The Evolution of Digital Architecture and the Formation Of
Total Page:16
File Type:pdf, Size:1020Kb
University of Wisconsin Milwaukee UWM Digital Commons Theses and Dissertations May 2019 Culture and Code: The volutE ion of Digital Architecture and the Formation of Networked Publics Geoffrey Gimse University of Wisconsin-Milwaukee Follow this and additional works at: https://dc.uwm.edu/etd Part of the Communication Technology and New Media Commons, Databases and Information Systems Commons, and the History of Science, Technology, and Medicine Commons Recommended Citation Gimse, Geoffrey, "Culture and Code: The vE olution of Digital Architecture and the Formation of Networked Publics" (2019). Theses and Dissertations. 2070. https://dc.uwm.edu/etd/2070 This Dissertation is brought to you for free and open access by UWM Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of UWM Digital Commons. For more information, please contact [email protected]. CULTURE AND CODE: THE EVOLUTION OF DIGITAL ARCHITECTURE AND THE FORMATION OF NETWORKED PUBLICS by Geoffrey Gimse A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in English at The University of Wisconsin-Milwaukee May 2019 ABSTRACT CULTURE AND CODE: THE EVOLUTION OF DIGITAL ARCHITECTURE AND THE FORMATION OF NETWORKED PUBLICS by Geoffrey Gimse The University of Wisconsin-Milwaukee, 2019 Under the Supervision of Professor William Keith Culture and Code traces the construction of the modern idea of the Internet and offers a potential glimpse of how that idea may change in the near future. Developed through a theoretical framework that links Sheila Jasanoff and Sang-Hyun Kim’s theory of the sociotechnical imaginary to broader theories on publics and counterpublics, Culture and Code offers a way to reframe the evolution of Internet technology and its culture as an enmeshed part of larger socio-political shifts within society. In traveling the history of the modern Internet as detailed in its technical documentation, legal documents, user created content, and popular media this dissertation positions the construction of the idea of the Internet and its technology as the result of an ongoing series of intersections and collisions between the sociotechnical imaginaries of three different publics: Implementors, Vendors, and Users. These publics were identified as the primary audiences of the 1989 Internet Engineering Task Force specification of the four-layer TCP/IP model that became a core part of our modern infrastructure. Using that model as a continued metaphor throughout the work, Culture and Code shows how each public’s sociotechnical imaginary developed, how they influenced and shaped one another, and the inevitable conflicts that arose leading to a coalescing sociotechnical imaginary that is centered around vendor control while continuing to project the ideal of the empowered user. ii © Copyright by Geoffrey Gimse, 2019 All Rights Reserved To Courtney, my wife and partner through this crazy journey. Without your amazing support and encouragement, none of this would have been possible. TABLE OF CONTENTS Introduction: Imaginaries in Conflict ............................................................................................................ 1 Chapter 1: Models for a Social History of Network Technology ................................................................... 6 Rethinking the Narrative ........................................................................................................................... 6 Telling the History of the Digital Public Sphere ...................................................................................... 14 Computing and the Network in the Public Mind .................................................................................... 15 The Personal Computer: Power and Boundaries .................................................................................... 20 The Birth of the Cloud and the Growing Abstraction of Digital Power................................................... 28 Evolution of Technological Change ......................................................................................................... 31 Chapter 2: The Link Layer ........................................................................................................................... 33 The Network as a Public .......................................................................................................................... 35 Self-Organization ................................................................................................................................. 37 Stranger Relations ............................................................................................................................... 37 Personal and Impersonal Speech ........................................................................................................ 38 Attention ............................................................................................................................................. 39 Social Space ......................................................................................................................................... 39 Temporality ......................................................................................................................................... 40 Poetic World Making........................................................................................................................... 41 RFC 1122 and 1123: The TCP/IP Network Model and its Audiences ...................................................... 44 The Implementors: Imagining Meritocracy ............................................................................................ 51 Users: From Hobbyist to Hacker to Genius ............................................................................................. 54 Vendors: Innovation and Destruction ..................................................................................................... 57 Publics, Change, and Internet Imaginaries ............................................................................................. 60 Chapter 3: The Internet Layer: .................................................................................................................... 66 The Rise of the User Imaginary ............................................................................................................... 66 Power and Control .................................................................................................................................. 70 Government and the Vendor Publics .................................................................................................. 72 User and Implementor Alliances ............................................................................................................. 77 The Expansion of the User Imaginary ..................................................................................................... 79 The BBS and the Locus of the User Imaginary ........................................................................................ 81 Tensions with the Vendor Imaginary ...................................................................................................... 84 The Rise of MUDS and the User as Creator ............................................................................................ 86 Chapter 4: The Transport Layer .................................................................................................................. 90 The Stack, Redux ..................................................................................................................................... 90 The Protocol Suite as Political Space ...................................................................................................... 95 The Importance of (a) Protocol ............................................................................................................... 97 Cyborg Publics ......................................................................................................................................... 99 The Robustness Principle ...................................................................................................................... 102 The Hypertext Transport Protocol ........................................................................................................ 103 The Origins of HTTP ............................................................................................................................... 104 The Vendor Arrives ............................................................................................................................... 112 Government’s Role in the Imaginaries ................................................................................................. 116 Chapter 5: The Application Layer .............................................................................................................. 121 Application Layer .................................................................................................................................. 121 Into the Modern Imaginary ................................................................................................................... 122 Path 1: User-Imaginary 2.0: De-Centralization ..................................................................................... 131 Path 2: Vendor