In 1994, the Internet was mainly a text-based medium. "GUIs" or graphic user interfaces were relatively uncommon. The first major web browser "Mosaic Netscape 0.9" was not released until October of that year. Still, the prospect of the ubiquitous use of the Internet to browse linked documents was being discussed with great excitement, at least within academic circles. Luddites were hard to find. For that reason alone, Sven Birkerts's The Gutenberg Elegies now appears to be a remarkably prescient warning of the downside of our new device-obsessed society. At the same time, many of his observations seem quaint. Birkerts got the main picture right, but he can hardly be faulted for mistaking the details or not seeing just how far down the road to digital hypnosis we would traveled.
The first half of the book tells the back story. Birkerts, in an early chapter, recounts how he became attracted to books and writing, including his attempts to become a novelist and how he ultimately discovered his aptitude for writing essays. In any case, we learn early on that Beikerts is devoted to print books, reading, and writing. He goes on to describe the phenomenology of deep reading or reading in which we become thoroughly immersed in the text. He provides an account of how reading can be instrumental in "self-formation," how reading and interpreting texts is related to our life activities apart from reading, and how the activities of reading and writing are not so very different.
In the second part of the book, Birkerts explores the coming new world of digital reading and as you might guess, he greets it with apprehension. Birkerts fears that the beneficial habits and frame of mind created by deep reading will be undermined by the new electronic media. He predicts the erosion of language. He writes that "the complex discourse patterns of the nineteenth century" are becoming "flattened by the requirements of communication over distances. That tendency runs riot as the layers of mediation thicken. Simple linguistic prefab is now the norm, while ambiguity, paradox, irony, subtlety, and wit are fast disappearing....Verbal intelligence, which has long been viewed as suspect as the act of reading, will come to seem positively conspiratorial. The greater part of any articulate person's energy will be deployed in dumbing-down her discourse." It's hard to deny that his prediction has come to pass. The 140 character twitter message has joined the 30 second sound byte to dominate much of our communication. Worse yet, the cell phone text has returned us to the age of brief telegraphic wire messages, except everyone is able to send these messages hundreds of time a day.
Birkerts fears that with the loss of physical books will undermine our sense of the past. No longer will the past be represented to us in surviving artifacts, but it will be stored in databases "flattening" our historical perspective. The extent to which university students are turning their backs on physical books is, indeed, striking. Their work relies very significantly on texts that can be viewed online. This is, perhaps, a product of the ready availability of electronic journal literature. Not long ago, libraries had access only to a limited number of journals and student research relied significantly on books. Now, back issues of journals are sold to libraries in extremely cost effective packages. Money is made mostly on expensive access to recent issues. This is a boon to humanities research, but Birkerts's point that our historical perspective is flattened seems credible, particularly when one views a pdf of an 80 year old journal article in contrast to an original paper version of it.
Perhaps Birkerts's most worrying prediction is of "the waning of the private self." He detects "a process of social collectivization that will over time all but vanquish the ideal of the isolated individual." He writes, "for some decades now we have been edging away from the perception of private life as something opaque, closed off to the world; we increasingly accept the transparency of a life lived within a set of systems, electronic or otherwise....One day we will conduct our public and private lives within networks so dense, among so many channels of instantaneous information, that it will make almost no sense to speak of the differentiations of subjective individualism." I'm not entirely convinced that we are losing the notion of subjective individualism. Much of our social networks are designed to create at least an image of ourselves as individuals, but at the same time we are becoming conduits for memes that waft through the electronic social space; and if Birkerts's concern about "the waining of the private self" was really a concern about the waning of privacy itself, he could not have been more prescient.
The more quaint aspects of Birkerts's work appear in this latter half, where he describes Perseus 1.0 as the "hot new thing in the classics world." Perseus 1.0 was an early an interactive multimedia database for the Classics. The "Perseus Project" is still going, but it has been overtaken by so many new and more sophisticated databases. Still, Birkerts's "curmudgeonly" remarks about the use of such tools in education, particularly humanities education remain worth considering and continue to be discussed among teachers and researchers. Birkerts also has chapters on hyperlinks and audio books. The observations about how hyperlinks change the character of writing and reading are worthwhile; however, his prediction that audio books would supplant print books is obviously mistaken.
The third part of The Gutenberg Elegies laments the demise of literature and the educated reader. My knowledge of literature is far too shallow to comment on his points, though they seem a tad overstated. Regarding the disappearance of the educated reader, I suspect he has a point. In decades past, reading had far less competition. Now, finding an avid reader is rather difficult. This is surely a function of the time we spend looking at text messages, screen-shots, and Youtube video clips, not to mention downloadable movies, audio files, and much more. The ubiquity of cell phones means that people seldom find themselves separated from people with whom they would like to converse and so carrying around a pocket sized paperback to fill the odd empty 20 minutes isn't something we do.
All in all, The Gutenberg Elegies is becoming (or has become) a classic, early work in the expanding debate over the social and personal consequences of our new digital culture. Any one interested in this debate would do well to read it.
Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts
Thursday, September 26, 2013
Monday, May 6, 2013
The Offensive Internet: Speech, Privacy, and Reputation / Saul Levmore and Martha C. Nussbaum, eds. -- Cambridge, Mass.: Harvard University Press, 2010
The following are excerpts from a review that is forthcoming in The
Journal of Information Ethics.
Most of us learned at an early age that “sticks and stones will break your bones, but names will never harm you,” but we also discovered that the saying was often cold comfort. Disregarding verbal abuse or defamatory remarks is not easy. Fortunately, we usually are able to find a more or less adequate way of responding to insults, if only to allow the passage of time to dull the pain. The Internet has made this much more difficult. On the web, insults, defamation, and invasions of privacy can immediately spread to a world-wide audience and last seemingly in perpetuity. The Offensive Internet: Speech, Privacy, and Reputation, edited by Saul Levmore and Martha Nussbaum, presents thirteen chapters that address harm, speech, and privacy issues raised by the Internet. The authors are, with a few exceptions, law professors at some of the leading U.S. law schools. So unsurprisingly, the chapters are consistently of high quality. They approach the issues at various levels of abstraction, ranging from philosophical discussions to examinations of concrete instances of harm. Most of the authors advocate specific legislative or judicial remedies for the harms under discussion.
First Amendment absolutist certainly will find the treatment of free speech in The Offensive Internet inadequate. Their judgment is likely to be based on a high assessment of the importance of speech and the slippery slope that regulation poses. Some may downplay the gravity of the harms that occur on the internet, making the dangers of censorship relatively greater. Their critique, however, needs to address the important distinctions made in The Offensive Internet, particularly in the section on speech. An important hurdle that the critics will need to overcome is the growing maturity of the Internet. In its initial manifestation, the Internet was shielded from regulation in order to promote its promise for enhanced, democratic communication. Today, however, it is perhaps the primary medium of mass communication around the world. As such, it no longer needs special protections. It is now appropriate to employ the widely accepted methods of holding Internet posters accountable for speech that would otherwise fall outside of First Amendment protection.
In general, The Offensive Internet is a valuable exploration of some of the more unpleasant aspects of unregulated speech and the consequences that follow from situations in which people can be unaccountable for their behavior. Fortunately, the authors offer us an impressive variety of means to address the problems. The volume does not, however, adequately address two important issues. The first has already been mentioned: protections against harms, protections of the freedom of speech, and protections of privacy can only be established equitably when the relative vulnerability of the parties is recognized. The early chapters’ emphasis on harms to women and minority groups is a move in the right direction, but the recognition of power dynamics tends to disappear in later chapters which seem to assume a power-blind approach. This is particularly clear in the chapters on privacy and reputation. An equitable legal regime should more completely protect the privacy of individuals, while leaving powerful institutions, like government agencies and major corporations, open to public scrutiny.
The second important issue that is not sufficiently addressed is whether the internet entrenches false information or exhibits self-correcting tendencies. Several of the authors acknowledge the fact that assertions (true or false) reside on the web indefinitely, that misinformation is often intentionally posted on the web, and that people tend to post (or re-post) what they wish to be true rather than what is well-justified. At the same time, the on-going activity of editing and re-editing wikis and blogs can also allow for the slow construction of reliable information. If this latter feature of the web becomes more dominant, then the concerns over false information undermining corporate or even personal reputations should decreased. Addressing these epistemic questions, however, would enlarge significantly the scope of the work, but much could have been gained by including at least a chapter or two on the broader philosophical background that lies behind the legal concerns that are central to the work.
In all, The Offensive
Internet is a valuable contribution to the understanding some of the
effects the Internet is having on individuals and society, and it offers
important critical analyses of the current speech regime that may be too
liberal for the good of individuals and society. Above all, free speech
absolutists would do well to read and reflect on the work.
Most of us learned at an early age that “sticks and stones will break your bones, but names will never harm you,” but we also discovered that the saying was often cold comfort. Disregarding verbal abuse or defamatory remarks is not easy. Fortunately, we usually are able to find a more or less adequate way of responding to insults, if only to allow the passage of time to dull the pain. The Internet has made this much more difficult. On the web, insults, defamation, and invasions of privacy can immediately spread to a world-wide audience and last seemingly in perpetuity. The Offensive Internet: Speech, Privacy, and Reputation, edited by Saul Levmore and Martha Nussbaum, presents thirteen chapters that address harm, speech, and privacy issues raised by the Internet. The authors are, with a few exceptions, law professors at some of the leading U.S. law schools. So unsurprisingly, the chapters are consistently of high quality. They approach the issues at various levels of abstraction, ranging from philosophical discussions to examinations of concrete instances of harm. Most of the authors advocate specific legislative or judicial remedies for the harms under discussion.
...
First Amendment absolutist certainly will find the treatment of free speech in The Offensive Internet inadequate. Their judgment is likely to be based on a high assessment of the importance of speech and the slippery slope that regulation poses. Some may downplay the gravity of the harms that occur on the internet, making the dangers of censorship relatively greater. Their critique, however, needs to address the important distinctions made in The Offensive Internet, particularly in the section on speech. An important hurdle that the critics will need to overcome is the growing maturity of the Internet. In its initial manifestation, the Internet was shielded from regulation in order to promote its promise for enhanced, democratic communication. Today, however, it is perhaps the primary medium of mass communication around the world. As such, it no longer needs special protections. It is now appropriate to employ the widely accepted methods of holding Internet posters accountable for speech that would otherwise fall outside of First Amendment protection.
...
In general, The Offensive Internet is a valuable exploration of some of the more unpleasant aspects of unregulated speech and the consequences that follow from situations in which people can be unaccountable for their behavior. Fortunately, the authors offer us an impressive variety of means to address the problems. The volume does not, however, adequately address two important issues. The first has already been mentioned: protections against harms, protections of the freedom of speech, and protections of privacy can only be established equitably when the relative vulnerability of the parties is recognized. The early chapters’ emphasis on harms to women and minority groups is a move in the right direction, but the recognition of power dynamics tends to disappear in later chapters which seem to assume a power-blind approach. This is particularly clear in the chapters on privacy and reputation. An equitable legal regime should more completely protect the privacy of individuals, while leaving powerful institutions, like government agencies and major corporations, open to public scrutiny.
The second important issue that is not sufficiently addressed is whether the internet entrenches false information or exhibits self-correcting tendencies. Several of the authors acknowledge the fact that assertions (true or false) reside on the web indefinitely, that misinformation is often intentionally posted on the web, and that people tend to post (or re-post) what they wish to be true rather than what is well-justified. At the same time, the on-going activity of editing and re-editing wikis and blogs can also allow for the slow construction of reliable information. If this latter feature of the web becomes more dominant, then the concerns over false information undermining corporate or even personal reputations should decreased. Addressing these epistemic questions, however, would enlarge significantly the scope of the work, but much could have been gained by including at least a chapter or two on the broader philosophical background that lies behind the legal concerns that are central to the work.
Labels:
Constitutional Law,
Ethics,
Philosophy,
Technology
Thursday, January 12, 2012
Constitution 3.0: Feedom and Technological Change / Jeffrey Rosen and Benjamin Wittes, eds. -- Washington D.C.: Brookings Institution Press, 2011
In 1928, the U.S. Supreme Court handed down a ruling in Olmstead v United States, a case arising out of the new wiretapping technology available to law enforcement. Attorneys for Olmstead argued that a government wiretap violated Olmstead's Fourth Amendment right to be secure against unreasonable searches and seizures, but 5-4 majority of the Court found that as conversations were not tangible effects that could be searched or seized and as the government had not trespassed on Olmstead's property in placing the wiretap, no violation of the Fourth Amendment had occurred.
In contrast, Justice Brandeis's dissent rested on the observation that phone conversations often contained more information than sealed letters and that as the Fourth Amendment's intent was to protect the privacy of citizens, the Court should find that phone conversations deserve the same protection as mailed correspondences. It is fair to say that Brandeis was reading beyond the simple words of the Fourth Amendment, but it is hard to argue that Court should not have done exactly this. Justice Butler explained why in his dissent, writing "this Court has always construed the Constitution in the light of the principles upon which it was founded. The direct operation or literal meaning of the words used do not measure the purpose or scope of its provisions. Under the principles established and applied by this Court, the Fourth Amendment safeguards against all evils that are like and equivalent to those embraced within the ordinary meaning of its words."
The framers of the Constitution could not possibly have imagined the technological developments of the 20th century, and as these technologies directly bore on the values protected by the Fourth Amendment, the Supreme Court should have exercised its authority to interpret the Constitution and apply those values to present circumstances. The task of applying an 18th century document to unimaginable technologies has only become more problematic over the past fifteen years. Happily, Constitution 3.0 offers us a collection of essays exploring how emerging technologies might affect the core concepts in constitutional law, particularly how they might affect the interpretation of the First, Fourth, Fifth, and Fourteenth Amendments. The essays take up several rather narrow questions, but stand as a fine starting point for a longer discussion of the constitutional problems that 21st century technologies pose.
Constitution 3.0 is divided into four parts, covering surveillance and data mining, free expression and privacy, brain scan technologies, and genetic engineering. This review will only address parts one and two.
In Chapter Two, Christopher Slobogin observes that surveillance technology currently can track the public movements and record the on-going, daily activities of citizens. Such surveillance might not implicate the Fourth Amendment as it falls outside of the legal concept of a search. Slobogin argues that in response we must expand the concept of a search to reflect its ordinary language meaning and regulate government surveillance proportionate to its intrusiveness.
In Chapter Three, Orin S. Kerr responds to new surveillance technologies by noting that surveillance now involves a four stage process: evidence collection, data manipulation by a machine, disclosure to a person operating the surveillance program, and disclosure to the public. The "old law of surveillance" attempted to prevent the collection of evidence. Kerr argues that we should now be more concern about regulating each stage of the process as appropriate, particularly its dissemination, rather as the information collected by the I.R.S. is not available to the public.
In Chapter Four, Jack Goldsmith emphasizes the dangers to national security that new technologies pose and identifies numerous instances where unwarranted searches and invasive screening processes are permitted by the Court. While he recognizes that allowing unwarranted searches in a broader range of circumstance may seem unnecessary, he is concerned that "bits [of data] and strings [of code] can do, and are doing, enormous harm," thereby justifying "massive government snooping."
In Chapter Five, Jeffrey Rosen points out that more and more the questions of privacy and free speech are decided by private corporations, e.g., Facebook, Twitter, and Google. This poses a special problem for protecting Fourth Amendment values as the Amendment limits what governments actions and does not clearly reach private actors, particularly when the information gathered is voluntarily surrendered. Rosen suggests that technical solutions are available, but must be implemented by "regulators, legislators, technologists, and ultimately,...politically engaged citizens." We can not simply rely on the Court for relief.
In Chapter Six, Tim Wu describes two traditions of free speech. The first balances the value and significance of free expression against legitimate government interests. The second arose in the middle of the 20th century with the creation of an oligarchic national broadcasting system. The concern became finding ways in which more than a few voices could have a national audience. With the rise of the internet, it appears that this problem has been solved, but Wu points out that speakers are connected to their audiences by a small number of intermediaries, i.e., mainly, "Verizon, AT&T, the cable industry, and a handful of crucial switches, Google most obviously." Like Rosen, Wu is concerned about that constitutional issues are increasing implicating private actors and he is particularly concerned about the concentration of power within the sphere of private communications.
In Chapter Seven, Jonathan Zittrain discusses two problems arising from the concentration of content; (1) the potential that a private actor or government agency will effectively destroy unique content and denial-of-service attacks launched against particular content providers. He recommends in response a "mutual aid treaty for the internet," meaning that site operators would agree to download and store any page to which they link. If any of these sites suffer a denial-of-service attack, a version of the content that was most previously accessed could be displayed. While the downloaded pages might not be absolutely current, they would provide internet browsers with a reasonably up-to-date version of the content.
What is most interesting about these essays is that they grapple with values that often come into conflict: privacy and national security versus freedom of information and freedom of expression. These values have been in conflict since long before digital technology began changing our information environment, but the problems these conflicts pose have become far more profound. In the final essay, Lawrence Lessig points out that how future Courts will solve these problems will depend on a cultural climate that establishes unquestioned norms. Hence, the spread of private video recording devices and the willingness to participate in social media that record and disseminate personal information may make our concerns about privacy virtually vanish. It is through these changes in culture that the changes in technology will transform our Constitutional liberties.
In contrast, Justice Brandeis's dissent rested on the observation that phone conversations often contained more information than sealed letters and that as the Fourth Amendment's intent was to protect the privacy of citizens, the Court should find that phone conversations deserve the same protection as mailed correspondences. It is fair to say that Brandeis was reading beyond the simple words of the Fourth Amendment, but it is hard to argue that Court should not have done exactly this. Justice Butler explained why in his dissent, writing "this Court has always construed the Constitution in the light of the principles upon which it was founded. The direct operation or literal meaning of the words used do not measure the purpose or scope of its provisions. Under the principles established and applied by this Court, the Fourth Amendment safeguards against all evils that are like and equivalent to those embraced within the ordinary meaning of its words."
The framers of the Constitution could not possibly have imagined the technological developments of the 20th century, and as these technologies directly bore on the values protected by the Fourth Amendment, the Supreme Court should have exercised its authority to interpret the Constitution and apply those values to present circumstances. The task of applying an 18th century document to unimaginable technologies has only become more problematic over the past fifteen years. Happily, Constitution 3.0 offers us a collection of essays exploring how emerging technologies might affect the core concepts in constitutional law, particularly how they might affect the interpretation of the First, Fourth, Fifth, and Fourteenth Amendments. The essays take up several rather narrow questions, but stand as a fine starting point for a longer discussion of the constitutional problems that 21st century technologies pose.
Constitution 3.0 is divided into four parts, covering surveillance and data mining, free expression and privacy, brain scan technologies, and genetic engineering. This review will only address parts one and two.
In Chapter Two, Christopher Slobogin observes that surveillance technology currently can track the public movements and record the on-going, daily activities of citizens. Such surveillance might not implicate the Fourth Amendment as it falls outside of the legal concept of a search. Slobogin argues that in response we must expand the concept of a search to reflect its ordinary language meaning and regulate government surveillance proportionate to its intrusiveness.
In Chapter Three, Orin S. Kerr responds to new surveillance technologies by noting that surveillance now involves a four stage process: evidence collection, data manipulation by a machine, disclosure to a person operating the surveillance program, and disclosure to the public. The "old law of surveillance" attempted to prevent the collection of evidence. Kerr argues that we should now be more concern about regulating each stage of the process as appropriate, particularly its dissemination, rather as the information collected by the I.R.S. is not available to the public.
In Chapter Four, Jack Goldsmith emphasizes the dangers to national security that new technologies pose and identifies numerous instances where unwarranted searches and invasive screening processes are permitted by the Court. While he recognizes that allowing unwarranted searches in a broader range of circumstance may seem unnecessary, he is concerned that "bits [of data] and strings [of code] can do, and are doing, enormous harm," thereby justifying "massive government snooping."
In Chapter Five, Jeffrey Rosen points out that more and more the questions of privacy and free speech are decided by private corporations, e.g., Facebook, Twitter, and Google. This poses a special problem for protecting Fourth Amendment values as the Amendment limits what governments actions and does not clearly reach private actors, particularly when the information gathered is voluntarily surrendered. Rosen suggests that technical solutions are available, but must be implemented by "regulators, legislators, technologists, and ultimately,...politically engaged citizens." We can not simply rely on the Court for relief.
In Chapter Six, Tim Wu describes two traditions of free speech. The first balances the value and significance of free expression against legitimate government interests. The second arose in the middle of the 20th century with the creation of an oligarchic national broadcasting system. The concern became finding ways in which more than a few voices could have a national audience. With the rise of the internet, it appears that this problem has been solved, but Wu points out that speakers are connected to their audiences by a small number of intermediaries, i.e., mainly, "Verizon, AT&T, the cable industry, and a handful of crucial switches, Google most obviously." Like Rosen, Wu is concerned about that constitutional issues are increasing implicating private actors and he is particularly concerned about the concentration of power within the sphere of private communications.
In Chapter Seven, Jonathan Zittrain discusses two problems arising from the concentration of content; (1) the potential that a private actor or government agency will effectively destroy unique content and denial-of-service attacks launched against particular content providers. He recommends in response a "mutual aid treaty for the internet," meaning that site operators would agree to download and store any page to which they link. If any of these sites suffer a denial-of-service attack, a version of the content that was most previously accessed could be displayed. While the downloaded pages might not be absolutely current, they would provide internet browsers with a reasonably up-to-date version of the content.
What is most interesting about these essays is that they grapple with values that often come into conflict: privacy and national security versus freedom of information and freedom of expression. These values have been in conflict since long before digital technology began changing our information environment, but the problems these conflicts pose have become far more profound. In the final essay, Lawrence Lessig points out that how future Courts will solve these problems will depend on a cultural climate that establishes unquestioned norms. Hence, the spread of private video recording devices and the willingness to participate in social media that record and disseminate personal information may make our concerns about privacy virtually vanish. It is through these changes in culture that the changes in technology will transform our Constitutional liberties.
Labels:
Constitutional Law,
International Law,
Technology
Friday, October 28, 2011
Slow Reading / John Miedema -- Duluth, Minn.: Litwin Books, 2009
In 1986 Carlo Petrini formed an organization in Rome called "Slow Food" in reaction to the opening of a MacDonald's restaurant. He hoped to promote the pleasures that come from the consumption of fresh, locally grown food, produced from sustainable farming practices. His organization quickly turned into a world-wide movement as there were people everywhere who were fed up with the food-like products being churned out by multinational agribusiness companies and served up as "convenience foods." These foods are lacking in both nutrition and flavor, unless, of course, you include such flavorings as sugar, salt, and oil. The toll these food-like products are taking on our health and well being is incalculable. Obesity, diabetes, heart disease, and other ailments of over consumption plague us as never before.
John Miedema's book Slow Reading transfers the sentiment behind the slow food movement to our reading practices. The parallels are striking. One merely needs to substitute digital technology and the computer industry for agribusiness and one can see that the rush to make money from our consumption of information is doing to our mental lives what junk food is doing to our bodies; and just as the slow food movement seeks to recover the benefits of pre-industrial food production, a potential slow reading movement might recover the benefits of our pre-internet reading habits.
Many of Miedema's observations about reading digital texts versus books are obvious and uncontroversial. Any text that cannot be displayed in a few computer screens is unlikely to be read by anyone. Reading longer texts virtually requires a print copy. Print allows for a degree of concentration and reading comprehension that is nearly unobtainable from electronic texts. This may be due in part to the fact that reading a book involves more of one's body than reading a computer screen. One's hands, arms, and posture are involved in a way that they normally are not when reading a computer screen. Looking directly into the light of a computer screen is far more tiring than reading print on a page.
Then there are the intentional efforts to distract the reader that are built into most Web pages. Advertisement tempt us to abandon our reading and hyperlinks encourage us to follow tangent upon tangent until we lose track of what we originally set out to read. Even electronic texts that take up the full computer screen without hyperlinks are normally embedded in a browser that has scroll bars, "favorites" links, tabs, a clock, date, a search box, and sundry other icons that have nothing to do with the text. All of these distractions are absent from a printed book.
On the other hand, the very disadvantages of a digital text are its advantages. Digital texts are easily searched by computer algorithms and can be connected easily to any number of related texts. They often can be quickly copied and pasted into a new document, enlarged, reduced, tagged, annotated without damage to the original text. The benefits of electronic texts go on and on. Whether the printed text or the electronic text is superior depends on one's needs and intentions, but one important fact stands out: print encourages us to read slowly and carefully, allowing us to find more meaning in the text. That is, we are able to better understand what the author intended by writing the text in the first place. This leads to an important question that Miedema raises about how meaning is related to a text. Do we find meaning or create meaning when reading a text?
Slow Reading offers only sketchy answers to this question, but it does provide an admirable starting point. Finding meaning in a text can be contrasted with creating the meaning of the text, though certainly both are involved in any act of reading. Printed books guide us through the author's train of thought in the order and pace that the author intended. Each paragraph is present in the context of the book as a whole and this context refines and helps to disambiguate the meaning of any individual paragraph. We mostly are finding the meaning in the text. In contrast, an electronic text allow us to create meaning in a way that printed texts do not. This is a function of the ambiguous character of the snippets of electronic texts often displayed without significant context. We are free to draw our own original insight from an author's words, even to reverse the author's meaning completely. We can read the texts in any number of contexts which we create by navigating away from the text to other Web sites that strike us as related to the meaning we are constructing.
These two different reading activities are paradoxically both individual and communitarian. Reading a printed text to understand the author's meaning places the reader in a relatively solitary situation. One is usually reading alone in a room and is directly connected to a single text. At the same time, the print book reader is deeply engaged with a specific contribution by an author who is normally making a contribution to a larger and longer conversation of a community of authors. This links the reader to the larger, longer conversation. Any response the reader might have will be bounded to a great extent by the logic of that conversation. The reader becomes part of the community engaged in the conversation.
In contrast, the reader of an e-text is, of course, more immediately connected to an almost unlimited community of Web authors through sophisticated search tools that browse billions of texts, but the reader of an e-text is not deeply connected to anyone in this community. Search tools encourage the reader pick and choose short passages and construct an entirely new text that is built out of often unrelated or idiosyncratically related texts. The context of what one is reading may be an amalgam of statements in numerous unrelated conversations. The reader is not engaged in discovering the meaning of ideas in a specific on-going conversation within a community. The reader is acting more like a scientific investigator, searching the natural world (or in this case the world of Web texts) for observations that will allow the creation of a novel theory of the reader's own. In an important sense, reading on the Web often involves not engaging with others in a conversation, not listening to the author's full expression of an idea, but listening for what one wants to hear and appropriating the snippet of text for one's own solitary purposes.
Miedema notes numerous advantages that come from "slow," "deep," or "close" reading, including educational and psychological benefits, but Slow Reading is most of all a paean to the pleasures of settling into a comfortable chair and losing oneself in a book. In this age of ubiquitous data smog, that's a very fine thing.
John Miedema's book Slow Reading transfers the sentiment behind the slow food movement to our reading practices. The parallels are striking. One merely needs to substitute digital technology and the computer industry for agribusiness and one can see that the rush to make money from our consumption of information is doing to our mental lives what junk food is doing to our bodies; and just as the slow food movement seeks to recover the benefits of pre-industrial food production, a potential slow reading movement might recover the benefits of our pre-internet reading habits.
Many of Miedema's observations about reading digital texts versus books are obvious and uncontroversial. Any text that cannot be displayed in a few computer screens is unlikely to be read by anyone. Reading longer texts virtually requires a print copy. Print allows for a degree of concentration and reading comprehension that is nearly unobtainable from electronic texts. This may be due in part to the fact that reading a book involves more of one's body than reading a computer screen. One's hands, arms, and posture are involved in a way that they normally are not when reading a computer screen. Looking directly into the light of a computer screen is far more tiring than reading print on a page.
Then there are the intentional efforts to distract the reader that are built into most Web pages. Advertisement tempt us to abandon our reading and hyperlinks encourage us to follow tangent upon tangent until we lose track of what we originally set out to read. Even electronic texts that take up the full computer screen without hyperlinks are normally embedded in a browser that has scroll bars, "favorites" links, tabs, a clock, date, a search box, and sundry other icons that have nothing to do with the text. All of these distractions are absent from a printed book.
On the other hand, the very disadvantages of a digital text are its advantages. Digital texts are easily searched by computer algorithms and can be connected easily to any number of related texts. They often can be quickly copied and pasted into a new document, enlarged, reduced, tagged, annotated without damage to the original text. The benefits of electronic texts go on and on. Whether the printed text or the electronic text is superior depends on one's needs and intentions, but one important fact stands out: print encourages us to read slowly and carefully, allowing us to find more meaning in the text. That is, we are able to better understand what the author intended by writing the text in the first place. This leads to an important question that Miedema raises about how meaning is related to a text. Do we find meaning or create meaning when reading a text?
Slow Reading offers only sketchy answers to this question, but it does provide an admirable starting point. Finding meaning in a text can be contrasted with creating the meaning of the text, though certainly both are involved in any act of reading. Printed books guide us through the author's train of thought in the order and pace that the author intended. Each paragraph is present in the context of the book as a whole and this context refines and helps to disambiguate the meaning of any individual paragraph. We mostly are finding the meaning in the text. In contrast, an electronic text allow us to create meaning in a way that printed texts do not. This is a function of the ambiguous character of the snippets of electronic texts often displayed without significant context. We are free to draw our own original insight from an author's words, even to reverse the author's meaning completely. We can read the texts in any number of contexts which we create by navigating away from the text to other Web sites that strike us as related to the meaning we are constructing.
These two different reading activities are paradoxically both individual and communitarian. Reading a printed text to understand the author's meaning places the reader in a relatively solitary situation. One is usually reading alone in a room and is directly connected to a single text. At the same time, the print book reader is deeply engaged with a specific contribution by an author who is normally making a contribution to a larger and longer conversation of a community of authors. This links the reader to the larger, longer conversation. Any response the reader might have will be bounded to a great extent by the logic of that conversation. The reader becomes part of the community engaged in the conversation.
In contrast, the reader of an e-text is, of course, more immediately connected to an almost unlimited community of Web authors through sophisticated search tools that browse billions of texts, but the reader of an e-text is not deeply connected to anyone in this community. Search tools encourage the reader pick and choose short passages and construct an entirely new text that is built out of often unrelated or idiosyncratically related texts. The context of what one is reading may be an amalgam of statements in numerous unrelated conversations. The reader is not engaged in discovering the meaning of ideas in a specific on-going conversation within a community. The reader is acting more like a scientific investigator, searching the natural world (or in this case the world of Web texts) for observations that will allow the creation of a novel theory of the reader's own. In an important sense, reading on the Web often involves not engaging with others in a conversation, not listening to the author's full expression of an idea, but listening for what one wants to hear and appropriating the snippet of text for one's own solitary purposes.
Miedema notes numerous advantages that come from "slow," "deep," or "close" reading, including educational and psychological benefits, but Slow Reading is most of all a paean to the pleasures of settling into a comfortable chair and losing oneself in a book. In this age of ubiquitous data smog, that's a very fine thing.
Labels:
Books,
Library Science,
Psychology,
Recreation and Leisure,
Technology
Wednesday, August 3, 2011
The Googlization of Everything (and Why We Should Worry) / Siva Vaidhyanathan -- Berkeley, CA: University of California Press, 2011
Siva Vaidhyanathan, professor of media studies and law at the University of Virginia prefaces his book The Googlization of Everything with a quote from Alexis de Tocqueville that perfectly captures his darker attitudes toward Google: "It does not break wills, but it softens them, bends them, and directs them; it rarely forces one to act, but it constantly opposes itself to one's acting; it does not destroy, it prevents things from coming into being; it does not tyrannize, it hinders." Vaidhyanathan is particularly concerned that Google's explosive success is placing too much power over (or perhaps responsibility for) the world's treasure-store of knowledge in the hands of one private company. His concerns are not without merit.
Vaidhyanathan is quick to admit that Google's success is based on the clear benefits that it has given the world. More than any other search engine, Google has "organized and made universally accessible the world's knowledge" and it has done so in a manner that has been comfortable and appealing to most internet users. It has also behaved more or less consistently with its informal motto: "Don't be evil." Having given Google its due, Vaidhyanathan describes practices that Google has adopted that raise important questions.
In general, Google's success depends on the "PageRank system" that they employ in displaying search results. Search results generally appear in descending order based on the number of pages that link to a page that is captured by Google's Web crawlers. This seemingly surrenders any editorial decision-making that Google might otherwise employ in displaying results and makes use of the decisions by a myriad anonymous Web designers to evaluate the merits of Web pages. There are, however, instances in which some filtering is employed by Google, most obviously is Google's willingness to consider blocking a site if they receive complaints about it.
More worrisome consequences of Google's practices stem from their standard practices. While the PageRank system will generally provide an effective quality screen, it also privileges mainstream sites. Popularity among Web designers will lead to a site appearing on Google's first page of results, which in turn will reinforce the popularity of the site. It is not easy for a new or unusual site to break onto the first page of results.
Vaidhyanathan also takes Google to task for their collaboration with the Chinese government in censoring search results. At first Google argued that providing censored information was better for democracy movements than providing no information at all; however, when Google's servers were hacked (presumably by the Chinese government) and information about Chinese dissidents and critics of the government were compromised, Google "pulled out of China." The pull out was less impressive than it appeared, though. Google simply offered its Mandarin-language search service through Hong Kong, and since all traffic between Hong Kong and China is censored by China, China continues to receive Google services, but they are censored by China and not Google directly.
Vaidyanathan also provides an very interesting exploration of the privacy issues that Google's practices raises. Two levels of concern can be identified here: first, Google is amassing a huge amount of information about individual internet users that conceivably could be used against the user. More broadly, though, Google's store of data about users could easily be used by whomever owns the information to understand the demographics of internet users in a manner that could be politically significant. It is already showing itself to be economically significant.
Perhaps Vaidyhanathan's most salient concern is Google's growing dominance in the digitization of our written (and graphic) cultural heritage and here he indicts our research libraries as complicit in a massive, historic act of privatization of a public good. The Google Books project has resulted in the digitization of nearly all of the out of copyright books at Harvard, Stanford, Michigan, Oxford, and the New York Public Library. Disregarding copyright concerns, Google has also digitized massive numbers of "orphan" works, i.e., books that are not out of copyright, but for which the copyright holder is unknown. This turns normal publishing practices on their head: instead of requiring permission before publication, Google sought to publish until permission was denied by individual copyright holders. While it is true that a massive digitizing project of the sort that Google seeks to undertake would be impossible any other way, their actions are a direct challenge to long-settle copyright law. These actions resulted in a now-famous law suit, that has pitted publishers and authors against Google. The parties to the dispute have been trying to come to a legally acceptable out of court settlement, but have thus far been unable to do so.
Vaidhyanathan appears less concerned about the integrity of the traditional copyright regime than he is about what he calls "public failure," or the failure of public institutions to take responsibility of preserving and making freely accessible the world's cultural heritage and this is certainly the most significant concern that Google's activities have raised. While it is true that Google has not prevented others from creating competing digital archives, the head start that they have gained makes competition highly unlikely. This means that the access to the world's cultural heritage is likely to be -- at least for the foreseeable future -- in the hands of a single private company, unless, of course, public institutions take up the challenge of digitizing the resources for which they ostensibly are responsible and this is Vaidhyanathan's call to action. He proposes a "Human Knowledge Project" on the order of the Human Genome project, where governments around the world allocate the resources necessary to create a cultural digital repository that will ensure that our patrimony remains a public good accessible to all.
The Googlization of Everything is not always the most well organized book. Despite improvements from a pre-publication version, the book continues to read too much like a series of related blog postings; however, by the final chapter, the overall concerns do become clear and seem well argued, though one would be hard pressed to point to how and exactly where the argument was made.
Vaidhyanathan is quick to admit that Google's success is based on the clear benefits that it has given the world. More than any other search engine, Google has "organized and made universally accessible the world's knowledge" and it has done so in a manner that has been comfortable and appealing to most internet users. It has also behaved more or less consistently with its informal motto: "Don't be evil." Having given Google its due, Vaidhyanathan describes practices that Google has adopted that raise important questions.
In general, Google's success depends on the "PageRank system" that they employ in displaying search results. Search results generally appear in descending order based on the number of pages that link to a page that is captured by Google's Web crawlers. This seemingly surrenders any editorial decision-making that Google might otherwise employ in displaying results and makes use of the decisions by a myriad anonymous Web designers to evaluate the merits of Web pages. There are, however, instances in which some filtering is employed by Google, most obviously is Google's willingness to consider blocking a site if they receive complaints about it.
More worrisome consequences of Google's practices stem from their standard practices. While the PageRank system will generally provide an effective quality screen, it also privileges mainstream sites. Popularity among Web designers will lead to a site appearing on Google's first page of results, which in turn will reinforce the popularity of the site. It is not easy for a new or unusual site to break onto the first page of results.
Vaidhyanathan also takes Google to task for their collaboration with the Chinese government in censoring search results. At first Google argued that providing censored information was better for democracy movements than providing no information at all; however, when Google's servers were hacked (presumably by the Chinese government) and information about Chinese dissidents and critics of the government were compromised, Google "pulled out of China." The pull out was less impressive than it appeared, though. Google simply offered its Mandarin-language search service through Hong Kong, and since all traffic between Hong Kong and China is censored by China, China continues to receive Google services, but they are censored by China and not Google directly.
Vaidyanathan also provides an very interesting exploration of the privacy issues that Google's practices raises. Two levels of concern can be identified here: first, Google is amassing a huge amount of information about individual internet users that conceivably could be used against the user. More broadly, though, Google's store of data about users could easily be used by whomever owns the information to understand the demographics of internet users in a manner that could be politically significant. It is already showing itself to be economically significant.
Perhaps Vaidyhanathan's most salient concern is Google's growing dominance in the digitization of our written (and graphic) cultural heritage and here he indicts our research libraries as complicit in a massive, historic act of privatization of a public good. The Google Books project has resulted in the digitization of nearly all of the out of copyright books at Harvard, Stanford, Michigan, Oxford, and the New York Public Library. Disregarding copyright concerns, Google has also digitized massive numbers of "orphan" works, i.e., books that are not out of copyright, but for which the copyright holder is unknown. This turns normal publishing practices on their head: instead of requiring permission before publication, Google sought to publish until permission was denied by individual copyright holders. While it is true that a massive digitizing project of the sort that Google seeks to undertake would be impossible any other way, their actions are a direct challenge to long-settle copyright law. These actions resulted in a now-famous law suit, that has pitted publishers and authors against Google. The parties to the dispute have been trying to come to a legally acceptable out of court settlement, but have thus far been unable to do so.
Vaidhyanathan appears less concerned about the integrity of the traditional copyright regime than he is about what he calls "public failure," or the failure of public institutions to take responsibility of preserving and making freely accessible the world's cultural heritage and this is certainly the most significant concern that Google's activities have raised. While it is true that Google has not prevented others from creating competing digital archives, the head start that they have gained makes competition highly unlikely. This means that the access to the world's cultural heritage is likely to be -- at least for the foreseeable future -- in the hands of a single private company, unless, of course, public institutions take up the challenge of digitizing the resources for which they ostensibly are responsible and this is Vaidhyanathan's call to action. He proposes a "Human Knowledge Project" on the order of the Human Genome project, where governments around the world allocate the resources necessary to create a cultural digital repository that will ensure that our patrimony remains a public good accessible to all.
The Googlization of Everything is not always the most well organized book. Despite improvements from a pre-publication version, the book continues to read too much like a series of related blog postings; however, by the final chapter, the overall concerns do become clear and seem well argued, though one would be hard pressed to point to how and exactly where the argument was made.
Labels:
Books,
Computer Science,
Library Science,
Mass Media,
Technology
Tuesday, January 11, 2011
What Technology Wants / Kevin Kelly -- NY: Viking, 2010
Computer technology, particularly the Web, is having profound impacts on the world and our lives, but that is entirely uncontroversial. It is the significance of those impacts that is worthy of discussion. Which changes wrought by technology are important and which are trivial? Which are beneficial? Which are detrimental? How will they shape our future? I had hoped that Kevin Kelly, a former editor of Whole Earth Catalog and the founding editor of Wired Magazine, would provide some illuminating answers to these kinds of questions in his new book What Technology Wants. Sadly, he has not.
What Technology Wants places the rise of technology in an evolutionary -- indeed, cosmic -- context. According to Kelly, technology (or "the technium" as he calls its collective existence) is an inevitable product of the self-organizing forces of nature, set in motion with the big bang. The technium is one of Earth's seven kingdoms of life, an ever developing outgrowth of the human mind that has already taken on such characteristics as autonomy and sentience. These are startling claims outside the circles of science fiction and require much stronger defense than Kelly provides.
Nonetheless, much of What Technology Wants is interesting and informative. In his acknowledgements, Kelly tells us that the book was based on interviews and conversations with the 48 smartest people he knows, and much of that knowledge-base is manifest in the rich detail of his book. Unfortunately, when Kelly goes beyond the details and asserts broader philosophical claims, he is out of his depth.
The book's central idea is disclosed in its title. The technium is (or at very is now becoming) capable of intentional action on the order of highly evolved living species, including humans, but with all due respect to Kelly, I can want to close a window in my house to keep from getting cold, but my thermostat does not similarly want to regulate the temperature in my house. It is simply a changeable physical link between the electric power grid and my radiator system. Kelly blithely disregards the distinction. He willfully attributes human traits to technology based on the slenderest similarities. Furthermore, crucial concepts, like intelligence, sentience, choice, and freedom, are so ill-defined that he can assert nearly anything he likes about their relationship to technology. His treatment of these psychological and philosophical ideas are surprisingly naive.
More worthwhile aspects of his book include his discussion of evolutionary forces. Here, he goes beyond a simple outline of natural selection and notes the significance of structural and historical influences on the modification of species. His extension of these observations to the development of technologies is interesting, though not aways clear. The basic outlines describe a sequence of technologies, where each new technology is predicated on its predecessors. Technologies are transformed by (1) human intention, (2) the laws of nature i.e., the structure of technologies, and (3) historical accident. Together, these forces make certain technological developments inevitable. So much so that any particular discovery commonly is made multiple times, independently, and just at the time they are ripe for discovery. Kelly suggests that this inevitable development is the trajectory that technology "wants." It is unfortunate that he employs this description, since it distracts from a serious examination of the likely future of discovery.
Among the most egregious omissions from What Technology Wants are analyses of economic forces. Today, the inevitable progress of technology likely has to do less with the nature of the technology and more with the imperatives of capital. This, of course, fits with human intentionality that Kelly identifies as driving technological development, but his fixation on the structure of technology underplays this as the most significant driving force. At most, the structure of technology establishes certain limits to what can be or is likely to be developed. By overlooking the significance of economic forces, Kelly overstates the inevitability of certain technologies. Government regulation can significantly influence the path of technological development, if the political will can be mustered.
The second greatest omission is an analysis of the consequences of the end of easily acquired oil as an energy source. This historical accident might profoundly delay or reverse the growth of technology. Kelly suggests that the accumulation of technological advances has led to an constant doubling of the power of the technium. This is known as "Moore's Law" when applied to the development of computer chips. Allegedly, this exponential growth has generated the astounding explosion of technology in recent years, but was is missing here is the discovery and use of easily available oil as a fuel for growth. Kelly might, of course, identify the harnessing of oil as a technology that fits within his growth curve, but he does not recognize that far from being an interim step toward greater growth, oil-powered technologies are only as sustainable as the reserves that fuel them. Kelly's unlimited technological development is more likely to slow and even reverse when our oil-based economy slows to a crawl.
Finally, at least for the purposes of this review, Kelly's notion of progress is based on expanding "freedom" understood as nothing more than a greater range choices. For Kelly, the evolving technium is a choice-creating force and choice-creation appears to be his highest value. Kelly explicitly rejects the alternative value of human happiness as a direct measure of the value of individual technologies or the technium in general. While it is certainly true that technologies often have promoted human happiness, they have also promoted human suffering. Kelly believes the the former slightly out weighs the latter. It is a judgement that is hard, if not impossible, to quantify, but Kelly's infatuation with technology ensures his own answer. It is likely to be persuasive only to those previously convinced of its truth.
In the final chapters, Kelly confides his infatuation with technology. He probably expects the readers who have stuck with him for so long agree with him. He writes, "I find myself indebted to the net for its provisions. It is a steadfast benefactor, always there. I caress it with my fidgety fingers; it yields to my desires, like a lover. Secret knowledge? Here. Predictions of what is to come? Here. Maps to hidden places? Here." He continues this sort of lurid prose for several paragraphs. In the final chapter, Kelly discusses the technium's relationship to God. He writes, "If there is a God, the arc of the technium is aimed right at him....The ongoing self-organized mutability of life, evolution, mind, and the technium is a reflexion of God's becoming," and "we can see more God in a cell phone than a tree frog."
What Technology Wants is a lively, interesting, entertaining, infuriating, absurd book, filled with over-generalizations, willfull surrender to conceptual errors, inappropriate analogies, and dubious metaphysics. Hopefully, better books on its important topic will evolve soon.
What Technology Wants places the rise of technology in an evolutionary -- indeed, cosmic -- context. According to Kelly, technology (or "the technium" as he calls its collective existence) is an inevitable product of the self-organizing forces of nature, set in motion with the big bang. The technium is one of Earth's seven kingdoms of life, an ever developing outgrowth of the human mind that has already taken on such characteristics as autonomy and sentience. These are startling claims outside the circles of science fiction and require much stronger defense than Kelly provides.
Nonetheless, much of What Technology Wants is interesting and informative. In his acknowledgements, Kelly tells us that the book was based on interviews and conversations with the 48 smartest people he knows, and much of that knowledge-base is manifest in the rich detail of his book. Unfortunately, when Kelly goes beyond the details and asserts broader philosophical claims, he is out of his depth.
The book's central idea is disclosed in its title. The technium is (or at very is now becoming) capable of intentional action on the order of highly evolved living species, including humans, but with all due respect to Kelly, I can want to close a window in my house to keep from getting cold, but my thermostat does not similarly want to regulate the temperature in my house. It is simply a changeable physical link between the electric power grid and my radiator system. Kelly blithely disregards the distinction. He willfully attributes human traits to technology based on the slenderest similarities. Furthermore, crucial concepts, like intelligence, sentience, choice, and freedom, are so ill-defined that he can assert nearly anything he likes about their relationship to technology. His treatment of these psychological and philosophical ideas are surprisingly naive.
More worthwhile aspects of his book include his discussion of evolutionary forces. Here, he goes beyond a simple outline of natural selection and notes the significance of structural and historical influences on the modification of species. His extension of these observations to the development of technologies is interesting, though not aways clear. The basic outlines describe a sequence of technologies, where each new technology is predicated on its predecessors. Technologies are transformed by (1) human intention, (2) the laws of nature i.e., the structure of technologies, and (3) historical accident. Together, these forces make certain technological developments inevitable. So much so that any particular discovery commonly is made multiple times, independently, and just at the time they are ripe for discovery. Kelly suggests that this inevitable development is the trajectory that technology "wants." It is unfortunate that he employs this description, since it distracts from a serious examination of the likely future of discovery.
Among the most egregious omissions from What Technology Wants are analyses of economic forces. Today, the inevitable progress of technology likely has to do less with the nature of the technology and more with the imperatives of capital. This, of course, fits with human intentionality that Kelly identifies as driving technological development, but his fixation on the structure of technology underplays this as the most significant driving force. At most, the structure of technology establishes certain limits to what can be or is likely to be developed. By overlooking the significance of economic forces, Kelly overstates the inevitability of certain technologies. Government regulation can significantly influence the path of technological development, if the political will can be mustered.
The second greatest omission is an analysis of the consequences of the end of easily acquired oil as an energy source. This historical accident might profoundly delay or reverse the growth of technology. Kelly suggests that the accumulation of technological advances has led to an constant doubling of the power of the technium. This is known as "Moore's Law" when applied to the development of computer chips. Allegedly, this exponential growth has generated the astounding explosion of technology in recent years, but was is missing here is the discovery and use of easily available oil as a fuel for growth. Kelly might, of course, identify the harnessing of oil as a technology that fits within his growth curve, but he does not recognize that far from being an interim step toward greater growth, oil-powered technologies are only as sustainable as the reserves that fuel them. Kelly's unlimited technological development is more likely to slow and even reverse when our oil-based economy slows to a crawl.
Finally, at least for the purposes of this review, Kelly's notion of progress is based on expanding "freedom" understood as nothing more than a greater range choices. For Kelly, the evolving technium is a choice-creating force and choice-creation appears to be his highest value. Kelly explicitly rejects the alternative value of human happiness as a direct measure of the value of individual technologies or the technium in general. While it is certainly true that technologies often have promoted human happiness, they have also promoted human suffering. Kelly believes the the former slightly out weighs the latter. It is a judgement that is hard, if not impossible, to quantify, but Kelly's infatuation with technology ensures his own answer. It is likely to be persuasive only to those previously convinced of its truth.
In the final chapters, Kelly confides his infatuation with technology. He probably expects the readers who have stuck with him for so long agree with him. He writes, "I find myself indebted to the net for its provisions. It is a steadfast benefactor, always there. I caress it with my fidgety fingers; it yields to my desires, like a lover. Secret knowledge? Here. Predictions of what is to come? Here. Maps to hidden places? Here." He continues this sort of lurid prose for several paragraphs. In the final chapter, Kelly discusses the technium's relationship to God. He writes, "If there is a God, the arc of the technium is aimed right at him....The ongoing self-organized mutability of life, evolution, mind, and the technium is a reflexion of God's becoming," and "we can see more God in a cell phone than a tree frog."
What Technology Wants is a lively, interesting, entertaining, infuriating, absurd book, filled with over-generalizations, willfull surrender to conceptual errors, inappropriate analogies, and dubious metaphysics. Hopefully, better books on its important topic will evolve soon.
Subscribe to:
Posts (Atom)