Browse Source

editing section 2

master
manetta 4 years ago
parent
commit
c6054824bb
  1. 8
      content/Section 1 - Digital Infrapunctures/1-introduction.md
  2. 29
      content/Section 2 - Harm in Computational Infrastructures/1-introduction.md
  3. 22
      content/Section 2 - Harm in Computational Infrastructures/2-question-1.md

8
content/Section 1 - Digital Infrapunctures/1-introduction.md

@ -25,6 +25,14 @@ Who is an infrastructure bringing together? And who *not*? What are the conditio
And, most importantly, *who* can actually intervene in the design of infrastructures? And *how*? And, most importantly, *who* can actually intervene in the design of infrastructures? And *how*?
We invited Deb Verhoeven to respond to the following questions:
* What are digital infrapunctures?
* How do we identify stress points in digital infrastructures?
* Who can create infrapunctures?
* Could you expand on the analogy of acupuncture in relation to infrastructures?
* Could you give some examples of infrapunctural interventions?
<br> <br>
# Footnotes & Further readings # Footnotes & Further readings

29
content/Section 2 - Harm in Computational Infrastructures/1-introduction.md

@ -5,27 +5,13 @@ Summary: How to correct, shift or expose harms in computational infrastructures?
<!-- > Our concern is that the computational infrastructures are far more than a technological ecosystem alone. Like all infrastructure, they incentivize us to embed their values, and therewith much of their politics in the lower layers of the technology stack. Comparable to the cables and control equipment in electrical networks that determine what can and cannot be connected to it, computational infrastructures embed constraints on what can and cannot be built on top of it, as well as what is accessible to those needing to audit or validate its functionality.[^progammableinfrastructures] --> <!-- > Our concern is that the computational infrastructures are far more than a technological ecosystem alone. Like all infrastructure, they incentivize us to embed their values, and therewith much of their politics in the lower layers of the technology stack. Comparable to the cables and control equipment in electrical networks that determine what can and cannot be connected to it, computational infrastructures embed constraints on what can and cannot be built on top of it, as well as what is accessible to those needing to audit or validate its functionality.[^progammableinfrastructures] -->
What are computational infrastructures? <!-- What are computational infrastructures? -->
Who designs them? What values do they embed into digital systems? <!-- Who designs them? What values do they embed into digital systems? -->
The work of Seda Gürses provides us with handles to XXX [unpack, look closer into, study, explore] computational infrastructures. Throughout her work she has questioned the notion of "fair" technologies, how such "fair" practices are XXX [formulated, reasoned upon, shaped] and who is involved in reviewing the "fair" impact of digital systems. An important factor in her work is to approach computational infrastructures as systems that are far more than a technological ecosystems alone. In this section we will unpack how computational infrastructures operate and what impact that has on the digital systems that are being built on top of them.
Seda is currently an Associate Professor in the Department of Multi-Actor Systems at TU Delft at the Faculty of Technology Policy and Management, and an affiliate at the COSIC Group at the Department of Electrical Engineering (ESAT), KU Leuven. Beyond her academic work, she also collaborated with artistic initiatives including Constant vzw, Bootlab, De-center, ESC in Brussels, Graz and Berlin. We will introduce the work of Seda Gürses and dive with her into the following questions:
<!-- They effect different externalities, operate on the basis of specific embedded values and define restrictions of what can be built on top of the infrastructure and what not. -->
<!-- Through the work of Seda we can understand computational infrastructures as complex entities. -->
Three works that particulary connect to *digital infrapunctures* are her work on *POTs (Protective Optimization Technologies)*[^pots], *Programmable Infrastructures*[^progammableinfrastructures] and *The Institute for Technology in the Public Interest*[^titipi]. Links to these works are included at the bottom of this page.
<!-- How can we recognize harm in these digital systems? -->
<!-- And how to possibly correct, shift or expose these harms? -->
This section contains five video contributions in which she will unpack how computational infrastructures operate and what impact that has on the digital systems that are being built on top of them.
We invited her to respond to the following questions:
* What are computational infrastructures? * What are computational infrastructures?
* What are elements that shape (or are shaped by) computational infrastructures? * What are elements that shape (or are shaped by) computational infrastructures?
@ -38,10 +24,3 @@ We invited her to respond to the following questions:
<!-- We propose Protective Optimization Technologies (POTs). POTs, provide means for affected parties to address the negative impacts of systems in the environment, expanding avenues for political con- testation. POTs intervene from outside the system, do not require service providers to cooperate, and can serve to correct, shift, or expose harms that systems impose on populations and their environments. We illustrate the potential and limitations of POTs in two case studies: countering road congestion caused by traffic-beating applications, and recalibrating credit scoring for loan applicants. --> <!-- We propose Protective Optimization Technologies (POTs). POTs, provide means for affected parties to address the negative impacts of systems in the environment, expanding avenues for political con- testation. POTs intervene from outside the system, do not require service providers to cooperate, and can serve to correct, shift, or expose harms that systems impose on populations and their environments. We illustrate the potential and limitations of POTs in two case studies: countering road congestion caused by traffic-beating applications, and recalibrating credit scoring for loan applicants. -->
# Footnotes
[^pots]: Bogdan Lulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses "POTs: Protective Optimization Technologies" (2020). <https://arxiv.org/pdf/1806.02711.pdf>
[^progammableinfrastructures]: Seda Gürses, Roel Dobbe, Martha Poon "Seminar on Programmable Infrastructures" (2020). <https://www.tudelft.nl/tbm/programmable-infrastructures/>
[^titipi]: Miriyam Aouragh, Seda Gürses, Femke Snelting, Helen Pritchard "The Institute for Technology in the Public Interest" (accessed on 2020) <http://titipi.org/>

22
content/Section 2 - Harm in Computational Infrastructures/2-question-1.md

@ -3,6 +3,28 @@ Slug: 02-s2-question-1
Date: 2020-11-01 12:01 Date: 2020-11-01 12:01
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.
The work of Seda Gürses provides us with handles to XXX [unpack, look closer into, study, explore] computational infrastructures. Throughout her work she has questioned the notion of "fair" technologies, how such "fair" practices are XXX [formulated, reasoned upon, shaped] and who is involved in reviewing the "fair" impact of digital systems. An important factor in her work is to approach computational infrastructures as systems that are far more than a technological ecosystems alone.
Seda is currently an Associate Professor in the Department of Multi-Actor Systems at TU Delft at the Faculty of Technology Policy and Management, and an affiliate at the COSIC Group at the Department of Electrical Engineering (ESAT), KU Leuven. Beyond her academic work, she also collaborated with artistic initiatives including Constant vzw, Bootlab, De-center, ESC in Brussels, Graz and Berlin.
<!-- They effect different externalities, operate on the basis of specific embedded values and define restrictions of what can be built on top of the infrastructure and what not. -->
<!-- Through the work of Seda we can understand computational infrastructures as complex entities. -->
Three works that particulary connect to *digital infrapunctures* are her work on *POTs (Protective Optimization Technologies)*[^pots], *Programmable Infrastructures*[^progammableinfrastructures] and *The Institute for Technology in the Public Interest*[^titipi]. Links to these works are included at the bottom of this page.
<!-- How can we recognize harm in these digital systems? -->
<!-- And how to possibly correct, shift or expose these harms? -->
<video> <video>
<source src="https://vvvvvvaria.org/archive/2018-02-16-Extratonality/dennis-not-supercut-yet.mp4" type="video/mp4"> <source src="https://vvvvvvaria.org/archive/2018-02-16-Extratonality/dennis-not-supercut-yet.mp4" type="video/mp4">
</video> </video>
# Footnotes
[^pots]: Bogdan Lulynych, Rebekah Overdorf, Carmela Troncoso, Seda Gürses "POTs: Protective Optimization Technologies" (2020). <https://arxiv.org/pdf/1806.02711.pdf>
[^progammableinfrastructures]: Seda Gürses, Roel Dobbe, Martha Poon "Seminar on Programmable Infrastructures" (2020). <https://www.tudelft.nl/tbm/programmable-infrastructures/>
[^titipi]: Miriyam Aouragh, Seda Gürses, Femke Snelting, Helen Pritchard "The Institute for Technology in the Public Interest" (accessed on 2020) <http://titipi.org/>

Loading…
Cancel
Save