Broken Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Broken Technologies Broken Technologies 2 The Angel of Machines: from Buch der Erfindungen Gewerbe und Industrien,or Book of Inven- tions,Vol.6,1887, F.Reuleaux, Editor. From Moon, Francis C. The Machines of Leonardo da Vinci and Franz Reuleaux. Kinematics of Machines from the Renaissance to the 20th Century. Springer, 2007. FrontPage: © Maria Flores Crossa 3 Broken Technologies The Humanist as Engineer Fernando Flores Morador Lund University 2011- revised 2015 4 Department of History of Ideas and Science University of Lund Broken Technologies. The Humanist as Engineer. Ver 3.0 Biskopsgatan 7, 223 62 Lund © Fernando Flores Morador, 2009, Third Edition Cover: Maria Flores Crossa Tryck: Media – Tryck, Lunds Universitet, 2011-revised 2015 ISBN: 978-91-633-9692-2 5 Contents Contents ....................................................................................................................................... 5 List of figures .................................................................................................................................. 7 List of Tables.................................................................................................................................. 9 Foreword .................................................................................................................................. 11 First Edition (Ver. 1.0) ................................................................................................................ 11 Second edition (Ver. 1.1) ............................................................................................................ 11 Third Edition (Ver. 2.0) .............................................................................................................. 11 Forth Edition (Ver. 3.0) .............................................................................................................. 11 Introduction ............................................................................................................................. 15 About the benefit of humanity studies ..................................................................................... 15 How we understand “technology” ............................................................................................ 17 First-level brokenness.................................................................................................................. 19 Second-level brokenness ............................................................................................................. 20 Third-level brokenness ................................................................................................................ 21 Part I: The Encyclopaedia of Broken Technologies .......................................................... 25 An outline of first-level brokenness ..................................................................................... 27 Entry 1: Fantastic Technologies ............................................................................................ 33 Entry 2: Magic technologies................................................................................................... 39 Entry 3: Tentative technologies............................................................................................. 43 Entry 4: Technologies of poverty ......................................................................................... 47 Urban acupuncture ...................................................................................................................... 48 Entry 5: Fruitless technologies .............................................................................................. 51 Worldly humanism ....................................................................................................................... 54 Entry 6: Art as broken technology ........................................................................................ 57 Art after Duchamp ...................................................................................................................... 59 An outline of second-level brokenness ................................................................................ 63 Entry 7: Enigmatic technologies ........................................................................................... 67 Entry 8: Virtual Technologies................................................................................................ 71 Texts as machines ........................................................................................................................ 76 Entry 9: Media-broken technologies .................................................................................... 81 6 Entry 10: Game technologies ................................................................................................ 87 Games and the Pleasure Principle ............................................................................................. 89 An outline of the third-level of brokenness ........................................................................ 91 Entry 11: Value-broken technologies and broken labour ................................................. 95 The substance of value in Marx ................................................................................................. 95 Use–value and archaic labour .................................................................................................... 98 Either Use–value or Change–value ........................................................................................... 99 Head and Hand in Labour ........................................................................................................ 102 Family labour and broken value .............................................................................................. 103 Entry 12: Second language technologies ............................................................................ 107 Modelling Languages ................................................................................................................. 108 Entry 13: Amateur-technologies ......................................................................................... 111 Quality-broken technologies .................................................................................................... 111 Amateurism and professionalism in computer technology ................................................. 112 Entry 14: Artificiality as broken technology ..................................................................... 115 Artificial Life or the Vitalism of Postmodernity ................................................................... 118 Two competing epistemological models ................................................................................ 119 The foundations of Postmodern philosophy of Life ........................................................... 119 Entry 15: Cloning as Broken Technology ......................................................................... 125 Part II: The Humanist as Engineer ..................................................................................... 129 Introduction ................................................................................................................................ 129 Caring for first-level brokenness ......................................................................................... 131 From pure thought and language to praxis ............................................................................ 131 The two states of mind ............................................................................................................. 132 Order and Information ............................................................................................................. 137 Caring for second-level brokenness.................................................................................... 143 The World ................................................................................................................................... 143 Empirical versus phenomenal dimensions ............................................................................ 150 Empirical dimensions ................................................................................................................ 153 Phenomenal dimensions ........................................................................................................... 157 Technology and epistemology ................................................................................................. 160 Technology from the point of view of post-phenomenology ............................................ 162 Things and devices ..................................................................................................................... 165 Congruence in artefacts and tools ........................................................................................... 169 Multistability and brokenness .................................................................................................. 170 Docking and congruence .......................................................................................................... 172 Docking based on sexual analogies ......................................................................................... 177 The docking of devices ............................................................................................................
Recommended publications
  • Data-Driven Grasp Synthesis - a Survey Jeannette Bohg, Member, IEEE, Antonio Morales, Member, IEEE, Tamim Asfour, Member, IEEE, Danica Kragic Member, IEEE
    TRANSACTIONS ON ROBOTICS 1 Data-Driven Grasp Synthesis - A Survey Jeannette Bohg, Member, IEEE, Antonio Morales, Member, IEEE, Tamim Asfour, Member, IEEE, Danica Kragic Member, IEEE specific metric. This process is usually based on some existing Abstract—We review the work on data-driven grasp synthesis grasp experience that can be a heuristic or is generated in and the methodologies for sampling and ranking candidate simulation or on a real robot. Kamon et al. [5] refer to this grasps. We divide the approaches into three groups based on whether they synthesize grasps for known, familiar or unknown as the comparative and Shimoga [2] as the knowledge-based objects. This structure allows us to identify common object rep- approach. Here, a grasp is commonly parameterized by [6, 7]: resentations and perceptual processes that facilitate the employed • the grasping point on the object with which the tool center data-driven grasp synthesis technique. In the case of known point (TCP) should be aligned, objects, we concentrate on the approaches that are based on • the approach vector which describes the 3D angle that object recognition and pose estimation. In the case of familiar objects, the techniques use some form of a similarity matching the robot hand approaches the grasping point with, to a set of previously encountered objects. Finally, for the • the wrist orientation of the robotic hand and approaches dealing with unknown objects, the core part is the • an initial finger configuration extraction of specific features that are indicative of good grasps. Data-driven approaches differ in how the set of grasp candi- Our survey provides an overview of the different methodologies dates is sampled, how the grasp quality is estimated and how and discusses open problems in the area of robot grasping.
    [Show full text]
  • Identifying and Defining Relationships: Techniques for Improving Student Systemic Thinking
    AC 2011-897: IDENTIFYING AND DEFINING RELATIONSHIPS: TECH- NIQUES FOR IMPROVING STUDENT SYSTEMIC THINKING Cecelia M. Wigal, University of Tennessee, Chattanooga Cecelia M. Wigal received her Ph.D. in 1998 from Northwestern University and is presently a Professor of Engineering and Assistant Dean of the College of Engineering and Computer Science at the University of Tennessee at Chattanooga (UTC). Her primary areas of interest and expertise include complex process and system analysis, process improvement analysis, and information system analysis with respect to usability and effectiveness. Dr. Wigal is also interested in engineering education reform to address present and future student and national and international needs. c American Society for Engineering Education, 2011 Identifying and Defining Relationships: Techniques for Improving Student Systemic Thinking Abstract ABET, Inc. is looking for graduating undergraduate engineering students who are systems thinkers. However, genuine systems thinking is contrary to the traditional practice of using linear thinking to help solve design problems often used by students and many practitioners. Linear thinking has a tendency to compartmentalize solution options and minimize recognition of relationships between solutions and their elements. Systems thinking, however, has the ability to define the whole system, including its environment, objectives, and parts (subsystems), both static and dynamic, by their relationships. The work discussed here describes two means of introducing freshman engineering students to thinking systemically or holistically when understanding and defining problems. Specifically, the modeling techniques of Rich Pictures and an instructor generated modified IDEF0 model are discussed. These techniques have roles in many applications. In this case they are discussed in regards to their application to the design process.
    [Show full text]
  • From Point to Pixel: a Genealogy of Digital Aesthetics by Meredith Anne Hoy
    From Point to Pixel: A Genealogy of Digital Aesthetics by Meredith Anne Hoy A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Rhetoric and the Designated Emphasis in Film Studies in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Whitney Davis, co-chair Professor Jeffrey Skoller, co-chair Professor Warren Sack Professor Abigail DeKosnik Professor Kristen Whissel Spring 2010 Copyright 2010 by Hoy, Meredith All rights reserved. Abstract From Point to Pixel: A Genealogy of Digital Aesthetics by Meredith Anne Hoy Doctor of Philosophy in Rhetoric University of California, Berkeley Professor Whitney Davis, Co-chair Professor Jeffrey Skoller, Co-chair When we say, in response to a still or moving picture, that it has a digital “look” about it, what exactly do we mean? How can the slick, color-saturated photographs of Jeff Wall and Andreas Gursky signal digitality, while the flattened, pixelated landscapes of video games such as Super Mario Brothers convey ostensibly the same characteristic of “being digital,” but in a completely different manner? In my dissertation, From Point to Pixel: A Genealogy of Digital Aesthetics, I argue for a definition of a "digital method" that can be articulated without reference to the technicalities of contemporary hardware and software. I allow, however, the possibility that this digital method can acquire new characteristics when it is performed by computational technology. I therefore treat the artworks covered in my dissertation as sensuous artifacts that are subject to change based on the constraints and affordances of the tools used in their making.
    [Show full text]
  • A Rhetorical Model for Homiletics. Rodney Kennedy Louisiana State University and Agricultural & Mechanical College
    Louisiana State University LSU Digital Commons LSU Historical Dissertations and Theses Graduate School 1990 The piE stemic Power of Metaphor: A Rhetorical Model for Homiletics. Rodney Kennedy Louisiana State University and Agricultural & Mechanical College Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_disstheses Recommended Citation Kennedy, Rodney, "The pE istemic Power of Metaphor: A Rhetorical Model for Homiletics." (1990). LSU Historical Dissertations and Theses. 5063. https://digitalcommons.lsu.edu/gradschool_disstheses/5063 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Historical Dissertations and Theses by an authorized administrator of LSU Digital Commons. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps.
    [Show full text]
  • Attempting Art: an Essay on Intention-Dependence
    Attempting Art: an essay on intention-dependence Michel-Antoine Xhignesse Department of Philosophy McGill University, Montréal December 2016 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Doctor of Philosophy © Michel-Antoine Xhignesse 2016 Table of Contents Dissertation abstract ................................................................................................................ iii Résumé de thèse ....................................................................................................................... iv Acknowledgements ................................................................................................................... v Chapter 1 – Introductory Remarks............................................................................................. 1 Chapter 2 – Art, Intention, and Intention-Dependence ............................................................ 9 2.1 – Introduction ............................................................................................................................ 9 2.2 – Intentional action ................................................................................................................. 11 2.3 – Intention-dependence vs. concept-dependence .................................................................... 18 2.4 – Accidents and Incidents ....................................................................................................... 22 2.5 – Separating Concept- and Intention-Dependence
    [Show full text]
  • Aesthetics—What? Why? and Wherefore?
    KENDALL WALTON Aesthetics—What? Why? and Wherefore? It is a very great honor to address my friends and philosophy of quantum physics are younger. But colleagues as president of the American Society these are clearly subcategories of traditional, well- for Aesthetics, an organization that plays a unique established areas of philosophy—ethics and phi- role in a field that is, at once, a major traditional losophy of science—and they inherit much of their branch of philosophy and also central to disci- identity and sense of purpose from their parents. plines often regarded as remote from philosophy, Aesthetics is not so fortunate. It is related in vari- as well as depending crucially on their contribu- ous important ways to epistemology, metaphysics, tions. philosophy of mind, philosophy of language— I will follow the lead of one of my distinguished indeed it overlaps all of them—but these older predecessors in this office, Peter Kivy, who used relatives are at best aunts and uncles to aesthetics, the occasion of his own presidential address twelve not parents. Aesthetics must figure out for itself years ago to step back and reflect on the state of what exactly it is. the discipline and the nature of aesthetics.1 Two kinds of issues about the field need to be addressed: What is distinctive about this branch i. what is aesthetics? of philosophy, in contrast to others? And what is philosophy? Under the first heading, we will ask Aesthetics is a strange field, in some ways a con- what aesthetics is the philosophy of , what domain fused one.
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 330706 Sample Name: RFQ0270004296- PR0720001831-Grasp Trading Pvt. Ltd.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 14:51:31 Date: 15/12/2020 Version: 31.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report RFQ0270004296-PR0720001831-Grasp Trading Pvt. Ltd.doc 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 Signature Overview 4 AV Detection: 5 Mitre Att&ck Matrix 5 Behavior Graph 5 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 7 Domains and IPs 9 Contacted Domains 9 URLs from Memory and Binaries 9 Contacted IPs 12 General Information 12 Simulations 13 Behavior and APIs 13 Joe Sandbox View / Context 13 IPs 14 Domains 14 ASN 14 JA3 Fingerprints 14 Dropped Files 14 Created / dropped Files 14 Static File Info 16 General 16 File Icon 17 Static RTF Info 17 Objects 17 Network Behavior 17 UDP Packets 17 Code Manipulations 18 Statistics 18 System Behavior 18 Analysis Process: WINWORD.EXE PID: 896 Parent PID: 792 18 General 18 File Activities 18 File Created 18 File Deleted 19 Registry Activities 19 Key Created 19 Key Value Created 19 Copyright null 2020 Page 2 of 23 Key Value Modified 21 Disassembly 23 Copyright null 2020 Page 3 of 23 Analysis Report RFQ0270004296-PR0720001831-Grasp …Trading Pvt. Ltd.doc Overview General Information Detection Signatures Classification Sample RFQ0270004296- Name: PR0720001831-Grasp Muullltttiii AAVV SSccaannnneerrr ddeettteecctttiiioonn fffoorrr ssuubbm… Trading Pvt.
    [Show full text]
  • GRASP Patterns
    GRASP Patterns David Duncan November 16, 2012 Introduction • GRASP (General Responsibility Assignment Software Patterns) is an acronym created by Craig Larman to encompass nine object‐oriented design principles related to creating responsibilities for classes • These principles can also be viewed as design patterns and offer benefits similar to the classic “Gang of Four” patterns • GRASP is an attempt to document what expert designers probably know intuitively • All nine GRASP patterns will be presented and briefly discussed What is GRASP? • GRASP = General Responsibility Assignment Software Patterns (or Principles) • A collection of general objected‐oriented design patterns related to assigning defining objects • Originally described as a collection by Craig Larman in Applying UML and Patterns: An Introduction to Object‐Oriented Analysis and Design, 1st edition, in 1997. Context (1 of 2) • The third edition of Applying UML and Patterns is the most current edition, published in 2005, and is by far the source most drawn upon for this material • Larman assumes the development of some type of analysis artifacts prior to the use of GRASP – Of particular note, a domain model is used • A domain model describes the subject domain without describing the software implementation • It may look similar to a UML class diagram, but there is a major difference between domain objects and software objects Context (2 of 2) • Otherwise, assumptions are broad: primarily, the practitioner is using some type of sensible and iterative process – Larman chooses
    [Show full text]
  • Use of Formal Methods at Amazon Web Services
    Use of Formal Methods at Amazon Web Services Chris Newcombe, Tim Rath, Fan Zhang, Bogdan Munteanu, Marc Brooker, Michael Deardeuff Amazon.com 29th September, 2014 Since 2011, engineers at Amazon Web Services (AWS) have been using formal specification and model checking to help solve difficult design problems in critical systems. This paper describes our motivation and experience, what has worked well in our problem domain, and what has not. When discussing personal experiences we refer to authors by their initials. At AWS we strive to build services that are simple for customers to use. That external simplicity is built on a hidden substrate of complex distributed systems. Such complex internals are required to achieve high availability while running on cost-efficient infrastructure, and also to cope with relentless rapid business growth. As an example of this growth; in 2006 we launched S3, our Simple Storage Service. In the 6 years after launch, S3 grew to store 1 trillion objects [1]. Less than a year later it had grown to 2 trillion objects, and was regularly handling 1.1 million requests per second [2]. S3 is just one of tens of AWS services that store and process data that our customers have entrusted to us. To safeguard that data, the core of each service relies on fault-tolerant distributed algorithms for replication, consistency, concurrency control, auto-scaling, load balancing, and other coordination tasks. There are many such algorithms in the literature, but combining them into a cohesive system is a major challenge, as the algorithms must usually be modified in order to interact properly in a real-world system.
    [Show full text]
  • Establishing a Need for a Protocol for the Interoperability of Heterogeneous Iot Home Devices
    Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2018 Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices Jenna Bayto Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Part of the Computer Engineering Commons Recommended Citation Bayto, Jenna, "Establishing a Need for a Protocol for the Interoperability of Heterogeneous IoT Home Devices" (2018). Electronic Theses and Dissertations. 1742. https://digitalcommons.georgiasouthern.edu/etd/1742 This thesis (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. ESTABLISHING A NEED FOR A PROTOCOL FOR THE INTEROPERABILITY OF HETEROGENEOUS IOT HOME DEVICES by JENNA BAYTO (Under the Direction of Christopher Kadlec) ABSTRACT The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home. INDEX WORDS: Internet of
    [Show full text]
  • Orphan Works, Abandonware and the Missing Market for Copyrighted Goods
    Orphan Works, Abandonware and the Missing Market for Copyrighted Goods Dennis W. K. Khong University of Strathclyde, United Kingdom Paper prepared for the 1st Annual Conference of the Asian Law and Economics Society, Seoul, Korea, 24–25 June 2005. 1 Introduction Of late, the issue of orphan works and abandonware is gaining attention in the legal circle. Following the case of Eldred v. Ashcroft,1 a new case is pending appeal in the United States raising the issue of orphan works.2 The Library of Congress (2005) recently issued a notice of inquiry on orphan works. In the US Congress, a bill3 has been put forward to remedy the problem of abandoned copyrighted works in the light of the Sonny Bono Copyright Term Extension Act of 1998. All these activities indicate that the problem of orphan works and abandonware is a legitimate subject of enquiry, not less by using the tools of economic analysis. It is this endeavour that this paper will try to undertake. In this paper, the use of the term ‘copyright owner’ is meant to denote the owner and his assigns and licensees, such as publishers, unless the context requires otherwise. Examples of the law are United Kingdom’s unless stated otherwise. 1. 537 U.S. 186 (2003). 2. Brewster Kahle et al. v. John Ashcroft, 72 U.S.P.Q.2D (BNA) 1888; US Dist. Lexis 24090 (N.D. Cal. 2004). 3. Congress, House, Public Domain Enhancement Act of 2003, 108th Cong., 1st sess., H.R. 2601. 1 Part I 2 The Problem Copyright law confers an exclusive right to the owner of a copyrighted work to control, inter alia, the copying and issuing of copies of his work.4 Through this exclusive right, copyright owners5 may earn profit by granting a license or sale of a copy subject to payment of a fee.
    [Show full text]
  • Road Map for Installing the IBM Power 550 Express (8204-E8A and 9409-M50)
    Power Systems Road map for installing the IBM Power 550 Express (8204-E8A and 9409-M50) GI11-2909-02 Power Systems Road map for installing the IBM Power 550 Express (8204-E8A and 9409-M50) GI11-2909-02 Note Before using this information and the product it supports, read the information in “Notices,” on page 29, “Safety notices” on page v, the IBM Systems Safety Notices manual, G229-9054, and the IBM Environmental Notices and User Guide, Z125–5823. This edition applies to IBM Power Systems servers that contain the POWER6 processor and to all associated models. © Copyright IBM Corporation 2008, 2009. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Safety notices .................................v Chapter 1. Installing the IBM Power 550 Express: Overview .............1 Chapter 2. Installing the server into a rack .....................3 Determining the location ...............................3 Marking the location.................................4 Attaching the mounting hardware to the rack ........................5 Installing the cable-management arm ...........................12 Chapter 3. Cabling the server and setting up the console ..............15 Cabling the server with an ASCII terminal .........................15 Cabling the server to the HMC .............................16 Cabling the server and accessing Operations Console .....................18 Cabling the server and accessing the Integrated Virtualization Manager ...............19 Supporting
    [Show full text]