monoskop in Sekulic 2018


sponsibility to share with those who do not; “with enough
of us, around the world, we'll not just send a strong message opposing the
privatization of knowledge — we'll make it a thing of the past. Will you join
us?” (8) He pointed to an important issue – every new cycle of technological
development (in this case the move from paper to digital) brings a new threat
of enclosure of the knowledge in the public domain.

While “the core and the periphery adopt different strategies of opposition to
the inequalities and exclusions [digital] technologies start to reproduce”
some technologies used by corporations to enclose can be used to liberate
knowledge and make it accessible. The existence of projects such as Library
Genesis, sci-hub, Public Library/Memory of the World, aaaarg.org, monoskop,
and ubuweb, commonly known as shadow libraries, show how building
infrastructure for storing, indexing, and access, as well as supporting
digitization, can not only be put to use by the periphery, but used as a
challenge to the normalization of enclosure offered by the core. The people
building alternative networks of distribution also build networks of support
and solidarity. Those on the peripheries need to 'steal' the knowledge behind
paywalls in order to fight the asymmetries paywalls enforce – peripheries
“steal” in order to advance. Depending on the vantage point, digitization of a
book can be stealing, or liberating it to return the knowledge (from the dusty
library closed stacks) back into circulation. “Old” knowledge can teach new
tricksters a handful of tricks.

In 201


monoskop in Bodo 2014


on channels do not enable
the development of a library. Two of the most essential attributes of any proper library: the catalogue
and the community are hard to provide on such channels. The catalog doesn’t just organize the
knowledge stored in the collection; it is not just a tool of searching and browsing. It is a critical
component in the organization of the community of “librarians” who preserve and nourish the
collection. The catalog is what distinguishes an unstructured heap of computer files from a wellmaintained library, but it is the same catalog, which makes shadow libraries, unauthorized texts
collections an easy target of law enforcement. Those few digital online libraries that dare to provide
unauthorized access to texts in an organized manner, such as textz.org, a*.org, monoskop or Gigapedia/
library.nu, all had their bad experiences with law enforcement and rights holder dismay.
Of these pirate libraries, Gigapedia—later called Library.nu—was the largest at the turn of the 2010’s. At
its peak, it was several orders of magnitudes bigger than its peers, offering access to nearly a million
English language documents. It was not just size that made Gigapedia unique. Unlike most sites, it
moved beyond its initial specialization in scientific texts to incorporate a wide range of academic
disciplines. Compared to its peers, it also had a highly developed central metadata database, which
contained bibliographic details on the collection and also, significantly, on gaps in the collection, which
underpinned a process of actively solicited contributions from users. Wi

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.