus on posthuman authorship and on the various distributed
agencies that play a part in creative processes is not only a means to disrupt
the hegemonic focus on a romantic single and original authorship model, but it
is also about a sensibility to (machinic) co-authorship, to the different
agencies involved in the creation of art, and playing a role in creativity
itself. As Emerson remarks in this respect: ‘we must be wary of granting a
(romantic) specialness to human intentionality — after all, the point of
dividing the responsibility for the creation of the poems between human and
machine is to disrupt the singularity of human identity, to force human
identity to intermingle with machine identity’.[49](ch3.xhtml#footnote-104)

## Emergent Creativity

This more relational notion of rights and the wider appreciation of the
various (posthuman) agencies involved in creative processes based on an ethics
of care, challenges the vision of the single individualised and original
author/owner who stands at the basis of our copyright and IP regime — a vision
that, it is worth emphasising, can be seen as a historical (and Western)
anomaly, where collaborative, anonymous, and more polyvocal models of
authorship have historically prevailed.[50](ch3.xhtml#footnote-103) The other
side of the Foucauldian double bind, i.e. the fixed cultural object that
functions as a commodity, has however been similarly critiqued from several
angles. As stated before, and as also apparent from the way the ALCS report
has been framed, currently our copyright and remuneration regime is based on
ownership of cultural objects. Yet as many have already made clear, this
regime and discourse is very much based on physical objects and on a print-
based context.[51](ch3.xhtml#footnote-102) As such the idea of ‘text’ (be it
print or digital) has not been sufficiently problematised as versioned,
processual and materially changing within an IP context. In other words, text
and works are mostly perceived as fixed and stable objects and commodities
instead of material and creative processes and entangled relationalities. As
Craig et al. state, ‘the copyright system is unfortunately employed to
reinforce the norms of the analog world’.[52](ch3.xhtml#footnote-101) In
contrast to a more relational perspective, the current copyright regime views
culture through a proprietary lens. And it is very much this discursive
positioning, or as Craig et al. argue ‘the language of “ownership,”
“property,” and “commodity”’, which ‘obfuscates the nature of copyright’s
subject matter, and cloaks the social and cultural conditions of its
production and the implications of its
protection’.[53](ch3.xhtml#footnote-100) How can we approach creativity in
context, as socially and culturally situated, and not as the free-standing,
stable product of a transcendent author, which is very much how it is being
positioned within an economic and copyright framework? This hegemonic
conception of creativity as property fails to acknowledge or take into
consideration the manifold, distributed, derivative and messy realities of
culture and creativity.

It is therefore important to put forward and promote another more emergent
vision of creativity, where creativity is seen as both processual and only
ever temporarily fixed, and where the work itself is seen as being the product
of a variety of (posthuman) agencies. Interestingly, someone who has written
very elaborately about a different form of creativity relevant to this context
is one of the authors of the ALCS commissioned report, Johanna Gibson. Similar
to Craig, who focuses on the relationality of copyright, Gibson wants to pay
more attention to the networking of creativity, moving it beyond a focus on
traditional models of producers and consumers in exchange for a ‘many-to-many’
model of creativity. For Gibson, IP as a system aligns with a corporate model
of creativity, one which oversimplifies what it means to be creative and
measures it against economic parameters alone.[54](ch3.xhtml#footnote-099) In
many ways in policy driven visions, IP has come to stand in for the creative
process itself, Gibson argues, and is assimilated within corporate models of
innovation. It has thus become a synonym for creativity, as we have seen in
the creative industries discourse. As Gibson explains, this simplified model
of creativity is very much a ‘discursive strategy’ in which the creator is
mythologised and output comes in the form of commodified
objects.[55](ch3.xhtml#footnote-098) In this sense we need to re-appropriate
creativity as an inherently fluid and uncertain concept and practice.

Yet this mimicry of creativity by IP and innovation at the same time means
that any re-appropriation of creativity from the stance of access and reuse is
targeted as anti-IP and thus as standing outside of formal creativity. Other,
more emergent forms of creativity have trouble existing within this self-
defining and sustaining hegemonic system. This is similar to what Craig
remarked with respect to remixed, counterfeit and pirated, and un-original
works, which are seen as standing outside the system. Gibson uses actor
network theory (ANT) as a framework to construct her network-based model of
creativity, where for her ANT allows for a vision that does not fix creativity
within a product, but focuses more on the material relationships and
interactions between users and producers. In this sense, she argues, a network
model allows for plural agencies to be attributed to creativity, including
those of users.[56](ch3.xhtml#footnote-097)

An interesting example of how the hegemonic object-based discourse of
creativity can be re-appropriated comes from the conceptual poet Kenneth
Goldsmith, who, in what could be seen as a direct response to this dominant
narrative, tries to emphasise that exactly what this discourse classifies as
‘uncreative’, should be seen as valuable in itself. Goldsmith points out that
appropriating is creative and that he uses it as a pedagogical method in his
classes on ‘Uncreative Writing’ (which he defines as ‘the art of managing
information and representing it as writing’[57](ch3.xhtml#footnote-096)). Here
‘uncreative writing’ is something to strive for and stealing, copying, and
patchwriting are elevated as important and valuable tools for writing. For
Goldsmith the digital environment has fostered new skills and notions of
writing beyond the print-based concepts of originality and authorship: next to
copying, editing, reusing and remixing texts, the management and manipulation
of information becomes an essential aspect of
creativity.[58](ch3.xhtml#footnote-095) Uncreative writing involves a
repurposing and appropriation of existing texts and works, which then become
materials or building blocks for further works. In this sense Goldsmith
critiques the idea of texts or works as being fixed when asking, ‘if artefacts
are always in flux, when is a historical work determined to be
“finished”?’[59](ch3.xhtml#footnote-094) At the same time, he argues, our
identities are also in flux and ever shifting, turning creative writing into a
post-identity literature.[60](ch3.xhtml#footnote-093) Machines play important
roles in uncreative writing, as active agents in the ‘managing of
information’, which is then again represented as writing, and is seen by
Goldsmith as a bridge between human-centred writing and full-blown
‘robopoetics’ (literature written by machines, for machines). Yet Goldsmith is
keen to emphasise that these forms of uncreative writing are not beholden to
the digital medium, and that pre-digital examples are plentiful in conceptual
literature and poetry. He points out — again by a discursive re-appropriation
of what creativity is or can be — that sampling, remixing and appropriation
have been the norm in other artistic and creative media for decades. The
literary world is lagging behind in this respect, where, despite the
experiments by modernist writers, it continues neatly to delineate avant-garde
from more general forms of writing. Yet as Goldsmith argues the digital has
started to disrupt this distinction again, moving beyond ‘analogue’ notions of
writing, and has fuelled with it the idea that there might be alternative
notions of writing: those currently perceived as
uncreative.[61](ch3.xhtml#footnote-092)

## Conclusion

There are two addendums to the argument I have outlined above that I would
like to include here. First of all, I would like to complicate and further
critique some of the preconceptions still inherent in the relational and
networked copyright models as put forward by Craig et al. and Gibson. Both are
in many ways reformist and ‘responsive’ models. Gibson, for example, does not
want to do away with IP rights, she wants them to develop and adapt to mirror
society more accurately according to a networked model of creativity. For her,
the law is out of tune with its public, and she wants to promote a more
inclusive networked (copy) rights model.[62](ch3.xhtml#footnote-091) For Craig
too, relationalities are established and structured by rights first and
foremost. Yet from a posthuman perspective we need to be conscious of how the
other actants involved in creativity would fall outside such a humanist and
subjective rights model.[63](ch3.xhtml#footnote-090) From texts and
technologies themselves to the wider environmental context and to other
nonhuman entities and objects: in what sense will a copyright model be able to
extend such a network beyond an individualised liberal humanist human subject?
What do these models exclude in this respect and in what sense are they still
limited by their adherence to a rights model that continues to rely on
humanist nodes in a networked or relational model? As Anna Munster has argued
in a talk about the case of the monkey selfie, copyright is based on a logic
of exclusion that does not line up with the assemblages of agentic processes
that make up creativity and creative expression.[64](ch3.xhtml#footnote-089)
How can we appreciate the relational and processual aspects of identity, which
both Craig and Gibson seem to want to promote, if we hold on to an inherently
humanist concept of subjectification, rights and creativity?

Secondly, I want to highlight that we need to remain cautious of a movement
away from copyright and the copyright industries, to a context of free culture
in which free content — and the often free labour it is based upon — ends up
servicing the content industries (i.e. Facebook, Google, Amazon). We must be
wary when access or the narrative around (open) access becomes dominated by
access to or for big business, benefitting the creative industries and the
knowledge economy. The danger of updating and adapting IP law to fit a
changing digital context and to new technologies, of making it more inclusive
in this sense — which is something both Craig and Gibson want to do as part of
their reformative models — is that this tends to be based on a very simplified
and deterministic vision of technology, as something requiring access and an
open market to foster innovation. As Sarah Kember argues, this technocratic
rationale, which is what unites pro-and anti-copyright activists in this
sense, essentially de-politicises the debate around IP; it is still a question
of determining the value of creativity through an economic perspective, based
on a calculative lobby.[65](ch3.xhtml#footnote-088) The challenge here is to
redefine the discourse in such a way that our focus moves away from a dominant
market vision, and — as Gibson and Craig have also tried to do — to emphasise
a non-calculative ethics of relations, processes and care instead.

I would like to return at this point to the ALCS report and the way its
results have been framed within a creative industries discourse.
Notwithstanding the fact that fair remuneration and incentives for literary
production and creativity in general are of the utmost importance, what I have
tried to argue here is that the ‘solution’ proposed by the ALCS does not do
justice to the complexities of creativity. When discussing remuneration of
authors, the ALCS seems to prefer a simple solution in which copyright is seen
as a given, the digital is pointed out as a generalised scapegoat, and
binaries between print and digital are maintained and strengthened.
Furthermore, fair remuneration is encapsulated by the ALCS within an economic
calculative logic and rhetoric, sustained by and connected to a creative
industries discourse, which continuously recreates the idea that creativity
and innovation are one. Instead I have tried to put forward various
alternative visions and practices, from radical open access to posthuman
authorship and uncreative writing, based on vital relationships and on an
ethics of care and responsibility. These alternatives highlight distributed
and relational authorship and/or showcase a sensibility that embraces
posthuman agencies and processual publishing as part of a more complex,
emergent vision of creativity, open to different ideas of what creativity is
and can become. In this vision creativity is thus seen as relational, fluid
and processual and only ever temporarily fixed as part of our ethical decision
making: a decision-making process that is contingent on the contexts and
relationships with which we find ourselves entangled. This involves asking
questions about what writing is and does, and how creativity expands beyond
our established, static, or given concepts, which include copyright and a
focus on the author as a ‘homo economicus’, writing as inherently an
enterprise, and culture as commodified. As I have argued, the value of words,
indeed the economic worth and sustainability of words and of the ‘creative
industries’, can and should be defined within a different narrative. Opening
up from the hegemonic creative industries discourse and the way we perform it
through our writing practices might therefore enable us to explore extended
relationalities of emergent creativity, open-ended publishing processes, and a
feminist ethics of care and responsibility.

This contribution has showcased examples of experimental, hybrid and posthuman
writing and publishing practices that are intervening in this established
discourse on creativity. How, through them, can we start to performatively
explore a new discourse and reconfigure the relationships that underlie our
writing processes? How can the worth of writing be reflected in different
ways?

## Works Cited

(2014) ‘New Research into Authors’ Earnings Released’, Authors’ Licensing and
Collecting Society,
Us/News/News/What-are-words-worth-now-not-much.aspx>

Abrahamsson, Sebastian, Uli Beisel, Endre Danyi, Joe Deville, Julien McHardy,
and Michaela Spencer (2013) ‘Mattering Press: New Forms of Care for STS
Books’, The EASST Review 32.4, volume-32-4-december-2013/mattering-press-new-forms-of-care-for-sts-books/>

Adema, Janneke (2017) ‘Cut-Up’, in Eduardo Navas (ed.), Keywords in Remix
Studies (New York and London: Routledge), pp. 104–14,


— (2014) ‘Embracing Messiness’, LSE Impact of Social Sciences,
adema-pdsc14/>

— (2015) ‘Knowledge Production Beyond The Book? Performing the Scholarly
Monograph in Contemporary Digital Culture’ (PhD dissertation, Coventry
University), f4c62c77ac86/1/ademacomb.pdf>

— (2014) ‘Open Access’, in Critical Keywords for the Digital Humanities
(Lueneburg: Centre for Digital Cultures (CDC)),


— and Gary Hall (2013) ‘The Political Nature of the Book: On Artists’ Books
and Radical Open Access’, New Formations 78.1, 138–56,


— and Samuel Moore (2018) ‘Collectivity and Collaboration: Imagining New Forms
of Communality to Create Resilience in Scholar-Led Publishing’, Insights 31.3,


ALCS, Press Release (8 July 2014) ‘What Are Words Worth Now? Not Enough’,


Barad, Karen (2007) Meeting the Universe Halfway: Quantum Physics and the
Entanglement of Matter and Meaning (Durham, N.C., and London: Duke University
Press).

Boon, Marcus (2010) In Praise of Copying (Cambridge, MA: Harvard University
Press).

Brown, Wendy (2015) Undoing the Demos: Neoliberalism’s Stealth Revolution
(Cambridge, MA: MIT Press).

Chartier, Roger (1994) The Order of Books: Readers, Authors, and Libraries in
Europe Between the 14th and 18th Centuries, 1st ed. (Stanford, CA: Stanford
University Press).

Craig, Carys J. (2011) Copyright, Communication and Culture: Towards a
Relational Theory of Copyright Law (Cheltenham, UK, and Northampton, MA:
Edward Elgar Publishing).

— Joseph F. Turcotte, and Rosemary J. Coombe (2011) ‘What’s Feminist About
Open Access? A Relational Approach to Copyright in the Academy’, Feminists@law
1.1,

Cramer, Florian (2013) Anti-Media: Ephemera on Speculative Arts (Rotterdam and
New York, NY: nai010 publishers).

Drucker, Johanna (2015) ‘Humanist Computing at the End of the Individual Voice
and the Authoritative Text’, in Patrik Svensson and David Theo Goldberg
(eds.), Between Humanities and the Digital (Cambridge, MA: MIT Press), pp.
83–94.

— (2014) ‘Distributed and Conditional Documents: Conceptualizing
Bibliographical Alterities’, MATLIT: Revista do Programa de Doutoramento em
Materialidades da Literatura 2.1, 11–29.

— (2013) ‘Performative Materiality and Theoretical Approaches to Interface’,
Digital Humanities Quarterly 7.1 [n.p.],


Ede, Lisa, and Andrea A. Lunsford (2001) ‘Collaboration and Concepts of
Authorship’, PMLA 116.2, 354–69.

Emerson, Lori (2008) ‘Materiality, Intentionality, and the Computer-Generated
Poem: Reading Walter Benn Michaels with Erin Moureacute’s Pillage Land’, ESC:
English Studies in Canada 34, 45–69.

— (2003) ‘Digital Poetry as Reflexive Embodiment’, in Markku Eskelinen, Raine
Koskimaa, Loss Pequeño Glazier and John Cayley (eds.), CyberText Yearbook
2002–2003, 88–106,

Foucault, Michel, ‘What Is an Author?’ (1998) in James D. Faubion (ed.),
Essential Works of Foucault, 1954–1984, Volume Two: Aesthetics, Method, and
Epistemology (New York: The New Press).

Gibson, Johanna (2007) Creating Selves: Intellectual Property and the
Narration of Culture (Aldershot, England and Burlington, VT: Routledge).

— Phillip Johnson and Gaetano Dimita (2015) The Business of Being an Author: A
Survey of Author’s Earnings and Contracts (London: Queen Mary University of
London), [https://orca.cf.ac.uk/72431/1/Final Report - For Web
Publication.pdf](https://orca.cf.ac.uk/72431/1/Final%20Report%20-%20For%20Web%20Publication.pdf)

Goldsmith, Kenneth (2011) Uncreative Writing: Managing Language in the Digital
Age (New York: Columbia University Press).

Hall, Gary (2010) ‘Radical Open Access in the Humanities’ (presented at the
Research Without Borders, Columbia University),
humanities/>

— (2008) Digitize This Book!: The Politics of New Media, or Why We Need Open
Access Now (Minneapolis, MN: University of Minnesota Press).

Hayles, N. Katherine (2004) ‘Print Is Flat, Code Is Deep: The Importance of
Media-Specific Analysis’, Poetics Today 25.1, 67–90,


Hughes, Rolf (2005) ‘Orderly Disorder: Post-Human Creativity’, in Proceedings
of the Linköping Electronic Conference (Linköpings universitet: University
Electronic Press).

Jenkins, Henry, and Owen Gallagher (2008) ‘“What Is Remix Culture?”: An
Interview with Total Recut’s Owen Gallagher’, Confessions of an Aca-Fan,


Johns, Adrian (1998) The Nature of the Book: Print and Knowledge in the Making
(Chicago, IL: University of Chicago Press).

Kember, Sarah (2016) ‘Why Publish?’, Learned Publishing 29, 348–53,


— (2014) ‘Why Write?: Feminism, Publishing and the Politics of Communication’,
New Formations: A Journal of Culture/Theory/Politics 83.1, 99–116.

Kretschmer, M., and P. Hardwick (2007) Authors’ Earnings from Copyright and
Non-Copyright Sources : A Survey of 25,000 British and German Writers (Poole,
UK: CIPPM/ALCS Bournemouth University),
[https://microsites.bournemouth.ac.uk/cippm/files/2007/07/ALCS-Full-
report.pdf](https://microsites.bournemouth.ac.uk/cippm/files/2007/07/ACLS-
Full-report.pdf)

Lessig, Lawrence (2008) Remix: Making Art and Commerce Thrive in the Hybrid
Economy (New York: Penguin Press).

Lovink, Geert, and Ned Rossiter (eds.) (2007) MyCreativity Reader: A Critique
of Creative Industries (Amsterdam: Institute of Network Cultures),


McGann, Jerome J. (1992) A Critique of Modern Textual Criticism
(Charlottesville, VA: University of Virginia Press).

McHardy, Julien (2014) ‘Why Books Matter: There Is Value in What Cannot Be
Evaluated.’, Impact of Social Sciences [n.p.],


Mol, Annemarie (2008) The Logic of Care: Health and the Problem of Patient
Choice, 1st ed. (London and New York: Routledge).

Montfort, Nick (2003) ‘The Coding and Execution of the Author’, in Markku
Eskelinen, Raine Kosimaa, Loss Pequeño Glazier and John Cayley (eds.),
CyberText Yearbook 2002–2003, 2003, 201–17,
, pp. 201–17.

Moore, Samuel A. (2017) ‘A Genealogy of Open Access: Negotiations between
Openness and Access to Research’, Revue Française des Sciences de
l’information et de la Communication 11,

Munster, Anna (2016) ‘Techno-Animalities — the Case of the Monkey Selfie’
(presented at the Goldsmiths University, London),


Navas, Eduardo (2012) Remix Theory: The Aesthetics of Sampling (Vienna and New
York: Springer).

Parikka, Jussi, and Mercedes Bunz (11 July 2014) ‘A Mini-Interview: Mercedes
Bunz Explains Meson Press’, Machinology,
meson-press/>

Richards, Victoria (7 January 2016) ‘Monkey Selfie: Judge Rules Macaque Who
Took Grinning Photograph of Himself “Cannot Own Copyright”’, The Independent,
macaque-who-took-grinning-photograph-of-himself-cannot-own-
copyright-a6800471.html>

Robbins, Sarah (2003) ‘Distributed Authorship: A Feminist Case-Study Framework
for Studying Intellectual Property’, College English 66.2, 155–71,


Rose, Mark (1993) Authors and Owners: The Invention of Copyright (Cambridge,
MA: Harvard University Press).

Spinosa, Dani (14 May 2014) ‘“My Line (Article) Has Sighed”: Authorial
Subjectivity and Technology’, Generic Pronoun,


Star, Susan Leigh (1991) ‘The Sociology of the Invisible: The Primacy of Work
in the Writings of Anselm Strauss’, in Anselm Leonard Strauss and David R.
Maines (eds.), Social Organization and Social Process: Essays in Honor of
Anselm Strauss (New York: A. de Grutyer).

* * *

[1](ch3.xhtml#footnote-152-backlink) The Authors’ Licensing and Collecting
Society is a [British](https://en.wikipedia.org/wiki/United_Kingdom)
membership organisation for writers, established in 1977 with over 87,000
members, focused on protecting and promoting authors’ rights. ALCS collects
and pays out money due to members for secondary uses of their work (copying,
broadcasting, recording etc.).

[2](ch3.xhtml#footnote-151-backlink) This survey was an update of an earlier
survey conducted in 2006 by the Centre of Intellectual Property Policy and
Management (CIPPM) at Bournemouth University.

[3](ch3.xhtml#footnote-150-backlink) ‘New Research into Authors’ Earnings
Released’, Authors’ Licensing and Collecting Society, 2014,
Us/News/News/What-are-words-worth-now-not-much.aspx>

[4](ch3.xhtml#footnote-149-backlink) Johanna Gibson, Phillip Johnson, and
Gaetano Dimita, The Business of Being an Author: A Survey of Author’s Earnings
and Contracts (London: Queen Mary University of London, 2015), p. 9,
[https://orca.cf.ac.uk/72431/1/Final Report - For Web Publication.pdf
](https://orca.cf.ac.uk/72431/1/Final%20Report%20-%20For%20Web%20Publication.pdf)

[5](ch3.xhtml#footnote-148-backlink) ALCS, Press Release. What Are Words Worth
Now? Not Enough, 8 July 2014, worth-now-not-enough>

[6](ch3.xhtml#footnote-147-backlink) Gibson, Johnson, and Dimita, The Business
of Being an Author, p. 35.

[7](ch3.xhtml#footnote-146-backlink) M. Kretschmer and P. Hardwick, Authors’
Earnings from Copyright and Non-Copyright Sources: A Survey of 25,000 British
and German Writers (Poole: CIPPM/ALCS Bournemouth University, 2007), p. 3,
[https://microsites.bournemouth.ac.uk/cippm/files/2007/07/ALCS-Full-
report.pdf](https://microsites.bournemouth.ac.uk/cippm/files/2007/07/ACLS-
Full-report.pdf)

[8](ch3.xhtml#footnote-145-backlink) ALCS, Press Release, 8 July 2014,
[https://www.alcs.co.uk/news/what-are-words-](https://www.alcs.co.uk/news
/what-are-words-worth-now-not-enough)
worth-now-not-enough

[9](ch3.xhtml#footnote-144-backlink) Gibson, Johnson, and Dimita, The Business
of Being an Author, p. 35.

[10](ch3.xhtml#footnote-143-backlink) Ibid.

[11](ch3.xhtml#footnote-142-backlink) In the survey, three questions that
focus on various sources of remuneration do list digital publishing and/or
online uses as an option (questions 8, 11, and 15). Yet the data tables
provided in the appendix to the report do not provide the findings for
questions 11 and 15 nor do they differentiate according to type of media for
other tables related to remuneration. The only data table we find in the
report related to digital publishing is table 3.3, which lists ‘Earnings
ranked (1 to 7) in relation to categories of work’, where digital publishing
ranks third after books and magazines/periodicals, but before newspapers,
audio/audio-visual productions and theatre. This lack of focus on the effect
of digital publishing on writers’ incomes, for a survey that is ‘the first to
capture the impact of the digital revolution on writers’ working lives’, is
quite remarkable. Gibson, Johnson, and Dimita, The Business of Being an
Author, Appendix 2.

[12](ch3.xhtml#footnote-141-backlink) Ibid., p. 35.

[13](ch3.xhtml#footnote-140-backlink) Ibid.

[14](ch3.xhtml#footnote-139-backlink) Geert Lovink and Ned Rossiter (eds.),
MyCreativity Reader: A Critique of Creative Industries (Amsterdam: Institute
of Network Cultures, 2007), p. 14,


[15](ch3.xhtml#footnote-138-backlink) See:
estimates-january-2015/creative-industries-economic-estimates-january-2015
-key-findings>

[16](ch3.xhtml#footnote-137-backlink) Wendy Brown, Undoing the Demos:
Neoliberalism’s Stealth Revolution (Cambridge, MA: MIT Press, 2015), p. 31.

[17](ch3.xhtml#footnote-136-backlink) Therefore Lovink and Rossiter make a
plea to, ‘redefine creative industries outside of IP generation’. Lovink and
Rossiter, MyCreativity Reader, p. 14.

[18](ch3.xhtml#footnote-135-backlink) Next to earnings made from writing more
in general, the survey on various occasions asks questions about earnings
arising from specific categories of works and related to the amount of works
exploited (published/broadcast) during certain periods. Gibson, Johnson, and
Dimita, The Business of Being an Author, Appendix 2.

[19](ch3.xhtml#footnote-134-backlink) Roger Chartier, The Order of Books:
Readers, Authors, and Libraries in Europe Between the 14th and 18th Centuries,
1st ed. (Stanford: Stanford University Press, 1994); Lisa Ede and Andrea A.
Lunsford, ‘Collaboration and Concepts of Authorship’, PMLA 116.2 (2001),
354–69; Adrian Johns, The Nature of the Book: Print and Knowledge in the
Making (Chicago, IL: University of Chicago Press, 1998); Jerome J. McGann, A
Critique of Modern Textual Criticism (Charlottesville, VA, University of
Virginia Press, 1992); Sarah Robbins, ‘Distributed Authorship: A Feminist
Case-Study Framework for Studying Intellectual Property’, College English 66.2
(2003), 155–71,

[20](ch3.xhtml#footnote-133-backlink) The ALCS survey addresses this problem,
of course, and tries to lobby on behalf of its authors for fair contracts with
publishers and intermediaries. That said, the survey findings show that only
42% of writers always retain their copyright. Gibson, Johnson, and Dimita, The
Business of Being an Author, p. 12.

[21](ch3.xhtml#footnote-132-backlink) Michel Foucault, ‘What Is an Author?’,
in James D. Faubion (ed.), Essential Works of Foucault, 1954–1984, Volume Two:
Aesthetics, Method, and Epistemology (New York: The New Press, 1998), p. 205.

[22](ch3.xhtml#footnote-131-backlink) Mark Rose, Authors and Owners: The
Invention of Copyright (Cambridge, MA: Harvard University Press, 1993).

[23](ch3.xhtml#footnote-130-backlink) Carys J. Craig, Joseph F. Turcotte, and
Rosemary J. Coombe, ‘What’s Feminist About Open Access? A Relational Approach
to Copyright in the Academy’, Feminists@law 1.1 (2011),


[24](ch3.xhtml#footnote-129-backlink) Ibid., p. 8.

[25](ch3.xhtml#footnote-128-backlink) Ibid., p. 9.

[26](ch3.xhtml#footnote-127-backlink) Lawrence Lessig, Remix: Making Art and
Commerce Thrive in the Hybrid Economy (New York: Penguin Press, 2008); Eduardo
Navas, Remix Theory: The Aesthetics of Sampling (Vienna and New York:
Springer, 2012); Henry Jenkins and Owen Gallagher, ‘“What Is Remix Culture?”:
An Interview with Total Recut’s Owen Gallagher’, Confessions of an Aca-Fan,
2008,

[27](ch3.xhtml#footnote-126-backlink) Craig, Turcotte, and Coombe, ‘What’s
Feminist About Open Access?, p. 27.

[28](ch3.xhtml#footnote-125-backlink) Ibid., p. 14.

[29](ch3.xhtml#footnote-124-backlink) Ibid., p. 26.

[30](ch3.xhtml#footnote-123-backlink) Janneke Adema, ‘Open Access’, in
Critical Keywords for the Digital Humanities (Lueneburg: Centre for Digital
Cultures (CDC), 2014), ; Janneke Adema,
‘Embracing Messiness’, LSE Impact of Social Sciences, 2014,
adema-pdsc14/>; Gary Hall, Digitize This Book!: The Politics of New Media, or
Why We Need Open Access Now (Minneapolis, MN: University of Minnesota Press,
2008), p. 197; Sarah Kember, ‘Why Write?: Feminism, Publishing and the
Politics of Communication’, New Formations: A Journal of
Culture/Theory/Politics 83.1 (2014), 99–116; Samuel A. Moore, ‘A Genealogy of
Open Access: Negotiations between Openness and Access to Research’, Revue
Française des Sciences de l’information et de la Communication, 2017,


[31](ch3.xhtml#footnote-122-backlink) Florian Cramer, Anti-Media: Ephemera on
Speculative Arts (Rotterdam and New York: nai010 publishers, 2013).

[32](ch3.xhtml#footnote-121-backlink) Especially within humanities publishing
there is a reluctance to allow derivative uses of one’s work in an open access
setting.

[33](ch3.xhtml#footnote-120-backlink) In 2015 the Radical Open Access
Conference took place at Coventry University, which brought together a large
array of presses and publishing initiatives (often academic-led) in support of
an ‘alternative’ vision of open access and scholarly communication.
Participants in this conference subsequently formed the loosely allied Radical
Open Access Collective: [radicaloa.co.uk](https://radicaloa.co.uk/). As the
conference concept outlines, radical open access entails ‘a vision of open
access that is characterised by a spirit of on-going creative experimentation,
and a willingness to subject some of our most established scholarly
communication and publishing practices, together with the institutions that
sustain them (the library, publishing house etc.), to rigorous critique.
Included in the latter will be the asking of important questions about our
notions of authorship, authority, originality, quality, credibility,
sustainability, intellectual property, fixity and the book — questions that
lie at the heart of what scholarship is and what the university can be in the
21st century’. Janneke Adema and Gary Hall, ‘The Political Nature of the Book:
On Artists’ Books and Radical Open Access’, New Formations 78.1 (2013),
138–56, ; Janneke Adema and Samuel
Moore, ‘Collectivity and Collaboration: Imagining New Forms of Communality to
Create Resilience In Scholar-Led Publishing’, Insights 31.3 (2018),
; Gary Hall, ‘Radical Open Access in the
Humanities’ (presented at the Research Without Borders, Columbia University,
2010), humanities/>; Janneke Adema, ‘Knowledge Production Beyond The Book? Performing
the Scholarly Monograph in Contemporary Digital Culture’ (PhD dissertation,
Coventry University, 2015),
f4c62c77ac86/1/ademacomb.pdf>

[34](ch3.xhtml#footnote-119-backlink) Julien McHardy, ‘Why Books Matter: There
Is Value in What Cannot Be Evaluated’, Impact of Social Sciences, 2014, n.p.,
[http://blogs.lse.ac.uk/impactofsocial sciences/2014/09/30/why-books-
matter/](http://blogs.lse.ac.uk/impactofsocialsciences/2014/09/30/why-books-
matter/)

[35](ch3.xhtml#footnote-118-backlink) Karen Barad, Meeting the Universe
Halfway: Quantum Physics and the Entanglement of Matter and Meaning (Durham,
N.C. and London: Duke University Press, 2007).

[36](ch3.xhtml#footnote-117-backlink) Annemarie Mol, The Logic of Care: Health
and the Problem of Patient Choice, 1st ed. (London and New York: Routledge,
2008).

[37](ch3.xhtml#footnote-116-backlink) Sebastian Abrahamsson and others,
‘Mattering Press: New Forms of Care for STS Books’, The EASST Review 32.4
(2013), press-new-forms-of-care-for-sts-books/>

[38](ch3.xhtml#footnote-115-backlink) McHardy, ‘Why Books Matter’.

[39](ch3.xhtml#footnote-114-backlink) Ibid.

[40](ch3.xhtml#footnote-113-backlink) Susan Leigh Star, ‘The Sociology of the
Invisible: The Primacy of Work in the Writings of Anselm Strauss’, in Anselm
Leonard Strauss and David R. Maines (eds.), Social Organization and Social
Process: Essays in Honor of Anselm Strauss (New York: A. de Gruyter, 1991).
Mattering Press is not alone in exploring an ethics of care in relation to
(academic) publishing. Sarah Kember, director of Goldsmiths Press is also
adamant in her desire to make the underlying processes of publishing (i.e.
peer review, citation practices) more transparent and accountable Sarah
Kember, ‘Why Publish?’, Learned Publishing 29 (2016), 348–53,
. Mercedes Bunz, one of the editors running
Meson Press, argues that a sociology of the invisible would incorporate
‘infrastructure work’, the work of accounting for, and literally crediting
everybody involved in producing a book: ‘A book isn’t just a product that
starts a dialogue between author and reader. It is accompanied by lots of
other academic conversations — peer review, co-authors, copy editors — and
these conversations deserve to be taken more serious’. Jussi Parikka and
Mercedes Bunz, ‘A Mini-Interview: Mercedes Bunz Explains Meson Press’,
Machinology, 2014, mercedes-bunz-explains-meson-press/>. For Open Humanities Press authorship is
collaborative and even often anonymous: for example, they are experimenting
with research published in wikis to further complicate the focus on single
authorship and a static marketable book object within academia (see their
living and liquid books series).

[41](ch3.xhtml#footnote-112-backlink) Lori Emerson, ‘Digital Poetry as
Reflexive Embodiment’, in Markku Eskelinen, Raine Koskimaa, Loss Pequeño
Glazier and John Cayley (eds.), CyberText Yearbook 2002–2003, 2003, 88–106,


[42](ch3.xhtml#footnote-111-backlink) Dani Spinosa, ‘“My Line (Article) Has
Sighed”: Authorial Subjectivity and Technology’, Generic Pronoun, 2014,


[43](ch3.xhtml#footnote-110-backlink) Spinosa, ‘My Line (Article) Has Sighed’.

[44](ch3.xhtml#footnote-109-backlink) Emerson, ‘Digital Poetry as Reflexive
Embodiment’, p. 89.

[45](ch3.xhtml#footnote-108-backlink) Rolf Hughes, ‘Orderly Disorder: Post-
Human Creativity’, in Proceedings of the Linköping Electronic Conference
(Linköpings universitet: University Electronic Press, 2005).

[46](ch3.xhtml#footnote-107-backlink) N. Katherine Hayles, ‘Print Is Flat,
Code Is Deep: The Importance of Media-Specific Analysis’, Poetics Today 25.1
(2004), 67–90, ; Johanna Drucker,
‘Performative Materiality and Theoretical Approaches to Interface’, Digital
Humanities Quarterly 7.1 (2013),
; Johanna
Drucker, ‘Distributed and Conditional Documents: Conceptualizing
Bibliographical Alterities’, MATLIT: Revista do Programa de Doutoramento em
Materialidades da Literatura 2.1 (2014), 11–29.

[47](ch3.xhtml#footnote-106-backlink) Nick Montfort, ‘The Coding and Execution
of the Author’, in Markku Eskelinen, Raine Kosimaa, Loss Pequeño Glazier and
John Cayley (eds.), CyberText Yearbook 2002–2003, 2003, 201–17 (p. 201),


[48](ch3.xhtml#footnote-105-backlink) Montfort, ‘The Coding and Execution of
the Author’, p. 202.

[49](ch3.xhtml#footnote-104-backlink) Lori Emerson, ‘Materiality,
Intentionality, and the Computer-Generated Poem: Reading Walter Benn Michaels
with Erin Moureacute’s Pillage Land’, ESC: English Studies in Canada 34
(2008), 66.

[50](ch3.xhtml#footnote-103-backlink) Marcus Boon, In Praise of Copying
(Cambridge, MA: Harvard University Press, 2010); Johanna Drucker, ‘Humanist
Computing at the End of the Individual Voice and the Authoritative Text’, in
Patrik Svensson and David Theo Goldberg (eds.), Between Humanities and the
Digital (Cambridge, MA: MIT Press, 2015), pp. 83–94.

[51](ch3.xhtml#footnote-102-backlink) We have to take into consideration here
that print-based cultural products were never fixed or static; the dominant
discourses constructed around them just perceive them to be so.

[52](ch3.xhtml#footnote-101-backlink) Craig, Turcotte, and Coombe, ‘What’s
Feminist About Open Access?’, p. 2.

[53](ch3.xhtml#footnote-100-backlink) Ibid.

[54](ch3.xhtml#footnote-099-backlink) Johanna Gibson, Creating Selves:
Intellectual Property and the Narration of Culture (Aldershot, UK, and
Burlington: Routledge, 2007), p. 7.

[55](ch3.xhtml#footnote-098-backlink) Gibson, Creating Selves, p. 7.

[56](ch3.xhtml#footnote-097-backlink) Ibid.

[57](ch3.xhtml#footnote-096-backlink) Kenneth Goldsmith, Uncreative Writing:
Managing Language in the Digital Age (New York: Columbia University Press,
2011), p. 227.

[58](ch3.xhtml#footnote-095-backlink) Ibid., p. 15.

[59](ch3.xhtml#footnote-094-backlink) Goldsmith, Uncreative Writing, p. 81.

[60](ch3.xhtml#footnote-093-backlink) Ibid.

[61](ch3.xhtml#footnote-092-backlink) It is worth emphasising that what
Goldsmith perceives as ‘uncreative’ notions of writing (including
appropriation, pastiche, and copying), have a prehistory that can be traced
back to antiquity (thanks go out to this chapter’s reviewer for pointing this
out). One example of this, which uses the method of cutting and pasting —
something I have outlined more in depth elsewhere — concerns the early modern
commonplace book. Commonplacing as ‘a method or approach to reading and
writing involved the gathering and repurposing of meaningful quotes, passages
or other clippings from published books by copying and/or pasting them into a
blank book.’ Janneke Adema, ‘Cut-Up’, in Eduardo Navas (ed.), Keywords in
Remix Studies (New York and London: Routledge, 2017), pp. 104–14,


[62](ch3.xhtml#footnote-091-backlink) Gibson, Creating Selves, p. 27.

[63](ch3.xhtml#footnote-090-backlink) For example, animals cannot own
copyright. See the case of Naruto, the macaque monkey that took a ‘selfie’
photograph of itself. Victoria Richards, ‘Monkey Selfie: Judge Rules Macaque
Who Took Grinning Photograph of Himself “Cannot Own Copyright”’, The
Independent, 7 January 2016, /monkey-selfie-judge-rules-macaque-who-took-grinning-photograph-of-himself-
cannot-own-copyright-a6800471.html>

[64](ch3.xhtml#footnote-089-backlink) Anna Munster, ‘Techno-Animalities — the
Case of the Monkey Selfie’ (presented at the Goldsmiths University, London,
2016),

[65](ch3.xhtml#footnote-088-backlink) Sarah Kember, ‘Why Write?: Feminism,
Publishing and the Politics of Communication’, New Formations: A Journal of
Culture/Theory/Politics 83.1 (2014), 99–116.

Stankievech
Letter to the Superior Court of Quebec Regarding Arg.org
2016


Letter to the Superior Court of Quebec Regarding Arg.org

Charles Stankievech
19 January 2016

To the Superior Court of Quebec:
I am writing in support of the online community and library platform called “Arg.org” (also known under additional aliases and
urls including “aaaaarg.org,” “grr.aaaaarg.org,” and most recently
“grr.aaaaarg.fail”). It is my understanding that a copyright infringement lawsuit has been leveled against two individuals who
support this community logistically. This letter will address what
I believe to be the value of Arg.org to a variety of communities
and individuals; it is written to encompass my perspective on the
issue from three distinct positions: (1) As Director of the Visual
Studies Program, Faculty of Architecture, Landscape, and Design,
University of Toronto, where I am a professor and oversee three
degree streams for both graduate and undergraduate students;
(2) As the co-director of an independent publishing house based
in Berlin, Germany, and Toronto, Canada, which works with international institutions around the world; (3) As a scholar and writer
who has published in a variety of well-regarded international
journals and presses. While I outline my perspective in relation to
these professional positions below, please note that I would also
be willing to testify via video-conference to further articulate
my assessment of Arg.org’s contribution to a diverse international
community of artists, scholars, and independent researchers.
98

Essay continuing from page 49

“Warburgian tradition.”47 If we consider the Warburg Library
in its simultaneous role as a contained space and the reflection
of an idiosyncratic mental energy, General Stumm’s aforementioned feeling of “entering an enormous brain” seems an
especially concise description. Indeed, for Saxl the librarian,
“the books remain a body of living thought as Warburg had
planned,”48 showing “the limits and contents of his scholarly
worlds.”49 Developed as a research tool to solve a particular
intellectual problem—and comparable on a number of levels
to exhibition-led inquiry—Aby Warburg’s organically structured, themed library is a three-dimensional instance of a library that performatively articulates and potentiates itself,
which is not yet to say exhibits, as both spatial occupation and
conceptual arrangement, where the order of things emerges
experimentally, and in changing versions, from the collection
and its unusual cataloging.50

47

48
49
50

Saxl speaks of “many tentative and personal excrescences” (“The History of
Warburg’s Library,” 331). When Warburg fell ill in 1920 with a subsequent fouryear absence, the library was continued by Saxl and Gertrud Bing, the new and
later closest assistant. Despite the many helpers, according to Saxl, Warburg always
remained the boss: “everything had the character of a private book collection, where
the master of the house had to see it in person that the bills were paid in time,
that the bookbinder chose the right material, or that neither he nor the carpenter
delivering a new shelf over-charged” (Ibid., 329).
Ibid., 331.
Ibid., 329.
A noteworthy aside: Gertrud Bing was in charge of keeping a meticulous index of
names and keywords; evoking the library catalog of Borges’s fiction, Warburg even
kept an “index of un-indexed books.” See Diers, “Porträt aus Büchern,” 21.

99

1. Arg.org supports a collective & semiprivate community of
academics & intellectuals.
As the director of a graduate-level research program at the University of Toronto, I have witnessed first-hand the evolution
of academic research. Arg.org has fostered a vibrant community
of thinkers, students, and writers, who can share their research
and create new opportunities for collaboration and learning
because of the knowledge infrastructure provided by the platform.
The accusation of copyright infringement leveled against the
community misses the point of the research platform altogether.
While there are texts made available for download at no expense
through the Arg.org website, it is essential to note that these texts
are not advertised, nor are they accessible to the general public.
Arg.org is a private community whose sharing platform can only
be accessed by invitation. Such modes of sharing have always
existed in academic communities; for example, when a group of
professors would share Xerox copies of articles they want to read
together as part of a collaborative research project. Likewise,
it would be hard to imagine a community of readers at any time
in history without the frequent lending and sharing of books.
From this perspective, Arg.org should be understood within a
twenty-first century digital ethos, where the sharing of intellectual
property and the generation of derivative IP occurs through collaborative platforms. On this point, I want to draw further attention
to two fundamental aspects of Arg.org.
a. One essential feature of the Arg.org platform is that it gives
invited users the ability to create reading lists from available texts—
what are called on the website “collections.” These collections
are made up of curated folders containing text files (usually in
Portable Document Format); such collections allow for new and
novel associations of texts, and the development of working
bibliographies that assist in research. Users can discover previously unfamiliar materials—including entire books and excerpted
chapters, essays, and articles—through these shared collections.
Based on the popularity of previous collections I have personally
assembled on the Arg.org platform, I have been invited to give
100

In the Memory Hall of Reproductions
Several photographs document how the Warburg Library was
also a backdrop for Warburg’s picture panels, the wood boards
lined with black fabric, which, not unlike contemporary mood
boards, held the visual compositions he would assemble and
re-assemble from around 2,000 photographs, postcards, and
printed reproductions cut out of books and newspapers.
Sometimes accompanied by written labels or short descriptions, the panels served as both public displays and researchin-process, and were themselves photographed with the aim
to eventually be disseminated as book pages in publications.
In the end, not every publishing venture was realized, and
most panels themselves were even lost along the way; in fact,
today, the panel photographs are the only visual remainder of
this type of research from the Warburg Institute. Probably the
most acclaimed of the panels are those which Warburg developed in close collaboration with his staff during the last years
of his life and from which he intended to create a sequential
picture atlas of human memory referred to as the Mnemosyne
Atlas. Again defying the classical boundaries of the disciplines, Warburg had appropriated visual material from the
archives of art history, natural philosophy, and science to
vividly evoke and articulate his thesis through the creation of
unprecedented associations. Drawing an interesting analogy,
the following statement from Warburg scholar Kurt Forster
underlines the importance of the panels for the creation of
meaning:
Warburg’s panels belong into the realm of the montage à la Schwitters or Lissitzky. Evidently, such a

101

guest lectures at various international venues; such invitations
demonstrate that this cognitive work is considered original
research and a valuable intellectual exercise worthy of further
discussion.
b. The texts uploaded to the Arg.org platform are typically documents scanned from the personal libraries of users who have
already purchased the material. As a result, many of the documents are combinations of the original published text and annotations or notes from the reader. Commentary is a practice that
has been occurring for centuries; in Medieval times, the technique
of adding commentary directly onto a published page for future
readers to read alongside the original writing was called “Glossing.”
Much of the philosophy, theology, and even scientific theories
were originally produced in the margins of other texts. For example, in her translation and publication of Charles Babbage’s lecture
on the theory of the first computer, Ada Lovelace had more notes
than the original lecture. Even though the text was subsequently
published as Babbage’s work, today modern scholarship acknowledges Lovelace as important voice in the theorization of the
modern computer due to these vital marginal notes.
2. Arg.org supports small presses.
Since 2011, I have been the co-founder and co-director of
K. Verlag, an independent press based in Berlin, Germany, and
Toronto, Canada. The press publishes academic books on art
and culture, as well as specialty books on art exhibitions. While
I am aware of the difficulties faced by small presses in terms of
profitability, especially given fears that the sharing of books online
could further hurt book sales; however, my experience has been
in the opposite direction. At K. Verlag, we actually upload our new
publications directly to Arg.org because we know the platform
reaches an important community of readers and thinkers. Fully
conscious of the uniqueness of printed books and their importance, digital circulation of ebooks and scanned physical books
present a range of different possibilities in reaching our audiences
in a variety of ways. Some members of Arg.org may be too
102

comparison does not need to claim artistic qualities
for Warburg’s panels, nor does it deny them regarding
Schwitters’s or Lissitzky’s collages. It simply lifts the
role of graphic montage from the realm of the formal
into the realm of the construction of meaning.51
Interestingly, even if Forster makes a point not to categorize
Warburg’s practice as art, in twentieth-century art theory and
visual culture scholarship, his idiosyncratic technique has
evidently been mostly associated with art practice. In fact,
insofar as Warburg is acknowledged (together with Marcel
Duchamp and, perhaps, the less well-known André Malraux),
it is as one of the most important predecessors for artists
working with the archive.52 Forster articulates the traditional
assumption that only artists were “allowed” to establish idiosyncratic approaches and think with objects outside of the
box. However, within the relatively new discourse of the
“curatorial,” contra the role of the “curator,” the curatorial
delineates its territory as that which is no longer defined exclusively by what the curator does (i.e. responsibilities of classification and care) but rather as a particular agency in terms of
epistemologically and spatially working with existing materials and collections. Consequently, figures such as Warburg
51
52

Kurt Forster, quoted in Benjamin H.D. Buchloh, “Gerhard Richter’s Atlas: Das anomische Archiv,” in Paradigma Fotografie: Fotokritik am Ende des fotografischen Zeitalters,
ed. Herta Wolf (Frankfurt/M.: Suhrkamp Verlag, 2002), 407, with further references.
One such example is the Atlas begun by Gerhard Richter in 1962; another is
Thomas Hirschhorn’s large-format, mixed-media collage series MAPS. Entitled
Foucault-Map (2008), The Map of Friendship Between Art and Philosophy (2007),
and Hannah-Arendt-Map (2003), these works are partly made in collaboration
with the philosopher Marcus Steinweg. They bring a diverse array of archival and
personal documents or small objects into associative proximities and reflect the
complex impact philosophy has had on Hirschhorn’s art and thinking.

103

poor to afford to buy our books (eg. students with increasing debt,
precarious artists, or scholars in countries lacking accessible
infrastructures for high-level academic research). We also realize
that Arg.org is a library-community built over years; the site
connects us to communities and individuals making original work
and we are excited if our books are shared by the writers, readers,
and artists who actively support the platform. Meanwhile, we
have also seen that readers frequently discover books from our
press through a collection of books on Arg.org, download the
book for free to browse it, and nevertheless go on to order a print
copy from our shop. Even when this is not the case, we believe
in the environmental benefit of Arg.org; printing a book uses
valuable resources and then requires additional shipping around
the world—these practices contradict our desire for the broadest
dissemination of knowledge through the most environmentallyconscious of means.
3. Arg.org supports both official institutional academics
& independent researchers.
As a professor at the University of Toronto, I have access to one
of the best library infrastructures in the world. In addition to
core services, this includes a large number of specialty libraries,
archives, and massive online resources for research. Such
an investment by the administration of the university is essential
to support the advanced research conducted in the numerous
graduate programs and by research chairs. However, there are
at least four ways in which the official, sanctioned access to these
library resources can at times fall short.
a. Physical limitations. While the library might have several copies
of a single book to accommodate demand, it is often the case
that these copies are simultaneously checked out and therefore
not available when needed for teaching or writing. Furthermore,
the contemporary academic is required to constantly travel for
conferences, lectures, and other research obligations, but travelling with a library is not possible. Frequently while I am working
abroad, I access Arg.org to find a book which I have previously
104

and Malraux, who thought apropos objects in space (even
when those objects are dematerialized as reproductions),
become productive forerunners across a range of fields: from
art, through cultural studies and art history, to the curatorial.
Essential to Warburg’s library and Mnemosyne Atlas, but
not yet articulated explicitly, is that the practice of constructing two-dimensional, heterogeneous image clusters shifts the
value between an original work of art and its mechanical
reproduction, anticipating Walter Benjamin’s essay written a
decade later.53 While a museum would normally exhibit an
original of Albrecht Dürer’s Melencolia I (1514) so it could be
contemplated aesthetically (admitting that even as an etching
it is ultimately a form of reproduction), when inserted as a
quotidian reprint into a Warburgian constellation and exhibited within a library, its “auratic singularity”54 is purposefully
challenged. Favored instead is the iconography of the image,
which is highlighted by way of its embeddedness within a
larger (visual-emotional-intellectual) economy of human consciousness.55 As it receives its impetus from the interstices
53

54
55

One of the points Benjamin makes in “The Artwork in the Age of Mechanical
Reproduction” is that reproducibility increases the “exhibition value” of a work of art,
meaning its relationship to being viewed is suddenly valued higher than its
relationship to tradition and ritual (“cult value”); a process which, as Benjamin writes,
nevertheless engenders a new “cult” of remembrance and melancholy (224–26).
Benjamin defines “aura” as the “here and now” of an object, that is, as its spatial,
temporal, and physical presence, and above all, its uniqueness—which in his
opinion is lost through reproduction. Ibid., 222.
It is worth noting that Warburg wrote his professorial dissertation on Albrecht
Dürer. Another central field of his study was astrology, which Warburg examined
from historical and philosophical perspectives. It is thus not surprising to find
out that Dürer’s Melencolia I (1514), addressing the relationship between the
human and the cosmos, was of the highest significance to Warburg as a recurring
theme. The etching is shown, for instance, as image 8 of Plate 58, “Kosmologie bei
Dürer” (Cosmology in Dürer); reproduced in Warnke, ed., Aby Moritz Warburg:
Der Bilderatlas Mnemosyne, Gesammelte Schriften, Vol. 1, 106–7. The connections

105

purchased, and which is on my bookshelf at home, but which
is not in my suitcase. Thus, the Arg.org platform acts as a patch
for times when access to physical books is limited—although
these books have been purchased (either by the library or the
reader herself) and the publisher is not being cheated of profit.
b. Lack of institutional affiliation. The course of one’s academic
career is rarely smooth and is increasingly precarious in today’s
shift to a greater base of contract sessional instructors. When
I have been in-between institutions, I lost access to the library
resources upon which my research and scholarship depended.
So, although academic publishing functions in accord with library
acquisitions, there are countless intellectuals—some of whom
are temporary hires or in-between job appointments, others whom
are looking for work, and thus do not have access to libraries.
In this position, I would resort to asking colleagues and friends
to share their access or help me by downloading articles through
their respective institutional portals. Arg.org helps to relieve
this precarity through a shared library which allows scholarship
to continue; Arg.org is thus best described as a community of
readers who share their research and legally-acquired resources
so that when someone is researching a specific topic, the adequate book/essay can be found to fulfill the academic argument.
c. Special circumstances of non-traditional education. Several
years ago, I co-founded the Yukon School of Visual Arts in
Dawson City as a joint venture between an Indigenous government and the State college. Because we were a tiny school,
we did not fit into the typical academic brackets regarding student
population, nor could we access the sliding scale economics
of academic publishers. As a result, even the tiniest package for
a “small” academic institution would be thousands of times larger
than our population and budget. As a result, neither myself
nor my students could access the essential academic resources
required for a post-secondary education. I attempted to solve this
problem by forging partnerships, pulling in favors, and accessing
resources through platforms like Arg.org. It is important to realize
106

among text and image, visual display and publishing, the
expansive space of the library and the dense volume of the
book, Aby Warburg’s wide-ranging work appears to be best
summarized by the title of one of the Mnemosyne plates:
“Book Browsing as a Reading of the Universe.”56

To the Paper Museum
Warburg had already died before Benjamin theorized the
impact of mechanical reproduction on art in 1935. But it is
Malraux who claims to have embarked on a lengthy, multipart project about similitudes in the artistic heritage of the
world in exactly the same year, and for whom, in opposition
to the architectonic space of the museum, photographic
reproduction, montage, and the book are the decisive filters
through which one sees the world. At the outset of his book
Le Musée imaginaire (first published in 1947),57 Malraux argues
that the secular modern museum has been crucial in reframing and transforming objects into art, both by displacing
them from their original sacred or ritual context and purpose,
and by bringing them into proximity and adjacency
with one another, thereby opening new possible readings

56
57

and analogies between Warburg’s image-based research and his theoretical ideas,
and von Trier’s Melancholia, are striking; see Anna-Sophie Springer’s visual essay
“Reading Rooms Reading Machines” on p. 91 of this book.
“Buchblättern als Lesen des Universums,” Plate 23a, reproduced in Warnke, Aby
Moritz Warburg: Der Bilderatlas Mnemosyne, Gesammelte Schriften, Vol. 1, 38–9.
The title of the English translation, The Museum Without Walls, by Stuart Gilbert
and Francis Price (London: Secker & Warburg, 1967), must be read in reference
to Erasmus’s envisioning of a “library without walls,” made possible through the
invention of the printing press, as Anthony Grafton mentions in his lecture, “The
Crisis of Reading,” The CUNY Graduate Center, New York, 10 November 2014.

107

that Arg.org was founded to meet these grassroots needs; the
platform supports a vast number of educational efforts, including
co-research projects, self-organized reading groups, and numerous other non-traditional workshops and initiatives.
d. My own writing on Arg.org. While using the platform, I have frequently come across my own essays and publications on the
site; although I often upload copies of my work to Arg.org myself,
these copies had been uploaded by other users. I was delighted
to see that other users found my publications to be of value and
were sharing my work through their curated “collections.” In some
cases, I held outright exclusive copyright on the text and I was
pleased it was being distributed. In other rare cases, I shared the
copyright or was forced to surrender my IP prior to publication;
I was still happy to see this type of document uploaded. I realize
it is not within my authority to grant copyright that is shared,
however, the power structure of contemporary publishing is often
abusive towards the writer. Massive, for-profit corporations have
dominated the publishing of academic texts and, as a result of
their power, have bullied young academics into signing away their
IP in exchange for publication. Even the librarians at Harvard
University—who spend over $3.75 million USD annually on journal subscriptions alone—believe that the economy of academic
publishing and bullying by a few giants has crossed a line, to the
point where they are boycotting certain publishers and encouraging faculty to publish instead in open access journals.
I want to conclude my letter of support by affirming that
Arg.org is at the cutting edge of academic research and knowledge
production. Sean Dockray, one of the developers of Arg.org,
is internationally recognized as a leading thinker regarding the
changing nature of research through digital platforms; he is regularly invited to academic conferences to discuss how the community on the Arg.org platform is experimenting with digital research.
Reading, publishing, researching, and writing are all changing
rapidly as networked digital culture influences professional and
academic life more and more frequently. Yet, our legal frameworks and business models are always slower than the practices

(“metamorphoses”) of individual objects—and, even more
critically, producing the general category of art itself. As
exceptions to this process, Malraux names those creations that
are so embedded in their original architecture that they defy
relocation in the museum (such as church windows, frescoes,
or monuments); this restriction of scale and transportation, in
fact, resulted in a consistent privileging of painting and sculpture within the museological apparatus.58
Long before networked societies, with instant Google
Image searches and prolific photo blogs, Malraux dedicated
himself to the difficulty of accessing works and oeuvres
distributed throughout an international topography of institutions. He located a revolutionary solution in the dematerialization and multiplication of visual art through photography
and print, and, above all, proclaimed that an imaginary museum
based on reproductions would enable the completion of a
meaningful collection of artworks initiated by the traditional
museum.59 Echoing Benjamin’s theory regarding the power of
the reproduction to change how art is perceived, Malraux
writes, “Reproduction is not the origin but a decisive means
for the process of intellectualization to which we subject art.
58

59

I thank the visual culture scholar Antonia von Schöning for pointing me to
Malraux after reading my previous considerations of the book-as-exhibition. Von
Schöning herself is author of the essay “Die universelle Verwandtschaft zwischen
den Bildern: André Malraux’Musée Imaginaire als Familienalbum der Kunst,”
kunsttexte.de, April 2012, edoc.hu-berlin.de/kunsttexte/2012-1/von-schoening
-antonia-5/PDF/von-schoening.pdf.
André Malraux, Psychologie der Kunst: Das imaginäre Museum (Baden-Baden:
Woldemar Klein Verlag, 1949), 9; see also Rosalind Krauss, “The Ministry of
Fate,” in A New History of French Literature, ed. Denis Hollier (Cambridge, MA
and London: Harvard University Press, 1989), 1000–6: “The photographic archive
itself, insofar as it is the locale of a potentially complete assemblage of world
artifacts, is a repository of knowledge in a way that no individual museum could
ever be” (1001).

109

of artists and technologists. Arg.org is a non-profit intellectual
venture and should therefore be considered as an artistic experiment, a pedagogical project, and an online community of coresearchers; it should not be subject to the same legal judgments
designed to thwart greedy profiteers and abusive practices.
There are certainly some documents to be found on Arg.org that
have been obtained by questionable or illegal means—every
Web 2.0 platform is bound to find such examples, from Youtube
to Facebook; however, such examples occur as a result of a small
number of participant users, not because of two dedicated individuals who logistically support the platform. A strength of Arg.org
and a source of its experimental vibrancy is its lack of policing,
which fosters a sense of freedom and anonymity which are both
vital elements for research within a democratic society and
the foundations of any library system. As a result of this freedom,
there are sometimes violations of copyright. However, since
Arg.org is a committed, non-profit community-library, such transgressions occur within a spirit of sharing and fair use that characterize this intellectual community. This sharing is quite different
from the popular platform Academia.edu, which is searchable
by non-users and acquires value by monetizing its articles through
the sale of digital advertising space and a nontransparent investment exit strategy. Arg.org is the antithesis of such a model
and instead fosters a community of learning through its platform.
Please do not hesitate to contact me for further information,
or to testify as a witness.
Regards,
Charles Stankievech,
Director of Visual Studies Program, University of Toronto
Co-Director of K. Verlag, Berlin & Toronto

… Medieval works, as diverse as the tapestry, the glass window,
the miniature, the fresco, and the sculpture become united as
one family if reproduced together on one page.”60 In his search
for a common visual rhetoric, Malraux went further than
merely arranging creations from one epoch and cultural sphere
by attempting to collect and directly juxtapose artworks and
artifacts from very diverse and distant cultural, historical, and
geographic contexts.
His richly illustrated series of books thus functions as a
utopian archive of new temporalities of art liberated from
history and scale by de-contextualizing and re-situating the
works, or rather their reproduced images, in unorthodox combinations. Le Musée imaginaire was thus an experimental virtual
museum intended to both form a repository of knowledge and
provide a space of association and connection that could not
be sustained by any other existing place or institution. From an
art historical point of view—Malraux was not a trained scholar
and was readily criticized by academics—his theoretical
assumptions of “universal kinship” (von Schöning) and the
“anti-destiny” of art have been rejected. His material selection
process and visual appropriation and manipulation through
framing, lighting, and scale, have also been criticized for their
problematic and often controversial—one could say, colonizing—implications.61 Among the most recent critics is the art
historian Walter Grasskamp, who argues that Malraux moreover might well have plagiarized the image-based work of the
60
61

André Malraux, Das imaginäre Museum, 16.
See the two volumes of Georges Duthuit, Le Musée Inimaginable (Paris: J. Corti,
1956); Ernst Gombrich, “André Malraux and the Crisis of Expressionism,” The
Burlington Magazine 96 (1954): 374–78; Michel Merlot, “L’art selon André Malraux,
du Musée imaginaire à l’Inventaire general,” In Situ 1 (2001), www.insitu.revues
.org/1053; and von Schöning, “Die universelle Verwandtschaft zwischen den Bildern.”

111


Dockray
Interface Access Loss
2013


Interface Access Loss

I want to begin this talk at the end -- by which I mean the end of property - at least according to
the cyber-utopian account of things, where digital file sharing and online communication liberate
culture from corporations and their drive for profit. This is just one of the promised forms of
emancipation -- property, in a sense, was undone. People, on a massive scale, used their
computers and their internet connections to share digitized versions of their objects with each
other, quickly producing a different, common form of ownership. The crisis that this provoked is
well-known -- it could be described in one word: Napster. What is less recognized - because it is
still very much in process - is the subsequent undoing of property, of both the private and common
kind. What follows is one story of "the cloud" -- the post-dot-com bubble techno-super-entity -which sucks up property, labor, and free time.

Object, Interface

It's debated whether the growing automation of production leads to global structural
unemployment or not -- Karl Marx wrote that "the self-expansion of capital by means of machinery
is thenceforward directly proportional to the number of the workpeople, whose means of
livelihood have been destroyed by that machinery" - but the promise is, of course, that when
robots do the work, we humans are free to be creative. Karl Kautsky predicted that increasing
automation would actually lead, not to a mass surplus population or widespread creativity, but
something much more mundane: the growth of clerks and bookkeepers, and the expansion of
unproductive sectors like "the banking system, the credit system, insurance empires and
advertising."

Marx was analyzing the number of people employed by some of the new industries in the middle
of the 19th century: "gas-works, telegraphy, photography, steam navigation, and railways." The
facts were that these industries were incredibly important, expansive and growing, highly
mechanized.. and employed a very small number of people. It is difficult not to read his study of
these technologies of connection and communication - against the background of our present
moment, in which the rise of the Internet has been accompanied by the deindustrialization of
cities, increased migrant and mobile labor, and jobs made obsolete by computation.

There are obvious examples of the impact of computation on the workplace: at factories and
distribution centers, robots engineered with computer-vision can replace a handful of workers,
with a savings of millions of dollars per robot over the life of the system. And there are less
apparent examples as well, like algorithms determining when and where to hire people and for
how long, according to fluctuating conditions.
Both examples have parallels within computer programming, namely reuse and garbage
collection. Code reuse refers to the practice of writing software in such a way that the code can be
used again later, in another program, to perform the same task. It is considered wasteful to give the
same time, attention, and energy to a function, because the development environment is not an
assembly line - a programmer shouldn't repeat. Such repetition then gives way to copy-andpasting (or merely calling). The analogy here is to the robot, to the replacement of human labor
with technology.

Now, when a program is in the midst of being executed, the computer's memory fills with data -but some of that is obsolete, no longer necessary for that program to run. If left alone, the memory
would become clogged, the program would crash, the computer might crash. It is the role of the
garbage collector to free up memory, deleting what is no longer in use. And here, I'm making the
analogy with flexible labor, workers being made redundant, and so on.

In Object-Oriented Programming, a programmer designs the software that she is writing around
“objects,” where each object is conceptually divided into “public” and “private” parts. The public
parts are accessible to other objects, but the private ones are hidden to the world outside the
boundaries of that object. It's a “black box” - a thing that can be known through its inputs and
outputs - even in total ignorance of its internal mechanisms. What difference does it make if the
code is written in one way versus an other .. if it behaves the same? As William James wrote, “If no
practical difference whatever can be traced, then the alternatives mean practically the same thing,
and all dispute is idle.”

By merely having a public interface, an object is already a social entity. It makes no sense to even
provide access to the outside if there are no potential objects with which to interact! So to

understand the object-oriented program, we must scale up - not by increasing the size or
complexity of the object, but instead by increasing the number and types of objects such that their
relations become more dense. The result is an intricate machine with an on and an off state, rather
than a beginning and an end. Its parts are interchangeable -- provided that they reliably produce
the same behavior, the same inputs and outputs. Furthermore, this machine can be modified:
objects can be added and removed, changing but not destroying the machine; and it might be,
using Gerald Raunig’s appropriate term, “concatenated” with other machines.

Inevitably, this paradigm for describing the relationship between software objects spread outwards,
subsuming more of the universe outside of the immediate code. External programs, powerful
computers, banking institutions, people, and satellites have all been “encapsulated” and
“abstracted” into objects with inputs and outputs. Is this a conceptual reduction of the richness
and complexity of reality? Yes, but only partially. It is also a real description of how people,
institutions, software, and things are being brought into relationship with one another according to
the demands of networked computation.. and the expanding field of objects are exactly those
entities integrated into such a network.

Consider a simple example of decentralized file-sharing: its diagram might represent an objectoriented piece of software, but here each object is a person-computer, shown in potential relation
to every other person-computer. Files might be sent or received at any point in this machine,
which seems particularly oriented towards circulation and movement. Much remains private, but a
collection of files from every person is made public and opened up to the network. Taken as a
whole, the entire collection of all files - which on the one hand exceeds the storage capacity of
any one person’s technical hardware, is on the other hand entirely available to every personcomputer. If the files were books.. then this collective collection would be a public library.

In order for a system like this to work, for the inputs and the outputs to actually engage with one
another to produce action or transmit data, there needs to be something in place already to enable
meaningful couplings. Before there is any interaction or any relationship, there must be some
common ground in place that allows heterogenous objects to ‘talk to each other’ (to use a phrase
from the business casual language of the Californian Ideology). The term used for such a common
ground - especially on the Internet - is platform, a word for that which enables and anticipates

future action without directly producing it. A platform provides tools and resources to the objects
that run “on top” of the platform so that those objects don't need to have their own tools and
resources. In this sense, the platform offers itself as a way for objects to externalize (and reuse)
labor. Communication between objects is one of the most significant actions that a platform can
provide, but it requires that the objects conform some amount of their inputs and outputs to the
specifications dictated by the platform.

But haven’t I only introduced another coupling, instead of between two objects, this time between
the object and the platform? What I'm talking about with "couplings" is the meeting point between
things - in other words, an “interface.” In the terms of OOP, the interface is an abstraction that
defines what kinds of interaction are possible with an object. It maps out the public face of the
object in a way that is legible and accessible to other objects. Similarly, computer interfaces like
screens and keyboards are designed to meet with human interfaces like fingers and eyes, allowing
for a specific form of interaction between person and machine. Any coupling between objects
passes through some interface and every interface obscures as much as it reveals - it establishes
the boundary between what is public and what is private, what is visible and what is not. The
dominant aesthetic values of user interface design actually privilege such concealment as “good
design,” appealing to principles of simplicity, cleanliness, and clarity.
Cloud, Access

One practical outcome of this has been that there can be tectonic shifts behind the interface where entire systems are restructured or revolutionized - without any interruption, as long as the
interface itself remains essentially unchanged. In Pragmatism’s terms, a successful interface keeps
any difference (in back) from making a difference (in front). Using books again as an example: for
consumers to become accustomed to the initial discomfort of purchasing a product online instead
of from a shop, the interface needs to make it so that “buying a book” is something that could be
interchangeably accomplished either by a traditional bookstore or the online "marketplace"
equivalent. But behind the interface is Amazon, which through low prices and wide selection is
the most visible platform for buying books and uses that position to push retailers and publishers
both to, at best, the bare minimum of profitability.

In addition to selling things to people and collecting data about its users (what they look at and
what they buy) to personalize product recommendations, Amazon has also made an effort to be a
platform for the technical and logistical parts of other retailers. Ultimately collecting data from
them as well, Amazon realizes a competitive advantage from having a comprehensive, up-to-theminute perspective on market trends and inventories. This volume of data is so vast and valuable
that warehouses packed with computers are constructed to store it, protect it, and make it readily
available to algorithms. Data centers, such as these, organize how commodities circulate (they run
business applications, store data about retail, manage fulfillment) but also - increasingly - they
hold the commodity itself - for example, the book. Digital book sales started the millennium very
slowly but by 2010 had overtaken hardcover sales.

Amazon’s store of digital books (or Apple’s or Google’s, for that matter) is a distorted reflection of
the collection circulating within the file-sharing network, displaced from personal computers to
corporate data centers. Here are two regimes of digital property: the swarm and the cloud. For
swarms (a reference to swarm downloading where a single file can be downloaded in parallel
from multiple sources) property is held in common between peers -- however, property is
positioned out of reach, on the cloud, accessible only through an interface that has absorbed legal
and business requirements.

It's just half of the story, however, to associate the cloud with mammoth data centers; the other
half is to be found in our hands and laps. Thin computing, including tablets and e-readers, iPads
and Kindles, and mobile phones have co-evolved with data centers, offering powerful, lightweight
computing precisely because so much processing and storage has been externalized.

In this technical configuration of the cloud, the thin computer and the fat data center meet through
an interface, inevitably clean and simple, that manages access to the remote resources. Typically,
a person needs to agree to certain “terms of service,” have a unique, measurable account, and
provide payment information; in return, access is granted. This access is not ownership in the
conventional sense of a book, or even the digital sense of a file, but rather a license that gives the
person a “non-exclusive right to keep a permanent copy… solely for your personal and noncommercial use,” contradicting the First Sale Doctrine, which gives the “owner” the right to sell,
lease, or rent their copy to anyone they choose at any price they choose. The doctrine,

established within America's legal system in 1908, separated the rights of reproduction, from
distribution, as a way to "exhaust" the copyright holder's control over the commodities that people
purchased.. legitimizing institutions like used book stores and public libraries. Computer software
famously attempted to bypass the First Sale Doctrine with its "shrink wrap" licenses that restricted
the rights of the buyer once she broke through the plastic packaging to open the product. This
practice has only evolved and become ubiquitous over the last three decades as software began
being distributed digitally through networks rather than as physical objects in stores. Such
contradictions are symptoms of the shift in property regimes, or what Jeremy Rifkin called “the age
of access.” He writes that “property continues to exist but is far less likely to be exchanged in
markets. Instead, suppliers hold on to property in the new economy and lease, rent, or charge an
admission fee, subscription, or membership dues for its short-term use.”

Thinking again of books, Rifkin’s description gives the image of a paid library emerging as the
synthesis of the public library and the marketplace for commodity exchange. Considering how, on
the one side, traditional public libraries are having their collections deaccessioned, hours of
operation cut, and are in some cases being closed down entirely, and on the other side, the
traditional publishing industry finds its stores, books, and profits dematerialized, the image is
perhaps appropriate. Server racks, in photographs inside data centers, strike an eerie resemblance
to library stacks - - while e-readers are consciously designed to look and feel something like a
book. Yet, when one peers down into the screen of the device, one sees both the book - and the
library.

Like a Facebook account, which must uniquely correspond to a real person, the e-reader is an
individualizing device. It is the object that establishes trusted access with books stored in the cloud
and ensures that each and every person purchases their own rights to read each book. The only
transfer that is allowed is of the device itself, which is the thing that a person actually does own.
But even then, such an act must be reported back to the cloud: the hardware needs to be deregistered and then re-registered with credit card and authentication details about the new owner.

This is no library - or it's only a library in the most impoverished sense of the word. It is a new
enclosure, and it is a familiar story: things in the world (from letters, to photographs, to albums, to
books) are digitized (as emails, JPEGs, MP3s, and PDFs) and subsequently migrate to a remote

location or service (Gmail, Facebook, iTunes, Kindle Store). The middle phase is the biggest
disruption, when the interface does the poorest job concealing the material transformations taking
place, when the work involved in creating those transformations is most apparent, often because
the person themselves is deeply involved in the process (of ripping vinyl, for instance). In the third
phase, the user interface becomes easier, more “frictionless,” and what appears to be just another
application or folder on one’s computer is an engorged, property-and-energy-hungry warehouse a
thousand miles away.

Capture, Loss

Intellectual property's enclosure is easy enough to imagine in warehouses of remote, secure hard
drives. But the cloud internalizes processing as well as storage, capturing the new forms of cooperation and collaboration characterizing the new economy and its immaterial labor. Social
relations are transmuted into database relations on the "social web," which absorbs selforganization as well. Because of this, the cloud impacts as strongly on the production of
publications, as on their consumption, in the tradition sense.

Storage, applications, and services offered in the cloud are marketed for consumption by authors
and publishers alike. Document editing, project management, and accounting are peeled slowly
away from the office staff and personal computers into the data centers; interfaces are established
into various publication channels from print on demand to digital book platforms. In the fully
realized vision of cloud publishing, the entire technical and logistical apparatus is externalized,
leaving only the human labor.. and their thin devices remaining. Little distinguishes the authorobject from the editor-object from the reader-object. All of them.. maintain their position in the
network by paying for lightweight computers and their updates, cloud services, and broadband
internet connections.
On the production side of the book, the promise of the cloud is a recovery of the profits “lost” to
file-sharing, as all that exchange is disciplined, standardized and measured. Consumers are finally
promised the access to the history of human knowledge that they had already improvised by
themselves, but now without the omnipresent threat of legal prosecution. One has the sneaking
suspicion though.. that such a compromise is as hollow.. as the promises to a desperate city of the

jobs that will be created in a new constructed data center - - and that pitting “food on the table”
against “access to knowledge” is both a distraction from and a legitimation of the forms of power
emerging in the cloud. It's a distraction because it's by policing access to knowledge that the
middle-man platform can extract value from publication, both on the writing and reading sides of
the book; and it's a legitimation because the platform poses itself as the only entity that can resolve
the contradiction between the two sides.

When the platform recedes behind the interface, these two sides are the the most visible
antagonism - in a tug-of-war with each other - - yet neither the “producers” nor the “consumers” of
publications are becoming more wealthy, or working less to survive. If we turn the picture
sideways, however, a new contradiction emerges, between the indebted, living labor - of authors,
editors, translators, and readers - on one side, and on the other.. data centers, semiconductors,
mobile technology, expropriated software, power companies, and intellectual property.
The talk in the data center industry of the “industrialization” of the cloud refers to the scientific
approach to improving design, efficiency, and performance. But the term also recalls the basic
narrative of the Industrial Revolution: the movement from home-based manufacturing by hand to
large-scale production in factories. As desktop computers pass into obsolescence, we shift from a
networked, but small-scale, relationship to computation (think of “home publishing”) to a
reorganized form of production that puts the accumulated energy of millions to work through
these cloud companies and their modernized data centers.

What kind of buildings are these blank superstructures? Factories for the 21st century? An engineer
named Ken Patchett described the Facebook data center that way in a television interview, “This is
a factory. It’s just a different kind of factory than you might be used to.” Those factories that we’re
“used to,” continue to exist (at Foxconn, for instance) producing the infrastructure, under
recognizably exploitative conditions, for a “different kind of factory,” - a factory that extends far
beyond the walls of the data center.

But the idea of the factory is only part of the picture - this building is also a mine.. and the
dispersed workforce devote most of their waking hours to mining-in-reverse, packing it full of data,
under the expectation that someone - soon - will figure out how to pull out something valuable.

Both metaphors rely on the image of a mass of workers (dispersed as it may be) and leave a darker
and more difficult possibility: the data center is like the hydroelectric plant, damming up property,
sociality, creativity and knowledge, while engineers and financiers look for the algorithms to
release the accumulated cultural and social resources on demand, as profit.

This returns us to the interface, site of the struggles over the management and control of access to
property and infrastructure. Previously, these struggles were situated within the computer-object
and the implied freedom provided by its computation, storage, and possibilities for connection
with others. Now, however, the eviscerated device is more interface than object, and it is exactly
here at the interface that the new technological enclosures have taken form (for example, see
Apple's iOS products, Google's search box, and Amazon's "marketplace"). Control over the
interface is guaranteed by control over the entire techno-business stack: the distributed hardware
devices, centralized data centers, and the software that mediates the space between. Every major
technology corporation must now operate on all levels to protect against any loss.

There is a centripetal force to the cloud and this essay has been written in its irresistible pull. In
spite of the sheer mass of capital that is organized to produce this gravity and the seeming
insurmountability of it all, there is no chance that the system will absolutely manage and control
the noise within it. Riots break out on the factory floor; algorithmic trading wreaks havoc on the
stock market in an instant; data centers go offline; 100 million Facebook accounts are discovered
to be fake; the list will go on. These cracks in the interface don't point to any possible future, or
any desirable one, but they do draw attention to openings that might circumvent the logic of
access.

"What happens from there is another question." This is where I left things off in the text when I
finished it a year ago. It's a disappointing ending: we just have to invent ways of occupying the
destruction, violence and collapse that emerge out of economic inequality, global warming,
dismantled social welfare, and so on. And there's not much that's happened since then to make us
very optimistic - maybe here I only have to mention the NSA. But as I began with an ending, I
really should end at a beginning.
I think we were obliged to adopt a negative, critical position in response the cyber-utopianism of

the last almost 20 years, whether in its naive or cynical forms. We had to identify and theorize the
darker side of things. But it can become habitual, and when the dark side materializes, as it has
over the past few years - so that everyone knows the truth - then the obligation flips around,
doesn't it? To break out of habitual criticism as the tacit, defeated acceptance of what is. But, what
could be? Where do we find new political imaginaries? Not to ask what is the bright side, or what
can we do to cope, but what are the genuinely emancipatory possibilities that are somehow still
latent, buried under the present - or emerging within those ruptures in it? - - - I can't make it all
the way to a happy ending, to a happy beginning, but at least it's a beginning and not the end.

Constant
The Techno-Galactic Guide to Software Observation
2018


::: {.toc}
[Introduction](#mtljymuz) [Encounter several collections of historical
hardware back-to-back](#njm5zwm4) [Interview people about their
histories with software](#mguzmza4) [Ask several people from different
fields and age-groups the same question: \"***What is
software?***\"](#odfkotky) [FMEM and /DEV/MEM](#mzcxodix)
[Pan/Monopsychism](#m2mwogri) [Fountain refreshment](#ndawnmy5) [Create
\"nannyware\": Software that observes and addresses the user](#mtk5yjbl)
[Useless scroll against productivity](#yzuwmdq4) [Investigating how
humans and machines negotiate the experience of time](#m2vjndu3)
[Quine](#nmi5mgjm) [Glossaries as an exercise](#zwu0ogu0) [Adding
qualifiers](#mja0m2i5) [Searching \"software\" through
software](#mmmwmje2) [Persist in calling everyone a Software Curious
Person](#ndhkmwey) [Setup a Relational software observatory consultancy
(RSOC)](#mmu1mgy0) [Agile Sun Salutation](#mta1ntzm) [Hand
reading](#mdu0mmji) [Bug reporting for sharing observations](#yznjodq3)
[Interface Détournement](#ytu5y2qy) [Comportments of software
(softwear)](#y2q4zju5) [Continuous integration](#mwrhm2y4) [make make
do](#zdixmgrm) [Flowcharts (Flow of the chart -- chart of the flow on
demand!)](#zweymtni) [Something in the Middle Maybe (SitMM)](#ywfin2e4)
[What is it like to be AN ELEVATOR?](#ntlimgqy) [Side Channel
Analysis](#ndg2zte4) [Compiling a bestiary of software logos](#njmzmjm1)
[Encounter several collections of historical hardware
back-to-back](#njm5zwm4) [Testing the testbed: testing software with
observatory ambitions (SWOA)](#mmy2zgrl) [Prepare a reader to think
theory with software](#mmmzmmrh)
:::

[]{#mtljymuz .anchor}

A guide to techno-galactic software observation

> I am less interested in the critical practice of reflection, of
> showing once-again that the emperor has no clothes, than in finding a
> way to *diffract* critical inquiry in order to make difference
> patterns in a more worldly way.^[1](#ebceffee)^

The techno-galactic software survival guide that you are holding right
now was collectively produced as an outcome of the Techno-Galactic
Software Observatory. This guide proposes several ways to achieve
critical distance from the seemingly endless software systems that
surround us. It offers practical and fantastical tools for the tactical
(mis)use of software, empowering/enabling users to resist embedded
paradigms and assumptions. It is a collection of methods for approaching
software, experiencing its myths and realities, its risks and benefits.

With the rise of online services, the use of software has increasingly
been knitted into the production of software, even while the rhetoric,
rights, and procedures continue to suggest that use and production
constitute separate realms. This knitting together and its corresponding
disavowal have an effect on the way software is used and produced, and
radically alters its operative role in society. The shifts ripple across
galaxies, through social structures, working conditions and personal
relations, resulting in a profusion of apparatuses aspiring to be
seamless while optimizing and monetizing individual and collective flows
of information in line with the interests of a handful of actors. The
diffusion of software services affects the personal, in the form of
intensified identity shaping and self-management. It also affects the
public, as more and more libraries, universities and public
infrastructures as well as the management of public life rely on
\"solutions\" provided by private companies. Centralizing data flows in
the clouds, services blur the last traces of the thin line that
separates bio- from necro-politics.

Given how fast these changes resonate and reproduce, there is a growing
urgency to engage in a critique of software that goes beyond taking a
distance, and that deals with the fact that we are inevitably already
entangled. How can we interact, intervene, respond and think with
software? What approaches can allow us to recognize the agency of
different actors, their ways of functioning and their politics? What
methods of observation enable critical inquiry and affirmative discord?
What techniques can we apply to resurface software where it has melted
into the infrastructure and into the everyday? How can we remember that
software is always at work, especially where it is designed to disappear
into the background?

We adopted the term of observation for a number of reasons. We regard
observation as a way to approach software, as one way to organize
engagement with its implications. Observation, and the enabling of
observation through intensive data-centric feedback mechanisms, is part
of the cybernetic principles that underpin present day software
production. Our aim was to scrutinize this methodology in its many
manifestations, including in \"observatories\" \-- high cost
infrastructures \[testing infrastructures?CITECLOSE23310 of observation
troubled by colonial, imperial traditions and their problematic
divisions of nature and culture \-- with the hope of opening up
questions about who gets to observe software (and how) and who is being
observed by software (and with what impact)? It is a question of power,
one that we answer, at least in part, with critical play.

We adopted the term techno-galactic to match the advertised capability
of \"scaling up to the universe\" that comes in contemporary paradigms
of computation, and to address different scales of software communities
and related political economies that involve and require observation.

Drawing on theories of software and computation developed in academia
and elsewhere, we grounded our methods in hands-on exercises and
experiments that you now can try at home. This Guide to Techno-Galactic
Software Observation offers methods developed in and inspired by the
context of software production, hacker culture, software studies,
computer science research, Free Software communities, privacy activism,
and artistic practice. It invites you to experiment with ways to stay
with the trouble of software.

The Techno-Galactic Software Observatory
----------------------------------------

In the summer of 2017, around thirty people gathered in Brussels to
explore practices of proximate critique with and of software in the
context of a worksession entitled \"Techno-Galactic Software
Observatory\".^[2](#bcaacdcf)^ The worksession called for
software-curious people of all kinds to ask questions about software.
The intuition behind such a call was that different types of engagement
requires a heterogeneous group of participants with different levels of
expertise, skill and background. During three sessions of two days,
participants collectively inspected the space-time of computation and
probed the universe of hardware-software separations through excursions,
exercises and conversations. They tried out various perspectives and
methods to look at the larger picture of software as a concept, as a
practice, and as a set of techniques.

The first two days of The Techno-Galactic Software Observatory included
visits to the Musée de l\'Informatique Pionnière en
Belgique^[3](#aaceaeff)^ in Namur and the Computermuseum
KULeuven^[4](#afbebabd)^. In the surroundings of these collections of
historical 'numerical artefacts', we started viewing software in a
long-term context. It offered us the occasion to reflect on the
conditions of its appearance, and allowed us to take on current-day
questions from a genealogical perspective. What is software? How did it
appear as a concept, in what industrial and governmental circumstances?
What happens to the material conditions of its production (minerals,
factory labor, hardware) when it evaporates into a cloud?

The second two days we focused on the space-time dimension of IT
development. The way computer programs and operating systems are
manufactured changed tremendously through time, and so did its
production times and places. From military labs via the mega-corporation
cubicles to the open-space freelancer utopia, what ruptures and
continuities can be traced in the production, deployment, maintenance
and destruction of software? From time-sharing to user-space partitions
and containerization, what separations were and are at work? Where and
when is software made today?

The Walk-in Clinic
------------------

The last two days at the Techno-galactic software observatory were
dedicated to observation and its consequences. The development of
software encompasses a series of practices whose evocative names are
increasingly familiar: feedback, report, probe, audit, inspect, scan,
diagnose, explore, test \... What are the systems of knowledge and power
within which these activities take place, and what other types of
observation are possible? As a practical set for our investigations, we
set up a walk-in clinic on the 25th floor of the World Trade Center,
where users and developers could arrive with software-questions of all
kinds.

> Do you suffer from the disappearance of your software into the cloud,
> feel oppressed by unequal user privilege, or experience the torment of
> software-ransom of any sort? Bring your devices and interfaces to the
> World Trade Center! With the help of a clear and in-depth session, at
> the Techno-Galactic Walk-In Clinic we guarantee immediate results. The
> Walk-In Clinic provides free hands-on observations to software curious
> people of all kinds. A wide range of professional and amateur
> practitioners will provide you with
> Software-as-a-Critique-as-a-Service on the spot. Available services
> range from immediate interface critique, collaborative code
> inspection, data dowsing, various forms of network analyses,
> unusability testing, identification of unknown viruses, risk
> assessment, opening of black-boxes and more. Free software
> observations provided. Last intake at 16:45.\
> (invitation to the Walk-In Clinic, June 2017)

On the following pages: Software as a Critique as a Service (SaaCaaS)
Directory and intake forms for Software Curious People (SCP).

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/masterlist\_twosides\_NEU.pdf]{.tmp}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/scprecord\_FINAL.pdf]{.tmp}
[]{#owqzmtdk .anchor}

Techno-Galactic Software Observation Essentials
=
**WARNING**

The survival techniques described in the following guide are to be used
at your own risk in case of emergency regarding software curiosity. The
publisher will not accept any responsability in case of damages caused
by misuse, misundestanding of instruction or lack of curiosity. By
trying the action exposed in the guide, you accept the responsability of
loosing data or altering hardware, including hard disks, usb key, cloud
storage, screens by throwing them on the floor, or even when falling on
the floor with your laptop by tangling your feet in an entanglement of
cables. No harm has been done to human, animal, computers or plants
while creating the guide. No firearms or any kind of weapon is needed in
order to survive software.\
Just a little bit of patience.

**Software observation survival stresses**

**Physical fitness plays a great part of software observation. Be fit or
CTRL-Quit.**

When trying to observe software you might experience stresses as such :

*Anxiety*Sleep deprivation *Forgetting about eating*Loss of time
tracking

**Can you cope with software ? You have to.**

> our methods for observation, like mapping, come with their luggage.

[Close encounters]{.grouping} []{#njm5zwm4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.visit)
Encounter several collections of historical hardware
back-to-back]{.method .descriptor} [How]{.how .empty .descriptor}

This can be done by identifying one or more computer museums and visit
them with little time in-between. Visiting a friend with a large
basement and lots of left-over computer equipment can help. Seeing and
possibly touching hardware from different contexts
(state-administration, business, research, \...), periods of time,
cultural contexts (California, Germany, French-speaking Belgium) and
price ranges allows you to sense the interactions between hardware and
software development.

[Note: It\'s a perfect way to hear people speak about the objects and
their contexts, how they worked or not and how objects are linked one
with another. It also shows the economic and cultural aspects of
softwares.]{.note .descriptor} [WARNING: **DO NOT FOLD, SPINDLE OR
MUTILATE**]{.warning .descriptor} [Example: Spaghetti Suitcase]{.example
.descriptor}

At one point during the demonstration of a Bull computer, the guide
revealed the system\'s \"software\" \-- a suitcase sized module with
dozens of patch cords. She made the comment that the term \"spaghetti
code\" (a derogatory expression about early code usign many \"GOTO\"
statments) had its origin in this physical arrangement of code as
patchings.

Preserving old hardware in order to observe physical manifestation of
software. See software here : we did experienced the incredible
possibility of actually touching software.

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/images/wednesday/IMG\_20170607\_113634\_585.jpg]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/resizes/Techno-Galactic-Software-Observatory/IMG\_1163.JPG?m=1496916927]{.tmp}
[Example: Playing with the binary. Bull cards. Happy operator! Punch
card plays.]{.example .descriptor}

\"The highlight of the collection is to revive a real punch card
workshop of the 1960s.\"

[Example: Collection de la Maison des Écritures d\'Informatique & Bible,
Maredsous]{.example .descriptor}

The particularity of the collection lies in the fact that it\'s the
conservation of multiple stages of life of a software since its initial
computerization until today. The idea of introducing informatics into
the work of working with/on the Bible (versions in Hebrew, Greek, Latin,
and French) dates back to 1971, via punch card recordings and their
memorization on magnetic tape. Then came the step of analyzing texts
using computers.

[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/resizes/Preparing-the-Techno-galactic-Software-Observatory/DSC05019.JPG?m=1490635726]{.tmp}
[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.jean.heuns]{.tmp}
[]{#mguzmza4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.jean.heuns)
Interview people about their histories with software]{.method
.descriptor} [What: Observe personnal narratives around software
history. Retrace the path of relation to software, how it changed during
the years and what are the human access memories that surrounds it. To
look at software through personal relations and emotions.]{.what
.descriptor} [How: Interviews are a good way to do it. Informal
conversations also.]{.how .descriptor}

Jean Heuns has been collecting servers, calculators, softwares, magnetic
tapes hard disks for xxx years. Found an agreement for them to be
displayed in the department hallways. Department of Computer sciences -
Kul Leuven.

[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3350.JPG]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3361.JPG]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3356.JPG]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3343.JPG]{.tmp}
[TODO: RELATES TO]{.tmp} []{#odfkotky .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.samequestion)
Ask several people from different fields and age-groups the same
question: \"***What is software?***\"]{.method .descriptor} [Remember:
The answers to this question will vary depending on who is asking it to
who.]{.remember .descriptor} [What: By paying close attention to the
answers, and possibly logging them, observations on the ambiguous place
and nature of software can be made.]{.what .descriptor}
[Example]{.example .empty .descriptor}

Jean Huens (system administrator at the department of Computer Science,
KULeuven): \"*It is difficult to answer the question \'what is
software\', but I know what is good software*\"

Thomas Cnudde (hardware designer at ESAT - COSIC, Computer Security and
Industrial Cryptography, KULeuven): \"*Software is a list of sequential
instructions! Hardware for me is made of silicon, software a sequence of
bits in a file. But naturally I am biased: I\'m a hardware designer so I
like to consider it as unique and special*\".

Amal Mahious (Director of NAM-IP, Namur): \"*This, you have to ask the
specialists.*\"

` {.verbatim}
*what is software?
--the unix filesystem says: it's a file----what is a file?
----in the filesystem, if you ask xxd:
------ it's a set of hexadecimal bytes
-------what is hexadecimal bytes?
------ -b it's a set of binary 01s
----if you ask objdump
-------it's a set of instructions
--side channel researching also says:
----it's a set of instructions
--the computer glossary says:
----it's a computer's programs, plus the procedure for their use http://etherbox.local/home/pi/video/A_Computer_Glossary.webm#t=02:26
------ a computer's programs is a set of instrutions for performing computer operations
`

[Remember: To answer the question \"*what is software*\" depends on the
situation, goal, time, and other contextual influences.]{.remember
.descriptor} [TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.everyonescp]{.tmp}
[]{#mzcxodix .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.devmem) FMEM
and /DEV/MEM]{.method .descriptor} [What: Different ways of exploring
your memory (RAM). Because in unix everything is a file, you can access
your memory as if it were a file.]{.what .descriptor} [Urgency: To try
and observe the operational level of software, getting closer to the
workings, the instruction-being of an executable/executing file, the way
it is when it is loaded into memory rather than when it sits in the
harddisk]{.urgency .descriptor} [Remember: In Unix-like operating
systems, a device file or special file is an interface for a device
driver that appears in a file system as if it were an ordinary file. In
the early days you could fully access your memory via the memory device
(`/dev/mem`) but over time the access was more and more restricted in
order to avoid malicious processes to directly access the kernel memory.
The kernel option CONFIG\_STRICT\_DEVMEM was introduced in kernel
version 2.6 and upper (2.6.36--2.6.39, 3.0--3.8, 3.8+HEAD). So you\'ll
need to use the Linux kernel module fmem: this module creates
`/dev/fmem` device, that can be used for accessing physical memory
without the limits of /dev/mem (1MB/1GB, depending on
distribution).]{.remember .descriptor}

`/dev/mem` tools to explore processes stored in the memory

ps ax | grep process
cd /proc/numberoftheprocess
cat maps

\--\> check what it is using

The proc filesystem is a pseudo-filesystem which provides an interface
to kernel data structures. It is commonly mounted at `/proc`. Most of it
is read-only, but some files allow kernel variables to be changed.

dump to a file\--\>change something in the file\--\>dump new to a
file\--\>diff oldfile newfile

\"where am i?\"

to find read/write memory addresses of a certain process\
`awk -F "-| " '$3 ~ /rw/ { print $1 " " $2}' /proc/PID/maps`{.bash}

take the range and drop it to hexdump

sudo dd if=/dev/mem bs=1 skip=$(( 16#b7526000 - 1 )) \
count=$(( 16#b7528000 - 16#7b7526000 + 1)) | hexdump -C

Besides opening the memory dump with an hex editor you can also try and
explore it with other tools or devices. You can open it as a raw image,
you can play it as a sound or perhaps send it directly to your
frame-buffer device (`/dev/fb0`).

[WARNING: Although your memory may look like/sound like/read like
gibberish, it may contain sensitive information about you and your
computer!]{.warning .descriptor} [Example]{.example .empty .descriptor}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/images/Screenshot\_from\_2017-06-07\_164407.png]{.tmp}
[TODO: BOX: Forensic and debuggung tools can be used to explore and
problematize the layers of abstraction of computing.]{.tmp} [TODO:
RELATES TO
http://pad.constantvzw.org/p/observatory.guide.monopsychism]{.tmp}
[]{#m2mwogri .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.monopsychism)
Pan/Monopsychism]{.method .descriptor} [What: Reading and writing
sectors of memory from/to different computers]{.what .descriptor} [How:
Shell commands and fmem kernel module]{.how .descriptor} [Urgency:
Memory, even when it is volatile, is a trace of the processes happening
in your computer in the form of saved information, and is therefore more
similar to a file than to a process. Challenging the file/process
divide, sharing memory with others will allow a more intimate relation
with your and other\'s computers.]{.urgency .descriptor} [About:
Monopsychism is the philosophical/theological doctrine according to
which there exists but one intellect/soul, shared by all beings.]{.about
.descriptor} [TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.devmem]{.tmp} [Note: The
parallel allocation and observation of the same memory sector in two
different computers is in a sense the opposite process of machine
virtualization, where the localization of multiple virtual machines in
one physical comptuers can only happen by rigidly separating the memory
sectors dedicated to the different virtual machines.]{.note .descriptor}
[WARNING: THIS METHOD HAS NOT BEEN TESTED, IT CAN PROBABLY DAMAGE YOUR
RAM MEMORY AND/OR COMPUTER]{.warning .descriptor}

First start the fmem kernel module in both computers:

`sudo sh fmem/run.sh`{.bash}

Then load part of your computer memory into the other computer via dd
and ssh:

`dd if=/dev/fmem bs=1 skip=1000000 count=1000 | ssh user@othercomputer dd of=/dev/fmem`{.bash}

Or viceversa, load part of another computer\'s memory into yours:

`ssh user@othercomputer dd if=/dev/fmem bs=1 skip=1000000 count=1000 | dd of=/dev/fmem`{.bash}

Or even, exchange memory between two other computers:

`ssh user@firstcomputer dd if=/dev/fmem bs=1 skip=1000000 count=1000 | ssh user@secondcomputer dd of=/dev/fmem`{.bash}

` {.quaverbatim}
pan/monopsychism:
(aquinas famously opposed averroes..who's philosophy can be interpreted as monopsychist)

shared memory

copying the same memory to different computers

https://en.wikipedia.org/wiki/Reflection_%28computer_programming%29

it could cut through the memory like a worm

or it could go through the memory of different computers one after the other and take and leave something there
`

[Temporality]{.grouping} []{#ndawnmy5 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.fountain)
Fountain refreshment]{.method .descriptor} [What: Augmenting a piece of
standardised office equipment designed to dispense water to perform a
decorative function.]{.what .descriptor} [How: Rearranging space as
conditioning observations (WTC vs. Museum vs. University vs. Startup
Office vs. Shifting Walls that became Water Fountains)]{.how
.descriptor} [Who: Gaining access to standardised water dispensing
equipment turned out to be more difficult than expected as such
equipment is typically licensed / rented rather than purchased outright.
Acquiring a unit that could be modified required access to secondary
markets of second hand office equiment in order to purchase a disused
model.]{.who .descriptor} [Urgency: EU-OSHA (European Agency for Safety
and Health at Work) Directive 2003/10/EC noise places describes the
minimum health and safety requirements regarding the exposure of workers
to the risks arising from physical agents (noise). However no current
European guidelines exist on the potential benefitial uses of tactially
designed additive noise systems.]{.urgency .descriptor}

The Techno-Galactic Software Observatory -- Comfortable silence, one way
mirrors

A drinking fountain and screens of one-way mirrors as part of the work
session \"*The Techno-Galactic Software Observatory*\" organised by
Constant.

For the past 100 years the western ideal of a corporate landscape has
been has been moving like a pendulum, oscillating between grids of
cubicles and organic, open landscapes, in a near to perfect 25-year
rhythm. These days the changes in office organisation is supplemented by
sound design, in corporate settings mostly to create comfortable
silence. Increase the sound and the space becomes more intimate, the
person on the table next to you can not immediately hear what you are
saying. It seems that actual silence in public and corporate spaces has
not been sought after since the start of the 20th century. Actual
silence is not at the moment considered comfortable. One of the visible
symptoms of our desire to take the edge off the silence is to be
observed through the appearance of fountains in public space. The
fountains purpose being to give off neutral sound, like white noise
without the negative connotations. However as a sound engineer\'s
definition of noise is unwanted sound that all depends on ones personal
relation to the sound of dripping water.

This means that there needs to be a consistent inoffensiveness to create
comfortable silence.

In corporate architecture the arrival of glass buildings were originally
seen as a symbol of transparency, especially loved by governmental
buildings. Yet the reflectiveness of this shiny surface once combined
with strong light -- known as the treason of the glass -- was only
completely embraced at the invention of one-way-mirror foil. And it was
the corporate business-world that would come to be known for their
reflective glass skyscrapers. As the foil reacts to light, it appears
transparent to someone standing in the dark, while leaving the side with
the most light with an opaque surface. Using this foil as room dividers
in a room with a changing light, what is hidden or visible will vary
throughout the day. So will the need for comfortable silence. Disclaimer
:\
Similar to the last 100 years of western office organisation,\
this fountain only has two modes:\
on or off

If it is on it also offers two options\
cold water and hot water

This fountain has been tampered with and has not in any way been
approved by a proffesional fountain cleaner. I do urge you to consider
this before you take the decision to drink from the fountain.

Should you chose to drink from the fountain, then I urge you to write
your name on your cup, in the designated area, for a customised
experience of my care for you.

I do want you to be comfortable.

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/mia6.gif]{.tmp} [SHOW
IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/FullSizeRender%2811%29.jpg]{.tmp}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/IMG\_5695.JPG]{.tmp}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/IMG\_5698.JPG]{.tmp}
[TODO: RELATES TO]{.tmp} []{#mtk5yjbl .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.silvio) Create
\"nannyware\": Software that observes and addresses the user]{.method
.descriptor} [What]{.what .empty .descriptor}

Nannyware is software meant to protect users while limiting their space
of activity. It is software that passive-aggressively suggests or
enforces some kind of discipline. In other words, create a form of
parental control extended to adults by means of user experience / user
interfaces.

Nannyware is a form of Content-control software: software designed to
restrict or control the content a reader is authorised to access,
especially when utilised to restrict material delivered over the
Internet via the Web, e-mail, or other means. Content-control software
determines what content will be available or be blocked.

[How]{.how .empty .descriptor}

> \[\...RestrictionsCITECLOSE23310 can be applied at various levels: a
> government can attempt to apply them nationwide (see Internet
> censorship), or they can, for example, be applied by an ISP to its
> clients, by an employer to its personnel, by a school to its students,
> by a library to its visitors, by a parent to a child\'s computer, or
> by an individual user to his or her own computer.^[5](#fcefedaf)^

[Who]{.who .empty .descriptor}

> Unlike filtering, accountability software simply reports on Internet
> usage. No blocking occurs. In setting it up, you decide who will
> receive the detailed report of the computer's usage. Web sites that
> are deemed inappropriate, based on the options you've chosen, will be
> red-flagged. Because monitoring software is of value only "after the
> fact", we do not recommend this as a solution for families with
> children. However, it can be an effective aid in personal
> accountability for adults. There are several available products out
> there.^[6](#bffbbeaf)^

[Urgency]{.urgency .empty .descriptor}

> As with all new lifestyle technologies that come along, in the
> beginning there is also some chaos until their impact can be assessed
> and rules put in place to bring order and respect to their
> implementation and use in society. When the automobile first came into
> being there was much confusion regarding who had the right of way, the
> horse or the car. There were no paved roads, speed limits, stop signs,
> or any other traffic rules. Many lives were lost and much property was
> destroyed as a result. Over time, government and society developed
> written and unwritten rules as to the proper use of the
> car.^[7](#bbfcbcfa)^

[WARNING]{.warning .empty .descriptor}

> Disadvantages of explicit proxy deployment include a user\'s ability
> to alter an individual client configuration and bypass the proxy. To
> counter this, you can configure the firewall to allow client traffic
> to proceed only through the proxy. Note that this type of firewall
> blocking may result in some applications not working
> properly.^[8](#ededebde)^

[Example]{.example .empty .descriptor}

> The main problem here is that the settings that are required are
> different from person to person. For example, I use workrave with a 25
> second micropause every two and a half minute, and a 10 minute
> restbreak every 20 minutes. I need these frequent breaks, because I\'m
> recovering from RSI. And as I recover, I change the settings to fewer
> breaks. If you have never had any problem at all (using the computer,
> that is), then you may want much fewer breaks, say 10 seconds
> micropause every 10 minutes, and a 5 minute restbreak every hour. It
> is very hard to give proper guidelines here. My best advice is to play
> around and see what works for you. Which settings \"feel right\".
> Basically, that\'s how Workrave\'s defaults evolve.^[9](#cfbbbfdd)^

[SHOW IMAGE HERE: !\[Content-control software\](
http://www.advicegoddess.com/archives/2008/05/03/nannyware.jpg )]{.tmp}
[SHOW IMAGE HERE: !\[A \"nudge\" from your music player
\](http://img.wonderhowto.com/img/10/25/63533437022064/0/disable-high-volume-warning-when-using-headphones-your-samsung-galaxy-s4.w654.jpg)]{.tmp}
[SHOW IMAGE HERE: !\[Emphasis on the body\]
(http://classicallytrained.net/wp-content/uploads/2014/10/take-a-break.jpg)]{.tmp}
[SHOW IMAGE HERE: !\[ \"Slack is trying to be my friend but it\'s more
like a slightly insensitive and slightly bossy acquaintance.\"
\@briecode \] (https://pbs.twimg.com/media/CuZLgV4XgAAYexX.jpg)]{.tmp}
[SHOW IMAGE HERE: !\[Slack is trying to be my friend but it\'s more like
a slightly insensitive and slightly bossy acquaintance.\]
(https://pbs.twimg.com/media/CuZLgV4XgAAYexX.jpg)]{.tmp} [SHOW IMAGE
HERE:
!\[\](https://images.duckduckgo.com/iu/?u=http%3A%2F%2Fi0.wp.com%2Fatherbeg.com%2Fwp-content%2Fuploads%2F2015%2F06%2FWorkrave-Restbreak-Shoulder.png&f=1)]{.tmp}

Facebook is working on an app to stop you from drunk-posting \"Yann
LeCun, who overseas the lab, told Wired magazine that the program would
be like someone asking you, \'Uh, this is being posted publicly. Are you
sure you want your boss and your mother to see this?\'\"

[SHOW IMAGE HERE: !\[This Terminal Dashboard Reminds You to Take a Break
When You\'re Lost Deep Inside the Command
Line\](https://i.kinja-img.com/gawker-media/image/upload/s\--\_of0PoM2\--/c\_fit,fl\_progressive,q\_80,w\_636/eegvqork0qizokwrlemz.png)]{.tmp}
[SHOW IMAGE HERE: !\[\](http://waterlog.gd/images/homescreen.png)]{.tmp}
[SHOW IMAGE HERE:
!\[\](https://pbs.twimg.com/media/C6oKTduWcAEruIE.jpg:large)]{.tmp}
[TODO: RELATES TO]{.tmp} []{#yzuwmdq4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.scrollresistance)
Useless scroll against productivity]{.method .descriptor} []{#m2vjndu3
.anchor} [[Method:](http://pad.constantvzw.org/p/observatory.guide.time)
Investigating how humans and machines negotiate the experience of
time]{.method .descriptor} [What]{.what .empty .descriptor} [SHOW IMAGE
HERE:
http://observatory.constantvzw.org/images/Screenshot\_from\_2017-06-10\_172547.png]{.tmp}
[How: python script]{.how .descriptor} [Example]{.example .empty
.descriptor}

` {.verbatim}
# ends of time

https://en.wikipedia.org/wiki/Year_2038_problem

Exact moment of the epoch:
03:14:07 UTC on 19 January 2038

## commands

local UNIX time of this machine
%XBASHCODE: date +%s

UNIX time + 1
%BASHCODE: echo $((`date +%s` +1 ))

## goodbye unix time

while :
do
sleep 1
figlet $((2147483647 - `date +%s`))
done

# Sundial Time Protocol Group tweaks

printf 'Current Time in Millennium Unix Time: '
printf $((2147483647 - `date +%s`))
echo
sleep 2
echo $((`cat ends-of-times/idletime` + 2)) > ends-of-times/idletime
idletime=`cat ends-of-times/idletime`
echo
figlet "Thank you for having donated 2 seconds to our ${idletime} seconds of collective SSH pause "
echo
echo

http://observatory.constantvzw.org/etherdump/ends-of-time.html
`

[TODO: RELATES TO]{.tmp} [Languaging]{.grouping} []{#nmi5mgjm .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.quine)
Quine]{.method .descriptor} [What: A program whose function consists of
displaying its own code. Also known as \"self-replicating
program\"]{.what .descriptor} [Why: Quines show the tension between
\"software as language\" and \"software as operation\".]{.why
.descriptor} [How: By running a quine you will get your code back. You
may do a step forward and wonder about functionality and aesthetics,
uselessness and performativity, data and code.]{.how .descriptor}
[Example: A quine (Python). When executed it outputs the same text as
the source:]{.example .descriptor}

` {.sourceCode .python}
s = 's = %r\nprint(s%%s)'
print(s%s)
`

[Example: A oneline unibash/etherpad quine, created during relearn
2017:]{.example .descriptor}

` {.quaverbatim}
wget -qO- http://192.168.73.188:9001/p/quine/export/txt | curl -F "file=@-;type=text/plain" http://192.168.73.188:9001/p/quine/import
`

[WARNING]{.warning .empty .descriptor}

The encounter with quines may deeply affect you. You may want to write
one and get lost in trying to make an ever shorter and more elegant one.
You may also take quines as point of departure or limit-ideas for
exploring software dualisms.

\"A quine is without why. It prints because it prints. It pays no
attention to itself, nor does it asks whether anyone sees it.\" \"Aquine
is aquine is aquine. \" Aquine is not a quine This is not aquine

[Remember: Although seemingly absolutely useless, quines can be used as
exploits.]{.remember .descriptor}

Exploring boundaries/tensions

databases treat their content as data (database punctualization) some
exploits manage to include operations in a database

[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.monopsychism]{.tmp}
[]{#zwu0ogu0 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.glossary)
Glossaries as an exercise]{.method .descriptor} [What: Use the technique
of psychanalytic listening to compile (gather, collect, bring together)
a list of key words for understanding software.]{.what .descriptor}
[How: Create a shared document that participants can add words to as
their importance emerges.To do pyschoanalytic listening, let your
attention float freely, hovering evenly, over a conversation or a text
until something catches its ear. Write down what your ear/eye catches.
When working in a collective context invite others to participate in
this project and describe the practice to them. Each individual may move
in and out of this mode of listening according to their interest and
desire and may add as many words to the list as they want. Use this list
to create an index of software observation.]{.how .descriptor} [When:
This is best done in a bounded context. In the case of the
Techno-Galactic Observatory, our bounded contexts includes the six day
work session and the pages and process of this publication.]{.when
.descriptor} [Who: The so-inclined within the group]{.who .descriptor}
[Urgency: Creating and troubling categories]{.urgency .descriptor}
[Note: Do not remove someone else\'s word from the glossary during the
accumulation phase. If an editing and cutting phase is desired this
should be done after the collection through collective consensus.]{.note
.descriptor} [WARNING: This method is not exclusive to and was not
developed for software observation. It may lead to awareness of
unconscious processes and to shifts in structures of feeling and
relation.]{.warning .descriptor} [Example]{.example .empty .descriptor}

` {.verbatim}
Agile
Code
Colonial
Command Line
Communication
Connectivity
Emotional
Galaxies
Green
Guide
Kernel
Imperial
Issues
Machine
Mantra
Memory
Museum
Observation
ProductionPower
Programmers
Progress
Relational
Red
Scripting
Scrum
Software
Survival
Technology
Test
Warning
WhiteBoard
Yoga
`

[TODO: RELATES TO]{.tmp} []{#mja0m2i5 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.validation)
Adding qualifiers]{.method .descriptor} [Remember: \"\[V\]alues are
properties of things and states of affairs that we care about and strive
to attain\...vlaues expressed in technical systems are a function of
their uses as well as their features and designs.\" Values at Play in
Digital Games, Mary Flanagan and Helen Nissenbaum]{.remember
.descriptor} [What: Bringing a moral, ethical, or otherwise
evaluative/adjectival/validating lens.]{.what .descriptor} [How:
Adjectives create subcategories. They narrow the focus by naming more
specifically the imagined object at hand and by implicitly excluding all
objects that do not meet the criteria of the qualifier. The more
adjectives that are added, the easier it becomes to answer the question
what is software. Or so it seems. Consider what happens if you add the
words good, bad, bourgeois, queer, stable, or expensive to software. Now
make a list of adjectives and try it for yourself. Level two of this
exercise consists of observing a software application and deducing from
this the values of the individuals, companies, and societies that
produced it.]{.how .descriptor} [Note: A qualifier may narrow down
definitions to undesirable degrees.]{.note .descriptor} [WARNING: This
exercise may be more effective at identifying normative and ideological
assumptions at play in the making, distributing, using, and maintaining
of software than at producing a concise definition.]{.warning
.descriptor} [Example: \"This morning, Jan had difficulties to answer
the question \"what is software\", but he said that he could answer the
question \"what is good software\". What is good software?]{.example
.descriptor} [TODO: RELATES TO]{.tmp} []{#mmmwmje2 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.softwarethrough)
Searching \"software\" through software]{.method .descriptor} [What: A
quick way to sense the ambiguity of the term \'software\', is to go
through the manual files on your hard drive and observe in which cases
is the term used.]{.what .descriptor} [How: command-line oneliner]{.how
.descriptor} [Why: Software is a polymorphic term that take different
meanings and comes with different assumptions for the different agents
involved in its production, usage and all other forms of encounter and
subjection. From the situated point of view of the software present on
your machine, when and why does software call itself as such?]{.why
.descriptor} [Example]{.example .empty .descriptor}

so software exists only outside your computer? only in general terms?
checking for the word software in all man pages:

grep -nr software /usr/local/man
!!!!

software appears only in terms of license:

This program is free software
This software is copyright (c)

we don\'t run software. we still run programs.\
nevertheless software is everywhere

[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.samequestion]{.tmp}
[]{#ndhkmwey .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.everyonescp)
Persist in calling everyone a Software Curious Person]{.method
.descriptor} [What: Persistance in naming is a method for changing a
person\'s relationship to software by (sometimes forcibly) call everyone
a Software Curious Person.]{.what .descriptor} [How: Insisting on
curiosity as a relation, rather than for example \'fear\' or
\'admiration\' might help cut down the barriers between different types
of expertise and allows multiple stakeholders feel entitled to ask
questions, to engage, to investigate and to observe.]{.how .descriptor}
[Urgency: Software is too important to not be curious about.
Observations could benefit from recognising different forms of
knowledge. It seems important to engage with software through multiple
interests, not only by means of technical expertise.]{.urgency
.descriptor} [Example: This method was used to address each of the
visitors at the Techno-Galactic Walk-in Clinic.]{.example .descriptor}
[TODO: RELATES TO]{.tmp} [Healing]{.grouping} []{#mmu1mgy0 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.relational)
Setup a Relational software observatory consultancy (RSOC)]{.method
.descriptor} [Remember]{.remember .empty .descriptor}

- Collectivise research around hacking to save time.
- Self-articulate software needs as your own Operating (system)
perspective.
- Change the lens by looking to software through a time perspective.

[What: By paying a visit to our ethnomethodology interview practice
you'll learn to observe software from different angles / perspectives.
Our practionners passion is to make the \"what is the relation to
software\" discussion into a service.]{.what .descriptor} [How: Reading
the signs. Considering the everchanging nature of software development
and use and its vast impact on globalized societies, it is necessary to
recognize some of the issues of how software is (often) either
passively-perceived or actively-observed, without an articulation of the
relations. We offer a method to read the signs of the relational aspect
of software observance. It\'s a crucial aspect of our guide. It will
give you another view on software that will shape your ability to
survive any kind of software disaster.]{.how .descriptor} [SHOW IMAGE
HERE: !\[Reading the signs. From: John \"Lofty\" Wiseman, SAS Survival
Handbook: The Ultimate Guide to Surviving Anywhere\](
http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/IMAG1319
)]{.tmp} [WARNING]{.warning .empty .descriptor} [SHOW IMAGE HERE: have a
advertising blob for the RSOC with a smiling doctor welcoming
image]{.tmp} [Example]{.example .empty .descriptor}

What follows is an example of a possible diagnostic questionnaire.

Sample Questionnaire
--------------------

**What to expect** You will obtain a cartography of software users
profiles. It will help you to shape your own relation to software. You
will be able to construct your own taxonomy and classifcation of
software users that is needed in order to find a means of rescue in case
of a software catastrophy.

- SKILLS\
- What kind of user would you say that you are?
- What is your most frequently used type of software?
- How often do you install/experiment/learn new software?



- History
- What is your first recollection of software use?
- How often do / when did you last purchase software or pay for a
software service?



- Ethics
- What is the software feature you care about the most?
- Do you use any free software?
- if yes than
- do you remember your first attempt at using this software
service? Do you still use it? If not why?



- Do you pay for media distribution/streaming services?
- Do you remember your first attempt at using free software and how
did that make you feel?
- Have you used any of these software services : facebook, dating app
(grindr, tinder, etc.), twitter, instagram or equivalent.



- Can you talk about your favorite apps or webtools that you use
regularly?
- What is most popular software your friends use?



- SKILL
- Would you say that you are a specilised user?



- Have you ever used the command line?
- Do you know about scripting?
- Have you ever edited an HTML page? A CSS file? A PHP file? A
configuration file?
- Can you talk about your most technical encounter with your computer
/ telephone?



- ECONOMY\
- How do you pay for your software use?
- Please elaborate (for example, do you buy the software? /
contribute in kind / deliver services or support)
- What is the last software that you paid for using?
- What online services are you currently paying for?
- Is someone paying for your use of service?



- Personal
- What stories do you have concerning contracts and administration in
relation to your software, Internet or computer?
- How does software help you shape your relations with other people?
- From which countries does your softwares come from / reside? How do
you feel about that?
- Have you ever read a terms of software service, what about one that
is not targeting the American market?

Sample questionnaire results
----------------------------

Possible/anticipated user profiles
----------------------------------

### \...meAsHardwareOwnerSoftwareUSER:

\"I did not own a computer personally until very very late as I did not
enjoy gaming as a kid or had interest in spending much time behind PC
beyond work (and work computer). My first was hence I think in 2005 and
it was a SGI workstation that was the computer of the year 2000 (cost
10.000USD) and I got it for around 300USD. Proprietary drivers for
unified graphics+RAM were never released, so it remained a software
dead-end in gorgeous blue curved chassis
http://www.sgidepot.co.uk/sgidepot/pics/vwdocs.jpg\"

### \...meAsSoftwareCONSUMER:

\"I payed/purchased software only twice in my life (totalling less then
25eur), as I could access most commercial software as widely pirated in
Balkans and later had more passion for FLOSS anyway, this made me relate
to software as material to exchange and work it, rather than commodity
goods I could or not afford.\"

### \...meAsSoftwareINVESTOR:

\"I did it as both of those apps were niche products in early beta (one
was Jeeper Elvis, real-time-non-linear-video-editor for BeOS) that
failed to reach market, but I think I would likely do it again and only
in that mode (supporting the bleeding edge and off-stream work), but
maybe with more than 25eur.\"

### \...meAsSoftwareUserOfOS:

\"I would spend most of 80s ignoring computers, 90ties figuring out
software from high-end to low-end, starting with OSF/DecAlpha and SunOS,
than IRIX and MacOS, finally Win 95/98 SE, that permanently pushed me
into niches (of montly LINUX distro install fests, or even QNX/Solaris
experiments and finally BeOS use).\"

### \...meAsSoftwareWEBSURFER:

\"I got used to websurfing in more than 15 windows on UNIX systems and
never got used to less than that ever since, furthermore with addition
of more browser options this number only multiplied (always wondered if
my first system was Windows 3.11 - would I be a more focused person and
how would that form my relations to browser windows\>tabs).\"

### \...meAsSoftwareUserOfPropertarySoftware:

\"I signed one NDA contract in person on the paper and with ink on a
rainy day while stopping of at trainstaion in north Germany for the
software that was later to be pulled out of market due to problematic
licencing agreement (intuitivly I knew it was wrong) - it had too much
unprofessional pixeleted edges in its graphics.

### \...meAsSoftwareUserOfDatingWebsites:

\"I got one feature request implemented by a prominent dating website
(to search profiles by language they speak), however I was never
publicly acknowledged (though I tried to make use of it few times), that
made our relations feel a bit exploitative and underappreciated. \"

### \...meAsSoftwareUserTryingToGoPRO:

\"my only two attempts to get into the software company failed as they
insisted on full time commitments. Later I found out ones were
intimidated in interview and other gave it to a person that negotiated
to work part time with friend! My relation to professionalism is likely
equally complex and pervert as one to the software.\"

Case study : W. W.
------------------

\...ww.AsExperiencedAdventerousUSER - experiments with software every
two days as she uses FLOSS and Gnu/Linux, cares the most for maliabity
of the software - as a result she has big expectations of flexibility
even in software category which is quite conventional and stability
focused like file-hosting.

\...ww.AsAnInevstorInSoftware - paid compiled version of FLOSS audio
software 5 years ago as she is supportive of economy and work around
production, maintainance and support, but she also used closed
hardware/software where she had to agree on licences she finds unfair,
but then she was hacking it in order to use it as an expert - when she
had time.

\...ww.AsCommunicationSoftwareUSER - she is not using commercial social
networks, so she is very concious of information transfers and time
relations, but has no strong media/format/design focus.

Q: What is your first recollection of software use?\
A: ms dos in 1990 at school \_ i was 15 or 16. oh no 12. Basic in 1986.

Q: What are the emotions related to this use?\
A: fun. i\'m good at this. empowering

Q: How often do / when did you last purchase software or pay for a
software service?\
A: I paid for ardour five years ago. I paid the developper directly. For
the compiled version. I paid for the service. I pay for my website and
email service at domaine public.

Q: What kind of user would you say you are?\
A: An experienced user drawing out the line. I don\'t behave.

Q: Is there a link between this and your issue?\
A: Even if it\'s been F/LOSS there is a lot of decision power in my
package.

Q: What is your most frequently used type of software?\
A: Web browser. email. firefox & thunderbird

Q: How often do you install/experiment/learn new software?\
A: Every two days. I reinstall all the time. my old lts system died.
stop being supported last april. It was linux mint something.

Q: Do you know about scripting?\
A: I do automating scripts for any operation i have to doi several times
like format conversion.

Q: Can you talk about your most technical encounter with your computer /
telephone?\
A: I\'ve tried to root it. but i didn\'t succeed.

Q: How much time do you wish to spend on such activities like hacking,
rooting your device?\
A: hours. you should take your time

Q: Did you ever sign licence agreement you were not agree with? How does
that affect you?\
A: This is the first thing your when you have a phone. it\'s obey or
die.

Q: What is the software feature you care for the most?\
A: malleability. different ways to approach a problem, a challenge, an
issue.

Q: Do you use any free software?\
A: yes. there maybe are some proprietary drivers.

Q: Do you remember your first attempt at using free software and how did
that make you feel?\
A: Yes i installed my dual boot in \... 10 years ago. scared and
powerful.

Q: Do you use one of this software service: facebook, dating app (grindr
of sort), twitter, instagram or equivalent?\
A: Google, gmail that\'s it

Q: Can you talk about your favorite apps or webtools that you use
regularly?\
A: Music player. vanilla music and f-droid. browser. I pay attention to
clearing my history, no cookies. I also have iceweasel. Https by
default. Even though i have nothing to hide.

Q: What stories around contracts and administration in relation to your
software internet or computer?\
A: Nothing comes to my mind. i\'m not allowed to do, to install on
phone. When it\'s an old phone, there is nothing left that is working
you have to do it.

Q: How does software help you shape your relations with other people?\
A: It\'s a hard question. if it\'s communication software of course
it\'s it\'s nature to be related to other people.there is an expectency
of immediate reply, of information transfer\...It\'s troubling your
relation with people in certain situations.

Q: From which countries does your softwares live / is coming from? How
do you feel about that?\
A: i think i chose the netherlands as a miror. you are hoping to reflect
well in this miror.

Q: Have you ever read a terms of software service; one that is not
targeting the American market?\
A: i have read them. no.

[TODO: RELATES TO]{.tmp} []{#mta1ntzm .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.agile.yoga)
Agile Sun Salutation]{.method .descriptor} [Remember]{.remember .empty
.descriptor}

> Agile software development describes a set of values and principles
> for software development under which requirements and solutions evolve
> through the collaborative effort of self-organizing cross-functional
> teams. It advocates adaptive planning, evolutionary development, early
> delivery, and continuous improvement, and it encourages rapid and
> flexible response to change. These principles support the definition
> and continuing evolution of many software development
> methods.^[10](#dbabcece)^

[What: You will be observing yourself]{.what .descriptor} [How]{.how
.empty .descriptor}

> Scrum is a framework for managing software development. It is designed
> for teams of three to nine developers who break their work into
> actions that can be completed within fixed duration cycles (called
> \"sprints\"), track progress and re-plan in daily 15-minute stand-up
> meetings, and collaborate to deliver workable software every sprint.
> Approaches to coordinating the work of multiple scrum teams in larger
> organizations include Large-Scale Scrum, Scaled Agile Framework (SAFe)
> and Scrum of Scrums, among others.^[11](#eefcbaac)^

[When: Anywhere where it\'s possible to lie on the floor]{.when
.descriptor} [Who]{.who .empty .descriptor}

> Self-organization and motivation are important, as are interactions
> like co-location and pair programming. It is better to have a good
> team of developers who communicate and collaborate well, rather than a
> team of experts each operating in isolation. Communication is a
> fundamental concept.^[12](#fbaeffab)^

[Urgency: Using Agile software development methods to develop a new path
into your professional and personal life towards creativity, focus and
health.]{.urgency .descriptor} [WARNING]{.warning .empty .descriptor}

> The agile movement is in some ways a bit like a teenager: very
> self-conscious, checking constantly its appearance in a mirror,
> accepting few criticisms, only interested in being with its peers,
> rejecting en bloc all wisdom from the past, just because it is from
> the past, adopting fads and new jargon, at times cocky and arrogant.
> But I have no doubts that it will mature further, become more open to
> the outside world, more reflective, and also therefore more
> effective.^[13](#edabeeaf)^

[Example]{.example .empty .descriptor} [SHOW IMAGE HERE:
https://mfr.osf.io/render?url=https://osf.io/ufdvb/?action=download%26direct%26mode=render&initialWidth=450&childId=mfrIframe]{.tmp}

Hello and welcome to the presentation of the agile yoga methodology. I
am Allegra, and today I\'m going to be your personal guide to YOGA, an
acronym for why organize? Go agile! I\'ll be part of your team today and
we\'ll do a few exercises together as an introduction to a new path into
your professional and personal life towards creativity, focus and
health.

A few months ago, I was stressed, overwhelmed with my work, feeling
alone, inadequate, but since I started practicing agile yoga, I feel
more productive. I have many clients as an agile yoga coach, and I\'ve
seen new creative business opportunities coming to me as a software
developer.

For this first experience with the agile yoga method and before we do
physical exercises together, I would like to invite you to close your
eyes. Make yourself comfortable, lying on the floor, or sitting with
your back on the wall. Close your eyes, relax. Get comfortable. Feel the
weight of your body on the floor or on the wall. Relax.

Leave your troubles at the door. Right now, you are not procrastinating,
you are having a meeting at the \,
a professional building dedicated to business, you are meeting yourself,
you are your own business partner, you are one. You are building your
future.

You are in a room standing with your team, a group of lean programmers.
You are watching a white board together. You are starting your day, a
very productive day as you are preparing to run a sprint together. Now
you turn towards each other, making a scrum with your team, you breathe
together, slowly, inhaling and exhaling together, slowly, feeling the
air in and out of your body. Now you all turn towards the sun to prepare
to do your ASSanas, the agile Sun Salutations or ASS with the team
dedicated ASS Master. She\'s guiding you. You start with Namaskar, the
Salute. your palms joined together, in prayer pose. you all reflect on
the first principle of the agile manifesto. your highest priority is to
satisfy the customer through early and continuous delivery of valuable
software.

Next pose, is Ardha Chandrasana or (Half Moon Pose). With a deep
inhalation, you raise both arms above your head and tilt slightly
backward arching your back. you welcome changing requirements, even late
in development. Agile processes harness change for the customer\'s
competitive advantage. then you all do Padangusthasana (Hand to Foot
Pose). With a deep exhalation, you bend forward and touch the mat, both
palms in line with your feet, forehead touching your knees. you deliver
working software frequently.

Surya Darshan (Sun Sight Pose). With a deep inhalation, you take your
right leg away from your body, in a big backward step. Both your hands
are firmly planted on your mat, your left foot between your hands. you
work daily throughout the project, business people and developers
together. now, you\'re flowing into Purvottanasana (Inclined Plane) with
a deep inhalation by taking your right leg away from your body, in a big
backward step. Both your hands are firmly planted on your mat, your left
foot between your hands. you build projects around motivated
individuals. you give them the environment and support they need, and
you trust them to get the job done.

You\'re in Adho Mukha Svanasana (Downward Facing Dog Pose). With a deep
exhalation, you shove your hips and butt up towards the ceiling, forming
an upward arch. Your arms are straight and aligned with your head. The
most efficient and effective method of conveying information to and
within a development team is face-to-face conversation.

Then, Sashtang Dandawat (Forehead, Chest, Knee to Floor Pose). With a
deep exhalation, you lower your body down till your forehead, chest,
knees, hands and feet are touching the mat, your butt tilted up. Working
software is the primary measure of progress.

Next is Bhujangasana (Cobra Pose). With a deep inhalation, you slowly
snake forward till your head is up, your back arched concave, as much as
possible. Agile processes promote sustainable development. You are all
maintaining a constant pace indefinitely, sponsors, developers, and
users together.

Now back into Adho Mukha Svanasana (Downward Facing Dog Pose).
Continuous attention to technical excellence and good design enhances
agility.

And then again to Surya Darshan (Sun Sight Pose). Simplicity\--the art
of maximizing the amount of work not done\--is essential. Then to
Padangusthasana (Hand to Foot Pose). The best architectures,
requirements, and designs emerge from self-organizing teams.

You all do again Ardha Chandrasana (Half Moon Pose). At regular
intervals, you as the team reflect on how to become more effective, then
tune and adjust your behavior accordingly. you end our ASSanas session
with a salute to honor your agile yoga practices. you have just had a
productive scrum meeting. now i invite you to open your eyes, move your
body around a bit, from the feet up to the head and back again.

Stand up on your feet and let\'s do a scrum together if you\'re ok being
touched on the arms by someone else. if not, you can do it on your own.
so put your hands on the shoulder of the SCP around you. now we\'re
joined together, let\'s look at the screen together as we inhale and
exhale. syncing our body together to the rythms of our own internal
software, modulating our oxygen level intake requirements to the oxygen
availability of our service facilities.

Now, let\'s do together a couple of exercise to protect and strengthen
our wrists. as programmers, as internauts, as entrepreneurs, they are a
very crucial parts of the body to protect. in order to be able to type,
to swipe, to shake hands vigourously, we need them in good health. So
bring to hands towards each other in a prayer pose, around a book, a
brick. You can do it without but I\'m using my extreme programming book
- embrace change - for that. So press the palms together firmly, press
the pad of your fingers together. do that while breathing in and out
twice.

Now let\'s expand our arms towards us, in the air, face and fingers
facing down. like we\'re typing. make your shoulders round. let\'s
breath while visualizing in our heads the first agile mantra :
Individuals and interactions over processes and tools.

Now let\'s bring back the arms next to the body and raise them again.
And let\'s move our hands towards the ceiling this time. Strenghtening
our back. In our head, the second mantra. Working software over
comprehensive documentation. now let\'s bring back the hands in the
standing position. Then again the first movement while visualizing the
third mantra : Customer collaboration over contract negotiation and then
the second movement thinking about the fourth and last mantra :
Responding to change over following a plan and of course we continue
breathing. Now to finish this session, let\'s do a sprint together in
the corridor !

[SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/guide/agileyoga/8-Poses-Yoga-Your-Desk.contours.png
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/guide/agileyoga/gayolab-office-chair-for-yoga.contours.png
)]{.tmp} [TODO: RELATES TO]{.tmp} []{#mdu0mmji .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.blobservation)
Hand reading]{.method .descriptor} [How: Visit the Future Blobservation
Booth to have your fortunes read and derive life insight from the wisdom
of software.]{.how .descriptor} [What: Put your hand in the reading
booth and get your line read.]{.what .descriptor} [Why: The hand which
holds your mouse everyday hides many secrets.]{.why .descriptor}
[Example]{.example .empty .descriptor}

` {.verbatim .wrap}
* sample reading timeline:

* 15:00 a test user, all tests clear and systems are online a user who said goodbye to us another user a user who thought it'd be silly to say thank you to the machine but thank you very much another kind user who said thank you yet another kind user another user, no feeback a nice user who found the reading process relieving yet another kind user a scared user! took the hand out but ended up trusting the system. "so cool thanks guys" another user a young user! this is a funny computer
* 15:35 another nice user
* 15:40 another nice user
* 15:47 happy user (laughing)
* 15:51 user complaining about her fortune, saying it's not true. Found the reading process creepy but eased up quickly
* 15:59 another nice user: http://etherbox.local:9001/p/SCP.sedyst.md
* 16:06 a polite user
* 16:08 a friendly playful user (stephanie)
* 16:12 a very giggly user (wendy)
* 16:14 a playful user - found the reading process erotic - DEFRAGMENTING? NO! Thanks Blobservation http://etherbox.local:9001/p/SCP.loup.md
* 16:19 a curious user
* 16:27 a friendly user but oh no, we had a glitch and computer crashed. But we still delivered the fortune. We got a thank you anyway
* 16:40 a nice user, the printer jammed but it was sorted out quickly *16:42 another nice user
* 16:50 nice user (joak)
* 16:52 yet another nice user (jogi)
* 16:55 happy user! (peter w)
* 16:57 more happy user (pierre h)
* 16:58 another happy user
* 17:00 super happy user (peggy)
* 17:02 more happy user
`

[Example]{.example .empty .descriptor}

> Software time is not the same as human time. Computers will run for AS
> LONG AS THEY WILL BE ABLE TO, provided sufficient power is available.
> You, as a human, don\'t have the luxury of being always connected to
> the power grid and this have to rely on your INTERNAL BATTERY. Be
> aware of your power cycles and set yourself to POWER-SAVING MODE
> whenever possible.

[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/resizes/Techno-Galactic-Software-Observatory/IMAG1407.jpg?m=1497344230]{.tmp}
[TODO: RELATES TO]{.tmp} []{#yznjodq3 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.dirty) Bug
reporting for sharing observations]{.method .descriptor} [What: Etherpad
had stopped working but it was unclear why. Where does etherpad
\'live\'?]{.what .descriptor} [How: Started by looking around the pi\'s
filesystem by reading /var/log/syslog in /opt/etherpad and in a
subdirectory named var/ there was dirty.db, and dirty it was.]{.how
.descriptor} [When: Monday morning]{.when .descriptor} [Urgency:
Software (etherpad) not working and the Walk-in Clinic was about to
start.]{.urgency .descriptor} [Note:
http://pad.constantvzw.org/p/observatory.inventory.jogi]{.note
.descriptor}

from jogi\@mur.at to \[Observatory\] When dirty.db get\'s dirty

Dear all,

as promised yesterday, here my little report regarding the broken
etherpad.

\ \#\#\# When dirty.db get\'s dirty

When I got to WTC on Monday morning the etherpad on etherbox.local was
disfunct. Later someone said that in fact etherpad had stopped working
the evening before, but it was unclear why. So I started looking around
the pi\'s filesystem to find out what was wrong. Took me a while to find
the relevant lines in /var/log/syslog but it became clear that there was
a problem with the database. Which database? Where does etherpad
\'live\'? I found it in /opt/etherpad and in a subdirectory named var/
there it was: dirty.db, and dirty it was.

A first look at the file revealed no apparent problem. The last lines
looked like this:

`{"key":"sessionstorage:Ddy0gw7okwbkv5BzkR1DuSLCV_IA5_jQ","val":{"cookie ":{"path":"/","_expires":null,"originalMaxAge":null,"httpOnly":true,"secure":false}}} {"key":"sessionstorage:AU1cffgcTf_q6BV9aIdAvES2YyXM7Gm1","val":{"cookie ":{"path":"/","_expires":null,"originalMaxAge":null,"httpOnly":true,"secure":false}}} {"key":"sessionstorage:_H5SdUlDvQ3XCuPaZEXQ5lx0K6aAEJ9m","val":{"cookie ":{"path":"/","_expires":null,"originalMaxAge":null,"httpOnly":true,"se cure":false}}}`

What I did not see at the time was that there were some (AFAIR something
around 150) binary zeroes at the end of the file. I used tail for the
first look and that tool silently ignored the zeroes at the end of the
file. It was Martino who suggested using different tools (xxd in that
case) and that showed the cause of the problem. The file looked
something like this:

00013730: 6f6b 6965 223a 7b22 7061 7468 223a 222f okie":{"path":"/
00013740: 222c 225f 6578 7069 7265 7322 3a6e 756c ","_expires":nul
00013750: 6c2c 226f 7269 6769 6e61 6c4d 6178 4167 l,"originalMaxAg
00013760: 6522 3a6e 756c 6c2c 2268 7474 704f 6e6c e":null,"httpOnl
00013770: 7922 3a74 7275 652c 2273 6563 7572 6522 y":true,"secure"
00013780: 3a66 616c 7365 7d7d 7d0a 0000 0000 0000 :false}}}.......
00013790: 0000 0000 0000 0000 0000 0000 0000 0000 ................

So Anita, Martino and I stuck our heads together to come up with a
solution. Our first attempt to fix the problem went something like this:

dd if=dirty.db of=dirty.db.clean bs=1 count=793080162

which means: write the first 793080162 blocks of size 1 byte to a new
file. After half an hour or so I checked on the size of the new file and
saw that some 10% of the copying had been done. No way this would get
done in time for the walk-in-clinic. Back to the drawing board.

Using a text editor was no real option btw since even vim has a hard
time with binary zeroes and the file was really big. But there was
hexedit! Martino installed it and copied dirty.db onto his computer.
After some getting used to the various commands to navigate in hexedit
the unwanted zeroes were gone in an instant. The end of the file looked
like this now:

00013730: 6f6b 6965 223a 7b22 7061 7468 223a 222f okie":{"path":"/
00013740: 222c 225f 6578 7069 7265 7322 3a6e 756c ","_expires":nul
00013750: 6c2c 226f 7269 6769 6e61 6c4d 6178 4167 l,"originalMaxAg
00013760: 6522 3a6e 756c 6c2c 2268 7474 704f 6e6c e":null,"httpOnl
00013770: 7922 3a74 7275 652c 2273 6563 7572 6522 y":true,"secure"
00013780: 3a66 616c 7365 7d7d 7d0a :false}}}.

Martino asked about the trailing \'.\' character and I checked a
different copy of the file. No \'.\' there, so that had to go too. My
biggest mistake in a long time! The \'.\' we were seeing in Martino\'s
copy of the file was in fact a \'\' (0a)! We did not realize that,
copied the file back to etherbox.local and waited for etherpad to resume
it\'s work. But no luck there, for obvious reasons.

We ended up making backups of dirty.db in various stages of deformation
and Martino started a brandnew pad so we could use pads for the walk-
in-clinic. The processing tool chain has been disabled btw. We did not
want to mess up any of the already generated .pdf, .html and .md files.

We still don\'t know why exactly etherpad stopped working sometime
Sunday evening or how the zeroes got into the file dirty.db. Anita
thought that she caused the error when she adjusted time on
etherbox.local, but the logfile does not reflect that. The last clean
entry in /var/log/syslog regarding nodejs/etherpad is recorded with a
timestamp of something along the line of \'Jun 10 10:17\'. Some minutes
later, around \'Jun 10 10:27\' the first error appears. These timestamps
reflect the etherbox\'s understanding of time btw, not \'real time\'.

It might be that the file just got too big for etherpad to handle it.
The size of the repaired dirty.db file was already 757MB. That could btw
explain why etherpad was working somewhat slugishly after some days.
There is still a chance that the time adjustment had an unwanted side
effect, but so far there is no obvious reason for what had happened.
\
\-- J.Hofmüller

http://thesix.mur.at/

[]{#ytu5y2qy .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.detournement)
Interface Détournement]{.method .descriptor} [Embodiment / body
techniques]{.grouping} []{#y2q4zju5 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.occupational)
Comportments of software (softwear)]{.method .descriptor}
[Remember]{.remember .empty .descriptor}

> The analysis of common sense, as opposed to the exercise of it, must
> then begin by redrawing this erased distinction between the mere
> matter-of-fact apprehension of reality\--or whatever it is you want to
> call what we apprehend merely and matter-of-factly\--and
> down-to-earth, colloquial wisdom, judgements, and assessments of it.

[What: Observe and catalog the common gestures, common comportments, and
common sense(s) surrounding software.]{.what .descriptor} [How: This can
be done through observation of yourself or others. Separate the
apprehended and matter of fact from the meanings, actions, reactions,
judgements, and assessments that the apprehension occasions. Step 1:
Begin by assembling a list of questions such as: When you see a software
application icon what are you most likely to do? When a software
application you are using presents you with a user agreement what are
you most likely to do? When a software applciation does something that
frustrates you what are you most likely to do? When a software
application you are using crashes what are you most likely to do? Step
2: Write down your responses and the responses of any subjects you are
observing. Step 3: For each question, think up three other possible
responses. Write these down. Step 4: (this step is only for the very
curious) Try the other possible responses out the next time you
encounter each of the given scenarios.]{.how .descriptor} [Note: The
common senses and comportments of software are of course informed and
conditioned by those of hardware and so perhaps this is more accurately
a method for articulating comportments of computing.]{.note .descriptor}
[WARNING: Software wears on both individual and collective bodies and
selves. Software may harm your physical and emotional health and that of
your society both by design and by accident.]{.warning .descriptor}
[TODO: RELATES TO Agile Sun Salutation, Natasha Schull\'s Addicted by
Design]{.tmp} [Flow-regulation, logistics, seamlessness]{.grouping}
[]{#mwrhm2y4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.continuousintegration)
Continuous integration]{.method .descriptor} [What: Continuous
integration is a sophisticated form of responsibility management: it is
the fascia of services. Continous integration picks up after all other
services and identifies what needs to happen so that they can work in
concert. Continuous integration is a way of observing the evolution of
(micro)services through cybernetic (micro)management.]{.what
.descriptor} [How: Continuous integration keeps track of changes to all
services and allows everyone to observe if they still can work together
after all the moving parts are fitted together.]{.how .descriptor}
[When: Continuous integration comes to prominence in a world of
distributed systems where there are many parts being organized
simultaneously. Continuous integration is a form of observation that
helps (micro)services maintain a false sense of independence and
decentralization while constantly subjecting them to centralized
feedback.]{.when .descriptor} [Who: Continuous integration assumes that
all services will submit themselves to the feedback loops of continuous
integration. This could be a democratic process or not.]{.who
.descriptor} [Urgency: Continuous integration reconfigures divisions of
labor in the shadows of automation. How can we surface and question its
doings and undoings?]{.urgency .descriptor} [WARNING: When each service
does one thing well, the service makers tend to assume everybody else is
doing the things they do not want to do.]{.warning .descriptor}

At TGSO continuous integration was introduced as a service that responds
to integration hell when putting together a number of TGSO services for
a walk-in software clinic. Due to demand, the continuous integration
service was extended to do \"service discovery\" and \"load balancing\"
once the walk-in clinic was in operation.

Continuous integration worked by visiting the different services of the
walk-in clinic to check for updates, test the functionality and think
through implications of integration with other services. If the pieces
didn\'t fit, continuous integration delivered error messages and
solution options.

When we noticed that software curious persons visiting the walk-in
clinic may have troubles finding the different services, and that some
services may be overloaded with software curious persons, continuous
integration was extended. We automated service registration using
colored tape and provided a lookup registry for software curious
persons.

http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/IMAG1404

Load balancing meant that software curious persons were forwarded to
services that had capacity. If all other services were full, the load
balancer defaulted to sending the software curious person to the [Agile
Sun
Salutation](http://pad.constantvzw.org/p/observatory.guide.agile.yoga)
service.

[WARNING: At TGSO the bundling of different functionalities into the
continuous integration service broke the \"do one thing well\"
principle, but saved the day (we register this as technical debt for the
next iteration of the walk-in clinic).]{.warning .descriptor} [Remember:
Continous integration may be the string that holds your current software
galaxy together.]{.remember .descriptor}

\"More technically, I am interested in how things bounce around in
computer systems. I am not sure if these two things are relted, but I
hope continuous integration will help me.\"

[]{#zdixmgrm .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.pipeline) make
make do]{.method .descriptor} [What: Makefile as a method for
quick/collective assemblages + observing amalgamates/pipelines]{.what
.descriptor} [Note: Note:
http://observatory.constantvzw.org/etherdump/makefile.raw.html]{.note
.descriptor}

etherpad-\>md-\>pdf-\>anything pipeline. makefile as a method for
quick/collective assemblages + observing amalgamates/pipelines CHRISTOPH

[]{#zweymtni .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.ssogy)
Flowcharts (Flow of the chart -- chart of the flow on demand!)]{.method
.descriptor} [Example]{.example .empty .descriptor} [SHOW IMAGE HERE:
!\[\]( http://observatory.constantvzw.org/images/symbols/ibm-ruler.jpg
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/burroughs-ruler.jpg
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/rectangle.png )]{.tmp}
[SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/curly\_rec.png
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/curly\_rec-2.png
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/flag.png )]{.tmp}
[SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/trapec.png )]{.tmp}
[SHOW IMAGE HERE: !\[Claude Shannon Information Diagram Blanked: Silvio
Lorusso\](
http://silviolorusso.com/wp-content/uploads/2012/02/shannon\_comm\_channel.gif
)]{.tmp} [TODO: RELATES TO]{.tmp}
[Beingontheside/inthemiddle/behind]{.grouping} []{#ywfin2e4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.somethinginthemiddlemaybe)
Something in the Middle Maybe (SitMM)]{.method .descriptor} [What: The
network traffic gets observed. There are different sniffing software out
there which differ in granularity and how far the user can taylor the
different functionality. SitMM builds on one of these tools called
[scapy](http://www.secdev.org/projects/scapy/).]{.what .descriptor}
[How: SitMM takes a closer look at the network traffic coming from/going
to a software curious person\'s device. The software curious person
using SitMM may ask to filter the traffic based on application or device
of interest.]{.how .descriptor} [Who]{.who .empty .descriptor}

The software curious person gets to observe their own traffic. Ideally,
observing ones own network traffic should be available to anyone, but
using such software can be deemed illegal under different jurisdictions.

For example, in the US wiretap law limit packet-sniffing to parties
owning the network that is being sniffed or the availability of consent
from one of the communicating parties. Section 18 U.S. Code § 2511 (2)
(a) (i) says:

> It shall not be unlawful \... to intercept \... while engaged in any
> activity which is a necessary incident to the rendition of his service
> or to the protection of the rights or property of the provider of that
> service

See here for a
[paper](http://spot.colorado.edu/%7Esicker/publications/issues.pdf) on
the topic. Google went on a big legal spree to defend their right to
capture unencrypted wireless traffic with google street view cars. The
courts were concerned about wiretapping and infringements on the privacy
of users, and not with the leveraging of private and public WiFi
infrastructure for the gain of a for profit company. The case raises
hard questions about the state, ownership claims and material reality of
WiFi signals. So, while WiFi sniffing is common and the tools like SitMM
are widely available, it is not always possible for software curious
persons to use them legally or to neatly filter out \"their traffic\"
from that of \"others\".

[When: SitMM can be used any time a software curious person feels the
weight of the (invisible) networks.]{.when .descriptor} [Why: SitMM is
intended to be a tool that gives artists, designers and educators an
easy to use custom WiFi router to work with networks and explore the
aspects of our daily communications that are exposed when we use WiFi.
The goal is to use the output to encourage open discussions about how we
use our devices online.]{.why .descriptor} [Example]{.example .empty
.descriptor}

Snippets of a Something In The Middle, Maybe - Report

` {.verbatim}
UDP 192.168.42.32:53649 -> 8.8.8.8:53
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP/HTTP 17.253.53.208:80 GET http://captive.apple.com/mDQArB9orEii/Xmql6oYqtUtn/f6xY5snMJcW8/CEm0Ioc1d0d8/9OdEOfkBOY4y.html
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP 192.168.42.32:49250 -> 17.253.53.208:80
UDP 192.168.42.32:63872 -> 8.8.8.8:53
UDP 192.168.42.32:61346 -> 8.8.8.8:53
...
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443

##################################################
Destination Address: 17.253.53.208
Destination Name: nlams2-vip-bx-008.aaplimg.com

Port: Connection Count
80: 6

##################################################
Destination Address: 17.134.127.79
Destination Name: unknown

Port: Connection Count
443: 2
##################################################
Destination Address: 17.248.145.76
Destination Name: unknown

Port: Connection Count
443: 16
`

[TODO: RELATES TO]{.tmp} []{#ntlimgqy .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.whatisitliketobeanelevator)
What is it like to be AN ELEVATOR?]{.method .descriptor} [What:
Understanding software systems by becoming them]{.what .descriptor}
[TODO: extend this text \.... how to observe software in the world
around you. How to observe an everyday software experience and translate
this into a flowchart )]{.tmp} [How: Creating a flowchart to incarnate a
software system you use everyday]{.how .descriptor} [WARNING: Uninformed
members of the public may panic when confronted with a software
performance in a closed space.]{.warning .descriptor} [Example: What is
it like to be an elevator?]{.example .descriptor}

` {.verbatim}

what
is
it
like
to be
an
elevator?
from 25th floor to 1st floor
light on button light of 25th floor
check current floor
if current floor is 25th floor
no
if current floor is ...
go one floor up
... smaller than 25th floor
go one floor down
... bigger than 25th floor
stop elevator
turn button light off of 25th floor
turn door light on
open door of elevator
play sound opening sequence
yes
start
user pressed button of 25th floor
close door of elevator
if door is closed
user pressed 1st floor button
start timer for door closing
if timer is running more than three seconds
yes
yes
light on button
go one floor down
no
if current floor is 1st floor
update floor indicator
check current floor
stop elevator
no
yes
light off button
turn door light on
open door of elevator
play sound opening sequence
end
update floor indicator
`

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/joseph/flowchart.pdf]{.tmp}
[TODO: RELATES TO]{.tmp} []{#ndg2zte4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.sidechannel)
Side Channel Analysis]{.method .descriptor} [Urgency: Side Channel
attacks are possible by disregarding the abstraction of software into
pure logic: the physical effects of the running of the software become
backdoors to observe its functioning, both threatening the control of
processes and the re-affirming the materiality of software.]{.urgency
.descriptor} [WARNING: **engineers are good guys!**]{.warning
.descriptor} [Example]{.example .empty .descriptor} [SHOW IMAGE HERE:
https://www.tek.com/sites/default/files/media/image/119-4146-00%20Near%20Field%20Probe%20Set.png.jpg]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/PWFU3377]{.tmp}
[TODO: RELATES TO]{.tmp} [Collections / collecting]{.grouping}
[]{#njmzmjm1 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.bestiary)
Compiling a bestiary of software logos]{.method .descriptor} [What:
Since the early days of GNU-linux and cemented through the ubiquitous
O\'Reilly publications, the visual culture of software relies heavily on
animal representations. But what kinds of animals, and to what
effect?]{.what .descriptor} [How]{.how .empty .descriptor}

Compile a collection of logos and note the metaphors for observation: \*
stethoscope \* magnifying glass \* long neck (giraffe)

[Example]{.example .empty .descriptor}

` {.verbatim}
% http://animals.oreilly.com/browse/
% [check Testing the testbed pads for examples]
% [something on bestiaries]
`

[TODO: RELATES TO]{.tmp} []{#njm5zwm4 .anchor} []{#mmy2zgrl .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.testingtestbed)
Testing the testbed: testing software with observatory ambitions
(SWOA)]{.method .descriptor} [WARNING: this method may make more sense
if you first take a look at the [Something in the Middle Maybe
(SitMM)](http://pad.constantvzw.org/p/observatory.guide.sitmm) which is
an instance of a SWOA]{.warning .descriptor} [How: The interwebs hosts
many projects that aim to produce software for observing software, (from
now on Software With Observatory Ambitions (SWOA)). A comparative
methodology can be produced by testing different SWOA to observe
software of interest. Example: use different sniffing software to
observe wireless networks, e.g., wireshark vs tcpdump vs SitMM.
Comparing SWOA reveals what is seen as worthy of observation (e.g., what
protocols, what space, which devices), the granularity of the
observation (e.g., how is the observation captured, in what detail), the
logo and conceptual framework of choice etc. This type of observation
may be turned into a service (See also: Something in the Middle Maybe
(SitMM)).]{.how .descriptor} [When: Ideally, SWOA can be used everywhere
and in every situation. In reality, institutions, laws and
administrators like to limit the use of SWOA on infrastructures to
people who are also administering these networks. Hence, we are
presented with the situation that the use of SWOA is condoned when it is
down by researchers and pen testers (e.g., they were hired) and shunned
when done by others (often subject to name calling as hackers or
attackers).]{.when .descriptor} [What: Deep philosophical moment: most
software has a recursive observatory ambition (it wants to be observed
in its execution, output etc.). Debuggers, logs, dashboards are all
instances of software with observatory ambitions and can not be
separated from software itself. Continuous integration is the act of
folding the whole software development process into one big feedback
loop. So, what separates SWOA from software itself? Is it the intention
of observing software with a critical, agonistic or adversarial
perspective vs one focused on productivity and efficiency that
distinguishes SWOA from software? What makes SWOA a critical practice
over other forms of sotware observation. If our methodology is testing
SWOA, then is it a meta critique of critique?]{.what .descriptor} [Who:
If you can run multiple SWOAs, you can do it. The question is: will
people like it if you turn your gaze on their SWOA based methods of
observation? Once again we find that observation can surface power
asymmetries and lead to defensiveness or desires to escape the
observation in the case of the observed, and a instinct to try to
conceal that observation is taking place.]{.who .descriptor} [Urgency:
If observation is a form of critical engagement in that it surfaces the
workings of software that are invisible to many, it follows that people
would develop software to observe (SWOAs). Testing SWOAs puts this form
of critical observation to test with the desire to understand how what
is made transparent through each SWOA also makes things invisible and
reconfigures power.]{.urgency .descriptor} [Note: Good SWOA software
usually uses an animal as a logo.:D]{.note .descriptor} [WARNING: Many
of the SWOA projects we looked at are promises more than running
software/available code. Much of it is likely to turn into obsolete
gradware, making testing difficult.]{.warning .descriptor} [TODO:
RELATES TO
http://pad.constantvzw.org/p/observatory.guide.bestiary]{.tmp} [TODO:
RELATES TO http://pad.constantvzw.org/p/observatory.guide.sitmm]{.tmp}
[]{#mmmzmmrh .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.reader)
Prepare a reader to think theory with software]{.method .descriptor}
[What: Compile a collection of texts about software.]{.what .descriptor}
[How: Choose texts from different realms. Software observations are
mostly done in the realm of the technological and the pragmatic. Also
the ecology of texts around software includes first and foremost
manuals, technical documentation and academic papers by software
engineers and these all \'live\' in different realms. More recently, the
field of software studies opened up additional perspectives fuelled by
cultural studies and sometimes filosophy. By compiling a reader \...
ways of speaking/writing about. Proximity.]{.how .descriptor}
[Example]{.example .empty .descriptor}

` {.verbatim .wrap}
Pull some quotes from the reader, for example from the chapter: Observation and its consequences

Lilly Irani, Hackathons and the Making of Entrepreneurial Citizenship, 2015 http://sci-hub.bz/10.1177/0162243915578486

Kara Pernice (Nielsen Norman Group), Talking with Participants During a Usability Test, January 26, 2014, https://www.nngroup.com/articles/talking-to-users/

Matthew G. Kirschenbaum, Extreme Inscription: Towards a Grammatology of the Hard Drive. 2004 http://texttechnology.mcmaster.ca/pdf/vol13_2_06.pdf

Alexander R. Galloway, The Poverty of Philosophy: Realism and Post-Fordism, Critical Inquiry. 2013, http://cultureandcommunication.org/galloway/pdf/Galloway,%20Poverty%20of%20Philosophy.pdf
Edward Alcosser, James P. Phillips, Allen M. Wolk, How to Build a Working Digital Computer. Hayden Book Company, 1968. https://archive.org/details/howtobuildaworkingdigitalcomputer_jun67

Matthew Fuller, "It looks like you're writing a letter: Microsoft Word", Nettime, 5 Sep 2000. https://library.memoryoftheworld.org/b/xpDrXE_VQeeuDDpc5RrywyTJwbzD8eatYGHKmyT2A_HnIHKb

Barbara P. Aichinger, DDR Memory Errors Caused by Row Hammer. 2015 www.memcon.com/pdfs/proceedings2015/SAT104_FuturePlus.pdf

Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee. Last-Level Cache Side-Channel Attacks are Practical. 2015 http://palms.ee.princeton.edu/system/files/SP_vfinal.pdf
`

[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.samequestion]{.tmp}
[]{#ytjmmmni .anchor}

Colophon

The Guide to techno-galactic software observing was compiled by Carlin
Wing, Martino Morandi, Peggy Pierrot, Anita, Christoph Haag, Michael
Murtaugh, Femke Snelting

License: Free Art License

Support:

Sources:

Constant, February 2018

::: {.footnotes}
1. [[[Haraway]{.fname}, [Donna]{.gname}, [Galison]{.fname},
[Peter]{.gname} and [Stump]{.fname}, [David J]{.gname}: [Modest
Witness: Feminist Diffractions in Science Studies]{.title},
[Stanford University Press]{.publisher}, [1996]{.date}.
]{.collection} [-\>](#eeffecbe)]{#ebceffee}
2. [Worksessions are intensive transdisciplinary moments, organised
twice a year by Constant. They aim to provide conditions for
participants with different experiences and capabilities to
temporarily link their practice and to develop ideas, prototypes and
research projects together. For the worksessions, primarily Free,
Libre and Open Source software is used and material that is
available under ??? [-\>](#fcdcaacb)]{#bcaacdcf}
3. [http://www.nam-ip.be [-\>](#ffeaecaa)]{#aaceaeff}
4. [http://www.etwie.be/database/actor/computermuseum-ku-leuven
[-\>](#dbabebfa)]{#afbebabd}
5. [[contributors]{.fname}, [Wikipedia]{.gname}: [Content-control
software --- Wikipedia, The Free Encyclopedia]{.title},
[2018]{.date}. [-\>](#fadefecf)]{#fcefedaf}
6. [[UrbanMinistry.org]{.fname}, [TechMission]{.gname}:
[SafeFamilies.org \| Accountability Software: Encyclopedia of Urban
Ministry]{.title}, [2018]{.date}. [-\>](#faebbffb)]{#bffbbeaf}
7. [[Content Watch Holdings]{.fname}, [Inc]{.gname}: [Protecting Your
Family]{.title}, [2018]{.date}. [-\>](#afcbcfbb)]{#bbfcbcfa}
8. [[websense.com]{.fname}, []{.gname}: [Explicit and transparent proxy
deployments]{.title}, [2012]{.date}. [-\>](#edbedede)]{#ededebde}
9. [[workrave.org]{.fname}, []{.gname}: [Frequently Asked
Questions]{.title}, [2018]{.date}. [-\>](#ddfbbbfc)]{#cfbbbfdd}
10. [[contributors]{.fname}, [Wikipedia]{.gname}: [Agile software
development --- Wikipedia, The Free Encyclopedia]{.title},
[2018]{.date}. [-\>](#ececbabd)]{#dbabcece}
11. [[contributors]{.fname}, [Wikipedia]{.gname}: [Scrum (software
development) --- Wikipedia, The Free Encyclopedia]{.title},
[2018]{.date}. [-\>](#caabcfee)]{#eefcbaac}
12. [[contributors]{.fname}, [Wikipedia]{.gname}: [The Manifesto for
Agile Software Development]{.title}, [2018]{.date}.
[-\>](#baffeabf)]{#fbaeffab}
13. [[Kruchten]{.fname}, [Philippe]{.gname}: [Agile's Teenage
Crisis?]{.title}, [2011]{.date}. [-\>](#faeebade)]{#edabeeaf}
:::
 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.