Dockray
Interface Access Loss
2013


Interface Access Loss

I want to begin this talk at the end -- by which I mean the end of property - at least according to
the cyber-utopian account of things, where digital file sharing and online communication liberate
culture from corporations and their drive for profit. This is just one of the promised forms of
emancipation -- property, in a sense, was undone. People, on a massive scale, used their
computers and their internet connections to share digitized versions of their objects with each
other, quickly producing a different, common form of ownership. The crisis that this provoked is
well-known -- it could be described in one word: Napster. What is less recognized - because it is
still very much in process - is the subsequent undoing of property, of both the private and common
kind. What follows is one story of "the cloud" -- the post-dot-com bubble techno-super-entity -which sucks up property, labor, and free time.

Object, Interface

It's debated whether the growing automation of production leads to global structural
unemployment or not -- Karl Marx wrote that "the self-expansion of capital by means of machinery
is thenceforward directly proportional to the number of the workpeople, whose means of
livelihood have been destroyed by that machinery" - but the promise is, of course, that when
robots do the work, we humans are free to be creative. Karl Kautsky predicted that increasing
automation would actually lead, not to a mass surplus population or widespread creativity, but
something much more mundane: the growth of clerks and bookkeepers, and the expansion of
unproductive sectors like "the banking system, the credit system, insurance empires and
advertising."

Marx was analyzing the number of people employed by some of the new industries in the middle
of the 19th century: "gas-works, telegraphy, photography, steam navigation, and railways." The
facts were that these industries were incredibly important, expansive and growing, highly
mechanized.. and employed a very small number of people. It is difficult not to read his study of
these technologies of connection and communication - against the background of our present
moment, in which the rise of the Internet has been accompanied by the deindustrialization of
cities, increased migrant and mobile labor, and jobs made obsolete by computation.

There are obvious examples of the impact of computation on the workplace: at factories and
distribution centers, robots engineered with computer-vision can replace a handful of workers,
with a savings of millions of dollars per robot over the life of the system. And there are less
apparent examples as well, like algorithms determining when and where to hire people and for
how long, according to fluctuating conditions.
Both examples have parallels within computer programming, namely reuse and garbage
collection. Code reuse refers to the practice of writing software in such a way that the code can be
used again later, in another program, to perform the same task. It is considered wasteful to give the
same time, attention, and energy to a function, because the development environment is not an
assembly line - a programmer shouldn't repeat. Such repetition then gives way to copy-andpasting (or merely calling). The analogy here is to the robot, to the replacement of human labor
with technology.

Now, when a program is in the midst of being executed, the computer's memory fills with data -but some of that is obsolete, no longer necessary for that program to run. If left alone, the memory
would become clogged, the program would crash, the computer might crash. It is the role of the
garbage collector to free up memory, deleting what is no longer in use. And here, I'm making the
analogy with flexible labor, workers being made redundant, and so on.

In Object-Oriented Programming, a programmer designs the software that she is writing around
“objects,” where each object is conceptually divided into “public” and “private” parts. The public
parts are accessible to other objects, but the private ones are hidden to the world outside the
boundaries of that object. It's a “black box” - a thing that can be known through its inputs and
outputs - even in total ignorance of its internal mechanisms. What difference does it make if the
code is written in one way versus an other .. if it behaves the same? As William James wrote, “If no
practical difference whatever can be traced, then the alternatives mean practically the same thing,
and all dispute is idle.”

By merely having a public interface, an object is already a social entity. It makes no sense to even
provide access to the outside if there are no potential objects with which to interact! So to

understand the object-oriented program, we must scale up - not by increasing the size or
complexity of the object, but instead by increasing the number and types of objects such that their
relations become more dense. The result is an intricate machine with an on and an off state, rather
than a beginning and an end. Its parts are interchangeable -- provided that they reliably produce
the same behavior, the same inputs and outputs. Furthermore, this machine can be modified:
objects can be added and removed, changing but not destroying the machine; and it might be,
using Gerald Raunig’s appropriate term, “concatenated” with other machines.

Inevitably, this paradigm for describing the relationship between software objects spread outwards,
subsuming more of the universe outside of the immediate code. External programs, powerful
computers, banking institutions, people, and satellites have all been “encapsulated” and
“abstracted” into objects with inputs and outputs. Is this a conceptual reduction of the richness
and complexity of reality? Yes, but only partially. It is also a real description of how people,
institutions, software, and things are being brought into relationship with one another according to
the demands of networked computation.. and the expanding field of objects are exactly those
entities integrated into such a network.

Consider a simple example of decentralized file-sharing: its diagram might represent an objectoriented piece of software, but here each object is a person-computer, shown in potential relation
to every other person-computer. Files might be sent or received at any point in this machine,
which seems particularly oriented towards circulation and movement. Much remains private, but a
collection of files from every person is made public and opened up to the network. Taken as a
whole, the entire collection of all files - which on the one hand exceeds the storage capacity of
any one person’s technical hardware, is on the other hand entirely available to every personcomputer. If the files were books.. then this collective collection would be a public library.

In order for a system like this to work, for the inputs and the outputs to actually engage with one
another to produce action or transmit data, there needs to be something in place already to enable
meaningful couplings. Before there is any interaction or any relationship, there must be some
common ground in place that allows heterogenous objects to ‘talk to each other’ (to use a phrase
from the business casual language of the Californian Ideology). The term used for such a common
ground - especially on the Internet - is platform, a word for that which enables and anticipates

future action without directly producing it. A platform provides tools and resources to the objects
that run “on top” of the platform so that those objects don't need to have their own tools and
resources. In this sense, the platform offers itself as a way for objects to externalize (and reuse)
labor. Communication between objects is one of the most significant actions that a platform can
provide, but it requires that the objects conform some amount of their inputs and outputs to the
specifications dictated by the platform.

But haven’t I only introduced another coupling, instead of between two objects, this time between
the object and the platform? What I'm talking about with "couplings" is the meeting point between
things - in other words, an “interface.” In the terms of OOP, the interface is an abstraction that
defines what kinds of interaction are possible with an object. It maps out the public face of the
object in a way that is legible and accessible to other objects. Similarly, computer interfaces like
screens and keyboards are designed to meet with human interfaces like fingers and eyes, allowing
for a specific form of interaction between person and machine. Any coupling between objects
passes through some interface and every interface obscures as much as it reveals - it establishes
the boundary between what is public and what is private, what is visible and what is not. The
dominant aesthetic values of user interface design actually privilege such concealment as “good
design,” appealing to principles of simplicity, cleanliness, and clarity.
Cloud, Access

One practical outcome of this has been that there can be tectonic shifts behind the interface where entire systems are restructured or revolutionized - without any interruption, as long as the
interface itself remains essentially unchanged. In Pragmatism’s terms, a successful interface keeps
any difference (in back) from making a difference (in front). Using books again as an example: for
consumers to become accustomed to the initial discomfort of purchasing a product online instead
of from a shop, the interface needs to make it so that “buying a book” is something that could be
interchangeably accomplished either by a traditional bookstore or the online "marketplace"
equivalent. But behind the interface is Amazon, which through low prices and wide selection is
the most visible platform for buying books and uses that position to push retailers and publishers
both to, at best, the bare minimum of profitability.

In addition to selling things to people and collecting data about its users (what they look at and
what they buy) to personalize product recommendations, Amazon has also made an effort to be a
platform for the technical and logistical parts of other retailers. Ultimately collecting data from
them as well, Amazon realizes a competitive advantage from having a comprehensive, up-to-theminute perspective on market trends and inventories. This volume of data is so vast and valuable
that warehouses packed with computers are constructed to store it, protect it, and make it readily
available to algorithms. Data centers, such as these, organize how commodities circulate (they run
business applications, store data about retail, manage fulfillment) but also - increasingly - they
hold the commodity itself - for example, the book. Digital book sales started the millennium very
slowly but by 2010 had overtaken hardcover sales.

Amazon’s store of digital books (or Apple’s or Google’s, for that matter) is a distorted reflection of
the collection circulating within the file-sharing network, displaced from personal computers to
corporate data centers. Here are two regimes of digital property: the swarm and the cloud. For
swarms (a reference to swarm downloading where a single file can be downloaded in parallel
from multiple sources) property is held in common between peers -- however, property is
positioned out of reach, on the cloud, accessible only through an interface that has absorbed legal
and business requirements.

It's just half of the story, however, to associate the cloud with mammoth data centers; the other
half is to be found in our hands and laps. Thin computing, including tablets and e-readers, iPads
and Kindles, and mobile phones have co-evolved with data centers, offering powerful, lightweight
computing precisely because so much processing and storage has been externalized.

In this technical configuration of the cloud, the thin computer and the fat data center meet through
an interface, inevitably clean and simple, that manages access to the remote resources. Typically,
a person needs to agree to certain “terms of service,” have a unique, measurable account, and
provide payment information; in return, access is granted. This access is not ownership in the
conventional sense of a book, or even the digital sense of a file, but rather a license that gives the
person a “non-exclusive right to keep a permanent copy… solely for your personal and noncommercial use,” contradicting the First Sale Doctrine, which gives the “owner” the right to sell,
lease, or rent their copy to anyone they choose at any price they choose. The doctrine,

established within America's legal system in 1908, separated the rights of reproduction, from
distribution, as a way to "exhaust" the copyright holder's control over the commodities that people
purchased.. legitimizing institutions like used book stores and public libraries. Computer software
famously attempted to bypass the First Sale Doctrine with its "shrink wrap" licenses that restricted
the rights of the buyer once she broke through the plastic packaging to open the product. This
practice has only evolved and become ubiquitous over the last three decades as software began
being distributed digitally through networks rather than as physical objects in stores. Such
contradictions are symptoms of the shift in property regimes, or what Jeremy Rifkin called “the age
of access.” He writes that “property continues to exist but is far less likely to be exchanged in
markets. Instead, suppliers hold on to property in the new economy and lease, rent, or charge an
admission fee, subscription, or membership dues for its short-term use.”

Thinking again of books, Rifkin’s description gives the image of a paid library emerging as the
synthesis of the public library and the marketplace for commodity exchange. Considering how, on
the one side, traditional public libraries are having their collections deaccessioned, hours of
operation cut, and are in some cases being closed down entirely, and on the other side, the
traditional publishing industry finds its stores, books, and profits dematerialized, the image is
perhaps appropriate. Server racks, in photographs inside data centers, strike an eerie resemblance
to library stacks - - while e-readers are consciously designed to look and feel something like a
book. Yet, when one peers down into the screen of the device, one sees both the book - and the
library.

Like a Facebook account, which must uniquely correspond to a real person, the e-reader is an
individualizing device. It is the object that establishes trusted access with books stored in the cloud
and ensures that each and every person purchases their own rights to read each book. The only
transfer that is allowed is of the device itself, which is the thing that a person actually does own.
But even then, such an act must be reported back to the cloud: the hardware needs to be deregistered and then re-registered with credit card and authentication details about the new owner.

This is no library - or it's only a library in the most impoverished sense of the word. It is a new
enclosure, and it is a familiar story: things in the world (from letters, to photographs, to albums, to
books) are digitized (as emails, JPEGs, MP3s, and PDFs) and subsequently migrate to a remote

location or service (Gmail, Facebook, iTunes, Kindle Store). The middle phase is the biggest
disruption, when the interface does the poorest job concealing the material transformations taking
place, when the work involved in creating those transformations is most apparent, often because
the person themselves is deeply involved in the process (of ripping vinyl, for instance). In the third
phase, the user interface becomes easier, more “frictionless,” and what appears to be just another
application or folder on one’s computer is an engorged, property-and-energy-hungry warehouse a
thousand miles away.

Capture, Loss

Intellectual property's enclosure is easy enough to imagine in warehouses of remote, secure hard
drives. But the cloud internalizes processing as well as storage, capturing the new forms of cooperation and collaboration characterizing the new economy and its immaterial labor. Social
relations are transmuted into database relations on the "social web," which absorbs selforganization as well. Because of this, the cloud impacts as strongly on the production of
publications, as on their consumption, in the tradition sense.

Storage, applications, and services offered in the cloud are marketed for consumption by authors
and publishers alike. Document editing, project management, and accounting are peeled slowly
away from the office staff and personal computers into the data centers; interfaces are established
into various publication channels from print on demand to digital book platforms. In the fully
realized vision of cloud publishing, the entire technical and logistical apparatus is externalized,
leaving only the human labor.. and their thin devices remaining. Little distinguishes the authorobject from the editor-object from the reader-object. All of them.. maintain their position in the
network by paying for lightweight computers and their updates, cloud services, and broadband
internet connections.
On the production side of the book, the promise of the cloud is a recovery of the profits “lost” to
file-sharing, as all that exchange is disciplined, standardized and measured. Consumers are finally
promised the access to the history of human knowledge that they had already improvised by
themselves, but now without the omnipresent threat of legal prosecution. One has the sneaking
suspicion though.. that such a compromise is as hollow.. as the promises to a desperate city of the

jobs that will be created in a new constructed data center - - and that pitting “food on the table”
against “access to knowledge” is both a distraction from and a legitimation of the forms of power
emerging in the cloud. It's a distraction because it's by policing access to knowledge that the
middle-man platform can extract value from publication, both on the writing and reading sides of
the book; and it's a legitimation because the platform poses itself as the only entity that can resolve
the contradiction between the two sides.

When the platform recedes behind the interface, these two sides are the the most visible
antagonism - in a tug-of-war with each other - - yet neither the “producers” nor the “consumers” of
publications are becoming more wealthy, or working less to survive. If we turn the picture
sideways, however, a new contradiction emerges, between the indebted, living labor - of authors,
editors, translators, and readers - on one side, and on the other.. data centers, semiconductors,
mobile technology, expropriated software, power companies, and intellectual property.
The talk in the data center industry of the “industrialization” of the cloud refers to the scientific
approach to improving design, efficiency, and performance. But the term also recalls the basic
narrative of the Industrial Revolution: the movement from home-based manufacturing by hand to
large-scale production in factories. As desktop computers pass into obsolescence, we shift from a
networked, but small-scale, relationship to computation (think of “home publishing”) to a
reorganized form of production that puts the accumulated energy of millions to work through
these cloud companies and their modernized data centers.

What kind of buildings are these blank superstructures? Factories for the 21st century? An engineer
named Ken Patchett described the Facebook data center that way in a television interview, “This is
a factory. It’s just a different kind of factory than you might be used to.” Those factories that we’re
“used to,” continue to exist (at Foxconn, for instance) producing the infrastructure, under
recognizably exploitative conditions, for a “different kind of factory,” - a factory that extends far
beyond the walls of the data center.

But the idea of the factory is only part of the picture - this building is also a mine.. and the
dispersed workforce devote most of their waking hours to mining-in-reverse, packing it full of data,
under the expectation that someone - soon - will figure out how to pull out something valuable.

Both metaphors rely on the image of a mass of workers (dispersed as it may be) and leave a darker
and more difficult possibility: the data center is like the hydroelectric plant, damming up property,
sociality, creativity and knowledge, while engineers and financiers look for the algorithms to
release the accumulated cultural and social resources on demand, as profit.

This returns us to the interface, site of the struggles over the management and control of access to
property and infrastructure. Previously, these struggles were situated within the computer-object
and the implied freedom provided by its computation, storage, and possibilities for connection
with others. Now, however, the eviscerated device is more interface than object, and it is exactly
here at the interface that the new technological enclosures have taken form (for example, see
Apple's iOS products, Google's search box, and Amazon's "marketplace"). Control over the
interface is guaranteed by control over the entire techno-business stack: the distributed hardware
devices, centralized data centers, and the software that mediates the space between. Every major
technology corporation must now operate on all levels to protect against any loss.

There is a centripetal force to the cloud and this essay has been written in its irresistible pull. In
spite of the sheer mass of capital that is organized to produce this gravity and the seeming
insurmountability of it all, there is no chance that the system will absolutely manage and control
the noise within it. Riots break out on the factory floor; algorithmic trading wreaks havoc on the
stock market in an instant; data centers go offline; 100 million Facebook accounts are discovered
to be fake; the list will go on. These cracks in the interface don't point to any possible future, or
any desirable one, but they do draw attention to openings that might circumvent the logic of
access.

"What happens from there is another question." This is where I left things off in the text when I
finished it a year ago. It's a disappointing ending: we just have to invent ways of occupying the
destruction, violence and collapse that emerge out of economic inequality, global warming,
dismantled social welfare, and so on. And there's not much that's happened since then to make us
very optimistic - maybe here I only have to mention the NSA. But as I began with an ending, I
really should end at a beginning.
I think we were obliged to adopt a negative, critical position in response the cyber-utopianism of

the last almost 20 years, whether in its naive or cynical forms. We had to identify and theorize the
darker side of things. But it can become habitual, and when the dark side materializes, as it has
over the past few years - so that everyone knows the truth - then the obligation flips around,
doesn't it? To break out of habitual criticism as the tacit, defeated acceptance of what is. But, what
could be? Where do we find new political imaginaries? Not to ask what is the bright side, or what
can we do to cope, but what are the genuinely emancipatory possibilities that are somehow still
latent, buried under the present - or emerging within those ruptures in it? - - - I can't make it all
the way to a happy ending, to a happy beginning, but at least it's a beginning and not the end.

Dockray
Openings and Closings
2013


Militarization of campuses

Early, on a recent November morning, 400 Military Police with tear gas and helicopters arrested 72 people, almost all students of the University of Sao Paulo. Those people were occupying the Rectory in response to an other arrest – of 3 fellow students – which was itself a consequence of the contract that the university administration signed with the MP, an agreement inviting the police back onto campus after decades in which this presence was essentially prohibited. University “autonomy” had been established by Article 207 of the 1988 Brazilian Constitution to close a chapter on Brazil’s military rule, during which time the Military Police enforced a series of decrees aimed at eliminating opposition to the dictatorship, including the local articulation of the 1960’s student movement. The 1964 Suplicy de Lacerda law forbade student organizations from engaging in politics; in 1968, Institutional Act No. 5 did away with the writ of habeus corpus; and Decree 477 a year later gave university and education authorities the right to expel students and professors involved in protests. A similar provision of “university asylum” restricted the access of policemen onto Greece’s campuses for 35 years. Like Brazil, this measure was adopted after the fall of a military regime that had violently crushed student uprisings and, like Brazil, this prohibition on police incursions into campuses collapsed in 2011. Greek politicians abolished the law in order to more effectively implement austerity measures imposed by European financial interests. Ten days after the raid at the University of Sao Paulo, the chancellor of the University of California, Davis ordered police to clear a handful of tents from a campus quadrangle. Because the peaceful demonstration was planned in solidarity with other actions on UC campuses drawing inspiration from the “occupy movement,” police force swiftly and forcefully dismantled the encampment. Students were pepper-­‐sprayed at close range by a well-­‐armored policeman wearing little concern. Such examples of the militarization of university campuses have become more common, especially in the context of growing social unrest. In California, they demonstrate the continued influence of Ronald Reagan, not simply for implementing neoliberal policies that have slashed public programs, produced a trillion dollars in US student loan debt and contracted the middle class; but also for campaigning in 1966 for governor of California on a promise to crack down on campus activists, making partnerships with conservative school officials and the FBI in order to “clean out left-­‐wing elements” from the University of California. Linda Katehi – that UC Davis chancellor – was also an author of a 2011 report that recommended terminating university asylum to the Greek government. The report noted that “the politicization of students… represents a beyond-­‐reasonable involvement in the political process,” continuing on to state that “Greek University campuses are not secure” because of “elements that seek political instability.”

Mobilization of books

After the Military Police operation in Sao Paulo, the rector appeared on television to accuse the students of preparing Molotov cocktails; independent media, on the other hand, described the students carrying left-­‐wing books. Even more recently at UC Riverside, a contingent faculty member holding a cardboard shield that was painted to look like the cover of Figures of the Thinkable, by Cornelius Castoriadis, was dragged across the pavement by police and charged with a felony, “assault with a deadly weapon.” In Berkeley, students covered a plaza in books, open and facedown, after their tent occupation was broken up. Many of the crests and seals of universities feature a book, no doubt drawing on the book as both a symbol of knowledge and an actual repository for it. And by extension, books have been mobilized at various moments in recent occupations and protests to make material reference to education and the metastasizing knowledge economy. No doubt the use of radical theory literalizes an attempt to bridge theory and practice, while evoking a utopian imaginary, or simply taking Deleuze’s words at face value: “There is no need to fear or hope, but only to look for new weapons.” Against a background of library closures and cutbacks, as well as the concomitant demands for the humanities and social sciences to justify themselves in economic terms, it is as if books have come into view, desperately, like a rat in daylight. There is almost nowhere for them to go – the space in the remaining libraries is being given over to audio-­‐visual material, computer terminals, public programming, and cafes, while publishers are shifting to digital distribution models that are designed to circumvent libraries entirely. So books have come out onto the street. Militarization of Books When knowledge does escape the jurisdiction of both the state and the market, it’s often at the hands of students (both the officially enrolled and the autodidacts). For example, returning to Brazil, the average cost of required reading material for a freshman is more than six months of minimum wage pay, with up to half of the texts not available in Brazil or simply out of print. Unsurprisingly, a system of copy shops provides on-­‐demand chapters, course readers, and other texts; but the Brazilian Association of Reprographic Rights has been particularly hostile to the practice. One year before Sao Paulo, at the Federal University in Rio de Janeiro, seven armed police officers in three cars (accompanied by the Chief of the Delegation for the Repression of Immaterial Property Crimes) raided the Xerox room of the School of Social Work, arresting the operator of the machines and confiscating all illegitimate copies. Similar shows of force have proliferated ever since Brazilian copyright law was amended in 1998 to eliminate the exceptions that had previously afforded the right to copy books for educational purposes. This act of reproduction, felt by students and faculty to be inextricably linked to university autonomy and the right to education, coalesced into a movement by 2006, Copiar Livro é Direito! (Copying Books is a Right!) Illicit copies, when confiscated, usually are destroyed. In this sense, it is worthwhile to understand such an event as a contemporary form of censorship, certainly not out of any ideological disapproval of the publication’s actual content, but rather an objection to the manner of its circulation. Many books banned (and burned) during the dictatorship were obviously a matter of content – those that could “destroy society’s moral base” might “put into practice a subversive plan that places national security in danger.” Even if explicit sexuality, crime, and drug use within literature are generally tolerated today (not everywhere, of course) the rhetoric contained within the 1970 decree that instituted censorship is still alive in matters of circulation. During negotiations for the multi-­‐national Anti-­‐Counterfeiting Trade Agreement (ACTA), the Bush and Obama administrations denied the public information, stating that it was “properly classified in the interest of national security.” Certain parts of the negotiations became known through Wikileaks and ACTA was revealed as a vehicle for exporting American intellectual property enforcement. Protecting intellectual property is essential, politicians claim, to maintaining the American “way of life,” although today this has less to do with the moral base of the country than the economic base – workers and corporations. America, Obama said in reference to ACTA, would use the “full arsenal of tools available to crack down on practices that blatantly harm our businesses.” Universities, those institutions for the production of knowledge, are deeply embedded in struggles over intellectual property, and moreover deployed as instruments of national security. The National Security Higher Education Advisory Board, which includes (surprise) Linda Katehi, brings together select university presidents and chancellors with the FBI, CIA, and other agencies several times per year. Developed to address intellectual property at the level of cyber-­‐theft (preventing sensitive research from falling into the hands of terrorists) the congenial relationship between university administrations and the FBI raises the spectre of US government spying on student activists in the 1960’s and early 1970’s. Financialization of publishing To the side of such partnerships with the state, the forces of financialization have been absorbed into universities, again with the welcome of administrations. Towering US student loan debt is one very clear index; another, less apparent, but growing, is the highly controlled circulation of academic publishing, especially journals and textbooks. Although apparently marginal (or niche) in topic, the vertical structure of the corporations behind most journals is surprisingly large. The Dutch company Elsevier, for example, publishes 250,000 articles per year, and earned $1.6 billion (a profit margin of 36%) in 2010. Texts are written, peer reviewed, and edited on a voluntary basis (usually labor costs are externalized, for example to the state or university). They are sold back to university libraries at extraordinarily high prices, and the libraries are obliged to pay because their constituency relies on access to research as a material for further research. When the website library.nu was taken-­‐down recently for providing access to over 400,000 digital texts, it was not the major “commercial” publishers that were behind the action, but a coalition of 17 educational publishers, including Elsevier, Springer, Taylor and Francis, the Cambridge University Press, and Macmillan. On the heels of FBI raids on prominent torrent sites, and with a similar level of coordination, this publishers’ alliance hired private investigators to deploy software “specifically developed by IT experts” to secure evidence. In order to expand their profitability, corporate academic publishers exploit and reinforce entrenched hierarchies within the academia. Compensation comes in the forms of CV lines and disciplinary visibility; and it is that very validation that individuals need to find and secure employment at research institutions. “Publish or die” is not anything new, but as employment grows increasingly temporary and managerial systems for assessment and quantifying productivity proliferate, it has grown more ominous. Beyond intensifying internal hierarchies, this publishing situation has widened the gap between the university and the rest of the world (even as it subjects the exchange of knowledge to the logic of the stock market); publications are meant for current students and faculty only, and their legitimacy is regularly checked against ID cards, passwords, and other credentials. One without such legitimacy finds themselves on the wrong side of a paywall. Here, we discover the quotidian dimension to the militarization of the university, in the inconveniences of proximity cards, accounts, and login screens. If our contemporary forms of censorship are focused on the manner of a thing’s circulation, then systems of control would be oriented towards policing access. Reprographic machines and file-­‐sharing software are obvious targets but, with the advent of tablet computers (such as Apple’s iPad, marketed heavily towards students), so are actual textbooks. The practice of reselling textbooks, a yearly student money-­‐saving ritual that is perfectly legal under the first-­‐sale doctrine, has long represented lost revenue to publishers. So many, including MacMillan and McGraw-­‐Hill, have moved strongly into the e-­‐textbook market, which allows them to shut the door on the secondary market because students are no longer buying the things themselves, but only temporary access to the things.

Opening of Access

Open Access publishing articulates an alternative, in order to circumvent the entire parasitical apparatus and ultimately deliver texts to readers and researchers for free. In large part, its success depends on whether or not researchers choose to publish their work with OA journals or with pay-­‐for-­‐access ones. If many have chosen the latter, it is because of factors like reputation and the interrelation between publishing and departmental structures of advancement and power. Interestingly, it is institutions with the strongest reputations that are also pushing for more ‘openness.’ Princeton University formally adopted an open-­‐access policy in 2011 (the sixth Ivy League school to do so) in order to discourage the “fruits of [their] scholarship” from languishing “artificially behind a pay wall.” MIT has long promoted openness of its materials, from OpenCourseWare (2002) to its own Open Access policy (2009), to a new online learning infrastructure, MITx. Why is it that elite, private schools are so motivated to open themselves to the world? Would this not dilute their status? The answer is obvious: opening up their research gives their faculty more exposure; it produces a positive image of an institution that is generous and genuinely interested in generating knowledge; and ultimately it builds the university’s brand. They are not giving away degrees and certainly not research positions – rather they are mobilizing their intellectual capital to attract publicity, students, donations, and contracts. We can guess what ‘opening up the university’ means for the institution and the faculty, but what about for the students, including those who may not have the proper title, those learners not enrolled? MITx is an adaptation of the common practice of distance learning, which has a century-­‐and-­‐a-­‐half long history, beginning with the University of London’s External Programme. There are populist overtones (Charles Dickens called the External Programme the “People’s University”) to distance learning that coincide with the promises of public education more generally, namely making higher education available to those traditionally without means for it. History has provided us with less than desirable motivations for distance education – the Free University of Iran was said to have been desirable to the Shah’s regime because the students would never gather – but current western programs are influenced by other concerns. Beyond publicity and social conscience, many of these online learning programs are driven by economics. At the University of California, the Board of Regents launched a pilot program as part of a plan to close a 4.7 billion dollar budget gap, with the projection that such a program could add 25,000 students at 1.1% of the normal cost. Aside from MITx’s free component (it brings in revenue as well if people want to actually get “credit”) most of these distance-­‐learning offerings are immaterial commodities. UCLA Extension is developing curricula and courses for Encore Career Institute, a for-­‐profit venture bringing together Hollywood, Silicon Valley, and a chairwoman of the UC Regents, whose goal is to “deliver some of the fantastic intellectual property that UC has.” And even MITx is not without its restricted-­‐access bedfellows; its pilot online course requires a textbook, which is owned by Elsevier. Students are here conceived of truly as consumers of product, and education has become a subgenre of publication. The classroom and library are seen as inefficient mechanisms for delivering education to the masses or, for that matter, for the delivering the masses to creditors, advertisers, and content providers. Clearly, classrooms will continue to exist, especially in the centers for the reproduction of the elite, such as those proponents of Open Access previously mentioned. But everywhere else, post-­‐ classroom (and post-­‐library) education is exploding. Students do not gather here and they certainly don’t sit-­‐in or take over buildings; they don’t argue outside during a break, over a cigarette, nor do they pass books between themselves. I am not, however, a fatalist on this point – these may be networks of access managed by capital and policed by the state, but new collective forms and subjectivities are already emerging, exploiting or evading the logic of accounts, passwords, and access. They find each other across borders and across disciplines.

Negating Access

After the capitalist restructuring of the 1970s and 1980s, how do we understand the scenes of people clashing with police formations; the revival of campus occupations as a tactic; the disappearance of university autonomy; the withdrawal of learning into the disciplined walls of the academy; in short, how do we understand a situation that appears quite like before? One way – the theme of this essay – would be through the notion of “access.” If access has moved from a question of rights (who has access?) to a matter of legality and economics (what are the terms and price for access, for a particular person?) then over the past few decades we have witnessed access being turned inside-­‐out, in a manner reminiscent of Marx’s “double freedom” of the proletariat: having access to academic resources while not being able to access each other. Library cards, passwords, and keys are assigned to individuals; and so are contracts, degrees, loans, and grades. Students (and faculty) are individuated at every turn, perhaps no more clearly than in online learning where each body collapses into their own profile. Access is not so much a passage into a space as it is an apparatus enclosing the individual. (In this sense, Open Access is one configuration of this apparatus). Two projects that I have worked within over the past 7 years – a file-­‐sharing website for texts, AAAARG.ORG, and a proposal-­‐based learning platform, The Public School – are ongoing efforts in escaping this regime of access in order to create some room to actually understand all of these conditions, their connection to larger processes, and the possibilities for future action. The Public School has no curriculum, no degrees, and nothing to do with the public school system. It is simply a framework within which people propose ideas for things they want to learn about with others; a rotating committee might organize this proposal into an actual class, bringing together a group of strangers and friends who find a way to teach each other. AAAARG.ORG is a collective library comprised of scans, excerpts, and exports that members of its public have found important enough to share with each other. They are premised, in part, on the proposition that making these kinds of spaces is an active, contingent process requiring the coordination, invention, and self-­‐ reflection of many people over time. The creation of these kinds of spaces involves a negation of access, often bringing conflict to the surface. What this means is that the spaces are not territories on which pedagogy happens, but rather that the collective activity of making and defending these spaces is pedagogical.

In the militarized raids of campus occupations and knowledge-­‐sharing assemblages, the state is acting to both produce and defend a structure that generates wealth from the process of education. While there are occasional clashes over content, usually any content is acceptable that circulates through this structure, and the very failure to circulate (to attract grant funding, attention, or feedback) becomes the operative, soft form of suppression. A resistant pedagogy should look for openings – and if they don’t exist, break them open – where space grows from a refusal of access and circulation, borders and disciplines; from an improvised diffusion that generates its own laws and dynamics. But a cautionary note – any time new social relations are born out of such an opening in space and time, a confrontation with power is not far behind.

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.