[iDC] To somebody with a hammer, everything looks like a nail.

Rob van Kranenburg kranenbu at xs4all.nl
Mon Feb 20 08:20:44 EST 2006


Hi Trebor,

I like that line, as I like my Nietzsche.

Yes,

> Cooperation, networking, and participation are key.

Therefore, we are in a team here working towards more balance in  
organic, analog and digital ecologies ( I bluntly state). And in a  
team there's goalies, defenders, attackers and what have you. I agree  
you need all the positions and you need to take them all serious,  
from ludic sousveillanc, to hacking consoles, to rfid performances  
dressed up in aluminium foil, to design strategies for locative media  
departments that will spring up (one coming in HKU this year), and  
grand narrative counter strategies alongside new visions of new  
territories.

> Internet2 is centrally controlled.

Exactly. I wonder what can one do about it, but experience it? I have  
no clue as to where the agency for citizens lies in this. As for the  
universities capacity and ability to rethink its intellectual output  
to which it holds some quality control - text - so seriously to  
actually start questioning itself I don't think that will happen and  
so it will blunder on into new Blackboard adventures and closed  
environments, only this time in gigabytes.

On Slashdot; from the-never-saw-it-coming-dept:

An anonymous reader writes "We've always know that Trusted Computing  
is really about DRM, but computer makers always denied it. Now that  
their Trusted Computing chips are standard on most new PCs, they've  
decided to come clean. According to Information Week, Lenovo has  
demonstrated a Thinkpad with built-in Microsoft and Adobe DRM that  
uses a Trusted Computing chip with a fingerprint sensor. Even worse:  
'The system is also aimed at tracking who reads a document and when,  
because the chip can report back every access attempt. If you access  
the file, your fingerprint is recorded.'"

http://yro.slashdot.org/article.pl?sid=06/02/19/070202&from=rss

Which is probably how you are going to acces Internet 2, and which is  
how off course Internet 2 will access you.

> Which values run our networks?

yes, indeed the question-  and whic h protocols - as you yourself  
point out, as these values are the key to the protocols, based on  
patents and copyright notions still favouring a kind of belief in  
individual genius as we move into a folksonomy,

Greetings, Rob


-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.thing.net/pipermail/idc/attachments/20060220/1f90fbea/attachment.html


More information about the iDC mailing list