Browse Source

changes in section 1 and 2 + in the start file

master
manetta 4 years ago
parent
commit
5c67c1f023
  1. 2
      content/Section 1 - Digital Infrapunctures/1-introduction.md
  2. 0
      content/Section 1 - Digital Infrapunctures/2-question-1.md
  3. 0
      content/Section 1 - Digital Infrapunctures/3-question-2.md
  4. 0
      content/Section 1 - Digital Infrapunctures/4-question-3.md
  5. 0
      content/Section 1 - Digital Infrapunctures/5-question-4.md
  6. 0
      content/Section 1 - Digital Infrapunctures/6-question-5.md
  7. 47
      content/Section 2 - Harm in Computational Infrastructures/1-introduction.md
  8. 2
      content/Section 2 - Harm in Computational Infrastructures/2-question-1.md
  9. 2
      content/Section 2 - Harm in Computational Infrastructures/3-question-2.md
  10. 2
      content/Section 2 - Harm in Computational Infrastructures/4-question-3.md
  11. 2
      content/Section 2 - Harm in Computational Infrastructures/5-question-4.md
  12. 2
      content/Section 2 - Harm in Computational Infrastructures/6-question-5.md
  13. 6
      content/Section 2 - Stress Points In Digital Infrastructures/1-what-types-of-bots-are-there.md
  14. 2
      content/Section 5 - Infrapunctural Imaginaries (exercise)/1-introduction.md
  15. 2
      content/Section 6 - Critical Interventions Through Bots (exercise)/1-introduction.md
  16. 8
      content/pages/start.md

2
content/Section 1 - Digital Infrapuncture/1-introduction.md → content/Section 1 - Digital Infrapunctures/1-introduction.md

@ -15,7 +15,7 @@ In her presentation, she describes digital infrastructures according to their:
![A screenshot of the last slide from Verhoeven's presentation.](/images/slide.png)
If we understand an infrastructure as a relational device -- or in other words -- as a technology that bring things (back) together, we critically enquire where do fail in doing this.
If we understand an infrastructure as a relational device - or in other words - as a technology that brings things (back) together, we can start to critically enquire where infrastructures fail to do so.
What are examples of infrastructures that do *not* bring things together anymore?

0
content/Section 1 - Digital Infrapuncture/2-question-1.md → content/Section 1 - Digital Infrapunctures/2-question-1.md

0
content/Section 1 - Digital Infrapuncture/3-question-2.md → content/Section 1 - Digital Infrapunctures/3-question-2.md

0
content/Section 1 - Digital Infrapuncture/4-question-3.md → content/Section 1 - Digital Infrapunctures/4-question-3.md

0
content/Section 1 - Digital Infrapuncture/5-question-4.md → content/Section 1 - Digital Infrapunctures/5-question-4.md

0
content/Section 1 - Digital Infrapuncture/6-question-5.md → content/Section 1 - Digital Infrapunctures/6-question-5.md

47
content/Section 2 - Harm in Computational Infrastructures/1-introduction.md

@ -0,0 +1,47 @@
Title: Introduction: Harms in Computational Infrastructures
Slug: 01-s2-introduction
Date: 2020-11-01 12:00
Summary: How to correct, shift or expose harms in computational infrastructures?
<!-- > Our concern is that the computational infrastructures are far more than a technological ecosystem alone. Like all infrastructure, they incentivize us to embed their values, and therewith much of their politics in the lower layers of the technology stack. Comparable to the cables and control equipment in electrical networks that determine what can and cannot be connected to it, computational infrastructures embed constraints on what can and cannot be built on top of it, as well as what is accessible to those needing to audit or validate its functionality.[^progammableinfrastructures] -->
What are computational infrastructures?
Who designs them? What values do they embed into digital systems?
The work of Seda Gürses[^seda] provides us with handles to XXX [unpack, look closer into, study, explore] computational infrastructures. Throughout her work she has questioned the notion of "fair" technologies, how such "fair" practices are XXX [formulated, reasoned upon, shaped] and who is involved in reviewing the "fair" impact of digital systems. An important factor in her work is to approach computational infrastructures as systems that are far more than a technological ecosystems alone.
<!-- They effect different externalities, operate on the basis of specific embedded values and define restrictions of what can be built on top of the infrastructure and what not. -->
<!-- Through the work of Seda we can understand computational infrastructures as complex entities. -->
Three works that particulary connect to *digital infrapunctures* are her work on *POTs (Protective Optimization Technologies)*[^pots], *Programmable Infrastructures*[^progammableinfrastructures] and *The Institute for Technology in the Public Interest*[^titipi]. Links to these works are included at the bottom of this page.
<!-- How can we recognize harm in these digital systems? -->
<!-- And how to possibly correct, shift or expose these harms? -->
This section contains five video contributions in which she will unpack how computational infrastructures operate and what impact that has on the digital systems that are being built on top of them.
We invited her to respond to the following questions:
* What are computational infrastructures?
* What are elements that shape (or are shaped by) computational infrastructures?
* How can we understand the harm caused by computational infrastructures and the systems which deploy them?
* What interventions are possible to mitigate or eliminate this harm?
* What kind of limitations do you see in the realisation of these interventions?
<!-- Her work focuses on privacy enhancing and protective optimization technologies (PETs and POTs), privacy engineering, as well as questions around software infrastructures, social justice and political economy as they intersect with computer science. -->
<!-- We propose Protective Optimization Technologies (POTs). POTs, provide means for affected parties to address the negative impacts of systems in the environment, expanding avenues for political con- testation. POTs intervene from outside the system, do not require service providers to cooperate, and can serve to correct, shift, or expose harms that systems impose on populations and their environments. We illustrate the potential and limitations of POTs in two case studies: countering road congestion caused by traffic-beating applications, and recalibrating credit scoring for loan applicants. -->
# Footnotes
[^seda]: Seda is currently an Associate Professor in the Department of Multi-Actor Systems at TU Delft at the Faculty of Technology Policy and Management, and an affiliate at the COSIC Group at the Department of Electrical Engineering (ESAT), KU Leuven. Beyond her academic work, she also collaborated with artistic initiatives including Constant vzw, Bootlab, De-center, ESC in Brussels, Graz and Berlin.
[^pots]: Bogdan Lulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses "POTs: Protective Optimization Technologies" (2020). <https://arxiv.org/pdf/1806.02711.pdf>
[^progammableinfrastructures]: Seda Gürses, Roel Dobbe, Martha Poon "Seminar on Programmable Infrastructures" (2020). <https://www.tudelft.nl/tbm/programmable-infrastructures/>
[^titipi]: Miriyam Aouragh, Seda Gürses, Femke Snelting, Helen Pritchard "The Institute for Technology in the Public Interest" (accessed on 2020) <http://titipi.org/>

2
content/Section 2 - Stress Points In Digital Infrastructures/2-question-1.md → content/Section 2 - Harm in Computational Infrastructures/2-question-1.md

@ -1,4 +1,4 @@
Title: Question 1: What are programmable infrastructures?
Title: Question 1: What are computational infrastructures?
Slug: 02-s2-question-1
Date: 2020-11-01 12:01
Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Stress Points In Digital Infrastructures/3-question-2.md → content/Section 2 - Harm in Computational Infrastructures/3-question-2.md

@ -1,4 +1,4 @@
Title: Question 2: What are elements that shape (or are shaped by) programmable infrastructures?
Title: Question 2: What are elements that shape (or are shaped by) computational infrastructures?
Slug: 03-s2-question-2
Date: 2020-11-01 12:02
Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Stress Points In Digital Infrastructures/4-question-3.md → content/Section 2 - Harm in Computational Infrastructures/4-question-3.md

@ -1,4 +1,4 @@
Title: Question 3: How can they be made to serve a "public interest"?
Title: Question 3: How can we understand the harm caused by computational infrastructures and the systems which deploy them?
Slug: 04-s2-question-3
Date: 2020-11-01 12:03
Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Stress Points In Digital Infrastructures/5-question-4.md → content/Section 2 - Harm in Computational Infrastructures/5-question-4.md

@ -1,4 +1,4 @@
Title: Question 4: Who can be involved in the making of these infrastructures?
Title: Question 4: What interventions are possible to mitigate or eliminate this harm?
Slug: 05-s2-question-4
Date: 2020-11-01 12:04
Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Stress Points In Digital Infrastructures/6-question-5.md → content/Section 2 - Harm in Computational Infrastructures/6-question-5.md

@ -1,4 +1,4 @@
Title: QUESTION 5: What interventions are possible in programmable infrastructures?
Title: QUESTION 5: What kind of limitations do you see in the realisation of these interventions?
Slug: 06-s2-question-5
Date: 2020-11-01 12:05
Summary: A video contribution by Seda Gürses.

6
content/Section 2 - Stress Points In Digital Infrastructures/1-what-types-of-bots-are-there.md

@ -1,6 +0,0 @@
Title: Introduction: Programmable Infrastructures
Slug: 01-s2-introduction
Date: 2020-11-01 12:00
Summary: What are Programmable Infrastructures?
How are digital infrastructures different from other infrastructures? Seda Gürses in collaboration with Roel Dobbe and Martha Poon have formulated a distinct category: *programmable infrastructures*.

2
content/Section 5 - Infrapunctural Imaginaries (exercise)/1-introduction.md

@ -13,6 +13,8 @@ So far, you have encountered different digital infrastructures throughout this m
Doing an exercise will create space to engage with the term *digital infrapunctures* in a playful way, allowing us to speculate about possible bot interventions or infrapunctural actions.
[note: insert prototypes as arguments]
# What is the exercise?
Imagine that a specific group is working with (or on) a bot as infrapunctural intervention. Choose a communicative infrastructure that is used by the group for this intervention and imagine what is happening.

2
content/Section 6 - Critical Interventions Through Bots (exercise)/1-introduction.md

@ -5,7 +5,7 @@ Summary: Start of the bot-making excercise.
In this last section of the module we will make a bot. 🤖
We will use the dialog writing exercise and transform it into a bot ([in case you haven't done it yet, it is recommended to go through this section first](/category/http://localhost:8000/category/section-5-infrapunctural-imaginaries-exercise.html)).
We will use the dialog writing exercise and transform it into a bot ([in case you haven't done it yet, it is recommended to go through this section first](/category/section-5-infrapunctural-imaginaries-exercise.html)).
Before we dive into bot-making, we will first look into the **materiality of bots**: How do they operate? What code is needed to make a bot? And how does a bot connect to an infrastructure, both in a technical and dialogical way?

8
content/pages/start.md

@ -17,18 +17,16 @@ By the end of the module you will have:
- identified some of the norms and values of a digital communication infrastructures
- signaled a particular tension (or rather hurt) that emerges from these norms and values
- studied different kind of examples of communicative and artistic bots
- learned how bots can be activating agents by identifying (?) hurt
- proposed a bot that could potentially resolve (resolve? spack back to? engage with?) this hurt
- proposed a bot that could potentially address or engage with this hurt
- evaluated the implications of bot-making and bot interventions
You can go through this module at your own speed. No subscription is required, you can simply start by clicking on the "start" button in each section and follow the instructions.
You can go through this module at your own speed. No subscription is required, you can simply start by clicking on the *start* button in each section and follow the instructions.
You will need approximately 4 hours to go through this whole module.
# About this module
This module is written by Cristina Cochior and Manetta Berends who are both part of [Varia](https://varia.zone/en/), a member-based organisation in the South of Rotterdam that works on/with everyday technology.
This module is written by Cristina Cochior and Manetta Berends, who are both part of [Varia](https://varia.zone/en/), a member-based organisation in the South of Rotterdam that works on/with everyday technology.
The module is developed in the context of the *Tool Criticism* course at the [Utrecht University](https://datafiedsociety.nl/research/) in collaboration with [Creative Coding Utrecht](https://creativecodingutrecht.nl/).

Loading…
Cancel
Save