industryterm:communication technologies

  • Training Remote Workers- How to Make the Most of It
    https://hackernoon.com/training-remote-workers-how-to-make-the-most-of-it-1d68ee2fcd94?source=r

    In the ever more diverse modern workplace, the amount of remote workers is increasing on a daily basis. Recent surveys show that around 70% of employees worldwide work remotely at least once a week. This number has increased in recent years alongside further advances in communication technologies, creating a more dispersed workforce.Alongside the increase in the overall amount of remote workers, the demand for flexible work from employees is increasing as well. Roughly one third of American workers say they would change jobs for one that allowed them to work off site, meaning businesses looking to attract employees could use remote work as an incentive.While advances in technology provide access to a wider global talent pool and allow businesses to grant their employees the perk of (...)

    #remote-work #remote-team #remote-working #coworking #training-exercises

  • [l] (https://blog.fefe.de/?ts=a5805be3) Aktuelle Ergebnisse der Gen...
    https://diasp.eu/p/7614309

    [l] Aktuelle Ergebnisse der Gender-Forschung: “Female Sexualization on social media” kommt nicht von männlicher Unterdrückung sondern von ökonomischer Ungerechtigkeit. Also jetzt in der Gesellschaft, nicht im Individuum.

    Our findings have important implications: Sexualization manifests in response to economic conditions but does not covary with female subordination. These results raise the possibility that sexualization may be a marker of social climbing among women that track the degree of status competition in the local environment.

    • Income inequality not gender inequality positively covaries with female sexualization on social media

      http://www.pnas.org/content/early/2018/08/20/1717959115

      Abstract

      Publicly displayed, sexualized depictions of women have proliferated, enabled by new communication technologies, including the internet and mobile devices. These depictions are often claimed to be outcomes of a culture of gender inequality and female oppression, but, paradoxically, recent rises in sexualization are most notable in societies that have made strong progress toward gender parity. Few empirical tests of the relation between gender inequality and sexualization exist, and there are even fewer tests of alternative hypotheses. We examined aggregate patterns in 68,562 sexualized self-portrait photographs (“sexy selfies”) shared publicly on Twitter and Instagram and their association with city-, county-, and cross-national indicators of gender inequality. We then investigated the association between sexy-selfie prevalence and income inequality, positing that sexualization—a marker of high female competition—is greater in environments in which incomes are unequal and people are preoccupied with relative social standing. Among 5,567 US cities and 1,622 US counties, areas with relatively more sexy selfies were more economically unequal but not more gender oppressive. A complementary pattern emerged cross-nationally (113 nations): Income inequality positively covaried with sexy-selfie prevalence, particularly within more developed nations. To externally validate our findings, we investigated and confirmed that economically unequal (but not gender-oppressive) areas in the United States also had greater aggregate sales in goods and services related to female physical appearance enhancement (beauty salons and women’s clothing). Here, we provide an empirical understanding of what female sexualization reflects in societies and why it proliferates.

      –--------------

      Data deposition: The data reported in this paper have been deposited in the Open Science Framework database (....).
      https://osf.io/gu6je

      #sexisme #inégalité_sociale #étude (pas accès libre)

  • The Geopolitical Economy of the Global Internet Infrastructure on JSTOR
    https://www.jstor.org/stable/10.5325/jinfopoli.7.2017.0228

    Article très intéressant qui repositionne les Etats dans la gestion de l’infrastructure globale de l’internet. En fait, une infrastructure globale pour le déploiement du capital (une autre approche de la géopolitique, issue de David Harvey).

    According to many observers, economic globalization and the liberalization of telecoms/internet policy have remade the world in the image of the United States. The dominant roles of Amazon, Apple, Facebook, and Google have also led to charges of US internet imperialism. This article, however, argues that while these internet giants dominate some of the most popular internet services, the ownership and control of core elements of the internet infrastructure—submarine cables, internet exchange points, autonomous system numbers, datacenters, and so on—are tilting increasingly toward the EU and BRICS (i.e., Brazil, Russia, India, China, and South Africa) countries and the rest of the world, complicating views of hegemonic US control of the internet and what Susan Strange calls the knowledge structure.

    This article takes a different tack. It argues that while US-based internet giants do dominate some of the middle and top layers of the internet—for example, operating systems (iOS, Windows, Android), search engines (Google), social networks (Facebook), online retailing (Amazon), over-the-top TV (Netflix), browsers (Google Chrome, Apple Safari, Microsoft Explorer), and domain names (ICANN)—they do not rule the hardware, or material infrastructure, upon which the internet and daily life, business, governments, society, and war increasingly depend. In fact, as the article shows, ownership and control of many core elements of the global internet infrastructure—for example, fiber optic submarine cables, content delivery networks (CDNs), autonomous system numbers (ASN), and internet exchange points (IXPs)—are tilting toward the rest of the world, especially Europe and the BRICS (i.e., Brazil, Russia, India, China, and South Africa). This reflects the fact that the United States’ standing in the world is slipping while an ever more multipolar world is arising.

    International internet backbone providers, internet content companies, and CDNs interconnect with local ISPs and at one or more of the nearly 2000 IXPs around the world. The largest IXPs are in New York, London, Amsterdam, Frankfurt, Seattle, Chicago, Moscow, Sao Paulo, Tokyo, and Hong Kong. They are core elements of the internet that switch traffic between all the various networks that comprise the internet system, and help to establish accessible, affordable, fast, and secure internet service.

    In developed markets, internet companies such as Google, Baidu, Facebook, Netflix, Youku, and Yandex use IXPs to interconnect with local ISPs such as Deutsche Telecoms in Germany, BT or Virgin Media in Britain, or Comcast in the United States to gain last-mile access to their customers—and vice versa, back up the chain. Indeed, 99 percent of internet traffic handled by peering arrangements among such parties occurs without any money changing hands or a formal contract.50 Where IXPs do not exist or are rare, as in Africa, or run poorly, as in India, the cost of bandwidth is far more expensive. This is a key factor that helps to explain why internet service is so expensive in areas of the world that can least afford it. It is also why the OECD and EU encourage developing countries to make IXPs a cornerstone of economic development and telecoms policy work.

    The network of networks that make up the internet constitute a sprawling, general purpose platform upon which financial markets, business, and trade, as well as diplomacy, spying, national security, and war depend. The world’s largest electronic payments system operator, the Society for Worldwide Interbank Financial Telecommunications’ (SWIFT) secure messaging network carries over 25 million messages a day involving payments that are believed to be worth over $7 trillion USD.59 Likewise, the world’s biggest foreign currency settlement system, the CLS Bank, executes upward of a million trades a day worth between $1.5 and $2.5 trillion over the global cable systems—although that is down by half from its high point in 2008.60 As Stephen Malphrus, former chief of staff to the US Federal Reserve Chairman Ben Bernanke, observed, when “communications networks go down, the financial services sector does not grind to a halt, rather it snaps to a halt.”61

    Governments and militaries also account for a significant portion of internet traffic. Indeed, 90 to 95 percent of US government traffic, including sensitive diplomatic and military orders, travels over privately owned cables to reach officials in the field.62 “A major portion of DoD data traveling on undersea cables is unmanned aerial vehicle video,” notes a study done for the Department of Homeland Security by MIT scholar Michael Sechrist.63 Indeed, the Department of Defense’s entire Global Information Grid shares space in these cables with the general public internet.64

    The 3.6 billion people as of early 2016 who use the internet to communicate, share music, ideas and knowledge, browse, upload videos, tweet, blog, organize social events and political protests, watch pornography, read sacred texts, and sell stuff are having the greatest influence on the current phase of internet infrastructure development. Video currently makes up an estimated two-thirds of all internet traffic, and is expected to grow to 80 percent in the next five years,69 with US firms leading the way. Netflix single-handedly accounts for a third of all internet traffic. YouTube is the second largest source of internet traffic on fixed and mobile networks alike the world over. Altogether, the big five internet giants account for roughly half of all “prime-time” internet traffic, a phrasing that deliberately reflects the fact that internet usage swells and peaks at the same time as the classic prime-time television period, that is, 7 p.m. to 11 p.m.

    Importance des investissements des compagnies de l’internet dans les projets de câbles.

    Several things stand out from this analysis. First, in less than a decade, Google has carved out a very large place for itself through its ownership role in four of the six projects (the SJC, Faster, Unity, and Pacific Cable Light initiatives), while Facebook has stakes in two of them (APG and PLCN) and Microsoft in the PLCN project. This is a relatively new trend and one that should be watched in the years ahead.

    A preliminary view based on the publicly available information is that the US internet companies are important but subordinate players in consortia dominated by state-owned national carriers and a few relatively new competitors. Keen to wrest control of core elements of the internet infrastructure that they perceive to have been excessively dominated by United States interests in the past, Asian governments and private investors have joined forces to change things in their favor. In terms of the geopolitical economy of the internet, there is both a shift toward the Asia-Pacific region and an increased role for national governments.

    Return of the State as Regulator of Concentrated Markets

    In addition to the expanded role of the state as market builder, regulator, and information infrastructure policy maker, many regulators have also rediscovered the reality of significant market concentration in the telecom-internet and media industries. Indeed, the US government has rejected several high-profile telecoms mergers in recent years, such as AT&T’s proposal to take over T-Mobile in 2011, T-Mobile’s bid for Sprint in 2014, and Comcast’s attempt to acquire Time Warner Cable last year. Even the approval of Comcast’s blockbuster takeover of NBC Universal in 2011, and Charter Communications acquisition of Time Warner Cable last year, respectively, came with important strings attached and ongoing conduct regulation designed to constrain the companies’ ability to abuse their dominant market power.87 The FCC’s landmark 2016 ruling to reclassify broadband internet access as a common carrier further indicated that US regulators have been alert to the realities of market concentration and telecoms-internet access providers’ capacity to abuse that power, and the need to maintain a vigilant eye to ensure that their practices do not swamp people’s rights to freely express themselves, maintain control over the collection, retention, use, and disclosure of their personal information, and to access a diverse range of services over the internet.88 The 28 members of the European Union, along with Norway, India, and Chile, have adopted similar “common carriage/network neutrality/open network”89 rules to offset the reality that concentration in core elements of these industries is “astonishingly high”90 on the basis of commonly used indicators (e.g., concentration ratios and the Herfindahl–Hirschman Index).

    These developments indicate a new phase in internet governance and control. In the first phase, circa the 1990s, technical experts and organizations such as the Internet Engineers Task Force played a large role, while the state sat relatively passively on the sidelines. In the second phase, circa the early to mid-2000s, commercial forces surged to the fore, while internet governance revolved around the ICANN and the multi-stakeholder model. Finally, the revelations of mass internet surveillance by many states and ongoing disputes over the multi-stakeholder, “internet freedom” agenda on the one side, versus the national sovereignty, multilateral model where the ITU and UN system would play a larger role in internet governance all indicate that significant moves are afoot where the relationship between states and markets is now in a heightened state of flux.

    Such claims, however, are overdrawn. They rely too heavily on the same old “realist,” “struggle for control” model where conflict between nation-states has loomed large and business interests and communication technologies served mainly as “weapons of politics” and the handmaidens of national interests from the telegraph in the nineteenth century to the internet today. Yet, nation-states and private business interests, then and now, not only compete with one another but also cooperate extensively to cultivate a common global space of economic accumulation. Communication technologies and business interests, moreover, often act independent of the nation-state and via “private structures of cooperation,” that is, cartels and consortia, as the history and contemporary state of the undersea cable networks illustrate. In fact, the internet infrastructure of the twenty-first century, much like that of the industrial information infrastructure of the past 150 years, is still primarily financed, owned, and operated by many multinational consortia, although more than a few submarine communications cables are now owned by a relatively new roster of competitive players, such as Tata, Level 3, Global Cloud Xchange, and so forth. They have arisen mostly in the last 20 years and from new quarters, such as India in the case of Tata, for example.

    #Economie_numérique #Géopolitique #Câbles_sous_marins

  • Unlike Us | About
    http://networkcultures.org/unlikeus/about

    Invitation to join the network (a series of events, reader, workshops, online debates, campaigns etc.)

    Concept: Geert Lovink (Institute of Network Cultures/HvA, Amsterdam) and Korinna Patelis (Cyprus University of Technology, Limassol)

    Thanks to Marc Stumpel, Sabine Niederer, Vito Campanelli, Ned Rossiter, Michael Dieter, Oliver Leistert, Taina Bucher, Gabriella Coleman, Ulises Mejias, Anne Helmond, Lonneke van der Velden, Morgan Currie and Eric Kluitenberg for their input.

    Summary
    The aim of Unlike Us is to establish a research network of artists, designers, scholars, activists and programmers who work on ‘alternatives in social media’. Through workshops, conferences, online dialogues and publications, Unlike Us intends to both analyze the economic and cultural aspects of dominant social media platforms and to propagate the further development and proliferation of alternative, decentralized social media software.

    Whether or not we are in the midst of internet bubble 2.0, we can all agree that social media dominate internet and mobile use. The emergence of web-based user to user services, driven by an explosion of informal dialogues, continuous uploads and user generated content have greatly empowered the rise of participatory culture. At the same time, monopoly power, commercialization and commodification are also on the rise with just a handful of social media platforms dominating the social web. These two contradictory processes – both the facilitation of free exchanges and the commercial exploitation of social relationships – seem to lie at the heart of contemporary capitalism.

    On the one hand new media create and expand the social spaces through which we interact, play and even politicize ourselves; on the other hand they are literally owned by three or four companies that have phenomenal power to shape such interaction. Whereas the hegemonic Internet ideology promises open, decentralized systems, why do we, time and again, find ourselves locked into closed corporate environments? Why are individual users so easily charmed by these ‘walled gardens’? Do we understand the long-term costs that society will pay for the ease of use and simple interfaces of their beloved ‘free’ services?

    The accelerated growth and scope of Facebook’s social space, for example, is unheard of. Facebook claims to have 700 million users, ranks in the top two or three first destination sites on the Web worldwide and is valued at 50 billion US dollars. Its users willingly deposit a myriad of snippets of their social life and relationships on a site that invests in an accelerated play of sharing and exchanging information. We all befriend, rank, recommend, create circles, upload photos, videos and update our status. A myriad of (mobile) applications orchestrate this offer of private moments in a virtual public, seamlessly embedding the online world in users’ everyday life.

    Yet despite its massive user base, the phenomena of online social networking remains fragile. Just think of the fate of the majority of social networking sites. Who has ever heard of Friendster? The death of Myspace has been looming on the horizon for quite some time. The disappearance of Twitter and Facebook – and Google, for that matter – is only a masterpiece of software away. This means that the protocological future is not stationary but allows space for us to carve out a variety of techno-political interventions. Unlike Us is developed in the spirit of RSS-inventor and uberblogger Dave Winer whose recent Blork project is presented as an alternative for ‘corporate blogging silos’. But instead of repeating the entrepreneurial-start-up-transforming-into-corporate-behemoth formula, isn’t it time to reinvent the internet as a truly independent public infrastructure that can effectively defend itself against corporate domination and state control?

    Agenda
    Going beyond the culture of complaint about our ignorance and loss of privacy, the proposed network of artists, scholars, activists and media folks will ask fundamental and overarching questions about how to tackle these fast-emerging monopoly powers. Situated within the existing oligopoly of ownership and use, this inquiry will include the support of software alternatives and related artistic practices and the development of a common alternative vision of how the techno-social world might be mediated.

    Without falling into the romantic trap of some harmonious offline life, Unlike Us asks what sort of network architectures could be designed that contribute to ‘the common’, understood as a shared resource and system of collective production that supports new forms of social organizations (such as organized networks) without mining for data to sell. What aesthetic tactics could effectively end the expropriation of subjective and private dimensions that we experience daily in social networks? Why do we ignore networks that refuse the (hyper)growth model and instead seek to strengthen forms of free cooperation? Turning the tables, let’s code and develop other ‘network cultures’ whose protocols are no longer related to the logic of ‘weak ties’. What type of social relations do we want to foster and discover in the 21st century? Imagine dense, diverse networked exchanges between billions of people, outside corporate and state control. Imagine discourses returning subjectivities to their ‘natural’ status as open nodes based on dialogue and an ethics of free exchange.

    To a large degree social media research is still dominated by quantitative and social scientific endeavors. So far the focus has been on moral panics, privacy and security, identity theft, self-representation from Goffman to Foucault and graph-based network theory that focuses on influencers and (news) hubs. What is curiously missing from the discourse is a rigorous discussion of the political economy of these social media monopolies. There is also a substantial research gap in understanding the power relations between the social and the technical in what are essentially software systems and platforms. With this initiative, we want to shift focus away from the obsession with youth and usage to the economic, political, artistic and technical aspects of these online platforms. What we first need to acknowledge is social media’s double nature.

    Dismissing social media as neutral platforms with no power is as implausible as considering social media the bad boys of capitalism. The beauty and depth of social media is that they call for a new understanding of classic dichotomies such as commercial/political, private/public, users/producers, artistic/standardised, original/copy, democratising/ disempowering. Instead of taking these dichotomies as a point of departure, we want to scrutinise the social networking logic. Even if Twitter and Facebook implode overnight, the social networking logic of befriending, liking and ranking will further spread across all aspects of life.

    The proposed research agenda is at once a philosophical, epistemological and theoretical investigation of knowledge artifacts, cultural production and social relations and an empirical investigation of the specific phenomenon of monopoly social media. Methodologically we will use the lessons learned from theoretical research activities to inform practice-oriented research, and vice-versa. Unlike Us is a common initiative of the Institute of Network Cultures (Amsterdam University of Applied Science HvA) and the Cyprus University of Technology in Limassol.

    An online network and a reader connected to a series of events initially in Amsterdam and Cyprus (early 2012) are already in planning. We would explicitly like to invite other partners to come on board who identify with the spirit of this proposal, to organize related conferences, festivals, workshops, temporary media labs and barcamps (where coders come together) with us. The reader (tentatively planned as number 8 in the Reader series published by the INC) will be produced mid-late 2012. The call for contributions to the network, the reader and the event series goes out in July 2011, followed by the publicity for the first events and other initiatives by possible new partners.

    Topics of Investigation
    The events, online platform, reader and other outlets may include the following topics inviting theoretical, empirical, practical and art-based contributions, though not every event or publication might deal with all issues. We anticipate the need for specialized workshops and barcamps.

    1. Political Economy: Social Media Monopolies
    Social media culture is belied in American corporate capitalism, dominated by the logic of start-ups and venture capital, management buyouts, IPOs etc. Three to four companies literally own the Western social media landscape and capitalize on the content produced by millions of people around the world. One thing is evident about the market structure of social media: one-to-many is not giving way to many-to-many without first going through many-to-one. What power do these companies actually have? Is there any evidence that such ownership influences user-generated content? How does this ownership express itself structurally and in technical terms?

    What conflicts arise when a platform like Facebook is appropriated for public or political purposes, while access to the medium can easily be denied by the company? Facebook is worth billions, does that really mean something for the average user? How does data-mining work and what is its economy? What is the role of discourse (PR) in creating and sustaining an image of credibility and trustworthiness, and in which forms does it manifest to oppose that image? The bigger social media platforms form central nodes, such as image upload services and short ulr services. This ecology was once fairly open, with a variety of new Twitter-related services coming into being, but now Twitter takes up these services itself, favoring their own product through default settings; on top of that it is increasingly shutting down access to developers, which shrinks the ecology and makes it less diverse.

    2. The Private in the Public
    The advent of social media has eroded privacy as we know it, giving rise to a culture of self-surveillance made up of myriad voluntary, everyday disclosures. New understandings of private and public are needed to address this phenomenon. What does owning all this user data actually mean? Why are people willing to give up their personal data, and that of others? How should software platforms be regulated?

    Is software like a movie to be given parental guidance? What does it mean that there are different levels of access to data, from partner info brokers and third-party developers to the users? Why is education in social media not in the curriculum of secondary schools? Can social media companies truly adopt a Social Network Users’ Bill of Rights?

    3. Visiting the Belly of the Beast
    The exuberance and joy that defined the dotcom era is cliché by now. IT use is occurring across the board, and new labour conditions can be found everywhere. But this should not keep our eyes away from the power relations inside internet companies. What are the geopolitical lines of distribution that define the organization and outsourcing taking place in global IT companies these days? How is the industry structured and how does its economy work?

    Is there a broader connection to be made with the politics of land expropriation and peasant labour in countries like India, for instance, and how does this analytically converge with the experiences of social media users? How do monopolies deal with their employees’ use of the platforms? What can we learn from other market sectors and perspectives that (critically) reflect on, for example, techniques of sustainability or fair trade?

    4. Artistic Responses to Social Media
    Artists are playing a crucial role in visualizing power relationships and disrupting subliminal daily routines of social media usage. Artistic practice provides an important analytical site in the context of the proposed research agenda, as artists are often first to deconstruct the familiar and to facilitate an alternative lens to understand and critique these media. Is there such a thing as a social ‘web aesthetics’? It is one thing to criticize Twitter and Facebook for their primitive and bland interface designs. How can we imagine the social in different ways? And how can we design and implement new interfaces to provide more creative freedom to cater to our multiple identities? Also, what is the scope of interventions with social media, such as, for example, the ‘dislike button’ add-on for Facebook? And what practices are really needed? Isn’t it time, for example, for a Facebook ‘identity correction’?

    5. Designing culture: representation and software
    Social media offer us the virtual worlds we use every day. From Facebook’s ‘like’ button to blogs’ user interface, these tools empower and delimit our interactions. How do we theorize the plethora of social media features? Are they to be understood as mere technical functions, cultural texts, signifiers, affordances, or all these at once? In what ways do design and functionalities influence the content and expressions produced? And how can we map and critique this influence? What are the cultural assumptions embedded in the design of social media sites and what type of users or communities do they produce?

    To answer the question of structure and design, one route is to trace the genealogy of functionalities, to historicize them and look for discursive silences. How can we make sense of the constant changes occurring both on and beyond the interface? How can we theorize the production and configuration of an ever-increasing algorithmic and protocological culture more generally?

    6. Software Matters: Sociotechnical and Algorithmic Cultures
    One of the important components of social media is software. For all the discourse on sociopolitical power relations governed by corporations such as Facebook and related platforms, one must not forget that social media platforms are thoroughly defined and powered by software. We need critical engagement with Facebook as software. That is, what is the role of software in reconfiguring contemporary social spaces? In what ways does code make a difference in how identities are formed and social relationships performed? How does the software function to interpellate users to its logic? What are the discourses surrounding software?

    One of the core features of Facebook for instance is its news feed, which is algorithmically driven and sorted in its default mode. The EdgeRank algorithm of the news feed governs the logic by which content becomes visible, acting as a modern gatekeeper and editorial voice. Given its 700 million users, it has become imperative to understand the power of EdgeRank and its cultural implications. Another important analytical site for investigation are the ‘application programming interfaces’ (APIs) that to a large extent made the phenomenal growth of social media platforms possible in the first place. How have APIs contributed to the business logic of social media? How can we theorize social media use from the perspective of the programmer?

    7. Genealogies of Social Networking Sites
    Feedback in a closed system is a core characteristic of Facebook; even the most basic and important features, such as ‘friending’, traces back to early cybernetics’ ideas of control. While the word itself became lost in various transitions, the ideas of cybernetics have remained stable in fields such as artificial intelligence, robotics and the biopolitical arena. Both communication and information theories shaped this discourse. How does Facebook relate to such an algorithmic shape of social life? What can Facebook teach us about the powers of systems theory? Would Norbert Wiener and Niklas Luhmann be friends on Facebook?

    8. Is Research Doomed?
    The design of Facebook excludes the third person perspective, as the only way in is through ones own profile. What does this inbuilt ‘me-centricity’ imply for social media research? Does it require us to rethink the so-called objectivity of researchers and the detached view of current social research? Why is it that there are more than 200 papers about the way people use Facebook, but the site is ‘closed’ to true quantitative inquiry? Is the state of art in social media research exemplary of the ‘quantitative turn’ in new media research? Or is there a need to expand and rethink methods of inquiry in social media research? Going beyond the usual methodological approaches of the quantitative and qualitative, we seek to broaden the scope of investigating these media. How can we make sense of the political economy and the socio-technical elements, and with what means? Indeed, what are our toolkits for collective, transdisciplinary modes of knowledge and the politics of refusal?

    9. Researching Unstable Ontologies
    Software destabilizes Facebook as a solid ontology. Software is always in becoming and so by nature ontogenetic. It grows and grows, living off of constant input. Logging on one never encounters the same content, as it changes on an algorithmic level and in terms of the platform itself. What does Facebook’s fluid nature imply for how we make sense of and study it? Facebook for instance willingly complicates research: 1. It is always personalized (see Eli Pariser). Even when creating ‘empty’ research accounts it never gives the same results compared to other people’s empty research accounts. 2. One must often be ‘inside’ social media to study it. Access from the outside is limited, which reinforces the first problem. 3. Outside access is ideally (for Facebook and Twitter) arranged through carefully regulated protocols of APIs and can easily be restricted. Next to social media as a problem for research, there is also the question of social research methods as intervention.

    10. Making Sense of Data: Visualization and Critique
    Data representation is one of the most important battlefields nowadays. Indeed, global corporations build their visions of the world increasingly based on and structured around complex data flows. What is the role of data today and what are the appropriate ways in which to make sense of the burgeoning datasets? As data visualization is becoming a powerful buzzword and social research increasingly uses digital tools to make ‘beautiful’ graphs and visualizations, there is a need to take a step back and question the usefulness of current data visualization tools and to develop novel analytical frameworks through which to critically grasp these often simplified and nontransparent ways of representing data.

    Not only is it important to develop new interpretative and visual methods to engage with data flows, data itself needs to be questioned. We need to ask about data’s ontological and epistemological nature. What is it, who is the producer, for whom, where is it stored? In what ways do social media companies’ terms of service regulate data? Whether alternative social media or monopolistic platforms, how are our data-bodies exactly affected by changes in the software?

    11. Pitfalls of Building Social Media Alternatives
    It is not only important to critique and question existing design and socio-political realities but also to engage with possible futures. The central aim of this project is therefore to contribute and support ‘alternatives in social media’. What would the collective design of alternative protocols and interfaces look like? We should find some comfort in the small explosion of alternative options currently available, but also ask how usable these options are and how real is the danger of fragmentation. How have developers from different initiatives so far collaborated and what might we learn from their successes and failures? Understanding any early failures and successes of these attempts seems crucial.

    A related issue concerns funding difficulties faced by projects. Finally, in what ways does regionalism (United States, Europe, Asia) feed into the way people search for alternatives and use social media.

    12. Showcasing Alternatives in Social Media
    The best way to criticize platform monopolies is to support alternative free and open source software that can be locally installed. There are currently a multitude of decentralized social networks in the making that aspire to facilitate users with greater power to define for themselves with whom share their data. Let us look into the wildly different initiatives from Crabgrass, Appleseed, Diaspora, NoseRub, BuddyCloud, Protonet, StatusNet, GNU Social, Lorea and OneSocialWeb to the distributed Twitter alternative Thimbl.

    In which settings are these initiative developed and what choices are made for their design? Let’s hear from the Spanish activists who have recently made experiences with the n-1.cc platform developed by Lorea. What community does this platform enable? While traditional software focuses on the individual profile and its relation to the network and a public (share with friends, share with friends of friends, share with public), the Lorea software for instance asks you with whom to share an update, picture or video. It finegrains the idea of privacy and sharing settings at the content level, not the user’s profile. At the same time, it requires constant decision making, or else a high level of trust in the community you share your data with. And how do we experience the transition from, or interoperability with, other platforms? Is it useful to make a distinction between corporate competitors and grassroots initiatives? How can these beta alternatives best be supported, both economically and socially? Aren’t we overstating the importance of software and isn’t the availability of capital much bigger in determining the adoption of a platform?

    13. Social Media Activism and the Critique of Liberation Technology
    While the tendency to label any emergent social movement as the latest ‘Twitter revolution’ has passed, a liberal discourse of ‘liberation technology’ (information and communication technologies that empower grassroots movements) continues to influence our ideas about networked participation. This discourse tends to obscure power relations and obstruct critical questioning about the capitalist institutions and superstructures in which these technologies operate. What are the assumptions behind this neo-liberal discourse? What role do ‘developed’ nations play when they promote and subsidize the development of technologies of circumvention and hacktivism for use in ‘underdeveloped’ states, while at the same time allowing social media companies at home to operate in increasingly deregulated environments and collaborating with them in the surveillance of citizens at home and abroad? What role do companies play in determining how their products are used by dissidents or governments abroad? How have their policies and Terms of Use changed as a result?

    14. Social Media in the Middle East and Beyond
    The justified response to downplay the role of Facebook in early 2011 events in Tunisia and Egypt by putting social media in a larger perspective has not taken off the table the question of how to organize social mobilizations. Which specific software do the ‘movements of squares’ need? What happens to social movements when the internet and ICT networks are shut down? How does the interruption of internet services shift the nature of activism? How have repressive and democratic governments responded to the use of ‘liberation technologies’? How do these technologies change the relationship between the state and its citizens? How are governments using the same social media tools for surveillance and propaganda or highjacking Facebook identities, such as happened in Syria? What is Facebook’s own policy when deleting or censoring accounts of its users?

    How can technical infrastructures be supported which are not shutdown upon request? How much does our agency depend on communication technology nowadays? And whom do we exclude with every click? How can we envision ‘organized networks’ that are based on ’strong ties’ yet open enough to grow quickly if the time is right? Which software platforms are best suited for the ‘tactical camping’ movements that occupy squares all over the world?

    15. Data storage: social media and legal cultures
    Data that is voluntarily shared by social media users is not only used for commercial purposes, but is also of interest to governments. This data is stored on servers of companies that are bound to the specific legal culture and country. This material-legal complex is often overlooked. Fore instance, the servers of Facebook and Twitter are located in the US and therefore fall under the US jurisdiction. One famous example is the request for the Twitter accounts of several activists (Gonggrijp, Jónsdóttir, Applebaum) affiliated with Wikileaks projects by the US government. How do activists respond and how do alternative social media platforms deal with this issue?

  • #orbis: The Stanford Geospatial Network Model of the Roman World

    Spanning one-ninth of the earth’s circumference across three continents, the Roman Empire ruled a quarter of humanity through complex networks of political power, military domination and economic exchange. These extensive connections were sustained by premodern transportation and communication technologies that relied on energy generated by human and animal bodies, winds, and currents.

    Conventional maps that represent this world as it appears from space signally fail to capture the severe environmental constraints that governed the flows of people, goods and information. Cost, rather than distance, is the principal determinant of connectivity.

    For the first time, ORBIS allows us to express Roman communication costs in terms of both time and expense. By simulating movement along the principal routes of the Roman road network, the main navigable rivers, and hundreds of sea routes in the Mediterranean, Black Sea and coastal Atlantic, this interactive model reconstructs the duration and financial cost of travel in antiquity.

    Taking account of seasonal variation and accommodating a wide range of modes and means of transport, ORBIS reveals the true shape of the Roman world and provides a unique resource for our understanding of premodern history.

    http://orbis.stanford.edu/orbis2012
    #Empire_Romain #histoire #visualisation #cartographie
    #ressources_pédagogiques
    cc @reka

  • Secure messaging scorecard
    A rather elaborate overview of all those messaging apps out there, presented in a scorecard so you can quickly check which tools actually keep your messages safe (+), and in what way.

    https://www.eff.org/secure-messaging-scorecard

    Most of the tools that are easy for the general public to use don’t rely on security best practices—including end-to-end encryption and open source code. Messaging tools that are really secure often aren’t easy to use; everyday users may have trouble installing the technology, verifying its authenticity, setting up an account, or may accidentally use it in ways that expose their communications.

    [...]

    The Secure Messaging Scorecard examines dozens of messaging technologies and rates each of them on a range of security best practices. Our campaign is focused on communication technologies — including chat clients, text messaging apps, email applications, and video calling technologies. These are the tools everyday users need to communicate with friends, family members, and colleagues, and we need secure solutions for them.

    (+) Updated: Please also check the comments below and do not take that scorecard simply at face value, as the security community has some relevant criticism on it.

    Old version : https://www.eff.org/node/82654

    #privacy

  • Dans un style franchement lourdingue (surtout pour un article de cette taille-là), mais quand même intéressant, par Antonio Cassili.

    Four theses on mass surveillance and privacy negotiation —
    Medium
    https://medium.com/@AntonioCasilli/four-theses-on-digital-mass-surveillance-and-the-negotiation-of-privacy-7254

    A French Digital Theory approach to a post-Snowden world.

    The current political debate is fueled by growing concern over the implementation of a digital mass surveillance framework aimed to gather, store and process data from transactions, interactions and everyday uses of information and communication technologies. In the wake of Edward Snowden’s early revelations about the US PRISM program, the general public were surprised and frightened by the extent to which the intelligence agencies of western democratic governments were intercepting information from their own citizens. These events are poised to force a profound change to the relationship between governments and those they govern, contributing to an unprecedented climate of geopolitical instability compounded by the fact that markets are increasingly playing less of a role as third party forces correcting states’ securitarian excesses. As the responsibilities of stakeholders in the digital economy become clearer through the creation of a vast military-industrial complex, we enter a phase of tension and distrust between consumers and private sector businesses.

    In the space where the political challenges of digital technologies are played out, economic and strategic interests promote these surveillance methods, maintaining they simply build on the tools that modern states have long used to monitor populations. In fact, they represent a clean break with past approaches.

    The deployment of a digital mass surveillance system has been made possible by a long-term shift towards the expression of a powerful executive, combined with the infiltration of military interests in the democratic apparatus, as well as by the gradual assimilation between domestic security matters and the doctrine of national security.

    Although the executive power’s tendency to operate with no counterbalance could be seen as part and parcel of a democratic project that is constantly in fieri (an ‘unfinished democracy’, to borrow Pierre Rosanvallon’s terms), the securitarian phenomenon stands apart by the way it has grown into an all-encompassing discourse influencing the methods of democratic deliberation, obstructing the ability of the legislative and judicial branches to control executive bodies on the one hand, and the manifestations of a general willingness to respect citizens’ freedoms and fundamental rights on the other.

  • There Are No Technology Shortcuts to Good Education « Educational Technology Debate
    https://edutechdebate.org/ict-in-schools/there-are-no-technology-shortcuts-to-good-education

    All of the evidence stands on its own, but I will tie them together with a single theory that explains why technology is unable to substitute for good teaching: Quality primary and secondary education is a multi-year commitment whose single bottleneck is the sustained motivation of the student to climb an intellectual Everest. Though children are naturally curious, they nevertheless require ongoing guidance and encouragement to persevere in the ascent. Caring supervision from human teachers, parents, and mentors is the only known way of generating motivation for the hours of a school day, to say nothing of eight to twelve school years.

    And, as for technology’s capacity to even the playing field of education, he says, “the introduction of information and communication technologies in [...] schools serves to amplify existing forms of inequality.” This is a specific instance of a broader thesis I argued recently, of technology’s role as an amplifier of existing institutional forces.

    Pro-Technology Rhetoric 9: Technology is transformative, revolutionary, and otherwise stupendous! Therefore, it must be good for education.

    Reality: This myth is pervasive because it is so easy to believe and because we want to believe it so badly. After all, with computers, we can publish our own newsletters, buy gifts in our pajamas, and find the best Italian restaurant in town. And, it would be nice if all we had to do was to sit every child in front of a computer for 6 hours a day to turn them into educated, upright citizens.

    But, why do we believe this? It makes no sense. We don’t expect that playing football video games makes a child a great athlete. We don’t believe that watching YouTube will turn our kids into Steven Spielbergs. We don’t think that socializing on Facebook will turn people into electable government officials. And, if none of those things work, then why do we expect it of writing, history, science, or mathematics?

  • Cape Town Sanitation Hackathon
    http://capetownsanhack.eventbrite.com

    The Sanitation Hackathon emerges out of the recognition that the rapid increase of penetration, awareness and literacy in information and communication technologies (ICTs) in the developing world can transform water and sanitation management. Mobile phones, the Internet and open data are creating new entry points to make sanitation services more transparent, inclusive and participatory while forging new connections between the government, its citizens and the private sector.

    #toilettes #mobile #hack

  • ORBIS : carte interactive de la Rome antique
    http://orbis.stanford.edu

    http://www.theatlantic.com/technology/archive/2012/05/plan-a-trip-through-history-with-orbis-a-google-maps-for-ancient-rome/257554

    un monde virtuel, idéal pour un écrivain qui veut se plonger dans un univers parallèle !

    Spanning one-ninth of the earth’s circumference across three continents, the Roman Empire ruled a quarter of humanity through complex networks of political power, military domination and economic exchange. These extensive connections were sustained by premodern transportation and communication technologies that relied on energy generated by human and animal bodies, winds, and currents.
    Conventional maps that represent this world as it appears from space signally fail to capture the severe environmental constraints that governed the flows of people, goods and information. Cost, rather than distance, is the principal determinant of connectivity.
    For the first time, ORBIS allows us to express Roman communication costs in terms of both time and expense. By simulating movement along the principal routes of the Roman road network, the main navigable rivers, and hundreds of sea routes in the Mediterranean, Black Sea and coastal Atlantic, this interactive model reconstructs the duration and financial cost of travel in antiquity.
    Taking account of seasonal variation and accommodating a wide range of modes and means of transport, ORBIS reveals the true shape of the Roman world and provides a unique resource for our understanding of premodern history.

    #cartographie #histoire