| |
Current Topic: Technology |
|
Technologies of Power | MIT Press |
|
|
Topic: Technology |
12:34 am EDT, Aug 29, 2003 |
This collection explores how technologies become forms of power, how people embed their authority in technological systems, and how the machines and the knowledge that make up technical systems strengthen or reshape social, political, and cultural power. The authors suggest ways in which a more nuanced investigation of technology's complex history can enrich our understanding of the changing meanings of modernity. They consider the relationship among the state, expertise, and authority; the construction of national identity; changes in the structure and distribution of labor; political ideology and industrial development; and political practices during the Cold War. The essays show how insight into the technological aspects of such broad processes can help synthesize material and cultural methods of inquiry and how reframing technology's past in broader historical terms can suggest new directions for science and technology studies. Technologies of Power | MIT Press |
|
Topic: Technology |
12:04 am EDT, Aug 29, 2003 |
Most documents are the product of continual evolution. An essay may undergo dozens of revisions; source code for a computer program may undergo thousands. And as online collaboration becomes increasingly common, we see more and more ever-evolving group-authored texts. This site is a preliminary report on a simple visual technique, history flow, that provides a clear view of complex records of contributions and collaboration. IBM | History Flow |
|
Topic: Technology |
11:27 pm EDT, Aug 28, 2003 |
Anthropologist Christopher Kelty on programmers, networks and information technology Kelty has studied the political economy of information; Free Software; cultural aspects of intellectual property law; reputation, trust and exchange in communities of software programmers; and the history of medicine in America. Kelty teaches classes in science and technology studies, the mechanization of thought processes, the history of memory systems, ... Not all people involved with "hacking" are self-identified hackers. ... Entrepreneurs, visionaries, activists and lawyers are engaged in some of the same social worlds but may not call themselves hackers. In the end, the goal is to investigate the nature of social relations and shared attitudes toward the worlds we live in ... to find what ties people together in a given social world. ... information is not necessarily something that circulates on the Internet. It is something that can be understood socially as existing in a particular time and place through repeated interactions between people. I also talk about the differences between communication networks and social networks and try to give the students a way of thinking about how one might have both a communication network and a social network at the same time. ... areas like this are quite hard for students to get their head around ... I like to focus on banal, boring issues like standards, protocols, and IPR because I delight in showing how supposedly arcane technical problems actually turn out to be political. ... IP rights hand a kind of police power over to private bodies. ... The economic justification for the existence of IP is different from the actual uses to which people put it. Scientists and engineers like to think that the technical and scientific issues can be separated out from the social, sort of fuzzy issues. My claim is that they're heavily tied together. A Whole New Worldview |
|
High-Tech Word of Mouth Maims Movies in a Flash |
|
|
Topic: Technology |
11:14 pm EDT, Aug 19, 2003 |
"In the old days, there used to be a term, 'buying your gross,'" said Rick Sands, chief operating officer at Miramax, referring to the millions of dollars studios throw at a movie to ensure a big opening weekend. "You could buy your gross for the weekend and overcome bad word of mouth, because it took time to filter out into the general audience," he said. "Those days are over. Today, there is no fooling the public." "Gigli" was in a class by itself, plunging faster than the scariest summer thrill ride a disastrous $3.7-million opening weekend, followed by a record-breaking drop of 81.9%. High-Tech Word of Mouth Maims Movies in a Flash |
|
The Augmented Social Network | First Monday |
|
|
Topic: Technology |
8:09 am EDT, Aug 1, 2003 |
Could the next generation of online communications strengthen civil society by better connecting people to others with whom they share affinities, so they can more effectively exchange information and self-organize? Could such a system help to revitalize democracy in the 21st century? This paper proposes the creation of an Augmented Social Network (ASN) that would build identity and trust into the architecture of the Internet, in the public interest, in order to facilitate introductions between people who share affinities or complementary capabilities across social networks. The ASN is not a piece of software or a Web site. Rather, it is a model for a next-generation online community ... Remember that paper you were going to write? This is it. The Augmented Social Network | First Monday |
|
The Global Course of the Information Revolution | RAND |
|
|
Topic: Technology |
12:30 pm EDT, Jul 19, 2003 |
Advances in information technology are heavily influencing ways in which business, society, and government work and function throughout the globe, bringing many changes to everyday life, in a process commonly termed the "information revolution." This book paints a picture of the state of the information revolution today and how it will likely progress in the near- to mid-term future (10 to 15 years), focusing separately on different regions of the worldNorth America, Europe, the Asia-Pacific region, Latin America, the Middle East and North Africa, and sub-Saharan Africa. The Global Course of the Information Revolution | RAND |
|
Dynamic Social Network Modeling and Analysis |
|
|
Topic: Technology |
12:43 am EDT, Jul 5, 2003 |
The National Research Council invited papers and held a workshop in November 2002 on the topic of dynamic social network modeling and analysis. You can read it online for free or purchase an electronic or printed copy. Dynamic Social Network Modeling and Analysis |
|
Waste - Nullsoft strikes again |
|
|
Topic: Technology |
10:40 am EDT, May 29, 2003 |
WASTE is a software product and protocol that enables secure distributed communication for small (on the order of 10-50 nodes) trusted groups of users. WASTE is designed to enable small companies and small teams within larger companies to easily communicate and collaborate in a secure and efficient fashion, independent of physical network topology. WASTE is licensed under the GPL. # Network architecture: WASTE uses a distributed architecture that allows for nodes to connect in a partial mesh type network. Nodes on the network can broadcast and route traffic. Nodes that are not publicly accessible or on slow links can choose not to route traffic. This network is built such that all services utilize the network, so firewall issues become moot. # Security: WASTE uses link-level encryption to secure links, and public keys for authentication. RSA is used for session key exchange and authentication, and the links are encrypted using Blowfish in PCBC mode. The automatic key distribution security model is very primitive at the moment, and may not lend itself well to some social situations. Waste - Nullsoft strikes again |
|
On the Bursty Evolution of Blogspace |
|
|
Topic: Technology |
1:11 pm EDT, May 24, 2003 |
We propose two new tools to address the evolution of hyperlinked corpora. First, we define time graphs to extend the traditional notion of an evolving directed graph, capturing link creation as a point phenomenon in time. Second, we develop definitions and algorithms for time-dense community tracking, to crystallize the notion of community evolution. We develop these tools in the context of Blogspace, the space of weblogs (or blogs). Our study involves approximately 750K links among 25K blogs. We create a time graph on these blogs by an automatic analysis of their internal time stamps. We then study the evolution of connected component structure and microscopic community structure in this time graph. We show that Blogspace underwent a transition behavior around the end of 2001, and has been rapidly expanding over the past year, not just in metrics of scale, but also in metrics of community structure and connectedness. This expansion shows no sign of abating, although measures of connectedness must plateau within two years. By randomizing link destinations in Blogspace, but retaining sources and timestamps, we introduce a concept of randomized Blogspace. We observe similar evolution of a giant component, but no corresponding increase in community structure. Having demonstrated the formation of micro-communities over time, we then turn to the ongoing activity within active communities. We extend recent work of Kleinberg to discover dense periods of "bursty" intra-community link creation. This paper by Prabhakar Raghavan of Verity was presented this week at the International WWW conference. Free ACM registration required for download. On the Bursty Evolution of Blogspace |
|
Information Flow in Social Groups [PDF] |
|
|
Topic: Technology |
1:37 am EDT, May 24, 2003 |
We present a study of information flow that takes into account the observation that an item relevant to one person is more likely to be of interest to individuals in the same social circle than those outside of it. This is due to the fact that the similarity of node attributes in social networks decreases as a function of the graph distance. An epidemic model on a scale-free network with this property has a finite threshold, implying that the spread of information is limited. We tested our predictions by measuring the spread of messages in an organization and also by numerical experiments that take into consideration the organizational distance among individuals. This paper is sort of a follow-up to the Email as Spectroscopy paper. You can find a PowerPoint briefing on it at http://www.hpl.hp.com/shl/papers/flow/justflow.ppt Information Flow in Social Groups [PDF] |
|