Ulises Mejias on ‘Confinement, Education and the Control Society’ – fascinating commentary on Deleuze’s societies of control and how the instant communication and ‘life-long learning’ potential (and, I guess, everyware) of the internet age may facilitate control and repression: “This is the paradox of social […]
All posts filed under “Treacherous computing”
Uninnovate – engineering products to do less
Image from uninnovate.com I’ve just come across a very interesting new blog, uninnovate.com, which focuses on the phenomenon of “engineering expensive features into a product for which there is no market demand in order to make the product do less.” The first few posts tackle […]
Ed Felten: DRM Wars, and ‘Property Rights Management’
At Freedom to Tinker, Ed Felten has posted a summary of a talk he gave at the Usenix Security Symposium, called “DRM Wars: The Next Generation”. The two installments so far (Part 1, Part 2) trace a possible trend in the (stated) intentions of DRM’s […]
Embedding control in society: the end of freedom
Henry Porter’s chilling Blair Laid Bare – which I implore you to read if you have the slightest interest in your future – contains an equally worrying quote from the LSE’s Simon Davies noting the encroachment of architectures of control in society itself: “The second […]
Oh yeah, that Windows Kill Switch
I know the furore surrounding Microsoft’s ‘Windows Genuine Advantage’ is a few days old, and perhaps I should have blogged about it at the time, specifically the rumoured ‘Kill Switch’ which would remotely deactivate any PCs apparently running ‘non-genuine’ copies of XP. That’s certainly a […]
DRM now the ‘biggest issue’ in preserving information for the future
The Guardian has an interview with Richard Masters, of the British Library’s digital objects management programme looking at the impact of technology on archiving. The usual worries about file formats, media incompatability and how to select what to preserve and what not to are discussed, […]
Friend or foe: Battery-authentication ICs?
Via MAKE, an article from Electrical Design News looking at lithium battery authentication chips in products such as phones and laptops, designed to prevent users fitting ‘non-genuine’ batteries. Now, the immediate response of most of us is probably “razor blade model!” or even “stifling democratic […]
Review: Everyware by Adam Greenfield
This is the first book review I’ve done on this blog, though it won’t be the last. In a sense, this is less of a conventional review than an attempt to discuss some of the ideas in the book, and synthesise them with points that […]
Freedom to Tinker – The Freedom to Tinker with Freedom?
At Freedom to Tinker, David Robinson asks whether, in a world where DRM is presented to so many customers as a benefit (e.g. Microsoft’s Zune service), the public as a whole will be quite happy to trade away its freedom to tinker, whether the law […]
‘Fair use, Xbox hacking, and how far will Linux users go to get a cheap PC?’
Adrian Kingsley-Hughes, in ZDNet’s Hardware 2.0 blog, asks whether it is ‘ethical’ for users to install GNU/Linux on an Xbox, or in general, to use hardware they have bought in whatever way they wish. “First, is it ethical to hack an Xbox or any other […]