Adema & Hall
The political nature of the book: on artists' books and radical open access
2013


The political nature of the book: on artists' books and radical open access
Adema, J. and Hall, G.

Author post-print (accepted) deposited in CURVE September 2013

Original citation & hyperlink:
Adema, J. and Hall, G. (2013). The political nature of the book: on artists' books and radical
open access. New Formations, volume 78 (1): 138-156

http://dx.doi.org/10.3898/NewF.78.07.2013

This is an Open Access article distributed under the terms of the Creative Commons
Attribution License (http://creativecommons.org/licenses/by/3.0/), which permits
unrestricted use, distribution, and reproduction in any medium, provided the original
work is properly cited.
This document is the author’s post-print version of the journal article, incorporating any
revisions agreed during the peer-review process. Some differences between the published
version and this version may remain and you are advised to consult the published version
if you wish to cite from it.

CURVE is the Institutional Repository for Coventry University
http://curve.coventry.ac.uk/open

Abstract
In this article we argue that the medium of the book can be a material and
conceptual means, both of criticising capitalism’s commodification of knowledge (for
example, in the form of the commercial incorporation of open access by feral and
predatory publishers), and of opening up a space for thinking about politics. The
book, then, is a political medium. As the history of the artist’s book shows, it can be
used to question, intervene in and disturb existing practices and institutions, and even
offer radical, counter-institutional alternatives. If the book’s potential to question and
disturb existing practices and institutions includes those associated with liberal
democracy and the neoliberal knowledge economy (as is apparent from some of the
more radical interventions occurring today under the name of open access), it also
includes politics and with it the very idea of democracy. In other words, the book is a
medium that can (and should) be ‘rethought to serve new ends’; a medium through
which politics itself can be rethought in an ongoing manner.

Keywords: Artists’ books, Academic Publishing, Radical Open Access, Politics,
Democracy, Materiality

Janneke Adema is a PhD student at Coventry University, writing a dissertation on the
future of the scholarly monograph. She is the author of the OAPEN report Overview
of Open Access Models for eBooks in the Humanities and Social Sciences (2010) and
has published in The International Journal of Cultural Studies, New Media & Society,
New Review of Academic Librarianship; Krisis: Journal for Contemporary
Philosophy; Scholarly and Research Communication; and LOGOS; and co-edited a
living book on Symbiosis (Open Humanities Press, 2011). Her research can be
followed on www.openreflections.wordpress.com.

Gary Hall is Professor of Media and Performing Arts and Director of the Centre for
Disruptive Media at Coventry University, UK. He is author of Culture in Bits
(Continuum, 2002) and Digitize This Book! (Minnesota UP, 2008). His work has
appeared in numerous journals, including Angelaki, Cultural Studies, The Oxford
Literary Review, Parallax and Radical Philosophy. He is also founding co-editor of
the open access journal Culture Machine (http://www.culturemachine.net), and co-

1

founder of Open Humanities Press (http://www.openhumanitiespress.org). More
details are available on his website http://www.garyhall.info.

THE POLITICAL NATURE OF THE BOOK: ON ARTISTS’ BOOKS AND
RADICAL OPEN ACCESS

Janneke Adema and Gary Hall

INTRODUCTION

The medium of the book plays a double role in art and academia, functioning not only
as a material object but also as a concept-laden metaphor. Since it is a medium
through which an alternative future for art, academia and even society can be enacted
and imagined, materially and conceptually, we can even go so far as to say that, in its
ontological instability with regard to what it is and what it conveys, the book serves a
political function. In short, the book can be ‘rethought to serve new ends’. 1 At the
same time, the medium of the book remains subject to a number of constraints: in
terms of its material form, structure, characteristics and dimensions; and also in terms
of the political economies, institutions and practices in which it is historically
embedded. Consequently, if it is to continue to be able to serve ‘new ends’ as a
medium through which politics itself can be rethought – although this is still a big if –
then the material and cultural constitution of the book needs to be continually
1

Johanna Drucker, The Century of Artists’ Books, 2nd ed., Granary Books, New York, 2004,
p49.

2

reviewed, reevaluated and reconceived. In order to explore critically this ‘political
nature of the book’, as we propose to think of it, along with many of the fundamental
ideas on which the book as both a concept and a material object is based, this essay
endeavours to demonstrate how developments undergone by the artist’s book in the
1960s and 1970s can help us to understand some of the changes the scholarly
monograph is experiencing now, at a time when its mode of production, distribution,
organisation and consumption is shifting from analogue to digital and from codex to
net. In what follows we will thus argue that a reading of the history of the artist’s
book can be generative for reimagining the future of the scholarly monograph, both
with respect to the latter’s potential form and materiality in the digital age, and with
respect to its relation to the economic system in which book production, distribution,
organisation and consumption takes place. Issues of access and experimentation are
crucial to any such future, we will suggest, if the critical potentiality of the book is to
remain open to new political, economic and intellectual contingencies.

THE HISTORY OF THE ARTIST’S BOOK

With the rise to prominence of digital publishing today, the material conditions of
book production, distribution, organisation and consumption are undergoing a rapid
and potentially profound transformation. The academic world is one arena in which
digital publishing is having a particularly strong impact. Here, the transition from
print to digital, along with the rise of self-publishing (Blurb, Scribd) and the use of
social media and social networks (Facebook, Twitter, Academia.edu) to communicate
and share scholarly research, has lead to the development of a whole host of
alternative publication and circulation systems for academic thought and knowledge.

3

Nowhere have such changes to the material conditions of the academic book been
rendered more powerfully apparent than in the emergence and continuing rise to
prominence of the open access movement. With its exploration of different ways of
publishing, circulating and consuming academic work (specifically, more open,
Gratis, Libre ways of doing so), and of different systems for governing, reviewing,
accrediting and legitimising that work, open access is frequently held as offering a
radical challenge to the more established academic publishing industry. Witness the
recent positioning in the mainstream media of the boycott of those publishers of
scholarly journals – Elsevier in particular – who charge extremely high subscription
prices and who refuse to allow authors to make their work freely available online on
an open access basis, in terms of an ‘Academic Spring’. Yet more potentially radical
still is the occupation of the new material conditions of academic book production,
distribution, organization and consumption by those open access advocates who are
currently experimenting with the form and concept of the book, with a view to both
circumventing and placing in question the very print-based system of scholarly
communication – complete with its ideas of quality, stability and authority – on
which so much of the academic institution rests.

In the light of the above, our argument in this essay is that some of these more
potentially radical, experimental developments in open access book publishing can be
related on the level of political and cultural significance to transformations undergone
in a previous era by the artist’s book. As a consequence, the history of the latter can
help us to explore in more depth and detail than would otherwise be possible the
relation in open access between experimenting with the medium of the book on a

4

material and conceptual level on the one hand, and enacting political alternatives in a
broader sense on the other. Within the specific context of 1960s and 1970s
counterculture, the artist’s book was arguably able to fill a certain political void,
providing a means of democratising and subverting existing institutions by
distributing an increasingly cheap and accessible medium (the book), and in the
process using this medium in order to reimagine what art is and how it can be
accessed and viewed. While artists grasped and worked through that relation between
the political, conceptual and material aspects of the book several decades ago, thanks
to the emergence of open access online journals, archives, blogs, wikis and free textsharing networks one of the main places in which this relation is being explored today
is indeed in the realm of academic publishing. 2

In order to begin thinking through some of the developments in publishing that are
currently being delved into under the banner of open access, then, let us pause for a
moment to reflect on some of the general characteristics of those earlier experiments
with the medium of the book that were performed by artists. Listed below are six key
areas in which artists’ books can be said to offer guidance for academic publishing in
the digital age, not just on a pragmatic level but on a conceptual and political level
too.

1) The Circumvention of Established Institutions

2

The relation in academic publishing between the political, conceptual and material aspects
of the book has of course been investigated at certain points in the past, albeit to varying
degrees and extents. For one example, see the ‘Working Papers’ and other forms of stencilled
gray literature that were produced and distributed by the Birmingham Centre for
Contemporary Cultural Studies in the 1960s and 1970s, as discussed by Ted Striphas and
Mark Hayward in their contribution to this issue.

5

According to the art theorist Lucy Lippard, the main reason the book has proved to be
so attractive as an artistic medium has to do with the fact that artists’ books are
‘considered by many the easiest way out of the art world and into the hearth of a
broader audience.’ 3 Books certainly became an increasingly popular medium of
artistic expression in Europe and the United States in the 1960s and 1970s. This was
largely due to their perceived potential to subvert the (commercial, profit-driven)
gallery system and to politicise artistic practice - to briefly introduce some of the
different yet as we can see clearly related arguments that follow - with the book
becoming a ‘democratic multiple’ that breached the walls held to be separating socalled high and low culture. Many artist-led and artist-controlled initiatives, such as
US-based Franklin Furnace, Printed Matter and Something Else Press, were
established during this period to provide a forum for artists excluded from the
traditional institutions of the gallery and the museum. Artists’ books played an
extremely important part in the rise of these independent art structures and publishing
ventures. 4 Indeed, for many artists such books embodied the ideal of being able to
control all aspects of their work.

Yet this movement toward liberating themselves from the gallery system by
publishing and exhibiting in artists’ books was by no means an easy transition for
many artists to make. It required them to come to terms with the idea that publishing
their own work did not amount to mere vanity self-publishing, in particular. Moore
and Hendricks describe this state of affairs in terms of the power and potential of ‘the

3

Lucy R. Lippard, ‘The Artist’s Book Goes Public’, in Joan Lyons (ed), Artists’ Books: a
Critical Anthology and Sourcebook, Rochester, New York: Visual Studies Workshop Press,
1993, p45.
4
Joan Lyons, ‘Introduction’, in Lyons (ed), Artists’ Books, p7.

6

page as an alternative space’. 5 From this perspective, producing, publishing and
distributing one’s own artist’s book was a sign of autonomy and independence; it was
nothing less than a way of being able to affect society directly. 6 The political potential
associated with the book by artists should therefore not be underestimated..
Accordingly, many artists created their own publishing imprints or worked together
with newly founded artist’s book publishers and printers (just as some academics are
today challenging the increasingly profit-driven publishing industry by establishing
not-for-profit, scholar-led, open access journals and presses). The main goal of these
independent (and often non-commercial) publisher-printer-artist collectives was to
make experimental, innovative work (rather than generate a profit), and to promote
ephemeral art works, which were often ignored by mainstream, mostly marketorientated institutions. 7 Artists’ books thus fitted in well with the mythology Johanna
Drucker describes as surrounding ‘activist artists’, and especially with the idea of the
book as a tool of independent activist thought. 8

2) The Relationship with Conceptual and Processual Art
In the context of this history of the artist’s book, one particularly significant
conceptual challenge to the gallery system came with the use of the book as a
platform for exhibiting original work (itself an extension of André Malraux’s idea of
the museum without walls). Curator Seth Siegelaub was among the first to publish his
artists – as opposed to exhibiting them – thus becoming, according to Germano

5

Hendricks and Moore, ‘The Page as Alternative Space: 1950 to 1969’, in Lyons (ed),
Artists’ Books, p87.
6
Pavel Büchler, ‘Books as Books’, in Jane Rolo and Ian Hunt (eds), Book Works: a Partial
History and Sourcebook, London: Book Works, 1996.
7
Clive Phillpot, ‘Some Contemporary Artists and Their Books’, in Cornelia Lauf and Clive
Phillpot (eds), Artist/Author: Contemporary Artists’ Books, New York, Distributed Art
Publishers, 1998, pp128-9.
8
Drucker, The Century of Artists’ Books, pp7-8.

7

Celant, ‘the first to allow complete operative and informative liberty to artists’. 9 The
Xerox Book and March 1-31, 1969, featuring work by Sol LeWitt, Robert Barry,
Douglas Huebler, Joseph Kosuth, Lawrence Weiner and other international artists, are
both examples of artists’ books where the book (or the catalogue) itself is the
exhibition. As Moore and Hendricks point out, this offered all kinds of benefits when
compared with traditional exhibitions: ‘This book is the exhibition, easily
transportable without the need for expensive physical space, insurance, endless
technical problems or other impediments. In this form it is relatively permanent and,
fifteen years later, is still being seen by the public.’ 10 Artists’ books thus served here
as an alternative space in themselves and at the same time functioned within a
network of alternative spaces, such as the above-mentioned Franklin Furnace
and Printed Matter.. Next to publishing and supporting artists’ books, such venues
offered a space for staging often highly politicised, critical, experimental and
performance art. 11 It is important to emphasise this aspect of artist book publishing, as
it shows that the book was used as a specific medium to exhibit works that could not
otherwise readily find a place within mainstream exhibition venues (a situation which,
as we will show, has been one of the main driving forces behind open access book
publishing). This focus on the book as a place for continual experimentation – be it on
the level of content or form – can thus be seen as underpinning what we are referring
to here as the ‘political nature of the book’ (playing on the title of Adrian Johns’
classic work of book history). 12

9

Germano Celant, Book as Artwork 1960-1972, New York, 6 Decades Books, 2011, p40.
Hendricks and Moore, ‘The Page as Alternative Space. 1950 to 1969’, p94.
11
Brian Wallis, ‘The Artist’s Book and Postmodernism’, in Cornelia Lauf and Clive Phillpot,
(eds), Artist/Author, 1998.
12
Adrian Johns, The Nature of the Book: Print and Knowledge in the Making, Chicago,
University of Chicago Press, 1998.
10

8

3) The Use of Accessible Technologies
As is the case with the current changes to the scholarly monograph, the rise of artists’
books can be perceived to have been underpinned (though by no means determined)
by developments in technology, with the revolution in mimeograph and offset
printing helping to take artists’ books out of the realm of expensive and rare
commodities by providing direct access to quick and inexpensive printing
methods. 13 Due to its unique characteristics – low production costs, portability,
accessibility and endurance – the artist’s book was regarded as having the potential to
communicate with a wider audience beyond the traditional art world. In particular, it
was seen as having the power to break down the barriers between so-called high and
low culture, using the techniques of mass media to enable artists to argue for their
own,

alternative

goals,

something

that

presented

all

kinds

of

political

possibilities.14 The artist’s book thus conveyed a high degree of artistic autonomy,
while also offering a far greater role to the reader or viewer, who was now able to
interact with the art object directly (eluding the intermediaries of the gallery and
museum system). Indeed, Lippard even went so far as to envision a future where
artists’ books would be readily available as part of mass consumer culture, at
‘supermarkets, drugstores and airports’. 15

4) The Politics of the Democratic Multiple

13

Hendricks and Moore, ‘The Page as Alternative Space’, pp94-95.
Joan Lyons, ‘Introduction’, in Lyons (ed), Artists’ Books, p7.
15
Lippard, ‘The Artist’s Book Goes Public’, p48; Lippard, ‘Conspicuous Consumption: New
Artists’ Books’, in Lyons (ed), Artists’ Books, p100. Is there a contradiction here between a
politics of artists’ books that is directed against commercial profit-driven galleries and
institutions, but which nevertheless uses the tools of mass consumer culture to reach a wider
audience (see also the critique Lippard offers in the next section)? And can a similar point be
made with respect to the politics of some open access initiatives and their use of social media
and (commercial, profit-driven) platforms such as Google Books and Amazon?
14

9

The idea of the book as a real democratic multiple came into being only after 1945, a
state of events that has been facilitated by a number of technological innovations,
including those detailed above. Yet the concept of the democratic multiple itself
developed in what was already a climate of political activism and social
consciousness. In this respect, the democratic multiple was part of both the overall
trend toward the dematerialization of art and the newly emergent emphasis on cultural
and artistic processes rather than ready-made objects. 16

Artists’ desire for

independence from established institutions and for the wider availability of their
works thus resonated with the democratising and anti-institutional potential of the
book as a medium. What is more, the book offered artists a space in which they were
able to experiment with the materiality of the medium itself and with the practices
that comprised it, and thus ultimately with the question of what constituted art and an
art object. This reflexivity of the book with regard to its own nature is one of the key
characteristics that make a book an artist’s book, and enable it to have political
potential in that it can be ‘rethought to serve new ends’. Much the same can be said
with respect to the relation between the book and scholarly communication: witness
the way reflection on the material nature of the book in the digital age has led to
questions being raised regarding how we structure scholarly communication and
practice scholarship more generally.

5) Conceptual Experimentation: Problematising the Concept and Form of the Book
Another key to understanding artists’ books and their history lies with the way the
radical change in printing technologies after World War II led to the reassessment of
the book form itself, and in particular, of the specific nature of the book’s materiality,

16

Drucker, The Century of Artists’ Books, p72.

10

of the very idea of the book, and of the notions and practices underlying the book’s
various uses.

When it came to reevaluating the materiality of the book, many experiments with
artists’ books tried to escape the linearity brought about by the codex form’s
(sequential) constraints, something which had long conditioned both writing and
reading practices. Undoubtedly, one of the most important theorists as far as
rethinking the materiality of the book in the period after 1945 is concerned is Ulises
Carrión. He defines the book as a specific set of conditions that should be (or need to
be) responded to. 17 Instead of seeing it as just a text, Carrión positions the book as an
object, a container and a sequence of spaces. For him, the codex is a form that needs
to be responded to in what he prefers to call ‘bookworks’. These are ‘books in which
the book form, as a coherent sequence of pages, determines conditions of reading that
are intrinsic to the work.’ 18 From this perspective, artists’ books interrogate the
structure and the meaning of the book’s form. 19

Yet the book is also a metaphor, a symbol and an icon to be responded to. 20 Indeed, it
is difficult to establish a precise definition or set of characteristics for artists’ books as
their very nature keeps changing. As Sowden and Bodman put it, ‘What a book is can
be challenged’. 21 Drucker, meanwhile, is at pains to point out that the book is open
for innovation, although the latter has its limits: ‘The convention of the book is both
its constrained meanings (as literacy, the law, text and so forth) and the space of new
17

James Langdon (ed), Book, Birmingham, Eastside Projects, 2010.
Ulises Carrión, ‘Bookworks Revisited’, in James Langdon (ed), Book, Birmingham,
Eastside Projects, 2010.
19
Drucker, The Century of Artists’ Books, pp3-4.
20
Ibid., p360.
21
Tom Sowden and Sarah Bodman, A Manifesto for the Book, Impact Press, 2010, p9.
18

11

work (the blank page, the void, the empty place).’ Books here ‘mutate, expand,
transform’. Accordingly, Drucker regards the transformed book as an intervention,
something that reflects the inherent critique that book experiments embody with
respect to their own constitution.22 One way of examining reflexively the structures
that make up the book is precisely by disturbing those structures. In certain respects
the page can be thought of as being finite (e.g. physically, materially), but it can also
be understood to be infinite, not least as a result of being potentially different on each
respective viewing/reading. This allows the book to be perceived as a self-reflexive
medium that is extremely well-suited to formal experiments. At the same time, it
allows it to be positioned as a potentially political medium, in the sense that it can be
used to intervene in and disturb existing practices and institutions.

6) The Problematisation of Reading and Authorship
As part of their constitution, artists’ books can be said to have brought into question
certain notions and practices relating to the book that had previously been taken too
much for granted – and perhaps still are. For instance, Brian Wallis shows how, ‘in
place of the omnipotent author’, postmodern artists’ books ‘acknowledge a
collectivity of voices and active participation of the reader’. 23 Carrión, for one, was
very concerned with the thought that readers might consume books passively, while
being unaware of their specificity as a medium. 24 The relationship between the book
and reading, and the way in which the physical aspect of the book can change how we
read, was certainly an important topic for artists throughout this period. Many
experiments with artists’ books focused on the interaction between author, reader and
22

Drucker, The Century of Artists’ Books.
Lucy Lippard and John Chandler, ‘The Dematerialization of Art’, Art International, 12, 2
(1968).
24
Langdon, Book.
23

12

book, offering an alternative, and not necessarily linear, reading experience. 25 Such
readerly interventions often represented a critical engagement with ideas of the author
as original creative genius derived from the cultural tradition of European
Romanticism. Joan Lyons describes this potential of the artist’s book very clearly:
‘The best of the bookworks are multinotational. Within them, words, images, colors,
marks, and silences become plastic organisms that play across the pages in variable
linear sequence. Their importance lies in the formulation of a new perceptual
literature whose content alters the concept of authorship and challenges the reader to a
new discourse with the printed page.’ 26 Carrión thus writes about how in the books of
the new art, as he calls them, words no longer transmit an author’s intention. Instead,
authors can use other people’s words as an element of the book as a whole – so much
so that he positions plagiarism as lying at the very basis of creativity. As far as artists’
books are concerned, it is not the artist’s intention that is at stake, according to
Carrión, but rather the process of testing the meaning of language. It is the reader who
creates the meaning and understanding of a book for Carrión, through his or her
specific meaning-extraction. Every book requires a different reading and opens up
possibilities to the reader. 27

THE INHIBITIONS OF MEDIATIC CHANGE

We can thus see that the very ‘nature’ of the book is particularly well suited to
experimentation and to reading against the grain. As a medium, the book has the
25

This has been one of the focal points of the books published and commissioned by UK
artist book publisher Book Works, for instance. Jane Rolo and Ian Hunt, ‘Introduction’, in
Book Works: A Partial History and Sourcebook, op. cit.
26
Joan Lyons, ‘Introduction’, p7.
27
Ulises Carrión, ‘The New Art of Making Books’, in James Langdon (ed), Book,
Birmingham, Eastside Projects, 2010.

13

potential to raise questions for some of the established practices and institutions
surrounding the production, distribution and consumption of printed matter. This
potential notwithstanding, it gradually became apparent (for some this realisation
occurred during the 1960s and 1970s, for others it only came about later) that the
ability of artists’ books to bring about institutional change in the art world, and to
question both the concept of the book and that of art as the singular aesthetic artefact
bolstered by institutional structures, was not particularly long-lasting. With respect to
the democratization of the artist’s book, for example, Lippard notes that, by losing its
distance, there was also a chance of the book losing its critical function. Here, says
Lippard, the ‘danger is that, with an expanding audience and an increased popularity
with collectors, the artist’s book will fall back into its edition de luxe or coffee table
origin … transformed into glossy, pricey products.’ For Lippard there is a discrepancy
between the characteristics of the medium which had the potential to break down
walls, and the actual content and form of most artists’ books which was highly
experimental and avant-garde, and thus inaccessible to readers/consumers outside of
the art world. 28

PROCESSES OF INCORPORATION AND COMMERCIALISATION

Interestingly, Carrión was one of the sharpest critics of the idea that artists’ books
should be somehow able to subvert the gallery system. In his ‘Bookworks Revisited’,
he showed how the hope surrounding this supposedly revolutionary potential of the
book as a medium was based on a gross misunderstanding of the mechanisms
underlying the art world. In particular, Carrión attacked the idea that the artist’s book

28

Lippard, ‘The Artist’s Book Goes Public’ pp47-48.

14

could do without any intermediaries. Instead of circumventing the gallery system, he
saw book artists as merely adopting an alternative set of intermediaries, namely book
publishers and critics. 29

Ten years later Stewart Cauley updated Carrión’s criticisms, arguing that as an art
form and medium, the artist’s book had not been able to avoid market mechanisms
and the celebrity cult of the art system. In fact, by the end of the 1980s the field of
artists’ publications had lost most of its experimental impetus and had become
something of an institution itself, imitating the gallery and museum system it was
initially designed to subvert. 30 Those interested in artists’ books initially found it
difficult to set up an alternative system, as they had to manage without organized
distribution, review mechanisms or funding schemes. When they were eventually able
to do so in the 1970s, the resulting structures in many ways mirrored the very
institutions they were supposed to be criticizing and providing an alternative to.31
Cauley points the finger of blame at the book community itself, especially at the fact
that artists at the time focused more on the concept and structure of the book than on
using the book form to make any kind of critical political statement. The idea that
artists’ books were disconnected from mainstream institutional systems has also been
debunked as a myth. As Drucker makes clear, many artists’ books were developed in
cooperation with museums or galleries, where they were perceived not as subversive
artefacts but rather as low-cost tools for gathering additional publicity for those
institutions and their activities. 32
29

Carrión, ‘Bookworks Revisited’; Johanna Drucker, ‘Artists’ Books and the Cultural Status
of the Book’, Journal of Communication, 44 (1994).
30
Stewart Cauley, ‘Bookworks for the ’90s’, Afterimage, 25, 6, May/June (1998).
31
Stefan Klima, Artists Books: A Critical Survey of the Literature, Granary Books, New
York, 1998, pp54-60.
32
Drucker, The Century of Artists’ Books, p78.

15

Following Abigail Solomon-Godeau, this process of commercialisation and
incorporation – or, as she calls it, ‘the near-total assimilation’ of art practice
(Solomon-Godeau focuses specifically on postmodern photography) and critique into
the discourses it professed to challenge – can be positioned as part of a general
tendency in conceptual and postmodern ‘critical art practices’. It is a development that
can be connected to the changing art markets of the time and viewed in terms of a
broader social and cultural shift to Reaganomics. For Solomon-Godeau, however, the
problem lay not only in changes to the art market, but in critical art practices and art
critique too, which in many ways were not robust enough to keep on reinventing
themselves. Nonetheless, even if they have become incorporated into the art market
and the commodity system, Solomon-Godeau argues that it is still possible for art
practices and institutional critiques to develop some (new) forms of sustainable
challenge from within these systems. As far as she is concerned, ‘a position of
resistance can never be established once and for all, but must be perpetually
refashioned and renewed to address adequately those shifting conditions and
circumstances that are its ground.’ 33

THE PROMISE OF OPEN ACCESS

At first sight many of the changes that have occurred recently in the world of
academic book publishing seem to resemble those charted above with respect to the
artist’s book. As was the case with the publishing of artists’ books, digital publishing
has provided interested parties with an opportunity to counter the existing
33

Abigail Solomon-Godeau, ‘Living with Contradictions: Critical Practices in the Age of
Supply-Side Aesthetics’, Social Text, 21 (1989).

16

(publishing) system and its institutions, to experiment with using contemporary and
emergent media to publish (in this case academic) books in new ways and forms, and
in the process to challenge established ideas of the printed codex book, together with
the material practices of production, distribution and consumption that surround it.
This has resulted in a new wave of scholar-led publishing initiatives in academia, both
formal (with scholars either becoming publishers themselves, or setting up crossinstitutional publishing infrastructures with libraries, IT departments and research
groups) and informal (using self-publishing and social media platforms such as blogs
and wikis). 34 The phenomenon of open access book publishing can be located within
this broader context – a context which, it is worth noting, also includes the closing of
many book shops due to fierce rivalry from the large supermarkets at one end of the
market, and online e-book traders such as Amazon at the other; the fact that the major
high-street book chains are increasingly loath to take academic titles - not just
journals but books too; and the handing over (either in part or in whole) to for-profit
corporations of many publishing organisations designed to serve charitable aims and
the public good: scholarly associations, learned societies, university presses, nonprofit and not-for-profit publishers.

From the early 1990s onwards, open access was pioneered and developed most
extensively in the science, technology, engineering and mathematics (STEM) fields,
where much of the attention was focused on the online self-archiving by scholars of
pre-publication (i.e. pre-print) versions of their research papers in central, subject or
institutionally-based repositories. This is known as the Green Road to open access, as

34

See, for example, Janneke Adema and Birgit Schmidt, ‘From Service Providers to Content
Producers: New Opportunities For Libraries in Collaborative Open Access Book Publishing’,
New Review of Academic Librarianship, 16 (2010).

17

distinct from the Gold Road, which refers to the publishing of articles in online, open
access journals. Of particular interest in this respect is the philosophy that lies behind
the rise of the open access movement, as it can be seen to share a number of
characteristics with the thinking behind artists’ books discussed earlier. The former
was primarily an initiative established by academic researchers, librarians, managers
and administrators, who had concluded that the traditional publishing system – thanks
in no small part to the rapid (and, as we shall see, ongoing) process of aggressive forprofit commercialisation it was experiencing – was no longer willing or able to meet
all of their communication needs. Accordingly, those behind this initiative wanted to
take advantage of the opportunities they saw as being presented by the new digital
publishing and distribution mechanisms to make research more widely and easily
available in a far faster, cheaper and more efficient manner than was offered by
conventional print-on-paper academic publishing. They had various motivations for
doing so. These include wanting to extend the circulation of research to all those who
were interested in it, rather than restricting access to merely those who could afford to
pay for it in the form of journal subscriptions, etc; 35 and a desire to promote the
emergence of a global information commons, and, through this, help to produce a
renewed democratic public sphere of the kind Jürgen Habermas propounds. From the
latter point of view (as distinct from the more radical democratic philosophy we
proceed to develop in what follows), open access was seen as working toward the
creation of a healthy liberal democracy, through its alleged breaking down of the
barriers between the academic community and the rest of society, and its perceived
consequent ability to supply the public with the information they need to make
knowledgeable decisions and actively contribute to political debate. Without doubt,
35

John Willinsky, The Access Principle: The Case for Open Access to Research and
Scholarship, Cambridge, Mass., The MIT Press, 2009, p5.

18

though, another motivating factor behind the development of open access was a desire
on the part of some of those involved to enhance the transparency, accountability,
discoverability, usability, efficiency and (cost) effectivity not just of scholarship and
research but of higher education itself. From the latter perspective (and as can again
be distinguished from the radical open access philosophy advocated below), making
research available on an open access basis was regarded by many as a means of
promoting and stimulating the neoliberal knowledge economy both nationally and
internationally. Open access is supposed to achieve these goals by making it easier for
business and industry to capitalise on academic knowledge - companies can build new
businesses based on its use and exploitation, for example - thus increasing the impact
of higher education on society and helping the UK, Europe and the West (and North)
to be more competitive globally. 36

To date, the open access movement has progressed much further toward its goal of
making all journal articles available open access than it has toward making all
academic books available in this fashion. There are a number of reasons why this is
the case. First, since the open access movement was developed and promoted most
extensively in the STEMs, it has tended to concentrate on the most valued mode of
publication in those fields: the peer-reviewed journal article. Interestingly, the recent

36

Gary Hall, Digitize This Book! The Politics of New Media, or Why We Need Open Access
Now, Minneapolis, University of Minnesota Press, 2008; Janneke Adema, Open Access
Business Models for Books in the Humanities and Social Sciences: An Overview of Initiatives
and Experiments, OAPEN Project Report, Amsterdam, 2010. David Willetts, the UK Science
Minister, is currently promoting ‘author-pays’ open access for just these reasons. See David
Willetts, ‘Public Access to Publicly-Funded Research’, BIS: Department for Business,
Innovation and Skills, May 2, 2012: https://www.gov.uk/government/speeches/public-accessto-publicly-funded-research--2

19

arguments around the ‘Academic Spring’ and ‘feral’ publishers such as Informa plc
are no exception to this general rule. 37

Second, restrictions to making research available open access associated with
publishers’ copyright and licensing agreements can in most cases be legally
circumvented when it comes to journal articles. If all other options fail, authors can
self-archive a pre-refereed pre-print of their article in a central, subject or
institutionally-based repository such as PubMed Central. However, it is not so easy to
elude such restrictions when it comes to the publication of academic books. In the
latter case, since the author is often paid royalties in exchange for their text, copyright
tends to be transferred by the author to the publisher. The text remains the intellectual
property of the author, but the exclusive right to put copies of that text up for sale, or
give them away for free, then rests with the publisher. 38

Another reason the open access movement has focused on journal articles is because
of the expense involved in publishing books in this fashion, since one of the main
models of funding open access in the STEMs, author-side fees, 39 is not easily
transferable either to book publishing or to the Humanities and Social Sciences
(HSS). In contrast to the STMs, the HSS feature a large number of disciplines in
which it is books (monographs in particular) published with esteemed international
37

David Harvie, Geoff Lightfoot, Simon Lilley and Kenneth Weir, ‘What Are We To Do
With Feral Publishers?’, submitted for publication in Organization, and accessible through
the Leicester Research Archive: http://hdl.handle.net/2381/9689.
38
See the Budapest Open Access Initiative, ‘Self-Archiving FAQ, written for the Budapest
Open Access Initiative (BOAI)’, 2002-4: http://www.eprints.org/self-faq/.
39
Although ‘author-pays’ is often positioned as the main model of funding open access
publication in the STEMs, a lot of research has disputed this fact. See, for example, Stuart
Shieber, ‘What Percentage of Open-Access Journals Charge Publication Fees’, The
Occasional Pamphlet on Scholarly Publishing, May 9, 2009:
http://blogs.law.harvard.edu/pamphlet/2009/05/29/what-percentage-of-open-access-journalscharge-publication-fees/.

20

presses, rather than articles in high-ranking journals, that are considered as the most
significant and valued means of scholarly communication. Authors in many fields in
the HSS are simply not accustomed to paying to have their work published. What is
more, many authors associate doing so with vanity publishing. 40 They are also less
likely to acquire the grants from either funding bodies or their institutions that are
needed to cover the cost of publishing ‘author-pays’. That the HSS in many Western
countries receive only a fraction of the amount of government funding the STEMs do
only compounds the problem, 41 as does the fact that higher rejection rates in the HSS,
as compared to the STEMs, mean that any grants would have to be significantly
larger, as the time spent on reviewing articles, and hence the amount of human labour
used, makes it a much more intensive process. 42 And that is just to publish journal
articles. Publishing books on an author-pays basis would be more expensive still.

Yet even though the open access movement initially focused more on journal articles
than on monographs, things have begun to change in this respect in recent years.
Undoubtedly, one of the major factors behind this change has been the fact that the

40

Maria Bonn, ‘Free Exchange of Ideas: Experimenting with the Open Access Monograph’,
College and Research Libraries News, 71, 8, September (2010) pp436-439:
http://crln.acrl.org/content/71/8/436.full.
41
Patrick Alexander, director of the Pennsylvania State University Press, provides the
following example: ‘Open Access STEM publishing is often funded with tax-payer dollars,
with publication costs built into researchers’ grant request… the proposed NIH budget for
2013 is $31 billion. NSF’s request for 2013 is around $7.3 billion. Compare those amounts to
the NEH ($154 million) and NEA ($154 million) and you can get a feel for why researchers
in the the arts and humanities face challenges in funding their publication costs.’ (Adeline
Koh, ‘Is Open Access a Moral or a Business Issue? A Conversation with The Pennsylvania
State University Press, The Chronicle of Higher Education, July 10, 2012:
http://chronicle.com/blogs/profhacker/is-open-access-a-moral-or-a-business-issue-aconversation-with-the-pennsylvania-state-university-press/41267)
42
See Mary Waltham’s 2009 report for the National Humanities Alliance, ‘The Future of
Scholarly Journals Publishing among Social Sciences and Humanities Associations’:
http://www.nhalliance.org/research/scholarly_communication/index.shtml; and Peter Suber,
‘Promoting Open Access in the Humanities’, 2004:
http://www.earlham.edu/~peters/writing/apa.htm. ‘On average, humanities journals have
higher rejection rates (70-90%) than STEM journals (20-40%)’, Suber writes.

21

publication of books on an open access basis has been perceived as one possible
answer to the ‘monograph crisis’. This phrase refers to the way in which the already
feeble sustainability of the print monograph is being endangered even further by the
ever-declining sales of academic books. 43 It is a situation that has in turn been brought
about by ‘the so-called “serials crisis”, a term used to designate the vertiginous rise of
the subscription to STEM journals since the mid-80s which… strangled libraries and
led to fewer and fewer purchases of books/monographs.’ 44 This drop in library
demand for monographs has led many presses to produce smaller print runs; focus on
more commercial, marketable titles; or even move away from monographs to
concentrate on text books, readers, and reference works instead. In short, conventional
academic publishers are now having to make decisions about what to publish more on
the basis of the market and a given text’s potential value as a commodity, and less on
the basis of its quality as a piece of scholarship. This last factor is making it difficult
for early career academics to publish the kind of research-led monographs that are
often needed to acquire that all important first full-time position. This in turn means
the HSS is, in effect, allowing publishers to make decisions on its future and on who
gets to have a long-term career on an economic basis, according to the needs of the
market – or what they believe those needs to be. But it is also making it hard for

43

Greco and Wharton estimate that the average number of library purchases of monographs
has dropped from 1500 in the 1970s to 200-300 at present. Thompson estimates that print
runs and sales have declined from 2000-3000 (print runs and sales) in the 1970s to print runs
of between 600-1000 and sales of between 400-500 nowadays. Albert N. Greco and Robert
Michael Wharton, ‘Should University Presses Adopt an Open Access [electronic publishing]
Business Model for all of their Scholarly Books?’, ELPUB. Open Scholarship: Authority,
Community, and Sustainability in the Age of Web 2.0 – Proceedings of the 12th
International Conference on Electronic Publishing held in Toronto, Canada 25-27 June
2008; John B. Thompson, Books in the Digital Age: The Transformation of Academic and
Higher Education Publishing in Britain and the United States, Cambridge, Polity Press, 2005.
44
Jean Kempf, ‘Social Sciences and Humanities Publishing and the Digital “Revolution”’
unpublished manuscript, 2010: http://perso.univlyon2.fr/~jkempf/Digital_SHS_Publishing.pdf; Thompson, Books in the Digital Age, pp. 9394.

22

authors in the HSS generally to publish monographs that are perceived as being
difficult, advanced, specialized, obscure, radical, experimental or avant-garde - a
situation reminiscent of the earlier state of events which led to the rise of artists’
books, with the latter emerging in the context of a perceived lack of exhibition space
for experimental and critical (conceptual) work within mainstream commercial
galleries.

Partly in response to this ‘monograph crisis’, a steadily increasing number of
initiatives have now been set up to enable authors in the HSS in particular to bring out
books open access – not just introductions, reference works and text books, but
research monographs and edited collections too. These initiatives include scholar-led
presses such as Open Humanities Press, re.press, and Open Book Publishers;
commercial presses such as Bloomsbury Academic; university presses, including
ANU E Press and Firenze University Press; and presses established by or working
with libraries, such as Athabasca University’s AU Press. 45

Yet important though the widespread aspiration amongst academics, librarians and
presses to find a solution to the monograph crisis has been, the reasons behind the
development of open access book publishing in the HSS are actually a lot more
diverse than is often suggested. For instance, to the previously detailed motivating
factors that inspired the rise of the open access movement can be added the desire,
shared by many scholars, to increase accessibility to (specialized) HSS research, with
a view to heightening its reputation, influence, impact and esteem. This is seen as

45

A list of publishers experimenting with business models for OA books is available at:
http://oad.simmons.edu/oadwiki/Publishers_of_OA_books. See also Adema, Open Access
Business Models.

23

being especially significant at a time when the UK government, to take just one
example, is emphasizing the importance of the STEMs while withdrawing support
and funding for the HSS. Many scholars in the HSS are thus now willing to stand up
against, and even offer a counter-institutional alternative to, the large, established,
profit-led, commercial firms that have come to dominate academic publishing – and,
in so doing, liberate the long-form argument from market constraints through the
ability to publish books that often lack a clear commercial market.

TWO STRATEGIES: ACCESSIBILITY AND EXPERIMENTATION

That said, all of these reasons and motivating factors behind the recent changes in
publishing models are still very much focused on making more scholarly research
more accessible. Yet for at least some of those involved in the creation and
dissemination of open access books, doing so also constitutes an important stage in
the development of what might be considered more ‘experimental’ forms of research
and publication; forms for which commercial and heavily print-based systems of
production and distribution have barely provided space. Such academic experiments
are thus perhaps capable of adopting a role akin to, if not the exact equivalent of, that
we identified artists’ books as having played in the countercultural context of the
1960s and 1970s: in terms of questioning the concept and material form of the book;
promoting alternative ways of reading and communicating via books; and
interrogating modern, romantic notions of authorship. We are thinking in particular of
projects that employ open peer-review procedures (such as Kathleen Fitzpatrick’s
Planned Obsolescence, which uses the CommentPress Wordpress plugin to enable
comments to appear alongside the main body of the text), wikis (e.g. Open

24

Humanities Press’ two series of Liquid and Living Books) and blogs (such as those
created using the Anthologize app developed at George Mason University). 46 These
enable varying degrees of what Peter Suber calls ‘author-side openness’ when it
comes to reviewing, editing, changing, updating and re-using content, including
creating derivative works. Such practices pose a conceptual challenge to some of the
more limited interpretations of open access (what has at times been dubbed ‘weak
open access’), 47 and can on occasion even constitute a radical test of the integrity and
identity of a given work, not least by enabling different versions to exist
simultaneously. In an academic context this raises questions of both a practical and
theoretical nature that have the potential to open up a space for reimagining what
counts as scholarship and research, and of how it can be responded to and accessed:
not just which version of a work is to be cited and preserved, and who is to have
ultimate responsibility for the text and its content; but also what an author, a text, and
a work actually is, and where any authority and stability that might be associated with
such concepts can now be said to reside.

It is interesting then that, although they can be positioned as constituting two of the
major driving forces behind the recent upsurge in the current interest in open access
book publishing, as ‘projects’, the at times more obviously or overtly ‘political’ (be it
liberal-democratic, neoliberal or otherwise) project of using digital media and the
Internet to create wider access to book-based research on the one hand, and
experimenting—as part of the more conceptual, experimental aspects of open access
book publishing—with the form of the book (a combination of which we identified as
46

See http://mediacommons.futureofthebook.org/mcpress/plannedobsolescence;
http://liquidbooks.pbwiki.com/; http://www.livingbooksaboutlife.org/; http://anthologize.org/.
47
See Peter Suber, SPARC OA newsletter, issue 155, March 2, 2011:
http://www.earlham.edu/~peters/fos/newsletter/03-02-11.htm

25

being essential components of the experimental and political potential of artists’
books) and the way our dominant system of scholarly communication currently
operates on the other, often seem to be rather disconnected. Again, a useful
comparison can be made to the situation described by Lippard, where more
(conceptually or materially) experimental artists’ books were seen as being less
accessible to a broader public and, in some cases, as going against the strategy of
democratic multiples, promoting exclusivity instead.

It is certainly the case that, in order to further the promotion of open access and
achieve higher rates of adoption and compliance among the academic community, a
number of strategic alliances have been forged between the various proponents of the
open access movement. Some of these alliances (those associated with Green open
access, for instance) have taken making the majority if not indeed all of the research
accessible online without a paywall (Gratis open access) 48 as their priority, perhaps
with the intention of moving on to the exploration of other possibilities, including
those concerned with experimenting with the form of the book, once critical mass has
been attained – but perhaps not. Hence Stevan Harnad’s insistence that ‘it’s time to
stop letting the best get in the way of the better: Let’s forget about Libre and Gold OA
until we have managed to mandate Green Gratis OA universally.’ 49 Although they
cannot be simply contrasted and opposed to the former (often featuring many of the
same participants), other strategic alliances have focused more on gaining the trust of
the academic community. Accordingly, they have prioritized allaying many of the

48

For an overview of the development of these terms, see:
http://www.arl.org/sparc/publications/articles/gratisandlibre.shtml
49
Stevan Harnad, Open Access: Gratis and Libre, Open Access Archivangelism,
Thursday, May 3, 2012.

26

anxieties with regard to open access publications – including concerns regarding their
quality, stability, authority, sustainability and status with regard to publishers’
copyright licenses and agreements – that have been generated as a result of the
transition toward the digital mode of reproduction and distribution. More often than
not, such alliances have endeavoured to do so by replicating in an online context
many of the scholarly practices associated with the world of print-on-paper
publishing. Witness the way in which the majority of open access book publishers
continue to employ more or less the same quality control procedures, preservation
structures and textual forms as their print counterparts: pre-publication peer review
conducted by scholars who have already established their reputations in the paper
world; preservation carried out by academic libraries; monographs consisting of
numbered pages and chapters arranged in a linear, sequential order and narrative, and
so on. As Sigi Jöttkandt puts it with regard to the strategy of Open Humanities Press
in this respect:

We’re intending OHP as a tangible demonstration to our still generally
sceptical colleagues in the humanities that there is no reason why OA
publishing cannot have the same professional standards as print. We aim to
show that OA is not only academically credible but is in fact being actively
advanced by leading figures in our fields, as evidenced by our editorial
advisory board. Our hope is that OHP will contribute to OA rapidly becoming
standard practice for scholarly publishing in the humanities. 50

50

Sigi Jöttkandt, 'No-fee OA Journals in the Humanities, Three Case Studies: A Presentation
by Open Humanities Press', presented at the Berlin 5 Open Access Conference: From Practice
to Impact: Consequences of Knowledge Dissemination, Padua, September 19, 2007:
http://openhumanitiespress.org/Jottkandt-Berlin5.pdf

27

Relatively few open access publishers, however, have displayed much interest in
combining such an emphasis on achieving universal, free, online access to research
and/or the gaining of trust, with a rigorous critical exploration of the form of the book
itself. 51 And this despite the fact that the ability to re-use material is actually an
essential feature of what has become known as the Budapest-Bethesda-Berlin (BBB)
definition of open access, which is one of the major agreements underlying the
movement. 52 It therefore seems significant that, of the books presently available open
access, only a minority have a license where price and permission barriers to research
are removed, with the result that the research is available under both Gratis and Libre
(re-use) conditions. 53

REIMAGINING THE BOOK, OR RADICAL OPEN ACCESS

Admittedly, there are many in the open access community who regard the more
radical experiments conducted with and on books as highly detrimental to the
strategies of large-scale accessibility and trust respectively. From this perspective,
efforts designed to make open access material available for others to (re)use, copy,
51

Open Humanities Press (http://openhumanitiespress.org/) and Media Commons Press
(http://mediacommons.futureofthebook.org/mcpress/) remain the most notable exceptions on
the formal side of the publishing scale, the majority of experiments with the form of the book
taking place in the informal sphere (e.g. blogbooks self-published by Anthologize, and
crowd-sourced, ‘sprint’ generated books such as Dan Cohen and Tom Scheinfeldt’s Hacking
the Academy: http://hackingtheacademy.org/).
52
See Peter Suber on the BBB definition here:
http://www.earlham.edu/~peters/fos/newsletter/09-02-04.htm, where he also states that two
of the three BBB component definitions (the Bethesda and Berlin statements) require
removing barriers to derivative works.
53
An examination of the licenses used on two of the largest open access book publishing
platforms or directories to date, the OAPEN (Open Access Publishing in Academic
Networks) platform and the DOAB (Directory of Open Access Books), reveals that on the
OAPEN platform (accessed May 6th 2012) 2 of the 966 books are licensed with a CC-BY
license, and 153 with a CC-BY-NC license (which still restricts commercial re-use). On the
DOAB (accessed May 6th 2012) 5 of the 778 books are licensed with a CC-BY license, 215
with CC-BY-NC.

28

reproduce and distribute in any medium, as well as make and distribute derivative
works, coupled with experiments with the form of the book, are seen as being very
much secondary objectives (and even by some as unnecessarily complicating and
diluting open access’s primary goal of making all of the research accessible online
without a paywall). 54 And, indeed, although in many of the more formal open access
definitions (including the important Bethesda and Berlin definitions of open access,
which require removing barriers to derivative works), the right to re-use and reappropriate a scholarly work is acknowledged and recommended, in both theory and
practice a difference between ‘author-side openness’ and ‘reader-side openness’ tends
to be upheld—leaving not much space for the ‘readerly interventions’ that were so
important in opening up the kind of possibilities for ‘reading against the grain’ that
the artist’s book promoted, something we feel (open access) scholarly works should
also strive to encourage and support. 55 This is especially the case with regard to the
publication of books, where a more conservative vision frequently holds sway. For
instance, it is intriguing that in an era in which online texts are generally connected to
a network of other information, data and mobile media environments, the open access
book should for the most part still find itself presented as having definite limits and a
clear, distinct materiality.

But if the ability to re-use material is an essential feature of open access – as, let us
repeat, it is according to the Budapest-Bethesda-Berlin and many of other influential
definitions of the term – then is working toward making all of the research accessible

54

See, for example, Stevan Harnad, Open Access: Gratis and Libre, Open Access
Archivangelism, Thursday, May 3, 2012.
55
For more on author-side and reader-side openness respectively, see Peter Suber, SPARC
OA newsletter: http://www.earlham.edu/~peters/fos/newsletter/03-02-11.htm

29

online on a Gratis basis and/or gaining the trust of the academic community the best
way for the open access movement (including open access book publishing) to
proceed, always and everywhere? If we do indeed wait until we have gained a critical
mass of open access content before taking advantage of the chance the shift from
analogue to digital creates, might it not by then be too late? Does this shift not offer
us the opportunity, through its loosening of much of the stability, authority, and
‘fixity’ of texts, to rethink scholarly publishing, and in the process raise the kind of
fundamental questions for our ideas of authorship, authority, legitimacy, originality,
permanence, copyright, and with them the text and the book, that we really should
have been raising all along? If we miss this opportunity, might we not find ourselves
in a similar situation to that many book artists and publishers have been in since the
1970s, namely, that of merely reiterating and reinforcing established structures and
practices?

Granted, following a Libre open access strategy may on occasion risk coming into
conflict with those more commonly accepted and approved open access strategies (i.e.
those concerned with achieving accessibility and the gaining of trust on a large-scale).
Nevertheless, should open access advocates on occasion not be more open to adopting
and promoting forms of open access that are designed to make material available for
others to (re)use, copy, reproduce, distribute, transmit, translate, modify, remix and
build upon? In particular, should they not be more open to doing so right here, right
now, before things begin to settle down and solidify again and we arrive at a situation
where we have succeeded merely in pushing the movement even further toward rather
weak, watered-down and commercial versions of open access?

30

CONCLUSION

We began by looking at how, in an art world context, the idea and form of the book
have been used to engage critically many of the established cultural institutions, along
with some of the underlying philosophies that inform them. Of particular interest in
this respect is the way in which, with the rise of offset printing and cheaper
production methods and printing techniques in the 1960s, there was a corresponding
increase in access to the means of production and distribution of books. This in turn
led to the emergence of new possibilities and roles that the book could be put to in an
art context, which included democratizing art and critiquing the status quo of the
gallery system. But these changes to the materiality and distribution of the codex
book in particular – as an artistic product as well as a medium – were integrally linked
with questions concerning the nature of both art and the book as such. Book artists
and theorists thus became more and more engaged in the conceptual and practical
exploration of the materiality of the book. In the end, however, the promise of
technological innovation which underpinned the changes with respect to the
production and distribution of artists’ books in the 1960s and 1970s was not enough
to generate any kind of sustainable (albeit repeatedly reviewed, refashioned and
renewed) challenge within the art world over the longer term.

The artist’s book of the 1960s and 1970s therefore clearly had the potential to bring
about a degree of transformation, yet it was unable to elude the cultural practices,
institutions and the market mechanisms that enveloped it for long (including those
developments in financialisation and the art market Solomon-Godeau connects to the
shift to Reaganomics). Consequently, instead of criticising or subverting the

31

established systems of publication and distribution, the artist’s book ended up being
largely integrated into them. 56 Throughout the course of this article we have argued
that its conceptual and material promise notwithstanding, there is a danger of
something similar happening to open access publishing today. Take the way open
access has increasingly come to be adopted by commercial publishers. If one of the
motivating factors behind at least some aspects of the open access movement – not
just the aforementioned open access book publishers in the HSS, but the likes of
PLoS, too – has been to stand up against, and even offer an alternative to, the large,
profit-led firms that have come to dominate the field of academic publishing, recent
years have seen many such commercial publishers experimenting with open access
themselves, even if such experiments have so far been confined largely to journals.57
Most commonly, this situation has resulted in the trialling of ‘author-side’ fees for the
open access publishing of journals, a strategy seen as protecting the interests of the
established publishers, and one which has recently found support in the Finch Report
from a group of representatives of the research, library and publishing communities
convened by David Willetts, the UK Science Minister. 58 But the idea that open access
56

That said, there is currently something of a revival of print, craft and artist's book
publishing taking place in which the paperbound book is being re-imagined in offline
environments. In this post-digital print culture, paper publishing is being used as a new form
of avant-garde social networking that, thanks to its analog nature, is not so easily controlled
by the digital data-gathering commercial hegemonies of Google, Amazon, Facebook et al. For
more, see Alessandro Ludovico, Post-Digital Print - the Mutation of Publishing Since 1984,
Onomatopee, 2012; and Florian Cramer, `Post-Digital Writing', Electronic Book Review,
December, 2012: http://electronicbookreview.com/thread/electropoetics/postal.
57
For more details, see Wilhelm Peekhaus, ‘The Enclosure and Alienation of Academic
Publishing: Lessons for the Professoriate’, tripleC, 10(2), 2012: http://www.triplec.at/index.php/tripleC/article/view/395
58
‘Accessibility, Sustainability, Excellence: How to Expand Access to Research Publications,
Report of the Working Group on Expanding Access to Published Research Findings’, June
18, 2012: http://www.researchinfonet.org/wp-content/uploads/2012/06/Finch-Group-reportFINAL-VERSION.pdf. For one overview of some of the problems that can be identified from
an HSS perspective in the policy direction adopted by Finch and Willetts, see Lucinda
Matthews-Jones, ‘Open Access and the Future of Academic Journals’, Journal of Victorian
Culture Online, November 21, 2012: http://myblogs.informa.com/jvc/2012/11/21/openaccess-and-the-future-of-academic-journals/

32

may represent a commercially viable publishing model has attracted a large amount of
so-called predatory publishers, too, 59 who (like Finch and Willetts) have propagated a
number of misleading and often quite mistaken accounts of open access. 60 The
question is thus raised as to whether the desire to offer a counter-institutional
alternative to the large, established, commercial firms is likely to become somewhat
marginalised and neutralised as a result of open access publishing being seen more
and more by such commercial publishers as just another means of generating a profit.
Will the economic as well as material practices transferred from the printing press
continue to inform and shape our communication systems? As Nick Knouf argues, to
raise this question, ‘is not to damn open access publishing by any means; rather, it is
to say that open access publishing, without a concurrent interrogation of the economic
underpinnings of the scholarly communication system, will only reform the situation
rather than provide a radical alternative.’ 61

With this idea of providing a radical challenge to the current scholarly communication
system in mind, and drawing once again on the brief history of artists’ books as
presented above, might it not be helpful to think of open access less as a project and
model to be implemented, and more as a process of continuous struggle and critical
resistance? Here an analogy can be drawn with the idea of democracy as a process. In
‘Historical Dilemmas of Democracy and Their Contemporary Relevance for
Citizenship’, the political philosopher Etiènne Balibar develops an interesting analysis
of democracy based on a concept of the ‘democratisation of democracy’ he derives
59

For a list of predatory OA publishers see: http://scholarlyoa.com/publishers/
This list has increased from 23 predatory publishers in 2011, to 225 in 2012.
60
See the reference to the research of Peter Murray Rust in Sigi Jöttkandt, ‘No-fee OA
Journals in the Humanities’.
61
Nicholas Knouf, ‘The JJPS Extension: Presenting Academic Performance Information’,
Journal of Journal Performance Studies, 1 (2010).

33

from a reading of Hannah Arendt and Jacques Rancière. For Balibar, the problem
with much of the discourse surrounding democracy is that it perceives the latter as a
model that can be implemented in different contexts (in China or the Middle East, for
instance). He sees discourses of this kind as running two risks in particular. First of
all, in conceptualizing democracy as a model there is a danger of it becoming a
homogenizing force, masking differences and inequalities. Second, when positioned
as a model or a project, democracy also runs the risk of becoming a dominating force
– yet another political regime that takes control and power. According to Balibar, a
more interesting and radical notion of democracy involves focusing on the process of
the democratisation of democracy itself, thus turning democracy into a form of
continuous struggle (or struggles) – or, perhaps better, continuous critical selfreflection. Democracy here is not an established reality, then, nor is it a mere ideal; it
is rather a permanent struggle for democratisation. 62

Can open access be understood in similar terms: less as a homogeneous project
striving to become a dominating model or force, and more as an ongoing critical
struggle, or series of struggles? And can we perhaps locate what some perceive as the
failure of artists’ books to contribute significantly to such a critical struggle after the
1970s to the fact that ultimately they became (incorporated in) dominant institutional
settings themselves – a state of affairs brought about in part by their inability to
address issues of access, experimentation and self-reflexivity in an ongoing critical
manner?

62

Etienne Balibar, ‘Historical Dilemmas of Democracy and Their Contemporary Relevance
for Citizenship’, Rethinking Marxism, 20 (2008).

34

Certainly, one of the advantages of conceptualizing open access as a process of
struggle rather than as a model to be implemented would be that doing so would
create more space for radically different, conflicting, even incommensurable positions
within the larger movement, including those that are concerned with experimenting
critically with the form of the book and the way our system of scholarly
communication currently operates. As we have shown, such radical differences are
often played down in the interests of strategy. To be sure, open access can experience
what Richard Poynder refers to as a ‘bad tempered wrangles’ over relatively ‘minor
issues’ such as ‘metadata, copyright, and distributed versus central archives’. 63 Still,
much of the emphasis has been on the importance of trying to maintain a more or less
unified front (within certain limits, of course) in the face of criticisms from
publishers, governments, lobbyists and so forth, lest its opponents be provided with
further ammunition with which to attack the open access movement, and dilute or
misinterpret its message, or otherwise distract advocates from what they are all
supposed to agree are the main tasks at hand (e.g. achieving universal, free, online
access to research and/or the gaining of trust). Yet it is important not to see the
presence of such differences and conflicts within the open access movement in purely
negative terms – the way they are often perceived by those working in the liberal
tradition, with its ‘rationalist belief in the availability of a universal consensus based
on reason’. 64 (This emphasis on the ‘universal’ is also apparent in fantasies of having
not just universal open access, but one single, fully integrated and indexed global
archive.) In fact if, as we have seen, one of the impulses behind open access is to
make knowledge and research – and with it society – more open and democratic, it

63

Richard Poynder, ‘Time to Walk the Walk’, Open and Shut?, 17 March, 2005:
http://poynder.blogspot.com/2005/03/time-to-walk-talk.html.
64
Chantal Mouffe, On the Political, London, Routledge, 2005, p11.

35

can be argued that the existence of such dissensus will help achieve this ambition.
After all, and as we know from another political philosopher, Chantal Mouffe, far
from placing democracy at risk, a certain degree of conflict and antagonism actually
constitutes the very possibility of democracy. 65 It seems to us that such a critical, selfreflexive, processual, non-goal oriented way of thinking about academic publishing
shares much with the mode of working of the artist - which is why we have argued
that open access today can draw productively on the kind of conceptual openness and
political energy that characterised experimentation with the medium of the book in
the art world of the 1960s and 1970s.

65

Mouffe, On the Political, p30.

36


Dockray & Liang
Sharing Instinct: An Annotation of the Social Contract Through Shadow Libraries
2015


# Sean Dockray & Lawrence Liang — Sharing Instinct: An Annotation of the
Social Contract Through Shadow Libraries

![](/site/assets/files/1289/timbuktu_ng_ancient-manuscripts.jpg) Abdel Kader
Haïdara, a librarian who smuggled hundreds of thousands of manuscripts from
jihadist-occupied Timbuktu to safety in Bamako, stands with ancient volumes
from Timbuktu packed into metal trunks. Photo: Brent Stirton/Getty Images.

_Foederis aequas Dicamus leges _

(Let us make fair terms for the compact.)

—Virgil’s  _Aeneid_ , XI

Man was born free, and everywhere he is in chains.1All excerpts from _The
Social Contract_ are from Jean-Jacques Rousseau, _The Social Contract: And,
The First and Second Discourses_, ed. Susan Dunn and Gita May (New Haven, CT:
Yale University Press, 2002).

> _June 30, 2015_

>

> _Dear Sean,_

>

> _I have been asked by Raqs Media Collective to contribute to a special
ongoing issue of _e-flux journal _that is part of the Venice Biennale. Raqs’s
section in the issue rethinks Rousseau’s social contract and the possibility
of its being rewritten, as a way of imagining social bonds and solidarities
that can help instigate and affirm a vision of the world as a space of
potential._

>

> _I was wondering if you would join me in a conversation on shadow libraries
and social contracts. The entire universe of the book-sharing communities
seems to offer the possibility of rethinking the terms of the social contract
and its associated terms (consent, general will, private interest, and so on).
While the rise in book sharing is at one level a technological phenomenon (a
library of 100,000 books put in PDF format can presently fit on a one-terabyte
drive that costs less than seventy-five dollars), it is also about how we
think of transformations in social relations mediated by sharing books._

>

> _If the striking image of books in preprint revolution was of being “in
chains,” as Rousseau puts it, I am prompted to wonder about the contemporary
conflict between the digital and mechanisms of control. Are books born free
but are everywhere in chains, or is it the case that they have been set free?
In which case are they writing new social contracts?_

>

> _I was curious about whether you, as the founder of _[
_Aaaaarg.org_](http://aaaaarg.org/) _, had the idea of a social contract in
mind, or even a community, when you started?_

>

> _Lawrence_



**Book I, Chapter VI : The Social Pact**

To find a form of association that may defend and protect with the whole force
of the community the person and property of every associate, and by means of
which each, joining together with all, may nevertheless obey only himself, and
remain as free as before.’’ Such is the fundamental problem to which the
social contract provides the solution.

We can reduce it to the following terms: ‘‘Each of us puts in common his
person and all his power under the supreme direction of the general will; and
in return each member becomes an indivisible part of the whole.’’

> _June 30, 2015_

>

> _Dear Lawrence,_

>

> _I am just listing a few ideas to put things out there and am happy to try
other approaches:_

>

> _—To think about the two kinds of structure that digital libraries take:
either each library is shared by many user-librarians or there is a library
for each person, shared with all the others. It’s a technological design
question, yes, but it also suggests different social contracts?_

>

> _—What is subtracted when we subtract your capacity/right to share a book
with others, when every one of us must approach the market anew to come into
contact with it? But to take a stab at misappropriating the terms you’ve
listed, consent, what libraries do I consent to? Usually the consent needs to
come from the library, in the form of a card or something, but we don’t ask
enough what we want, maybe. Also what about a social contract of books? Does a
book consent to being in a library? What rights does it have or expect?_

>

> _I really loved the math equation Rousseau used to arrive at the general
will: if you subtract the pluses and minuses of particular wills that cancel
each other out, then the general will is the sum of the differences! But why
does the general need to be the lowest common denominator—certainly there are
more appropriate mathematical concepts that have been developed in the past
few hundred years?_

>

> _Sean_



**Book I, Chapter II: Primitive Societies**

This common liberty is a consequence of man’s nature. His first law is to
attend to his own survival, his first concerns are those he owes to himself;
and as soon as he reaches the age of rationality, being sole judge of how to
survive, he becomes his own master.

It is the relation of things and not of men that constitutes war; and since
the state of war cannot arise from simple personal relations, but only from
real relations, private war—war between man and man—cannot exist either in the
state of nature, where there is no settled ownership, or in the social state,
where everything is under the authority of the laws.

> _July 1, 2015_

>

> _Dear Lawrence,_

>

> _Unlike a logic of exchange, or of offer and return with its demands for
reciprocity, the logic of sharing doesn’t ask its members for anything in
return. There are no guarantees that the one who gives a book will get back
anything, whether that is money, an equivalent book, or even a token of
gratitude. Similarly, there is nothing to prevent someone from taking without
giving. I think a logic of sharing will look positively illogical across the
course of its existence. But to me, this is part of the appeal: that it can
accommodate behaviors and relationships that might be impossible within the
market._

>

> _But if there is a lack of a contract governing specific exchanges, then
there is something at another level that defines and organizes the space of
sharing, that governs its boundaries, and that establishes inclusions and
exclusions. Is this something ethics? Identity? Already I am appealing to
something that itself would be shared, and would this sharing precede the
material sharing of, for example, a library? Or would the shared
ethics/identity/whatever be a symptom of the practice of sharing? Well, this
is perhaps the conclusion that anthropologists might come to when trying to
explain the sharing practices of hunter-gatherer societies, but a library?_

>

> _Sean_

>

>

>

> _July 1, 2015_

>

> _Hi Sean,_

>

> _I liked your question of what might account for a sharing instinct when it
comes to books, and whether we appeal to something that already exists as a
shared ethics or identity, or is sharing the basis of a shared
ethics/identity? I have to say that while I have never thought of my own book-
collecting through the analogy of hunter-gatherers, the more I think about it,
the more sense it makes to me. Linguistically we always speak of going on book
hunts and my daily trawling through the various shadow libraries online does
seem to function by way of a hunting-gathering mentality._

>

> _Often I download books I know that I will never personally read because I
know that it may either be of interest to someone else, or that the place of a
library is the cave where one gathers what one has hunted down, not just for
oneself but for others. I also like that we are using so-called primitive
metaphors to account for twenty-first-century digital practices, because it
allows us the possibility of linking these practices to a primal instinct of
sharing, which precedes our encounter with the social norms that classify and
partition that instinct (legal, illegal, authorized, and so on). _

>

> _I don’t know if you remember the meeting that we had in Mumbai a few years
ago—among the other participants, we had an academic from Delhi as an
interlocutor. He expressed an absolute terror at what he saw as the “tyranny
of availability” in online libraries. In light of the immense number of books
available in electronic copies and on our computers or hard discs, he felt
overwhelmed and compared his discomfort with that of being inside a large
library and not knowing what to do. Interestingly, he regularly writes asking
me to supply him with books that he can’t find or does not have access to._

>

> _This got me thinking about the idea of a library and what it may mean, in
its classical sense and its digital sense. An encounter with any library,
especially when it manifests itself physically, is one where you encounter
your own finitude in the face of what seems like the infinity of knowledge.
But personally this sense of awe has also been tinged with an immense
excitement and possibility. The head rush of wanting to jump from a book on
forgotten swear words to an intellectual biography of Benjamin, and the
tingling anticipation as you walk out of the library with ten books, captures
for me more than any other experience the essence of the word potential._

>

> _I have a modest personal library of around four thousand books, which I
know will be kind of difficult for me to finish in my lifetime even if I stop
adding any new books, and yet the impulse to add books to our unending list
never fades. And if you think about this in terms of the number of books that
reside on our computers, then the idea of using numbers becomes a little
pointless, and we need some other way or measure to make sense of our
experience._

>

> _Lawrence_



**Book I, Chapter VII: The Sovereign**

Every individual can, as a man, have a particular will contrary to, or
divergent from, the general will which he has as a citizen; his private
interest may appear to him quite different from the common interest; his
absolute and naturally independent existence may make him envisage what he
owes to the common cause as a gratuitous contribution, the loss of which would
be less harmful to others than the payment of it would be onerous to him.

> _July 12, 2015_

>

> _Hi Sean,_

>

> _There is no symbol that to my mind captures the regulated nature of the
library more than that of the board that hushes you with its capitalized
SILENCE. Marianne Constable says, “One can acknowledge the figure of silence
in the library and its persistence, even as one may wonder what a silent
library would be, whether libraries ever are silent, and what the various
silences—if any—in a library could be.”_

>

> _If I had to think about the nature of the social contract and the
possibilities of its rewriting from the site of the library one encounters
another set of silent rules and norms. If social contracts are narrative
compacts that establish a political community under the sign of a sovereign
collective called the people, libraries also aspire to establish an authority
in the name of the readers and to that extent they share a common constitutive
character. But just as there is a foundational scandal of absence at the heart
of the social contract that presumes our collective consent (what Derrida
describes as the absence of the people and the presence of their signature)
there seems to be a similar silence in the world of libraries where readers
rarely determine the architecture, the logic, or the rules of the library._

>

> _So libraries have often mirrored, rather than inverted, power relations
that underlie the social contracts that they almost underwrite._  _In contrast
I am wondering if the various shadow libraries that have burgeoned online, the
portable personal libraries that are shared offline: Whether all of them
reimagine the social contract of libraries, and try to create a more insurgent
imagination of the library?_

>

> _Lawrence_

>

>

>

> _July 13, 2015_

>

> _Hi Lawrence,_

>

> _As you know, I’m very interested in structures that allow the people within
ways to meaningfully reconfigure them. This is distinct from participation or
interaction, where the structures are inquisitive or responsive, but not
fundamentally changeable._

>

> _I appreciate the idea that a library might have, not just a collection of
books or a system of organizing, but its own social contract. In the case of
Aaaaarg, as you noticed, it is not explicit. Not only is there no statement as
such, there was never a process prior to the library in which something like a
social contract was designed._

>

> _I did ask users to write out a short statement of their reason for joining
Aaaaarg and have around fifty thousand of these expressions of intention. I
think it’s more interesting to think of the social contract, or at least a
"general will," in terms of those. If Rousseau distinguished between the will
of all and the general will, in a way that could be illustrated by the catalog
of reasons for joining Aaaaarg. Whereas the will of all might be a sum of all
the reasons, the general will would be the sum of what remains after you "take
away the pluses and minuses that cancel one another." I haven’t done the math,
but I don’t think the general will, the general reason, goes beyond a desire
for access._

>

> _To summarize a few significant groupings:_

>

> _—To think outside institutions; _
> _—To find things that one cannot find; _
> _—To have a place to share things;_
> _—To act out a position against intellectual property; _
> _—A love of books (in whatever form)._

>

> _What I do see as common across these groupings is that the desire for
access is, more specifically, a desire to have a relationship with texts and
others that is not mediated by market relations._

>

> _In my original conception of the site, it would be something like a
collective commonplace. Like commonplacing, the excerpts that people would
keep were those parts of texts that seemed particularly useful, that produced
a spark that one wanted to share. This is important: that it was the
experience of being electrified in some way that people were sharing and not a
book as such. Over time, things changed and the shared objects became more
complete so to say, and less “subjective,” but I hope that there is still that
spark. But, at this point, I realize that I am just another one of the many
wills, and just one designer of whatever social contract is underlying the
library._

>

> _So, again—What is the social contract? It wasn’t determined in advance and
it is not written in any about section or FAQ. I would say that it is, like
the library itself, something that is growing and evolving over time, wouldn’t
you?_

>

> _Sean_



**Book II, Chapter VIII : The People**

As an architect, before erecting a large edifice, examines and tests the soil
in order to see whether it can support the weight, so a wise lawgiver does not
begin by drawing up laws that are good in themselves, but considers first
whether the people for whom he designs them are fit to maintain them.

> _July 15, 2015_

>

> _Lawrence,_

>

> _There are many different ways of organizing a library, of structuring it,
and it’s the same for online libraries. I think the most interesting
conversation would not be to bemoan the digital for overloading our ability to
be discerning, or to criticize it for not conforming to the kind of economy
that we expected publishing to have, or become nostalgic for book smells; but
to actually really wonder what it is that could make these libraries great,
places that will be missed in the future if they go away. To me, this is the
most depressing thing about the unfortunate fact that digital shadow libraries
have to operate somewhat below the radar: it introduces a precariousness that
doesn’t allow imagination to really expand, as it becomes stuck on techniques
of evasion, distribution, and redundancy. But what does it mean when a library
functions transnationally? When its contents can be searched? When reading
interfaces aren’t bound by the book form? When its contents can be referenced
from anywhere?_

>

> _What I wanted when building Aaaaarg.org the first time was to make it
useful, in the absolute fullest sense of the word, something for people who
saw books not just as things you buy to read because they’re enjoyable, but as
things you need to have a sense of self, of orientation in the world, to learn
your language and join in the conversation you are a part of—a library for
people who related to books like that._

>

> _Sean_

>

>

>

> _July 17, 2015_

>

> _Hi Sean_,

>

> _To pick up on the reasons that people give for joining Aaaaarg.org: even
though Aaaaarg.org is not bound by a social contract, we do see the
outlines—through common interests and motivations—of a fuzzy sense of a
community. And the thing with fuzzy communities is that they don’t necessarily
need to be defined with the same clarity as enumerated communities, like
nations, do. Sudipta Kaviraj, who used the term fuzzy communities, also speaks
of a “narrative contract”—perhaps a useful way to think about how to make
sense of the bibliophilic motivations and intentions, or what you describe as
the “desire to have a relationship with texts and others that is not mediated
by market relations.”_

>

> _This seems a perfectly reasonable motivation except that it is one that
would be deemed impossible at the very least, and absurd at worst by those for
whom the world of books and ideas can only be mediated by the market. And it’s
this idea of the absurd and the illogical that I would like to think a little
bit about via the idea of the ludic, a term that I think might be useful to
deploy while thinking of ways of rewriting the social contract: a ludic
contract, if you will, entered into through routes allowed by ludic libraries.
_

>

> _If we trace the word ludic back to its French and Latin roots, we find it
going back to the idea of playing (from Latin _ludere  _"to play" or _ludique
_“spontaneously playful”), but today it has mutated into most popular usage
(ludicrous) generally used in relation to an idea that is so impossible it
seems absurd. And more often than not the term conveys an absurdity associated
with a deviation from well-established norms including utility, seriousness,
purpose, and property._

>

> _But what if our participation in various forms of book sharing was less
like an invitation to enter a social contract, and more like an invitation to
play? But play what, you may ask, since the term play has childish and
sometimes frivolous connotation to it? And we are talking here about serious
business. Gadamer proposes that rather than the idea of fun and games, we can
think with the analogy of a cycle, suggesting that it was important not to
tighten the nuts on the axle too much, or else the wheel could not turn. “It
has to have some play in it … and not too much play, or the wheel will fall
off. It was all about _spielraum _, ‘play-room,’ some room for play. It needs
space.” _

>

> _The ludic, or the invitation to the ludic in this account, is first and
foremost a necessary relief—just as playing is—from constraining situations
and circumstances. They could be physical, monetary, or out of sheer
nonavailability (thus the desire for access could be thought of as a tactical
maneuver to create openings). They could be philosophical constraints
(epistemological, disciplinary), social constraints (divisions of class, work,
and leisure time). At any rate all efforts at participating in shadow
libraries seem propelled by an instinct to exceed the boundaries of the self
however defined, and to make some room for play or to create a “ludic
spaciousness,” as it were. _

>

> _The spatial metaphor is also related to the bounded/unbounded (another name
for freedom I guess) and to the extent that the unbounded allows us a way into
our impossible selves; they share a space with dreams, but rarely do we think
of the violation of the right to access as fundamentally being a violation of
our right to dream. Your compilation of the reasons that people wanted to join
Aaaaarg may well be thought of as an archive of one-sentence-long dreams of
the ludic library. _

>

> _If for Bachelard the house protects the dreamer, the library for me is a
ludic shelter, which brings me back to an interesting coincidence. I don’t
know what it is that prompted you to choose the name Aaaaarg.org; I don’t know
if you are aware it binds you irrevocably (to use the legal language of
contracts) with one of the very few theorists of the ludic, the Dutch
philosopher Johan Huizinga, who coined the word _homo ludens _(as against the
more functional, scientific homo sapiens or functional homo faber). In his
1938 text Huizinga observes that “the fun of playing, resists all analysis,
all logical interpretation,” and as a concept it cannot be reduced to any
other mental category. He feels that no language really has an exact
equivalent to the word fun but the closest he comes in his own language is the
Dutch word _aardigkeit, _so the line between aaaarg and aaard may have well
have been dreamt of before Aaaaarg.org even started._

>

> _More soon,_

>

> _Lawrence_

×

[![](/site/templates/img/conversation.svg)![](/site/templates/img
/conversation-highlight.svg)](http://conversations.e-flux.com/t
/superconversations-day-73-mohammad-salemy-responds-to-sean-dockray-lawrence-
liang-sharing-instinct-an-annotation-of-the-social-contract-through-shadow-
libraries/2244 "Sharing Instinct: An Annotation of the Social Contract Through
Shadow Libraries @ e-flux Conversations")


© 2015 e-flux and the author

Constant
The Techno-Galactic Guide to Software Observation
2018


::: {.toc}
[Introduction](#mtljymuz) [Encounter several collections of historical
hardware back-to-back](#njm5zwm4) [Interview people about their
histories with software](#mguzmza4) [Ask several people from different
fields and age-groups the same question: \"***What is
software?***\"](#odfkotky) [FMEM and /DEV/MEM](#mzcxodix)
[Pan/Monopsychism](#m2mwogri) [Fountain refreshment](#ndawnmy5) [Create
\"nannyware\": Software that observes and addresses the user](#mtk5yjbl)
[Useless scroll against productivity](#yzuwmdq4) [Investigating how
humans and machines negotiate the experience of time](#m2vjndu3)
[Quine](#nmi5mgjm) [Glossaries as an exercise](#zwu0ogu0) [Adding
qualifiers](#mja0m2i5) [Searching \"software\" through
software](#mmmwmje2) [Persist in calling everyone a Software Curious
Person](#ndhkmwey) [Setup a Relational software observatory consultancy
(RSOC)](#mmu1mgy0) [Agile Sun Salutation](#mta1ntzm) [Hand
reading](#mdu0mmji) [Bug reporting for sharing observations](#yznjodq3)
[Interface Détournement](#ytu5y2qy) [Comportments of software
(softwear)](#y2q4zju5) [Continuous integration](#mwrhm2y4) [make make
do](#zdixmgrm) [Flowcharts (Flow of the chart -- chart of the flow on
demand!)](#zweymtni) [Something in the Middle Maybe (SitMM)](#ywfin2e4)
[What is it like to be AN ELEVATOR?](#ntlimgqy) [Side Channel
Analysis](#ndg2zte4) [Compiling a bestiary of software logos](#njmzmjm1)
[Encounter several collections of historical hardware
back-to-back](#njm5zwm4) [Testing the testbed: testing software with
observatory ambitions (SWOA)](#mmy2zgrl) [Prepare a reader to think
theory with software](#mmmzmmrh)
:::

[]{#mtljymuz .anchor}

A guide to techno-galactic software observation

> I am less interested in the critical practice of reflection, of
> showing once-again that the emperor has no clothes, than in finding a
> way to *diffract* critical inquiry in order to make difference
> patterns in a more worldly way.^[1](#ebceffee)^

The techno-galactic software survival guide that you are holding right
now was collectively produced as an outcome of the Techno-Galactic
Software Observatory. This guide proposes several ways to achieve
critical distance from the seemingly endless software systems that
surround us. It offers practical and fantastical tools for the tactical
(mis)use of software, empowering/enabling users to resist embedded
paradigms and assumptions. It is a collection of methods for approaching
software, experiencing its myths and realities, its risks and benefits.

With the rise of online services, the use of software has increasingly
been knitted into the production of software, even while the rhetoric,
rights, and procedures continue to suggest that use and production
constitute separate realms. This knitting together and its corresponding
disavowal have an effect on the way software is used and produced, and
radically alters its operative role in society. The shifts ripple across
galaxies, through social structures, working conditions and personal
relations, resulting in a profusion of apparatuses aspiring to be
seamless while optimizing and monetizing individual and collective flows
of information in line with the interests of a handful of actors. The
diffusion of software services affects the personal, in the form of
intensified identity shaping and self-management. It also affects the
public, as more and more libraries, universities and public
infrastructures as well as the management of public life rely on
\"solutions\" provided by private companies. Centralizing data flows in
the clouds, services blur the last traces of the thin line that
separates bio- from necro-politics.

Given how fast these changes resonate and reproduce, there is a growing
urgency to engage in a critique of software that goes beyond taking a
distance, and that deals with the fact that we are inevitably already
entangled. How can we interact, intervene, respond and think with
software? What approaches can allow us to recognize the agency of
different actors, their ways of functioning and their politics? What
methods of observation enable critical inquiry and affirmative discord?
What techniques can we apply to resurface software where it has melted
into the infrastructure and into the everyday? How can we remember that
software is always at work, especially where it is designed to disappear
into the background?

We adopted the term of observation for a number of reasons. We regard
observation as a way to approach software, as one way to organize
engagement with its implications. Observation, and the enabling of
observation through intensive data-centric feedback mechanisms, is part
of the cybernetic principles that underpin present day software
production. Our aim was to scrutinize this methodology in its many
manifestations, including in \"observatories\" \-- high cost
infrastructures \[testing infrastructures?CITECLOSE23310 of observation
troubled by colonial, imperial traditions and their problematic
divisions of nature and culture \-- with the hope of opening up
questions about who gets to observe software (and how) and who is being
observed by software (and with what impact)? It is a question of power,
one that we answer, at least in part, with critical play.

We adopted the term techno-galactic to match the advertised capability
of \"scaling up to the universe\" that comes in contemporary paradigms
of computation, and to address different scales of software communities
and related political economies that involve and require observation.

Drawing on theories of software and computation developed in academia
and elsewhere, we grounded our methods in hands-on exercises and
experiments that you now can try at home. This Guide to Techno-Galactic
Software Observation offers methods developed in and inspired by the
context of software production, hacker culture, software studies,
computer science research, Free Software communities, privacy activism,
and artistic practice. It invites you to experiment with ways to stay
with the trouble of software.

The Techno-Galactic Software Observatory
----------------------------------------

In the summer of 2017, around thirty people gathered in Brussels to
explore practices of proximate critique with and of software in the
context of a worksession entitled \"Techno-Galactic Software
Observatory\".^[2](#bcaacdcf)^ The worksession called for
software-curious people of all kinds to ask questions about software.
The intuition behind such a call was that different types of engagement
requires a heterogeneous group of participants with different levels of
expertise, skill and background. During three sessions of two days,
participants collectively inspected the space-time of computation and
probed the universe of hardware-software separations through excursions,
exercises and conversations. They tried out various perspectives and
methods to look at the larger picture of software as a concept, as a
practice, and as a set of techniques.

The first two days of The Techno-Galactic Software Observatory included
visits to the Musée de l\'Informatique Pionnière en
Belgique^[3](#aaceaeff)^ in Namur and the Computermuseum
KULeuven^[4](#afbebabd)^. In the surroundings of these collections of
historical 'numerical artefacts', we started viewing software in a
long-term context. It offered us the occasion to reflect on the
conditions of its appearance, and allowed us to take on current-day
questions from a genealogical perspective. What is software? How did it
appear as a concept, in what industrial and governmental circumstances?
What happens to the material conditions of its production (minerals,
factory labor, hardware) when it evaporates into a cloud?

The second two days we focused on the space-time dimension of IT
development. The way computer programs and operating systems are
manufactured changed tremendously through time, and so did its
production times and places. From military labs via the mega-corporation
cubicles to the open-space freelancer utopia, what ruptures and
continuities can be traced in the production, deployment, maintenance
and destruction of software? From time-sharing to user-space partitions
and containerization, what separations were and are at work? Where and
when is software made today?

The Walk-in Clinic
------------------

The last two days at the Techno-galactic software observatory were
dedicated to observation and its consequences. The development of
software encompasses a series of practices whose evocative names are
increasingly familiar: feedback, report, probe, audit, inspect, scan,
diagnose, explore, test \... What are the systems of knowledge and power
within which these activities take place, and what other types of
observation are possible? As a practical set for our investigations, we
set up a walk-in clinic on the 25th floor of the World Trade Center,
where users and developers could arrive with software-questions of all
kinds.

> Do you suffer from the disappearance of your software into the cloud,
> feel oppressed by unequal user privilege, or experience the torment of
> software-ransom of any sort? Bring your devices and interfaces to the
> World Trade Center! With the help of a clear and in-depth session, at
> the Techno-Galactic Walk-In Clinic we guarantee immediate results. The
> Walk-In Clinic provides free hands-on observations to software curious
> people of all kinds. A wide range of professional and amateur
> practitioners will provide you with
> Software-as-a-Critique-as-a-Service on the spot. Available services
> range from immediate interface critique, collaborative code
> inspection, data dowsing, various forms of network analyses,
> unusability testing, identification of unknown viruses, risk
> assessment, opening of black-boxes and more. Free software
> observations provided. Last intake at 16:45.\
> (invitation to the Walk-In Clinic, June 2017)

On the following pages: Software as a Critique as a Service (SaaCaaS)
Directory and intake forms for Software Curious People (SCP).

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/masterlist\_twosides\_NEU.pdf]{.tmp}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/scprecord\_FINAL.pdf]{.tmp}
[]{#owqzmtdk .anchor}

Techno-Galactic Software Observation Essentials
=
**WARNING**

The survival techniques described in the following guide are to be used
at your own risk in case of emergency regarding software curiosity. The
publisher will not accept any responsability in case of damages caused
by misuse, misundestanding of instruction or lack of curiosity. By
trying the action exposed in the guide, you accept the responsability of
loosing data or altering hardware, including hard disks, usb key, cloud
storage, screens by throwing them on the floor, or even when falling on
the floor with your laptop by tangling your feet in an entanglement of
cables. No harm has been done to human, animal, computers or plants
while creating the guide. No firearms or any kind of weapon is needed in
order to survive software.\
Just a little bit of patience.

**Software observation survival stresses**

**Physical fitness plays a great part of software observation. Be fit or
CTRL-Quit.**

When trying to observe software you might experience stresses as such :

*Anxiety*Sleep deprivation *Forgetting about eating*Loss of time
tracking

**Can you cope with software ? You have to.**

> our methods for observation, like mapping, come with their luggage.

[Close encounters]{.grouping} []{#njm5zwm4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.visit)
Encounter several collections of historical hardware
back-to-back]{.method .descriptor} [How]{.how .empty .descriptor}

This can be done by identifying one or more computer museums and visit
them with little time in-between. Visiting a friend with a large
basement and lots of left-over computer equipment can help. Seeing and
possibly touching hardware from different contexts
(state-administration, business, research, \...), periods of time,
cultural contexts (California, Germany, French-speaking Belgium) and
price ranges allows you to sense the interactions between hardware and
software development.

[Note: It\'s a perfect way to hear people speak about the objects and
their contexts, how they worked or not and how objects are linked one
with another. It also shows the economic and cultural aspects of
softwares.]{.note .descriptor} [WARNING: **DO NOT FOLD, SPINDLE OR
MUTILATE**]{.warning .descriptor} [Example: Spaghetti Suitcase]{.example
.descriptor}

At one point during the demonstration of a Bull computer, the guide
revealed the system\'s \"software\" \-- a suitcase sized module with
dozens of patch cords. She made the comment that the term \"spaghetti
code\" (a derogatory expression about early code usign many \"GOTO\"
statments) had its origin in this physical arrangement of code as
patchings.

Preserving old hardware in order to observe physical manifestation of
software. See software here : we did experienced the incredible
possibility of actually touching software.

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/images/wednesday/IMG\_20170607\_113634\_585.jpg]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/resizes/Techno-Galactic-Software-Observatory/IMG\_1163.JPG?m=1496916927]{.tmp}
[Example: Playing with the binary. Bull cards. Happy operator! Punch
card plays.]{.example .descriptor}

\"The highlight of the collection is to revive a real punch card
workshop of the 1960s.\"

[Example: Collection de la Maison des Écritures d\'Informatique & Bible,
Maredsous]{.example .descriptor}

The particularity of the collection lies in the fact that it\'s the
conservation of multiple stages of life of a software since its initial
computerization until today. The idea of introducing informatics into
the work of working with/on the Bible (versions in Hebrew, Greek, Latin,
and French) dates back to 1971, via punch card recordings and their
memorization on magnetic tape. Then came the step of analyzing texts
using computers.

[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/resizes/Preparing-the-Techno-galactic-Software-Observatory/DSC05019.JPG?m=1490635726]{.tmp}
[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.jean.heuns]{.tmp}
[]{#mguzmza4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.jean.heuns)
Interview people about their histories with software]{.method
.descriptor} [What: Observe personnal narratives around software
history. Retrace the path of relation to software, how it changed during
the years and what are the human access memories that surrounds it. To
look at software through personal relations and emotions.]{.what
.descriptor} [How: Interviews are a good way to do it. Informal
conversations also.]{.how .descriptor}

Jean Heuns has been collecting servers, calculators, softwares, magnetic
tapes hard disks for xxx years. Found an agreement for them to be
displayed in the department hallways. Department of Computer sciences -
Kul Leuven.

[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3350.JPG]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3361.JPG]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3356.JPG]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/albums/Techno-Galactic-Software-Observatory/PWFU3343.JPG]{.tmp}
[TODO: RELATES TO]{.tmp} []{#odfkotky .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.samequestion)
Ask several people from different fields and age-groups the same
question: \"***What is software?***\"]{.method .descriptor} [Remember:
The answers to this question will vary depending on who is asking it to
who.]{.remember .descriptor} [What: By paying close attention to the
answers, and possibly logging them, observations on the ambiguous place
and nature of software can be made.]{.what .descriptor}
[Example]{.example .empty .descriptor}

Jean Huens (system administrator at the department of Computer Science,
KULeuven): \"*It is difficult to answer the question \'what is
software\', but I know what is good software*\"

Thomas Cnudde (hardware designer at ESAT - COSIC, Computer Security and
Industrial Cryptography, KULeuven): \"*Software is a list of sequential
instructions! Hardware for me is made of silicon, software a sequence of
bits in a file. But naturally I am biased: I\'m a hardware designer so I
like to consider it as unique and special*\".

Amal Mahious (Director of NAM-IP, Namur): \"*This, you have to ask the
specialists.*\"

` {.verbatim}
*what is software?
--the unix filesystem says: it's a file----what is a file?
----in the filesystem, if you ask xxd:
------ it's a set of hexadecimal bytes
-------what is hexadecimal bytes?
------ -b it's a set of binary 01s
----if you ask objdump
-------it's a set of instructions
--side channel researching also says:
----it's a set of instructions
--the computer glossary says:
----it's a computer's programs, plus the procedure for their use http://etherbox.local/home/pi/video/A_Computer_Glossary.webm#t=02:26
------ a computer's programs is a set of instrutions for performing computer operations
`

[Remember: To answer the question \"*what is software*\" depends on the
situation, goal, time, and other contextual influences.]{.remember
.descriptor} [TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.everyonescp]{.tmp}
[]{#mzcxodix .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.devmem) FMEM
and /DEV/MEM]{.method .descriptor} [What: Different ways of exploring
your memory (RAM). Because in unix everything is a file, you can access
your memory as if it were a file.]{.what .descriptor} [Urgency: To try
and observe the operational level of software, getting closer to the
workings, the instruction-being of an executable/executing file, the way
it is when it is loaded into memory rather than when it sits in the
harddisk]{.urgency .descriptor} [Remember: In Unix-like operating
systems, a device file or special file is an interface for a device
driver that appears in a file system as if it were an ordinary file. In
the early days you could fully access your memory via the memory device
(`/dev/mem`) but over time the access was more and more restricted in
order to avoid malicious processes to directly access the kernel memory.
The kernel option CONFIG\_STRICT\_DEVMEM was introduced in kernel
version 2.6 and upper (2.6.36--2.6.39, 3.0--3.8, 3.8+HEAD). So you\'ll
need to use the Linux kernel module fmem: this module creates
`/dev/fmem` device, that can be used for accessing physical memory
without the limits of /dev/mem (1MB/1GB, depending on
distribution).]{.remember .descriptor}

`/dev/mem` tools to explore processes stored in the memory

ps ax | grep process
cd /proc/numberoftheprocess
cat maps

\--\> check what it is using

The proc filesystem is a pseudo-filesystem which provides an interface
to kernel data structures. It is commonly mounted at `/proc`. Most of it
is read-only, but some files allow kernel variables to be changed.

dump to a file\--\>change something in the file\--\>dump new to a
file\--\>diff oldfile newfile

\"where am i?\"

to find read/write memory addresses of a certain process\
`awk -F "-| " '$3 ~ /rw/ { print $1 " " $2}' /proc/PID/maps`{.bash}

take the range and drop it to hexdump

sudo dd if=/dev/mem bs=1 skip=$(( 16#b7526000 - 1 )) \
count=$(( 16#b7528000 - 16#7b7526000 + 1)) | hexdump -C

Besides opening the memory dump with an hex editor you can also try and
explore it with other tools or devices. You can open it as a raw image,
you can play it as a sound or perhaps send it directly to your
frame-buffer device (`/dev/fb0`).

[WARNING: Although your memory may look like/sound like/read like
gibberish, it may contain sensitive information about you and your
computer!]{.warning .descriptor} [Example]{.example .empty .descriptor}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/images/Screenshot\_from\_2017-06-07\_164407.png]{.tmp}
[TODO: BOX: Forensic and debuggung tools can be used to explore and
problematize the layers of abstraction of computing.]{.tmp} [TODO:
RELATES TO
http://pad.constantvzw.org/p/observatory.guide.monopsychism]{.tmp}
[]{#m2mwogri .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.monopsychism)
Pan/Monopsychism]{.method .descriptor} [What: Reading and writing
sectors of memory from/to different computers]{.what .descriptor} [How:
Shell commands and fmem kernel module]{.how .descriptor} [Urgency:
Memory, even when it is volatile, is a trace of the processes happening
in your computer in the form of saved information, and is therefore more
similar to a file than to a process. Challenging the file/process
divide, sharing memory with others will allow a more intimate relation
with your and other\'s computers.]{.urgency .descriptor} [About:
Monopsychism is the philosophical/theological doctrine according to
which there exists but one intellect/soul, shared by all beings.]{.about
.descriptor} [TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.devmem]{.tmp} [Note: The
parallel allocation and observation of the same memory sector in two
different computers is in a sense the opposite process of machine
virtualization, where the localization of multiple virtual machines in
one physical comptuers can only happen by rigidly separating the memory
sectors dedicated to the different virtual machines.]{.note .descriptor}
[WARNING: THIS METHOD HAS NOT BEEN TESTED, IT CAN PROBABLY DAMAGE YOUR
RAM MEMORY AND/OR COMPUTER]{.warning .descriptor}

First start the fmem kernel module in both computers:

`sudo sh fmem/run.sh`{.bash}

Then load part of your computer memory into the other computer via dd
and ssh:

`dd if=/dev/fmem bs=1 skip=1000000 count=1000 | ssh user@othercomputer dd of=/dev/fmem`{.bash}

Or viceversa, load part of another computer\'s memory into yours:

`ssh user@othercomputer dd if=/dev/fmem bs=1 skip=1000000 count=1000 | dd of=/dev/fmem`{.bash}

Or even, exchange memory between two other computers:

`ssh user@firstcomputer dd if=/dev/fmem bs=1 skip=1000000 count=1000 | ssh user@secondcomputer dd of=/dev/fmem`{.bash}

` {.quaverbatim}
pan/monopsychism:
(aquinas famously opposed averroes..who's philosophy can be interpreted as monopsychist)

shared memory

copying the same memory to different computers

https://en.wikipedia.org/wiki/Reflection_%28computer_programming%29

it could cut through the memory like a worm

or it could go through the memory of different computers one after the other and take and leave something there
`

[Temporality]{.grouping} []{#ndawnmy5 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.fountain)
Fountain refreshment]{.method .descriptor} [What: Augmenting a piece of
standardised office equipment designed to dispense water to perform a
decorative function.]{.what .descriptor} [How: Rearranging space as
conditioning observations (WTC vs. Museum vs. University vs. Startup
Office vs. Shifting Walls that became Water Fountains)]{.how
.descriptor} [Who: Gaining access to standardised water dispensing
equipment turned out to be more difficult than expected as such
equipment is typically licensed / rented rather than purchased outright.
Acquiring a unit that could be modified required access to secondary
markets of second hand office equiment in order to purchase a disused
model.]{.who .descriptor} [Urgency: EU-OSHA (European Agency for Safety
and Health at Work) Directive 2003/10/EC noise places describes the
minimum health and safety requirements regarding the exposure of workers
to the risks arising from physical agents (noise). However no current
European guidelines exist on the potential benefitial uses of tactially
designed additive noise systems.]{.urgency .descriptor}

The Techno-Galactic Software Observatory -- Comfortable silence, one way
mirrors

A drinking fountain and screens of one-way mirrors as part of the work
session \"*The Techno-Galactic Software Observatory*\" organised by
Constant.

For the past 100 years the western ideal of a corporate landscape has
been has been moving like a pendulum, oscillating between grids of
cubicles and organic, open landscapes, in a near to perfect 25-year
rhythm. These days the changes in office organisation is supplemented by
sound design, in corporate settings mostly to create comfortable
silence. Increase the sound and the space becomes more intimate, the
person on the table next to you can not immediately hear what you are
saying. It seems that actual silence in public and corporate spaces has
not been sought after since the start of the 20th century. Actual
silence is not at the moment considered comfortable. One of the visible
symptoms of our desire to take the edge off the silence is to be
observed through the appearance of fountains in public space. The
fountains purpose being to give off neutral sound, like white noise
without the negative connotations. However as a sound engineer\'s
definition of noise is unwanted sound that all depends on ones personal
relation to the sound of dripping water.

This means that there needs to be a consistent inoffensiveness to create
comfortable silence.

In corporate architecture the arrival of glass buildings were originally
seen as a symbol of transparency, especially loved by governmental
buildings. Yet the reflectiveness of this shiny surface once combined
with strong light -- known as the treason of the glass -- was only
completely embraced at the invention of one-way-mirror foil. And it was
the corporate business-world that would come to be known for their
reflective glass skyscrapers. As the foil reacts to light, it appears
transparent to someone standing in the dark, while leaving the side with
the most light with an opaque surface. Using this foil as room dividers
in a room with a changing light, what is hidden or visible will vary
throughout the day. So will the need for comfortable silence. Disclaimer
:\
Similar to the last 100 years of western office organisation,\
this fountain only has two modes:\
on or off

If it is on it also offers two options\
cold water and hot water

This fountain has been tampered with and has not in any way been
approved by a proffesional fountain cleaner. I do urge you to consider
this before you take the decision to drink from the fountain.

Should you chose to drink from the fountain, then I urge you to write
your name on your cup, in the designated area, for a customised
experience of my care for you.

I do want you to be comfortable.

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/mia6.gif]{.tmp} [SHOW
IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/FullSizeRender%2811%29.jpg]{.tmp}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/IMG\_5695.JPG]{.tmp}
[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/mia/IMG\_5698.JPG]{.tmp}
[TODO: RELATES TO]{.tmp} []{#mtk5yjbl .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.silvio) Create
\"nannyware\": Software that observes and addresses the user]{.method
.descriptor} [What]{.what .empty .descriptor}

Nannyware is software meant to protect users while limiting their space
of activity. It is software that passive-aggressively suggests or
enforces some kind of discipline. In other words, create a form of
parental control extended to adults by means of user experience / user
interfaces.

Nannyware is a form of Content-control software: software designed to
restrict or control the content a reader is authorised to access,
especially when utilised to restrict material delivered over the
Internet via the Web, e-mail, or other means. Content-control software
determines what content will be available or be blocked.

[How]{.how .empty .descriptor}

> \[\...RestrictionsCITECLOSE23310 can be applied at various levels: a
> government can attempt to apply them nationwide (see Internet
> censorship), or they can, for example, be applied by an ISP to its
> clients, by an employer to its personnel, by a school to its students,
> by a library to its visitors, by a parent to a child\'s computer, or
> by an individual user to his or her own computer.^[5](#fcefedaf)^

[Who]{.who .empty .descriptor}

> Unlike filtering, accountability software simply reports on Internet
> usage. No blocking occurs. In setting it up, you decide who will
> receive the detailed report of the computer's usage. Web sites that
> are deemed inappropriate, based on the options you've chosen, will be
> red-flagged. Because monitoring software is of value only "after the
> fact", we do not recommend this as a solution for families with
> children. However, it can be an effective aid in personal
> accountability for adults. There are several available products out
> there.^[6](#bffbbeaf)^

[Urgency]{.urgency .empty .descriptor}

> As with all new lifestyle technologies that come along, in the
> beginning there is also some chaos until their impact can be assessed
> and rules put in place to bring order and respect to their
> implementation and use in society. When the automobile first came into
> being there was much confusion regarding who had the right of way, the
> horse or the car. There were no paved roads, speed limits, stop signs,
> or any other traffic rules. Many lives were lost and much property was
> destroyed as a result. Over time, government and society developed
> written and unwritten rules as to the proper use of the
> car.^[7](#bbfcbcfa)^

[WARNING]{.warning .empty .descriptor}

> Disadvantages of explicit proxy deployment include a user\'s ability
> to alter an individual client configuration and bypass the proxy. To
> counter this, you can configure the firewall to allow client traffic
> to proceed only through the proxy. Note that this type of firewall
> blocking may result in some applications not working
> properly.^[8](#ededebde)^

[Example]{.example .empty .descriptor}

> The main problem here is that the settings that are required are
> different from person to person. For example, I use workrave with a 25
> second micropause every two and a half minute, and a 10 minute
> restbreak every 20 minutes. I need these frequent breaks, because I\'m
> recovering from RSI. And as I recover, I change the settings to fewer
> breaks. If you have never had any problem at all (using the computer,
> that is), then you may want much fewer breaks, say 10 seconds
> micropause every 10 minutes, and a 5 minute restbreak every hour. It
> is very hard to give proper guidelines here. My best advice is to play
> around and see what works for you. Which settings \"feel right\".
> Basically, that\'s how Workrave\'s defaults evolve.^[9](#cfbbbfdd)^

[SHOW IMAGE HERE: !\[Content-control software\](
http://www.advicegoddess.com/archives/2008/05/03/nannyware.jpg )]{.tmp}
[SHOW IMAGE HERE: !\[A \"nudge\" from your music player
\](http://img.wonderhowto.com/img/10/25/63533437022064/0/disable-high-volume-warning-when-using-headphones-your-samsung-galaxy-s4.w654.jpg)]{.tmp}
[SHOW IMAGE HERE: !\[Emphasis on the body\]
(http://classicallytrained.net/wp-content/uploads/2014/10/take-a-break.jpg)]{.tmp}
[SHOW IMAGE HERE: !\[ \"Slack is trying to be my friend but it\'s more
like a slightly insensitive and slightly bossy acquaintance.\"
\@briecode \] (https://pbs.twimg.com/media/CuZLgV4XgAAYexX.jpg)]{.tmp}
[SHOW IMAGE HERE: !\[Slack is trying to be my friend but it\'s more like
a slightly insensitive and slightly bossy acquaintance.\]
(https://pbs.twimg.com/media/CuZLgV4XgAAYexX.jpg)]{.tmp} [SHOW IMAGE
HERE:
!\[\](https://images.duckduckgo.com/iu/?u=http%3A%2F%2Fi0.wp.com%2Fatherbeg.com%2Fwp-content%2Fuploads%2F2015%2F06%2FWorkrave-Restbreak-Shoulder.png&f=1)]{.tmp}

Facebook is working on an app to stop you from drunk-posting \"Yann
LeCun, who overseas the lab, told Wired magazine that the program would
be like someone asking you, \'Uh, this is being posted publicly. Are you
sure you want your boss and your mother to see this?\'\"

[SHOW IMAGE HERE: !\[This Terminal Dashboard Reminds You to Take a Break
When You\'re Lost Deep Inside the Command
Line\](https://i.kinja-img.com/gawker-media/image/upload/s\--\_of0PoM2\--/c\_fit,fl\_progressive,q\_80,w\_636/eegvqork0qizokwrlemz.png)]{.tmp}
[SHOW IMAGE HERE: !\[\](http://waterlog.gd/images/homescreen.png)]{.tmp}
[SHOW IMAGE HERE:
!\[\](https://pbs.twimg.com/media/C6oKTduWcAEruIE.jpg:large)]{.tmp}
[TODO: RELATES TO]{.tmp} []{#yzuwmdq4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.scrollresistance)
Useless scroll against productivity]{.method .descriptor} []{#m2vjndu3
.anchor} [[Method:](http://pad.constantvzw.org/p/observatory.guide.time)
Investigating how humans and machines negotiate the experience of
time]{.method .descriptor} [What]{.what .empty .descriptor} [SHOW IMAGE
HERE:
http://observatory.constantvzw.org/images/Screenshot\_from\_2017-06-10\_172547.png]{.tmp}
[How: python script]{.how .descriptor} [Example]{.example .empty
.descriptor}

` {.verbatim}
# ends of time

https://en.wikipedia.org/wiki/Year_2038_problem

Exact moment of the epoch:
03:14:07 UTC on 19 January 2038

## commands

local UNIX time of this machine
%XBASHCODE: date +%s

UNIX time + 1
%BASHCODE: echo $((`date +%s` +1 ))

## goodbye unix time

while :
do
sleep 1
figlet $((2147483647 - `date +%s`))
done

# Sundial Time Protocol Group tweaks

printf 'Current Time in Millennium Unix Time: '
printf $((2147483647 - `date +%s`))
echo
sleep 2
echo $((`cat ends-of-times/idletime` + 2)) > ends-of-times/idletime
idletime=`cat ends-of-times/idletime`
echo
figlet "Thank you for having donated 2 seconds to our ${idletime} seconds of collective SSH pause "
echo
echo

http://observatory.constantvzw.org/etherdump/ends-of-time.html
`

[TODO: RELATES TO]{.tmp} [Languaging]{.grouping} []{#nmi5mgjm .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.quine)
Quine]{.method .descriptor} [What: A program whose function consists of
displaying its own code. Also known as \"self-replicating
program\"]{.what .descriptor} [Why: Quines show the tension between
\"software as language\" and \"software as operation\".]{.why
.descriptor} [How: By running a quine you will get your code back. You
may do a step forward and wonder about functionality and aesthetics,
uselessness and performativity, data and code.]{.how .descriptor}
[Example: A quine (Python). When executed it outputs the same text as
the source:]{.example .descriptor}

` {.sourceCode .python}
s = 's = %r\nprint(s%%s)'
print(s%s)
`

[Example: A oneline unibash/etherpad quine, created during relearn
2017:]{.example .descriptor}

` {.quaverbatim}
wget -qO- http://192.168.73.188:9001/p/quine/export/txt | curl -F "file=@-;type=text/plain" http://192.168.73.188:9001/p/quine/import
`

[WARNING]{.warning .empty .descriptor}

The encounter with quines may deeply affect you. You may want to write
one and get lost in trying to make an ever shorter and more elegant one.
You may also take quines as point of departure or limit-ideas for
exploring software dualisms.

\"A quine is without why. It prints because it prints. It pays no
attention to itself, nor does it asks whether anyone sees it.\" \"Aquine
is aquine is aquine. \" Aquine is not a quine This is not aquine

[Remember: Although seemingly absolutely useless, quines can be used as
exploits.]{.remember .descriptor}

Exploring boundaries/tensions

databases treat their content as data (database punctualization) some
exploits manage to include operations in a database

[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.monopsychism]{.tmp}
[]{#zwu0ogu0 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.glossary)
Glossaries as an exercise]{.method .descriptor} [What: Use the technique
of psychanalytic listening to compile (gather, collect, bring together)
a list of key words for understanding software.]{.what .descriptor}
[How: Create a shared document that participants can add words to as
their importance emerges.To do pyschoanalytic listening, let your
attention float freely, hovering evenly, over a conversation or a text
until something catches its ear. Write down what your ear/eye catches.
When working in a collective context invite others to participate in
this project and describe the practice to them. Each individual may move
in and out of this mode of listening according to their interest and
desire and may add as many words to the list as they want. Use this list
to create an index of software observation.]{.how .descriptor} [When:
This is best done in a bounded context. In the case of the
Techno-Galactic Observatory, our bounded contexts includes the six day
work session and the pages and process of this publication.]{.when
.descriptor} [Who: The so-inclined within the group]{.who .descriptor}
[Urgency: Creating and troubling categories]{.urgency .descriptor}
[Note: Do not remove someone else\'s word from the glossary during the
accumulation phase. If an editing and cutting phase is desired this
should be done after the collection through collective consensus.]{.note
.descriptor} [WARNING: This method is not exclusive to and was not
developed for software observation. It may lead to awareness of
unconscious processes and to shifts in structures of feeling and
relation.]{.warning .descriptor} [Example]{.example .empty .descriptor}

` {.verbatim}
Agile
Code
Colonial
Command Line
Communication
Connectivity
Emotional
Galaxies
Green
Guide
Kernel
Imperial
Issues
Machine
Mantra
Memory
Museum
Observation
ProductionPower
Programmers
Progress
Relational
Red
Scripting
Scrum
Software
Survival
Technology
Test
Warning
WhiteBoard
Yoga
`

[TODO: RELATES TO]{.tmp} []{#mja0m2i5 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.validation)
Adding qualifiers]{.method .descriptor} [Remember: \"\[V\]alues are
properties of things and states of affairs that we care about and strive
to attain\...vlaues expressed in technical systems are a function of
their uses as well as their features and designs.\" Values at Play in
Digital Games, Mary Flanagan and Helen Nissenbaum]{.remember
.descriptor} [What: Bringing a moral, ethical, or otherwise
evaluative/adjectival/validating lens.]{.what .descriptor} [How:
Adjectives create subcategories. They narrow the focus by naming more
specifically the imagined object at hand and by implicitly excluding all
objects that do not meet the criteria of the qualifier. The more
adjectives that are added, the easier it becomes to answer the question
what is software. Or so it seems. Consider what happens if you add the
words good, bad, bourgeois, queer, stable, or expensive to software. Now
make a list of adjectives and try it for yourself. Level two of this
exercise consists of observing a software application and deducing from
this the values of the individuals, companies, and societies that
produced it.]{.how .descriptor} [Note: A qualifier may narrow down
definitions to undesirable degrees.]{.note .descriptor} [WARNING: This
exercise may be more effective at identifying normative and ideological
assumptions at play in the making, distributing, using, and maintaining
of software than at producing a concise definition.]{.warning
.descriptor} [Example: \"This morning, Jan had difficulties to answer
the question \"what is software\", but he said that he could answer the
question \"what is good software\". What is good software?]{.example
.descriptor} [TODO: RELATES TO]{.tmp} []{#mmmwmje2 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.softwarethrough)
Searching \"software\" through software]{.method .descriptor} [What: A
quick way to sense the ambiguity of the term \'software\', is to go
through the manual files on your hard drive and observe in which cases
is the term used.]{.what .descriptor} [How: command-line oneliner]{.how
.descriptor} [Why: Software is a polymorphic term that take different
meanings and comes with different assumptions for the different agents
involved in its production, usage and all other forms of encounter and
subjection. From the situated point of view of the software present on
your machine, when and why does software call itself as such?]{.why
.descriptor} [Example]{.example .empty .descriptor}

so software exists only outside your computer? only in general terms?
checking for the word software in all man pages:

grep -nr software /usr/local/man
!!!!

software appears only in terms of license:

This program is free software
This software is copyright (c)

we don\'t run software. we still run programs.\
nevertheless software is everywhere

[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.samequestion]{.tmp}
[]{#ndhkmwey .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.everyonescp)
Persist in calling everyone a Software Curious Person]{.method
.descriptor} [What: Persistance in naming is a method for changing a
person\'s relationship to software by (sometimes forcibly) call everyone
a Software Curious Person.]{.what .descriptor} [How: Insisting on
curiosity as a relation, rather than for example \'fear\' or
\'admiration\' might help cut down the barriers between different types
of expertise and allows multiple stakeholders feel entitled to ask
questions, to engage, to investigate and to observe.]{.how .descriptor}
[Urgency: Software is too important to not be curious about.
Observations could benefit from recognising different forms of
knowledge. It seems important to engage with software through multiple
interests, not only by means of technical expertise.]{.urgency
.descriptor} [Example: This method was used to address each of the
visitors at the Techno-Galactic Walk-in Clinic.]{.example .descriptor}
[TODO: RELATES TO]{.tmp} [Healing]{.grouping} []{#mmu1mgy0 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.relational)
Setup a Relational software observatory consultancy (RSOC)]{.method
.descriptor} [Remember]{.remember .empty .descriptor}

- Collectivise research around hacking to save time.
- Self-articulate software needs as your own Operating (system)
perspective.
- Change the lens by looking to software through a time perspective.

[What: By paying a visit to our ethnomethodology interview practice
you'll learn to observe software from different angles / perspectives.
Our practionners passion is to make the \"what is the relation to
software\" discussion into a service.]{.what .descriptor} [How: Reading
the signs. Considering the everchanging nature of software development
and use and its vast impact on globalized societies, it is necessary to
recognize some of the issues of how software is (often) either
passively-perceived or actively-observed, without an articulation of the
relations. We offer a method to read the signs of the relational aspect
of software observance. It\'s a crucial aspect of our guide. It will
give you another view on software that will shape your ability to
survive any kind of software disaster.]{.how .descriptor} [SHOW IMAGE
HERE: !\[Reading the signs. From: John \"Lofty\" Wiseman, SAS Survival
Handbook: The Ultimate Guide to Surviving Anywhere\](
http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/IMAG1319
)]{.tmp} [WARNING]{.warning .empty .descriptor} [SHOW IMAGE HERE: have a
advertising blob for the RSOC with a smiling doctor welcoming
image]{.tmp} [Example]{.example .empty .descriptor}

What follows is an example of a possible diagnostic questionnaire.

Sample Questionnaire
--------------------

**What to expect** You will obtain a cartography of software users
profiles. It will help you to shape your own relation to software. You
will be able to construct your own taxonomy and classifcation of
software users that is needed in order to find a means of rescue in case
of a software catastrophy.

- SKILLS\
- What kind of user would you say that you are?
- What is your most frequently used type of software?
- How often do you install/experiment/learn new software?



- History
- What is your first recollection of software use?
- How often do / when did you last purchase software or pay for a
software service?



- Ethics
- What is the software feature you care about the most?
- Do you use any free software?
- if yes than
- do you remember your first attempt at using this software
service? Do you still use it? If not why?



- Do you pay for media distribution/streaming services?
- Do you remember your first attempt at using free software and how
did that make you feel?
- Have you used any of these software services : facebook, dating app
(grindr, tinder, etc.), twitter, instagram or equivalent.



- Can you talk about your favorite apps or webtools that you use
regularly?
- What is most popular software your friends use?



- SKILL
- Would you say that you are a specilised user?



- Have you ever used the command line?
- Do you know about scripting?
- Have you ever edited an HTML page? A CSS file? A PHP file? A
configuration file?
- Can you talk about your most technical encounter with your computer
/ telephone?



- ECONOMY\
- How do you pay for your software use?
- Please elaborate (for example, do you buy the software? /
contribute in kind / deliver services or support)
- What is the last software that you paid for using?
- What online services are you currently paying for?
- Is someone paying for your use of service?



- Personal
- What stories do you have concerning contracts and administration in
relation to your software, Internet or computer?
- How does software help you shape your relations with other people?
- From which countries does your softwares come from / reside? How do
you feel about that?
- Have you ever read a terms of software service, what about one that
is not targeting the American market?

Sample questionnaire results
----------------------------

Possible/anticipated user profiles
----------------------------------

### \...meAsHardwareOwnerSoftwareUSER:

\"I did not own a computer personally until very very late as I did not
enjoy gaming as a kid or had interest in spending much time behind PC
beyond work (and work computer). My first was hence I think in 2005 and
it was a SGI workstation that was the computer of the year 2000 (cost
10.000USD) and I got it for around 300USD. Proprietary drivers for
unified graphics+RAM were never released, so it remained a software
dead-end in gorgeous blue curved chassis
http://www.sgidepot.co.uk/sgidepot/pics/vwdocs.jpg\"

### \...meAsSoftwareCONSUMER:

\"I payed/purchased software only twice in my life (totalling less then
25eur), as I could access most commercial software as widely pirated in
Balkans and later had more passion for FLOSS anyway, this made me relate
to software as material to exchange and work it, rather than commodity
goods I could or not afford.\"

### \...meAsSoftwareINVESTOR:

\"I did it as both of those apps were niche products in early beta (one
was Jeeper Elvis, real-time-non-linear-video-editor for BeOS) that
failed to reach market, but I think I would likely do it again and only
in that mode (supporting the bleeding edge and off-stream work), but
maybe with more than 25eur.\"

### \...meAsSoftwareUserOfOS:

\"I would spend most of 80s ignoring computers, 90ties figuring out
software from high-end to low-end, starting with OSF/DecAlpha and SunOS,
than IRIX and MacOS, finally Win 95/98 SE, that permanently pushed me
into niches (of montly LINUX distro install fests, or even QNX/Solaris
experiments and finally BeOS use).\"

### \...meAsSoftwareWEBSURFER:

\"I got used to websurfing in more than 15 windows on UNIX systems and
never got used to less than that ever since, furthermore with addition
of more browser options this number only multiplied (always wondered if
my first system was Windows 3.11 - would I be a more focused person and
how would that form my relations to browser windows\>tabs).\"

### \...meAsSoftwareUserOfPropertarySoftware:

\"I signed one NDA contract in person on the paper and with ink on a
rainy day while stopping of at trainstaion in north Germany for the
software that was later to be pulled out of market due to problematic
licencing agreement (intuitivly I knew it was wrong) - it had too much
unprofessional pixeleted edges in its graphics.

### \...meAsSoftwareUserOfDatingWebsites:

\"I got one feature request implemented by a prominent dating website
(to search profiles by language they speak), however I was never
publicly acknowledged (though I tried to make use of it few times), that
made our relations feel a bit exploitative and underappreciated. \"

### \...meAsSoftwareUserTryingToGoPRO:

\"my only two attempts to get into the software company failed as they
insisted on full time commitments. Later I found out ones were
intimidated in interview and other gave it to a person that negotiated
to work part time with friend! My relation to professionalism is likely
equally complex and pervert as one to the software.\"

Case study : W. W.
------------------

\...ww.AsExperiencedAdventerousUSER - experiments with software every
two days as she uses FLOSS and Gnu/Linux, cares the most for maliabity
of the software - as a result she has big expectations of flexibility
even in software category which is quite conventional and stability
focused like file-hosting.

\...ww.AsAnInevstorInSoftware - paid compiled version of FLOSS audio
software 5 years ago as she is supportive of economy and work around
production, maintainance and support, but she also used closed
hardware/software where she had to agree on licences she finds unfair,
but then she was hacking it in order to use it as an expert - when she
had time.

\...ww.AsCommunicationSoftwareUSER - she is not using commercial social
networks, so she is very concious of information transfers and time
relations, but has no strong media/format/design focus.

Q: What is your first recollection of software use?\
A: ms dos in 1990 at school \_ i was 15 or 16. oh no 12. Basic in 1986.

Q: What are the emotions related to this use?\
A: fun. i\'m good at this. empowering

Q: How often do / when did you last purchase software or pay for a
software service?\
A: I paid for ardour five years ago. I paid the developper directly. For
the compiled version. I paid for the service. I pay for my website and
email service at domaine public.

Q: What kind of user would you say you are?\
A: An experienced user drawing out the line. I don\'t behave.

Q: Is there a link between this and your issue?\
A: Even if it\'s been F/LOSS there is a lot of decision power in my
package.

Q: What is your most frequently used type of software?\
A: Web browser. email. firefox & thunderbird

Q: How often do you install/experiment/learn new software?\
A: Every two days. I reinstall all the time. my old lts system died.
stop being supported last april. It was linux mint something.

Q: Do you know about scripting?\
A: I do automating scripts for any operation i have to doi several times
like format conversion.

Q: Can you talk about your most technical encounter with your computer /
telephone?\
A: I\'ve tried to root it. but i didn\'t succeed.

Q: How much time do you wish to spend on such activities like hacking,
rooting your device?\
A: hours. you should take your time

Q: Did you ever sign licence agreement you were not agree with? How does
that affect you?\
A: This is the first thing your when you have a phone. it\'s obey or
die.

Q: What is the software feature you care for the most?\
A: malleability. different ways to approach a problem, a challenge, an
issue.

Q: Do you use any free software?\
A: yes. there maybe are some proprietary drivers.

Q: Do you remember your first attempt at using free software and how did
that make you feel?\
A: Yes i installed my dual boot in \... 10 years ago. scared and
powerful.

Q: Do you use one of this software service: facebook, dating app (grindr
of sort), twitter, instagram or equivalent?\
A: Google, gmail that\'s it

Q: Can you talk about your favorite apps or webtools that you use
regularly?\
A: Music player. vanilla music and f-droid. browser. I pay attention to
clearing my history, no cookies. I also have iceweasel. Https by
default. Even though i have nothing to hide.

Q: What stories around contracts and administration in relation to your
software internet or computer?\
A: Nothing comes to my mind. i\'m not allowed to do, to install on
phone. When it\'s an old phone, there is nothing left that is working
you have to do it.

Q: How does software help you shape your relations with other people?\
A: It\'s a hard question. if it\'s communication software of course
it\'s it\'s nature to be related to other people.there is an expectency
of immediate reply, of information transfer\...It\'s troubling your
relation with people in certain situations.

Q: From which countries does your softwares live / is coming from? How
do you feel about that?\
A: i think i chose the netherlands as a miror. you are hoping to reflect
well in this miror.

Q: Have you ever read a terms of software service; one that is not
targeting the American market?\
A: i have read them. no.

[TODO: RELATES TO]{.tmp} []{#mta1ntzm .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.agile.yoga)
Agile Sun Salutation]{.method .descriptor} [Remember]{.remember .empty
.descriptor}

> Agile software development describes a set of values and principles
> for software development under which requirements and solutions evolve
> through the collaborative effort of self-organizing cross-functional
> teams. It advocates adaptive planning, evolutionary development, early
> delivery, and continuous improvement, and it encourages rapid and
> flexible response to change. These principles support the definition
> and continuing evolution of many software development
> methods.^[10](#dbabcece)^

[What: You will be observing yourself]{.what .descriptor} [How]{.how
.empty .descriptor}

> Scrum is a framework for managing software development. It is designed
> for teams of three to nine developers who break their work into
> actions that can be completed within fixed duration cycles (called
> \"sprints\"), track progress and re-plan in daily 15-minute stand-up
> meetings, and collaborate to deliver workable software every sprint.
> Approaches to coordinating the work of multiple scrum teams in larger
> organizations include Large-Scale Scrum, Scaled Agile Framework (SAFe)
> and Scrum of Scrums, among others.^[11](#eefcbaac)^

[When: Anywhere where it\'s possible to lie on the floor]{.when
.descriptor} [Who]{.who .empty .descriptor}

> Self-organization and motivation are important, as are interactions
> like co-location and pair programming. It is better to have a good
> team of developers who communicate and collaborate well, rather than a
> team of experts each operating in isolation. Communication is a
> fundamental concept.^[12](#fbaeffab)^

[Urgency: Using Agile software development methods to develop a new path
into your professional and personal life towards creativity, focus and
health.]{.urgency .descriptor} [WARNING]{.warning .empty .descriptor}

> The agile movement is in some ways a bit like a teenager: very
> self-conscious, checking constantly its appearance in a mirror,
> accepting few criticisms, only interested in being with its peers,
> rejecting en bloc all wisdom from the past, just because it is from
> the past, adopting fads and new jargon, at times cocky and arrogant.
> But I have no doubts that it will mature further, become more open to
> the outside world, more reflective, and also therefore more
> effective.^[13](#edabeeaf)^

[Example]{.example .empty .descriptor} [SHOW IMAGE HERE:
https://mfr.osf.io/render?url=https://osf.io/ufdvb/?action=download%26direct%26mode=render&initialWidth=450&childId=mfrIframe]{.tmp}

Hello and welcome to the presentation of the agile yoga methodology. I
am Allegra, and today I\'m going to be your personal guide to YOGA, an
acronym for why organize? Go agile! I\'ll be part of your team today and
we\'ll do a few exercises together as an introduction to a new path into
your professional and personal life towards creativity, focus and
health.

A few months ago, I was stressed, overwhelmed with my work, feeling
alone, inadequate, but since I started practicing agile yoga, I feel
more productive. I have many clients as an agile yoga coach, and I\'ve
seen new creative business opportunities coming to me as a software
developer.

For this first experience with the agile yoga method and before we do
physical exercises together, I would like to invite you to close your
eyes. Make yourself comfortable, lying on the floor, or sitting with
your back on the wall. Close your eyes, relax. Get comfortable. Feel the
weight of your body on the floor or on the wall. Relax.

Leave your troubles at the door. Right now, you are not procrastinating,
you are having a meeting at the \,
a professional building dedicated to business, you are meeting yourself,
you are your own business partner, you are one. You are building your
future.

You are in a room standing with your team, a group of lean programmers.
You are watching a white board together. You are starting your day, a
very productive day as you are preparing to run a sprint together. Now
you turn towards each other, making a scrum with your team, you breathe
together, slowly, inhaling and exhaling together, slowly, feeling the
air in and out of your body. Now you all turn towards the sun to prepare
to do your ASSanas, the agile Sun Salutations or ASS with the team
dedicated ASS Master. She\'s guiding you. You start with Namaskar, the
Salute. your palms joined together, in prayer pose. you all reflect on
the first principle of the agile manifesto. your highest priority is to
satisfy the customer through early and continuous delivery of valuable
software.

Next pose, is Ardha Chandrasana or (Half Moon Pose). With a deep
inhalation, you raise both arms above your head and tilt slightly
backward arching your back. you welcome changing requirements, even late
in development. Agile processes harness change for the customer\'s
competitive advantage. then you all do Padangusthasana (Hand to Foot
Pose). With a deep exhalation, you bend forward and touch the mat, both
palms in line with your feet, forehead touching your knees. you deliver
working software frequently.

Surya Darshan (Sun Sight Pose). With a deep inhalation, you take your
right leg away from your body, in a big backward step. Both your hands
are firmly planted on your mat, your left foot between your hands. you
work daily throughout the project, business people and developers
together. now, you\'re flowing into Purvottanasana (Inclined Plane) with
a deep inhalation by taking your right leg away from your body, in a big
backward step. Both your hands are firmly planted on your mat, your left
foot between your hands. you build projects around motivated
individuals. you give them the environment and support they need, and
you trust them to get the job done.

You\'re in Adho Mukha Svanasana (Downward Facing Dog Pose). With a deep
exhalation, you shove your hips and butt up towards the ceiling, forming
an upward arch. Your arms are straight and aligned with your head. The
most efficient and effective method of conveying information to and
within a development team is face-to-face conversation.

Then, Sashtang Dandawat (Forehead, Chest, Knee to Floor Pose). With a
deep exhalation, you lower your body down till your forehead, chest,
knees, hands and feet are touching the mat, your butt tilted up. Working
software is the primary measure of progress.

Next is Bhujangasana (Cobra Pose). With a deep inhalation, you slowly
snake forward till your head is up, your back arched concave, as much as
possible. Agile processes promote sustainable development. You are all
maintaining a constant pace indefinitely, sponsors, developers, and
users together.

Now back into Adho Mukha Svanasana (Downward Facing Dog Pose).
Continuous attention to technical excellence and good design enhances
agility.

And then again to Surya Darshan (Sun Sight Pose). Simplicity\--the art
of maximizing the amount of work not done\--is essential. Then to
Padangusthasana (Hand to Foot Pose). The best architectures,
requirements, and designs emerge from self-organizing teams.

You all do again Ardha Chandrasana (Half Moon Pose). At regular
intervals, you as the team reflect on how to become more effective, then
tune and adjust your behavior accordingly. you end our ASSanas session
with a salute to honor your agile yoga practices. you have just had a
productive scrum meeting. now i invite you to open your eyes, move your
body around a bit, from the feet up to the head and back again.

Stand up on your feet and let\'s do a scrum together if you\'re ok being
touched on the arms by someone else. if not, you can do it on your own.
so put your hands on the shoulder of the SCP around you. now we\'re
joined together, let\'s look at the screen together as we inhale and
exhale. syncing our body together to the rythms of our own internal
software, modulating our oxygen level intake requirements to the oxygen
availability of our service facilities.

Now, let\'s do together a couple of exercise to protect and strengthen
our wrists. as programmers, as internauts, as entrepreneurs, they are a
very crucial parts of the body to protect. in order to be able to type,
to swipe, to shake hands vigourously, we need them in good health. So
bring to hands towards each other in a prayer pose, around a book, a
brick. You can do it without but I\'m using my extreme programming book
- embrace change - for that. So press the palms together firmly, press
the pad of your fingers together. do that while breathing in and out
twice.

Now let\'s expand our arms towards us, in the air, face and fingers
facing down. like we\'re typing. make your shoulders round. let\'s
breath while visualizing in our heads the first agile mantra :
Individuals and interactions over processes and tools.

Now let\'s bring back the arms next to the body and raise them again.
And let\'s move our hands towards the ceiling this time. Strenghtening
our back. In our head, the second mantra. Working software over
comprehensive documentation. now let\'s bring back the hands in the
standing position. Then again the first movement while visualizing the
third mantra : Customer collaboration over contract negotiation and then
the second movement thinking about the fourth and last mantra :
Responding to change over following a plan and of course we continue
breathing. Now to finish this session, let\'s do a sprint together in
the corridor !

[SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/guide/agileyoga/8-Poses-Yoga-Your-Desk.contours.png
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/guide/agileyoga/gayolab-office-chair-for-yoga.contours.png
)]{.tmp} [TODO: RELATES TO]{.tmp} []{#mdu0mmji .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.blobservation)
Hand reading]{.method .descriptor} [How: Visit the Future Blobservation
Booth to have your fortunes read and derive life insight from the wisdom
of software.]{.how .descriptor} [What: Put your hand in the reading
booth and get your line read.]{.what .descriptor} [Why: The hand which
holds your mouse everyday hides many secrets.]{.why .descriptor}
[Example]{.example .empty .descriptor}

` {.verbatim .wrap}
* sample reading timeline:

* 15:00 a test user, all tests clear and systems are online a user who said goodbye to us another user a user who thought it'd be silly to say thank you to the machine but thank you very much another kind user who said thank you yet another kind user another user, no feeback a nice user who found the reading process relieving yet another kind user a scared user! took the hand out but ended up trusting the system. "so cool thanks guys" another user a young user! this is a funny computer
* 15:35 another nice user
* 15:40 another nice user
* 15:47 happy user (laughing)
* 15:51 user complaining about her fortune, saying it's not true. Found the reading process creepy but eased up quickly
* 15:59 another nice user: http://etherbox.local:9001/p/SCP.sedyst.md
* 16:06 a polite user
* 16:08 a friendly playful user (stephanie)
* 16:12 a very giggly user (wendy)
* 16:14 a playful user - found the reading process erotic - DEFRAGMENTING? NO! Thanks Blobservation http://etherbox.local:9001/p/SCP.loup.md
* 16:19 a curious user
* 16:27 a friendly user but oh no, we had a glitch and computer crashed. But we still delivered the fortune. We got a thank you anyway
* 16:40 a nice user, the printer jammed but it was sorted out quickly *16:42 another nice user
* 16:50 nice user (joak)
* 16:52 yet another nice user (jogi)
* 16:55 happy user! (peter w)
* 16:57 more happy user (pierre h)
* 16:58 another happy user
* 17:00 super happy user (peggy)
* 17:02 more happy user
`

[Example]{.example .empty .descriptor}

> Software time is not the same as human time. Computers will run for AS
> LONG AS THEY WILL BE ABLE TO, provided sufficient power is available.
> You, as a human, don\'t have the luxury of being always connected to
> the power grid and this have to rely on your INTERNAL BATTERY. Be
> aware of your power cycles and set yourself to POWER-SAVING MODE
> whenever possible.

[SHOW IMAGE HERE:
http://gallery.constantvzw.org/var/resizes/Techno-Galactic-Software-Observatory/IMAG1407.jpg?m=1497344230]{.tmp}
[TODO: RELATES TO]{.tmp} []{#yznjodq3 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.dirty) Bug
reporting for sharing observations]{.method .descriptor} [What: Etherpad
had stopped working but it was unclear why. Where does etherpad
\'live\'?]{.what .descriptor} [How: Started by looking around the pi\'s
filesystem by reading /var/log/syslog in /opt/etherpad and in a
subdirectory named var/ there was dirty.db, and dirty it was.]{.how
.descriptor} [When: Monday morning]{.when .descriptor} [Urgency:
Software (etherpad) not working and the Walk-in Clinic was about to
start.]{.urgency .descriptor} [Note:
http://pad.constantvzw.org/p/observatory.inventory.jogi]{.note
.descriptor}

from jogi\@mur.at to \[Observatory\] When dirty.db get\'s dirty

Dear all,

as promised yesterday, here my little report regarding the broken
etherpad.

\ \#\#\# When dirty.db get\'s dirty

When I got to WTC on Monday morning the etherpad on etherbox.local was
disfunct. Later someone said that in fact etherpad had stopped working
the evening before, but it was unclear why. So I started looking around
the pi\'s filesystem to find out what was wrong. Took me a while to find
the relevant lines in /var/log/syslog but it became clear that there was
a problem with the database. Which database? Where does etherpad
\'live\'? I found it in /opt/etherpad and in a subdirectory named var/
there it was: dirty.db, and dirty it was.

A first look at the file revealed no apparent problem. The last lines
looked like this:

`{"key":"sessionstorage:Ddy0gw7okwbkv5BzkR1DuSLCV_IA5_jQ","val":{"cookie ":{"path":"/","_expires":null,"originalMaxAge":null,"httpOnly":true,"secure":false}}} {"key":"sessionstorage:AU1cffgcTf_q6BV9aIdAvES2YyXM7Gm1","val":{"cookie ":{"path":"/","_expires":null,"originalMaxAge":null,"httpOnly":true,"secure":false}}} {"key":"sessionstorage:_H5SdUlDvQ3XCuPaZEXQ5lx0K6aAEJ9m","val":{"cookie ":{"path":"/","_expires":null,"originalMaxAge":null,"httpOnly":true,"se cure":false}}}`

What I did not see at the time was that there were some (AFAIR something
around 150) binary zeroes at the end of the file. I used tail for the
first look and that tool silently ignored the zeroes at the end of the
file. It was Martino who suggested using different tools (xxd in that
case) and that showed the cause of the problem. The file looked
something like this:

00013730: 6f6b 6965 223a 7b22 7061 7468 223a 222f okie":{"path":"/
00013740: 222c 225f 6578 7069 7265 7322 3a6e 756c ","_expires":nul
00013750: 6c2c 226f 7269 6769 6e61 6c4d 6178 4167 l,"originalMaxAg
00013760: 6522 3a6e 756c 6c2c 2268 7474 704f 6e6c e":null,"httpOnl
00013770: 7922 3a74 7275 652c 2273 6563 7572 6522 y":true,"secure"
00013780: 3a66 616c 7365 7d7d 7d0a 0000 0000 0000 :false}}}.......
00013790: 0000 0000 0000 0000 0000 0000 0000 0000 ................

So Anita, Martino and I stuck our heads together to come up with a
solution. Our first attempt to fix the problem went something like this:

dd if=dirty.db of=dirty.db.clean bs=1 count=793080162

which means: write the first 793080162 blocks of size 1 byte to a new
file. After half an hour or so I checked on the size of the new file and
saw that some 10% of the copying had been done. No way this would get
done in time for the walk-in-clinic. Back to the drawing board.

Using a text editor was no real option btw since even vim has a hard
time with binary zeroes and the file was really big. But there was
hexedit! Martino installed it and copied dirty.db onto his computer.
After some getting used to the various commands to navigate in hexedit
the unwanted zeroes were gone in an instant. The end of the file looked
like this now:

00013730: 6f6b 6965 223a 7b22 7061 7468 223a 222f okie":{"path":"/
00013740: 222c 225f 6578 7069 7265 7322 3a6e 756c ","_expires":nul
00013750: 6c2c 226f 7269 6769 6e61 6c4d 6178 4167 l,"originalMaxAg
00013760: 6522 3a6e 756c 6c2c 2268 7474 704f 6e6c e":null,"httpOnl
00013770: 7922 3a74 7275 652c 2273 6563 7572 6522 y":true,"secure"
00013780: 3a66 616c 7365 7d7d 7d0a :false}}}.

Martino asked about the trailing \'.\' character and I checked a
different copy of the file. No \'.\' there, so that had to go too. My
biggest mistake in a long time! The \'.\' we were seeing in Martino\'s
copy of the file was in fact a \'\' (0a)! We did not realize that,
copied the file back to etherbox.local and waited for etherpad to resume
it\'s work. But no luck there, for obvious reasons.

We ended up making backups of dirty.db in various stages of deformation
and Martino started a brandnew pad so we could use pads for the walk-
in-clinic. The processing tool chain has been disabled btw. We did not
want to mess up any of the already generated .pdf, .html and .md files.

We still don\'t know why exactly etherpad stopped working sometime
Sunday evening or how the zeroes got into the file dirty.db. Anita
thought that she caused the error when she adjusted time on
etherbox.local, but the logfile does not reflect that. The last clean
entry in /var/log/syslog regarding nodejs/etherpad is recorded with a
timestamp of something along the line of \'Jun 10 10:17\'. Some minutes
later, around \'Jun 10 10:27\' the first error appears. These timestamps
reflect the etherbox\'s understanding of time btw, not \'real time\'.

It might be that the file just got too big for etherpad to handle it.
The size of the repaired dirty.db file was already 757MB. That could btw
explain why etherpad was working somewhat slugishly after some days.
There is still a chance that the time adjustment had an unwanted side
effect, but so far there is no obvious reason for what had happened.
\
\-- J.Hofmüller

http://thesix.mur.at/

[]{#ytu5y2qy .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.detournement)
Interface Détournement]{.method .descriptor} [Embodiment / body
techniques]{.grouping} []{#y2q4zju5 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.occupational)
Comportments of software (softwear)]{.method .descriptor}
[Remember]{.remember .empty .descriptor}

> The analysis of common sense, as opposed to the exercise of it, must
> then begin by redrawing this erased distinction between the mere
> matter-of-fact apprehension of reality\--or whatever it is you want to
> call what we apprehend merely and matter-of-factly\--and
> down-to-earth, colloquial wisdom, judgements, and assessments of it.

[What: Observe and catalog the common gestures, common comportments, and
common sense(s) surrounding software.]{.what .descriptor} [How: This can
be done through observation of yourself or others. Separate the
apprehended and matter of fact from the meanings, actions, reactions,
judgements, and assessments that the apprehension occasions. Step 1:
Begin by assembling a list of questions such as: When you see a software
application icon what are you most likely to do? When a software
application you are using presents you with a user agreement what are
you most likely to do? When a software applciation does something that
frustrates you what are you most likely to do? When a software
application you are using crashes what are you most likely to do? Step
2: Write down your responses and the responses of any subjects you are
observing. Step 3: For each question, think up three other possible
responses. Write these down. Step 4: (this step is only for the very
curious) Try the other possible responses out the next time you
encounter each of the given scenarios.]{.how .descriptor} [Note: The
common senses and comportments of software are of course informed and
conditioned by those of hardware and so perhaps this is more accurately
a method for articulating comportments of computing.]{.note .descriptor}
[WARNING: Software wears on both individual and collective bodies and
selves. Software may harm your physical and emotional health and that of
your society both by design and by accident.]{.warning .descriptor}
[TODO: RELATES TO Agile Sun Salutation, Natasha Schull\'s Addicted by
Design]{.tmp} [Flow-regulation, logistics, seamlessness]{.grouping}
[]{#mwrhm2y4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.continuousintegration)
Continuous integration]{.method .descriptor} [What: Continuous
integration is a sophisticated form of responsibility management: it is
the fascia of services. Continous integration picks up after all other
services and identifies what needs to happen so that they can work in
concert. Continuous integration is a way of observing the evolution of
(micro)services through cybernetic (micro)management.]{.what
.descriptor} [How: Continuous integration keeps track of changes to all
services and allows everyone to observe if they still can work together
after all the moving parts are fitted together.]{.how .descriptor}
[When: Continuous integration comes to prominence in a world of
distributed systems where there are many parts being organized
simultaneously. Continuous integration is a form of observation that
helps (micro)services maintain a false sense of independence and
decentralization while constantly subjecting them to centralized
feedback.]{.when .descriptor} [Who: Continuous integration assumes that
all services will submit themselves to the feedback loops of continuous
integration. This could be a democratic process or not.]{.who
.descriptor} [Urgency: Continuous integration reconfigures divisions of
labor in the shadows of automation. How can we surface and question its
doings and undoings?]{.urgency .descriptor} [WARNING: When each service
does one thing well, the service makers tend to assume everybody else is
doing the things they do not want to do.]{.warning .descriptor}

At TGSO continuous integration was introduced as a service that responds
to integration hell when putting together a number of TGSO services for
a walk-in software clinic. Due to demand, the continuous integration
service was extended to do \"service discovery\" and \"load balancing\"
once the walk-in clinic was in operation.

Continuous integration worked by visiting the different services of the
walk-in clinic to check for updates, test the functionality and think
through implications of integration with other services. If the pieces
didn\'t fit, continuous integration delivered error messages and
solution options.

When we noticed that software curious persons visiting the walk-in
clinic may have troubles finding the different services, and that some
services may be overloaded with software curious persons, continuous
integration was extended. We automated service registration using
colored tape and provided a lookup registry for software curious
persons.

http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/IMAG1404

Load balancing meant that software curious persons were forwarded to
services that had capacity. If all other services were full, the load
balancer defaulted to sending the software curious person to the [Agile
Sun
Salutation](http://pad.constantvzw.org/p/observatory.guide.agile.yoga)
service.

[WARNING: At TGSO the bundling of different functionalities into the
continuous integration service broke the \"do one thing well\"
principle, but saved the day (we register this as technical debt for the
next iteration of the walk-in clinic).]{.warning .descriptor} [Remember:
Continous integration may be the string that holds your current software
galaxy together.]{.remember .descriptor}

\"More technically, I am interested in how things bounce around in
computer systems. I am not sure if these two things are relted, but I
hope continuous integration will help me.\"

[]{#zdixmgrm .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.pipeline) make
make do]{.method .descriptor} [What: Makefile as a method for
quick/collective assemblages + observing amalgamates/pipelines]{.what
.descriptor} [Note: Note:
http://observatory.constantvzw.org/etherdump/makefile.raw.html]{.note
.descriptor}

etherpad-\>md-\>pdf-\>anything pipeline. makefile as a method for
quick/collective assemblages + observing amalgamates/pipelines CHRISTOPH

[]{#zweymtni .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.ssogy)
Flowcharts (Flow of the chart -- chart of the flow on demand!)]{.method
.descriptor} [Example]{.example .empty .descriptor} [SHOW IMAGE HERE:
!\[\]( http://observatory.constantvzw.org/images/symbols/ibm-ruler.jpg
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/burroughs-ruler.jpg
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/rectangle.png )]{.tmp}
[SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/curly\_rec.png
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/curly\_rec-2.png
)]{.tmp} [SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/flag.png )]{.tmp}
[SHOW IMAGE HERE: !\[\](
http://observatory.constantvzw.org/images/symbols/trapec.png )]{.tmp}
[SHOW IMAGE HERE: !\[Claude Shannon Information Diagram Blanked: Silvio
Lorusso\](
http://silviolorusso.com/wp-content/uploads/2012/02/shannon\_comm\_channel.gif
)]{.tmp} [TODO: RELATES TO]{.tmp}
[Beingontheside/inthemiddle/behind]{.grouping} []{#ywfin2e4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.somethinginthemiddlemaybe)
Something in the Middle Maybe (SitMM)]{.method .descriptor} [What: The
network traffic gets observed. There are different sniffing software out
there which differ in granularity and how far the user can taylor the
different functionality. SitMM builds on one of these tools called
[scapy](http://www.secdev.org/projects/scapy/).]{.what .descriptor}
[How: SitMM takes a closer look at the network traffic coming from/going
to a software curious person\'s device. The software curious person
using SitMM may ask to filter the traffic based on application or device
of interest.]{.how .descriptor} [Who]{.who .empty .descriptor}

The software curious person gets to observe their own traffic. Ideally,
observing ones own network traffic should be available to anyone, but
using such software can be deemed illegal under different jurisdictions.

For example, in the US wiretap law limit packet-sniffing to parties
owning the network that is being sniffed or the availability of consent
from one of the communicating parties. Section 18 U.S. Code § 2511 (2)
(a) (i) says:

> It shall not be unlawful \... to intercept \... while engaged in any
> activity which is a necessary incident to the rendition of his service
> or to the protection of the rights or property of the provider of that
> service

See here for a
[paper](http://spot.colorado.edu/%7Esicker/publications/issues.pdf) on
the topic. Google went on a big legal spree to defend their right to
capture unencrypted wireless traffic with google street view cars. The
courts were concerned about wiretapping and infringements on the privacy
of users, and not with the leveraging of private and public WiFi
infrastructure for the gain of a for profit company. The case raises
hard questions about the state, ownership claims and material reality of
WiFi signals. So, while WiFi sniffing is common and the tools like SitMM
are widely available, it is not always possible for software curious
persons to use them legally or to neatly filter out \"their traffic\"
from that of \"others\".

[When: SitMM can be used any time a software curious person feels the
weight of the (invisible) networks.]{.when .descriptor} [Why: SitMM is
intended to be a tool that gives artists, designers and educators an
easy to use custom WiFi router to work with networks and explore the
aspects of our daily communications that are exposed when we use WiFi.
The goal is to use the output to encourage open discussions about how we
use our devices online.]{.why .descriptor} [Example]{.example .empty
.descriptor}

Snippets of a Something In The Middle, Maybe - Report

` {.verbatim}
UDP 192.168.42.32:53649 -> 8.8.8.8:53
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP/HTTP 17.253.53.208:80 GET http://captive.apple.com/mDQArB9orEii/Xmql6oYqtUtn/f6xY5snMJcW8/CEm0Ioc1d0d8/9OdEOfkBOY4y.html
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP 192.168.42.32:49250 -> 17.253.53.208:80
TCP 192.168.42.32:49250 -> 17.253.53.208:80
UDP 192.168.42.32:63872 -> 8.8.8.8:53
UDP 192.168.42.32:61346 -> 8.8.8.8:53
...
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443
TCP 192.168.42.32:49260 -> 17.134.127.97:443

##################################################
Destination Address: 17.253.53.208
Destination Name: nlams2-vip-bx-008.aaplimg.com

Port: Connection Count
80: 6

##################################################
Destination Address: 17.134.127.79
Destination Name: unknown

Port: Connection Count
443: 2
##################################################
Destination Address: 17.248.145.76
Destination Name: unknown

Port: Connection Count
443: 16
`

[TODO: RELATES TO]{.tmp} []{#ntlimgqy .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.whatisitliketobeanelevator)
What is it like to be AN ELEVATOR?]{.method .descriptor} [What:
Understanding software systems by becoming them]{.what .descriptor}
[TODO: extend this text \.... how to observe software in the world
around you. How to observe an everyday software experience and translate
this into a flowchart )]{.tmp} [How: Creating a flowchart to incarnate a
software system you use everyday]{.how .descriptor} [WARNING: Uninformed
members of the public may panic when confronted with a software
performance in a closed space.]{.warning .descriptor} [Example: What is
it like to be an elevator?]{.example .descriptor}

` {.verbatim}

what
is
it
like
to be
an
elevator?
from 25th floor to 1st floor
light on button light of 25th floor
check current floor
if current floor is 25th floor
no
if current floor is ...
go one floor up
... smaller than 25th floor
go one floor down
... bigger than 25th floor
stop elevator
turn button light off of 25th floor
turn door light on
open door of elevator
play sound opening sequence
yes
start
user pressed button of 25th floor
close door of elevator
if door is closed
user pressed 1st floor button
start timer for door closing
if timer is running more than three seconds
yes
yes
light on button
go one floor down
no
if current floor is 1st floor
update floor indicator
check current floor
stop elevator
no
yes
light off button
turn door light on
open door of elevator
play sound opening sequence
end
update floor indicator
`

[SHOW IMAGE HERE:
http://observatory.constantvzw.org/documents/joseph/flowchart.pdf]{.tmp}
[TODO: RELATES TO]{.tmp} []{#ndg2zte4 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.sidechannel)
Side Channel Analysis]{.method .descriptor} [Urgency: Side Channel
attacks are possible by disregarding the abstraction of software into
pure logic: the physical effects of the running of the software become
backdoors to observe its functioning, both threatening the control of
processes and the re-affirming the materiality of software.]{.urgency
.descriptor} [WARNING: **engineers are good guys!**]{.warning
.descriptor} [Example]{.example .empty .descriptor} [SHOW IMAGE HERE:
https://www.tek.com/sites/default/files/media/image/119-4146-00%20Near%20Field%20Probe%20Set.png.jpg]{.tmp}
[SHOW IMAGE HERE:
http://gallery.constantvzw.org/index.php/Techno-Galactic-Software-Observatory/PWFU3377]{.tmp}
[TODO: RELATES TO]{.tmp} [Collections / collecting]{.grouping}
[]{#njmzmjm1 .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.bestiary)
Compiling a bestiary of software logos]{.method .descriptor} [What:
Since the early days of GNU-linux and cemented through the ubiquitous
O\'Reilly publications, the visual culture of software relies heavily on
animal representations. But what kinds of animals, and to what
effect?]{.what .descriptor} [How]{.how .empty .descriptor}

Compile a collection of logos and note the metaphors for observation: \*
stethoscope \* magnifying glass \* long neck (giraffe)

[Example]{.example .empty .descriptor}

` {.verbatim}
% http://animals.oreilly.com/browse/
% [check Testing the testbed pads for examples]
% [something on bestiaries]
`

[TODO: RELATES TO]{.tmp} []{#njm5zwm4 .anchor} []{#mmy2zgrl .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.testingtestbed)
Testing the testbed: testing software with observatory ambitions
(SWOA)]{.method .descriptor} [WARNING: this method may make more sense
if you first take a look at the [Something in the Middle Maybe
(SitMM)](http://pad.constantvzw.org/p/observatory.guide.sitmm) which is
an instance of a SWOA]{.warning .descriptor} [How: The interwebs hosts
many projects that aim to produce software for observing software, (from
now on Software With Observatory Ambitions (SWOA)). A comparative
methodology can be produced by testing different SWOA to observe
software of interest. Example: use different sniffing software to
observe wireless networks, e.g., wireshark vs tcpdump vs SitMM.
Comparing SWOA reveals what is seen as worthy of observation (e.g., what
protocols, what space, which devices), the granularity of the
observation (e.g., how is the observation captured, in what detail), the
logo and conceptual framework of choice etc. This type of observation
may be turned into a service (See also: Something in the Middle Maybe
(SitMM)).]{.how .descriptor} [When: Ideally, SWOA can be used everywhere
and in every situation. In reality, institutions, laws and
administrators like to limit the use of SWOA on infrastructures to
people who are also administering these networks. Hence, we are
presented with the situation that the use of SWOA is condoned when it is
down by researchers and pen testers (e.g., they were hired) and shunned
when done by others (often subject to name calling as hackers or
attackers).]{.when .descriptor} [What: Deep philosophical moment: most
software has a recursive observatory ambition (it wants to be observed
in its execution, output etc.). Debuggers, logs, dashboards are all
instances of software with observatory ambitions and can not be
separated from software itself. Continuous integration is the act of
folding the whole software development process into one big feedback
loop. So, what separates SWOA from software itself? Is it the intention
of observing software with a critical, agonistic or adversarial
perspective vs one focused on productivity and efficiency that
distinguishes SWOA from software? What makes SWOA a critical practice
over other forms of sotware observation. If our methodology is testing
SWOA, then is it a meta critique of critique?]{.what .descriptor} [Who:
If you can run multiple SWOAs, you can do it. The question is: will
people like it if you turn your gaze on their SWOA based methods of
observation? Once again we find that observation can surface power
asymmetries and lead to defensiveness or desires to escape the
observation in the case of the observed, and a instinct to try to
conceal that observation is taking place.]{.who .descriptor} [Urgency:
If observation is a form of critical engagement in that it surfaces the
workings of software that are invisible to many, it follows that people
would develop software to observe (SWOAs). Testing SWOAs puts this form
of critical observation to test with the desire to understand how what
is made transparent through each SWOA also makes things invisible and
reconfigures power.]{.urgency .descriptor} [Note: Good SWOA software
usually uses an animal as a logo.:D]{.note .descriptor} [WARNING: Many
of the SWOA projects we looked at are promises more than running
software/available code. Much of it is likely to turn into obsolete
gradware, making testing difficult.]{.warning .descriptor} [TODO:
RELATES TO
http://pad.constantvzw.org/p/observatory.guide.bestiary]{.tmp} [TODO:
RELATES TO http://pad.constantvzw.org/p/observatory.guide.sitmm]{.tmp}
[]{#mmmzmmrh .anchor}
[[Method:](http://pad.constantvzw.org/p/observatory.guide.reader)
Prepare a reader to think theory with software]{.method .descriptor}
[What: Compile a collection of texts about software.]{.what .descriptor}
[How: Choose texts from different realms. Software observations are
mostly done in the realm of the technological and the pragmatic. Also
the ecology of texts around software includes first and foremost
manuals, technical documentation and academic papers by software
engineers and these all \'live\' in different realms. More recently, the
field of software studies opened up additional perspectives fuelled by
cultural studies and sometimes filosophy. By compiling a reader \...
ways of speaking/writing about. Proximity.]{.how .descriptor}
[Example]{.example .empty .descriptor}

` {.verbatim .wrap}
Pull some quotes from the reader, for example from the chapter: Observation and its consequences

Lilly Irani, Hackathons and the Making of Entrepreneurial Citizenship, 2015 http://sci-hub.bz/10.1177/0162243915578486

Kara Pernice (Nielsen Norman Group), Talking with Participants During a Usability Test, January 26, 2014, https://www.nngroup.com/articles/talking-to-users/

Matthew G. Kirschenbaum, Extreme Inscription: Towards a Grammatology of the Hard Drive. 2004 http://texttechnology.mcmaster.ca/pdf/vol13_2_06.pdf

Alexander R. Galloway, The Poverty of Philosophy: Realism and Post-Fordism, Critical Inquiry. 2013, http://cultureandcommunication.org/galloway/pdf/Galloway,%20Poverty%20of%20Philosophy.pdf
Edward Alcosser, James P. Phillips, Allen M. Wolk, How to Build a Working Digital Computer. Hayden Book Company, 1968. https://archive.org/details/howtobuildaworkingdigitalcomputer_jun67

Matthew Fuller, "It looks like you're writing a letter: Microsoft Word", Nettime, 5 Sep 2000. https://library.memoryoftheworld.org/b/xpDrXE_VQeeuDDpc5RrywyTJwbzD8eatYGHKmyT2A_HnIHKb

Barbara P. Aichinger, DDR Memory Errors Caused by Row Hammer. 2015 www.memcon.com/pdfs/proceedings2015/SAT104_FuturePlus.pdf

Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee. Last-Level Cache Side-Channel Attacks are Practical. 2015 http://palms.ee.princeton.edu/system/files/SP_vfinal.pdf
`

[TODO: RELATES TO
http://pad.constantvzw.org/p/observatory.guide.samequestion]{.tmp}
[]{#ytjmmmni .anchor}

Colophon

The Guide to techno-galactic software observing was compiled by Carlin
Wing, Martino Morandi, Peggy Pierrot, Anita, Christoph Haag, Michael
Murtaugh, Femke Snelting

License: Free Art License

Support:

Sources:

Constant, February 2018

::: {.footnotes}
1. [[[Haraway]{.fname}, [Donna]{.gname}, [Galison]{.fname},
[Peter]{.gname} and [Stump]{.fname}, [David J]{.gname}: [Modest
Witness: Feminist Diffractions in Science Studies]{.title},
[Stanford University Press]{.publisher}, [1996]{.date}.
]{.collection} [-\>](#eeffecbe)]{#ebceffee}
2. [Worksessions are intensive transdisciplinary moments, organised
twice a year by Constant. They aim to provide conditions for
participants with different experiences and capabilities to
temporarily link their practice and to develop ideas, prototypes and
research projects together. For the worksessions, primarily Free,
Libre and Open Source software is used and material that is
available under ??? [-\>](#fcdcaacb)]{#bcaacdcf}
3. [http://www.nam-ip.be [-\>](#ffeaecaa)]{#aaceaeff}
4. [http://www.etwie.be/database/actor/computermuseum-ku-leuven
[-\>](#dbabebfa)]{#afbebabd}
5. [[contributors]{.fname}, [Wikipedia]{.gname}: [Content-control
software --- Wikipedia, The Free Encyclopedia]{.title},
[2018]{.date}. [-\>](#fadefecf)]{#fcefedaf}
6. [[UrbanMinistry.org]{.fname}, [TechMission]{.gname}:
[SafeFamilies.org \| Accountability Software: Encyclopedia of Urban
Ministry]{.title}, [2018]{.date}. [-\>](#faebbffb)]{#bffbbeaf}
7. [[Content Watch Holdings]{.fname}, [Inc]{.gname}: [Protecting Your
Family]{.title}, [2018]{.date}. [-\>](#afcbcfbb)]{#bbfcbcfa}
8. [[websense.com]{.fname}, []{.gname}: [Explicit and transparent proxy
deployments]{.title}, [2012]{.date}. [-\>](#edbedede)]{#ededebde}
9. [[workrave.org]{.fname}, []{.gname}: [Frequently Asked
Questions]{.title}, [2018]{.date}. [-\>](#ddfbbbfc)]{#cfbbbfdd}
10. [[contributors]{.fname}, [Wikipedia]{.gname}: [Agile software
development --- Wikipedia, The Free Encyclopedia]{.title},
[2018]{.date}. [-\>](#ececbabd)]{#dbabcece}
11. [[contributors]{.fname}, [Wikipedia]{.gname}: [Scrum (software
development) --- Wikipedia, The Free Encyclopedia]{.title},
[2018]{.date}. [-\>](#caabcfee)]{#eefcbaac}
12. [[contributors]{.fname}, [Wikipedia]{.gname}: [The Manifesto for
Agile Software Development]{.title}, [2018]{.date}.
[-\>](#baffeabf)]{#fbaeffab}
13. [[Kruchten]{.fname}, [Philippe]{.gname}: [Agile's Teenage
Crisis?]{.title}, [2011]{.date}. [-\>](#faeebade)]{#edabeeaf}
:::
 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.