{"id":285,"date":"2015-02-04T06:10:59","date_gmt":"2015-02-04T06:10:59","guid":{"rendered":"https:\/\/www.courses.tegabrain.com\/SS15\/?p=285"},"modified":"2018-09-04T17:07:49","modified_gmt":"2018-09-04T17:07:49","slug":"week-3-reading","status":"publish","type":"post","link":"https:\/\/www.courses.tegabrain.com\/SS15\/?p=285","title":{"rendered":"Week 3 reading"},"content":{"rendered":"<div id=\"magicdomid2250\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><em><strong><span class=\"author-p-318794\">Critical Engineering Manifesto<\/span><\/strong><\/em><\/div>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<hr \/>\n<\/div>\n<div id=\"magicdomid2265\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794\">Summary:<\/span><\/div>\n<ul>\n<li id=\"magicdomid716\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794\">-Engineering is a transformative and influential language that shapes our communications, mobility and thought.<\/span><\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">Critical Engineers are people who are aware of engineering&#8217;s influence and are therefore suspicious of technologies that push dependency or rich user experience and seek to deconstruct and expose their inner workings<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<div id=\"magicdomid1481\" class=\"ace-line gutter-author-p-318794 emptyGutter\">\u00a0Critical Engineers recognize that dependency on a piece of engineering in turn engineers its users.\u00a0 They expose these spaces between production and consumption of technology to showcase their imbalances and deceptions<\/div>\n<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">Critical Engineers consider the term &#8220;machine&#8221; to encompass devices, bodies, agents, forces and networks.\u00a0 They understand that written code can regulate behavior between people and machines, and seek to use this to reconstruct user-constraints and social action<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">Critical Engineers look for historical examples of Critical Engineering withing the realms of art, architecture, activism, philosophy and invention and utilize concepts, strategies and goals from those works<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<div id=\"magicdomid2570\" class=\"ace-line gutter-author-p-318794 emptyGutter\">\u00a0Exploiting a system is the most desirable form of exposure<\/div>\n<\/li>\n<\/ul>\n<div id=\"magicdomid2975\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794\">Critical Engineers examine systems to find how a new technology could change the way we think or interact in potentially undesirable ways. They then look for ways to exploit the technology so it can expose its own flaws<\/span><\/div>\n<div id=\"magicdomid2977\" class=\"ace-line longKeep gutter-noauthor\"><\/div>\n<div id=\"magicdomid2996\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><em><strong><span class=\"author-p-318794\">Protocol<\/span><\/strong><\/em><\/div>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<hr \/>\n<\/div>\n<p>Summary:<\/p>\n<div id=\"magicdomid3911\" class=\"ace-line gutter-author-p-318794 line-list-type-bullet emptyGutter\">\n<ul class=\"listtype-bullet listindent1 list-bullet1\">\n<li><span class=\"author-p-318794\">Sovereign society &#8211; Hierarchy, with one central individual or group holding the most power, with lesser powers branching off from the center.\u00a0 Enforcement of control usually relied on violence or coercion<\/span><\/li>\n<\/ul>\n<\/div>\n<div id=\"magicdomid3912\" class=\"ace-line gutter-author-p-318794 line-list-type-bullet emptyGutter\">\n<ul class=\"listtype-bullet listindent1 list-bullet1\">\n<li><span class=\"author-p-318794\">Disciplinary society &#8211; Bureaucracy, decentralized control with several individuals or groups with equal power and smaller powers spreading off of each node.\u00a0 Control enforced by bureaucratic guidelines and wage control<\/span><\/li>\n<\/ul>\n<\/div>\n<div id=\"magicdomid4116\" class=\"ace-line gutter-author-p-318794 line-list-type-bullet emptyGutter\">\n<ul class=\"listtype-bullet listindent1 list-bullet1\">\n<li><span class=\"author-p-318794\">Control society &#8211; Protocol, distributed power with set rules determines how power flows.\u00a0 Control exercised by limiting the permissions and access of a user within the network<\/span><\/li>\n<\/ul>\n<\/div>\n<div id=\"magicdomid4144\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794\">How the internet works:<\/span><\/div>\n<div id=\"magicdomid5465\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794 b\"><b>TCP\/IP <\/b><\/span><span class=\"author-p-318794\">&#8211; Transmission Control Protocol\/Internet Protocol Suite, digital rules for transmitting lots of octets (8 bits) between programs or servers on a computer or the World Wide Web.<\/span><\/div>\n<div id=\"magicdomid5466\" class=\"ace-line longKeep gutter-noauthor\"><\/div>\n<div id=\"magicdomid5467\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794\">TCP\/IP treats each computer as equal in a network, enabling any computer to communicate with any other without hierarchy<\/span><\/div>\n<div id=\"magicdomid5468\" class=\"ace-line longKeep gutter-noauthor\"><\/div>\n<div id=\"magicdomid7040\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794 b\"><b>DNS &#8211; <\/b><\/span><span class=\"author-p-318794\">Domain Name System, a decentralized, hierarchical system for associating a plain-text web address (www.hackpad.com) with an IP address, which is a set of 4 numbers that the computer can actually recognize as where it needs to connect.\u00a0 (Try typing 192.168.1.1 into your browser, it is the default address for many types of router)\u00a0 The addresses are found by starting at a root server, which directs the request down the line to a specific domain, ie &#8220;.org&#8221;, this repeats until all parts of the address are located (.org -&gt; rhizome -&gt; www.)<\/span><\/div>\n<div id=\"magicdomid5470\" class=\"ace-line longKeep gutter-noauthor\"><\/div>\n<div id=\"magicdomid5726\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794\">Since DNS is a decentralized hierarchy, parts of it can be turned on or off to deny or allow access to certain blocks of IP addresses, making servers and webpages unreachable even if there are no other connection issues.<\/span><\/div>\n<div id=\"magicdomid5472\" class=\"ace-line longKeep gutter-noauthor\"><\/div>\n<div id=\"magicdomid5727\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794 b\"><b>HTML\/HTTP<\/b><\/span><span class=\"author-p-318794\"> &#8211; Hyper Text Markup Language, and Hyper Text Transfer Protocol.\u00a0 On the server of a webpage, HTTP encapsulates the individual HTML objects and follows the TCP to deliver the information to the computer that requested the page<\/span><\/div>\n<div id=\"magicdomid5729\" class=\"ace-line longKeep gutter-noauthor\"><\/div>\n<div id=\"magicdomid7059\" class=\"ace-line gutter-author-p-318794 emptyGutter\"><span class=\"author-p-318794\">Disciplinary society tied power to the location of the machinery through factories, plants and offices.\u00a0 The control society will distribute the power across the network, but control comes from the strict requirement to follow the protocols within the network.\u00a0 If two nodes wish to communicate, its not an issue of who as more or less influence, its a matter of if they are speaking the same language.\u00a0 However, the Internets reliance on DNS forms a weak point in its distributive model, allowing a government or similarly powered body to deny access to whatever web domains they want, making the equality provided by TCP\/IP meaningless<\/span><\/div>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\"><\/div>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\"><em><strong>Discussion:<\/strong><\/em><\/div>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<hr \/>\n<\/div>\n<ol>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">Have you stopped using any technology after an exploit showed you its ugly side? \u00a0Or have you simply changed the way you use that technology?<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\">Are there any Futurist or Science Fiction technologies you would really like to see realized? \u00a0Are there any that\u00a0would creep you out, scare you, or\u00a0challenge your moral beliefs? \u00a0Are there any that are both?<\/div>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\">(IE &#8211; cryogenics, genetic manipulation, androids, smart devices, or anything you&#8217;ve seen or can think of?)<\/div>\n<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">Is it unusual to consider and try to act upon the potential negative aspects of a technology that hasn&#8217;t been fully realized yet?<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">Do members of your family work in an office or factory? \u00a0Do you see yourself working in that same environment after college? \u00a0Have you seen a shift in friends\/family\/yourself towards working outside of traditional work spaces on personal computers? \u00a0Is that something you want going forward in life?<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\"><a href=\"http:\/\/en.wikipedia.org\/wiki\/Internet_censorship_in_the_Arab_Spring\" target=\"_blank\">Internet Censorship in the Arab World<\/a><\/div>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\">How would you react to your government shutting down internet access and even text messaging services in order to exert control?<\/div>\n<\/li>\n<li class=\"ace-line gutter-author-p-318794 emptyGutter\">\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\">Do you have an opinion on &#8220;The internet of things&#8221;? \u00a0If so, does the concept of DNS servers blocking access to entire domains of addresses change that opinion? \u00a0Should we base a system of embedded smart devices and automation on protocols that are subject to hierarchy?<\/div>\n<\/li>\n<\/ol>\n<div class=\"ace-line gutter-author-p-318794 emptyGutter\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Critical Engineering Manifesto Summary: -Engineering is a transformative and influential language that shapes our communications, mobility and thought. Critical Engineers are people who are aware of engineering&#8217;s influence and are therefore suspicious of technologies that push dependency or rich user experience and seek to deconstruct and expose their inner workings \u00a0Critical Engineers recognize that dependency [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=\/wp\/v2\/posts\/285"}],"collection":[{"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=285"}],"version-history":[{"count":4,"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=\/wp\/v2\/posts\/285\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=\/wp\/v2\/posts\/285\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.courses.tegabrain.com\/SS15\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}