All posts filed under “Intrusive technology

Another charging opportunity?

Another charging opportunity?

Last month, an Apple patent application was published describing a method of “Protecting electronic devices from extended unauthorized use” – effectively a ‘charging rights management’ system. New Scientist and OhGizmo have stories explaining the system; while the stated intention is to make stolen devices less […]

Design & Punishment

Design & Punishment

Design and Punishment, by Ben Cunningham. Photo from the Arts Institute at Bournemouth‘s 2007 Three Dimensional Design graduate directory. Very neatly linking the themes of the last two posts (devices to make users aware of their energy use, and intentionally uncomfortable seating) is the Design […]

Persuasion & control round-up

Persuasion & control round-up

New Scientist: Recruiting Smell for the Hard Sell Samsung’s coercive atmospherics strategy involves the smell of honeydew melon: THE AIR in Samsung’s flagship electronics store on the upper west side of Manhattan smells like honeydew melon. It is barely perceptible but, together with the soft, […]

Mosquito controversy goes high-profile

Mosquito controversy goes high-profile

The Mosquito anti-teenager sound device, which we’ve covered on this site a few times, was yesterday heavily criticised by the Children’s Commissioner for England, Sir Albert Aynsley-Green, launching the BUZZ OFF campaign in conjunction with Liberty and the National Youth Agency: Makers and users of […]

Slanty design

Slanty design

The Main Reading Room, Library of Congress. Image from CIRLA. In this article from Communications of the ACM from January 2007, Russell Beale uses the term slanty design to describe “design that purposely reduces aspects of functionality or usability”: It originated from an apocryphal story […]

Do you really need to print that?

Do you really need to print that?

This is not difficult to do, once you know how. Of course, it’s not terribly useful, since a) most people don’t read the display on a printer unless an error occurs, or b) you’re only likely to see it once you’ve already sent something to […]

Destroy everything you touch

Destroy everything you touch

We can’t help but be familiar with the concept of ‘malicious code’ in the context of computer security and programming, but in general the idea of products or technology which, as they’re used, sabotage or degrade the performance of a ‘rival’, is intriguing and not […]

The Hacker’s Amendment

The Hacker’s Amendment

Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]

The Convention on Modern Liberty

The Convention on Modern Liberty

Britain’s supposedly on the verge of a summer of rage, and while like Mary Riddell I am of course reminded of Ballard, it’s not quite the same. I don’t think this represents the ‘middle class’ ennui of Chelsea Marina. Instead I think we may have […]

Anti-teenager “pink lights to show up acne”

Anti-teenager “pink lights to show up acne”

In a similar vein to the Mosquito, intentionally shallow steps (and, superficially at least–though not really–blue lighting in toilets, which Raph d’Amico dissects well here), we now have residents’ associations installing pink lighting to highlight teenagers’ acne and so drive them away from an area: […]