Law in the Internet Society

View   r2  >  r1  ...
BrendanMulliganFirstPaper 2 - 26 Nov 2009 - Main.BrendanMulligan
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
 
Deleted:
<
<
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
 
Changed:
<
<

Paper Title

>
>

The Counterculture Movement and Computers: Similarities and Corporate Influence

 -- By BrendanMulligan - 13 Nov 2009
Added:
>
>
This essay identifies similarities between the counterculture movement of the 1960’s and 70’s and the development of the computer. It then examines how corporate influence on the hippie movement can inform our understanding of our modern computing systems.
 
Changed:
<
<

Section I

Subsection A

Subsub 1

Subsection B

>
>

Countercultural Ethos

 
Added:
>
>
"We're facing 25 years of prosperity, freedom and a better environment for the whole world. You got a problem with that?" This statement graced the cover of a 1997 edition of Wired magazine, but given the optimism and perhaps naivety embodied in this statement, it could just as likely been said 30 years earlier on some corner in the Haight. A variety of factors influenced the counterculture movement of the late 60’s and early 70’s: resistance to hyper-militarization that fueled the nuclear arms race and the Vietnam War, rejection of “technocracy,” and communitarian politics informed by a long anarchist tradition. When lucid, hippie ideology attempted to discard political and cultural orthodoxies, provide for equality, and reject individual ownership and consumerism. In many respects, these values are in consonance with a utopian vision of computers and interconnectedness. Given the similarities, this short essay attempts to probe ways in which the 60’s and 70’s can inform the fight that will define this era: freedom in personal computing.
 
Changed:
<
<

Subsub 1

>
>
Peter Coyote said, “If you look at all the political agendas of the 1960s, they basically failed. We didn't end capitalism. We didn't end imperialism. We didn't end racism. Yeah, the war ended. But if you look at the cultural agendas, they all worked.” I think that’s largely correct. Though tangible progress was made in the pursuit of rights, overwhelmingly the lasting legacy of this movement is cultural, and more to the point, commoditized. Organic food, the popularity of VW cars, tie-dies, re-packaged music from every festival imaginable, bickram yoga studios, drugs, Grateful Dead posters to adorn college walls, and to some extent even condoms are commercial products which owe much to this time. The political agenda did not stick, but the culture did because marketers have tapped into the innocence and honesty of the movement. Advertisers harnessed a movement intended—at least in part—to castrate their interests and used it to strengthen capitalism.
 
Added:
>
>

Hippie Influence on the Modern Personal Computer

 
Changed:
<
<

Subsub 2

>
>
The same thing is happening with the personal computer. In a 1995 Time Magazine article, Stewart Brand, a member of the Merry Pranksters, says: "Forget antiwar protests, Woodstock, even long hair. The real legacy of the sixties generation is the computer revolution." In the late 60’s and early 70’s, computers were corporate and university mainframes, locked in basements and guarded by technicians. By the early 1980s, computers had become desktop tools for individuals, abundant and seemingly empowering. Essentially, Brand argues that hippie programmers applied countercultural ideals such as decentralization and personalization, along with an understanding of information's transformative potential, to build the computer into liberating machinery.
 
Added:
>
>
Apple co-founder Steve Wozniak describes the founding of the company as deeply influenced by countercultural influences, saying he was “surrounded by a lot of the old hippie thinkers from the counterculture movement, basically trying to apply the same internal drives and passions into the use of technology to get us to that better, good world where people were equal and not so subject to the major corporations of the time, having all the power. . . . It was so tied in with empowering the normal low-level people.”
 
Added:
>
>

Advertiser Co-option

As Wozniak admits, “That's not where it turned out now, but it's sure where the ideal got us going in that directions,” so what happened to corrupt the movement? The obvious answer is greed. Early entrants to the computer/internet marketplace stumbled upon a goldmine. Everything has its price. Idyllic visions of computers and the internet were sacrificed at the altar of millions and advertisers.
 
Changed:
<
<

Section II

>
>
Even taking Brand and Wozniak’s account as true, the remnants of counterculture seen in our modern computing system are not authentic, but the commodification of an appealing ethos. Thomas Frank describes the same business co-option of the countercultural movement in 60’s and 70’s. “Every rock band with a substantial following was immediately honored with a host of imitators; the 1967 'summer of love' was as much a product of lascivious television specials and Life magazine stories as it was an expression of youthful disaffection; Hearst launched a psychedelic magazine in 1968; and even hostility to co-optation had a desperately ‘authentic’ shadow, documented by a famous 1968 print ad for Columbia Records titled ‘But The Man Can't Bust Our Music.’” In response to Coyote’s quote at the beginning of the essay, many of the cultural aspects outlived the substantive aspects of the movement because businesses and advertising forwarded this aspect of the movement.
 
Changed:
<
<

Subsection A

>
>
This is—but should not be—happening again with computers. Hewlitt Packard’s slogan is “the computer is personal again.” Apple targets younger audiences with hip music, trendy colors, and by positioning its product as subverting the market behemoth (Microsoft). Motorola’s new droid advertised open development, but only if you lock yourself to Verizon’s network.
 
Changed:
<
<

Subsection B

>
>

Where Does This Leave Us?

 
Added:
>
>
This essay is probably more observational than instructive, but I find it worthwhile to identify the aforementioned similarities. Although there are no easy solutions, perhaps exploitation is not inevitable. Factions of the tech community still remain committed to legitimate communal ideals. For example, the new tenets of the Hacker Ethic remain faithful to the old (“computers can change your life for the better”, “information wants to be free”, mistrust authority, etc.). However, extrapolating from Frank’s study, we should not be optimistic. Frank noted that the bohemian culture’s style transitioned from counterculture to hegemonic. Likewise, tech companies of all ilk have taken an instrument intended to deliver individuals from university and corporate technocrats and used it to monitor these individuals and strengthen corporate control.
 
Deleted:
<
<
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" on the next line:
 
Deleted:
<
<
# * Set ALLOWTOPICVIEW = TWikiAdminGroup, BrendanMulligan
 
Deleted:
<
<
Note: TWiki has strict formatting rules. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of that line. If you wish to give access to any other users simply add them to the comma separated list
 \ No newline at end of file
Added:
>
>
 
<--/commentPlugin-->

BrendanMulliganFirstPaper 1 - 13 Nov 2009 - Main.BrendanMulligan
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Paper Title

-- By BrendanMulligan - 13 Nov 2009

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" on the next line:

# * Set ALLOWTOPICVIEW = TWikiAdminGroup, BrendanMulligan

Note: TWiki has strict formatting rules. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of that line. If you wish to give access to any other users simply add them to the comma separated list


Revision 2r2 - 26 Nov 2009 - 08:58:47 - BrendanMulligan
Revision 1r1 - 13 Nov 2009 - 01:21:15 - BrendanMulligan
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM