[iDC] To somebody with a hammer, everything looks like a nail.
Rob van Kranenburg
kranenbu at xs4all.nl
Mon Feb 20 08:20:44 EST 2006
Hi Trebor,
I like that line, as I like my Nietzsche.
Yes,
> Cooperation, networking, and participation are key.
Therefore, we are in a team here working towards more balance in
organic, analog and digital ecologies ( I bluntly state). And in a
team there's goalies, defenders, attackers and what have you. I agree
you need all the positions and you need to take them all serious,
from ludic sousveillanc, to hacking consoles, to rfid performances
dressed up in aluminium foil, to design strategies for locative media
departments that will spring up (one coming in HKU this year), and
grand narrative counter strategies alongside new visions of new
territories.
> Internet2 is centrally controlled.
Exactly. I wonder what can one do about it, but experience it? I have
no clue as to where the agency for citizens lies in this. As for the
universities capacity and ability to rethink its intellectual output
to which it holds some quality control - text - so seriously to
actually start questioning itself I don't think that will happen and
so it will blunder on into new Blackboard adventures and closed
environments, only this time in gigabytes.
On Slashdot; from the-never-saw-it-coming-dept:
An anonymous reader writes "We've always know that Trusted Computing
is really about DRM, but computer makers always denied it. Now that
their Trusted Computing chips are standard on most new PCs, they've
decided to come clean. According to Information Week, Lenovo has
demonstrated a Thinkpad with built-in Microsoft and Adobe DRM that
uses a Trusted Computing chip with a fingerprint sensor. Even worse:
'The system is also aimed at tracking who reads a document and when,
because the chip can report back every access attempt. If you access
the file, your fingerprint is recorded.'"
http://yro.slashdot.org/article.pl?sid=06/02/19/070202&from=rss
Which is probably how you are going to acces Internet 2, and which is
how off course Internet 2 will access you.
> Which values run our networks?
yes, indeed the question- and whic h protocols - as you yourself
point out, as these values are the key to the protocols, based on
patents and copyright notions still favouring a kind of belief in
individual genius as we move into a folksonomy,
Greetings, Rob
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.thing.net/pipermail/idc/attachments/20060220/1f90fbea/attachment-0002.html
More information about the iDC
mailing list