JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2000

CYBER-SOCIETY-LIVE 2000

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL]: Blueprint for TOYWAR II

From:

John Armitage <[log in to unmask]>

Reply-To:

[log in to unmask]

Date:

Wed, 7 Jun 2000 09:02:04 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (390 lines)

From: Reinhold Grether [mailto:[log in to unmask]] 
Sent: Tuesday, June 06, 2000 2:41 PM
To: [log in to unmask]
Subject: Blueprint for TOYWAR II

------------------------------------------------------
Blueprint for TOYWAR II
>From Net Criticism to a Politics of Code
Theses on Network Economics and Network Politics
------------------------------------------------------
Written by Reinhold Grether
<[log in to unmask]>
and translated by Brian Currid <[log in to unmask]>
------------------------------------------------------
Lecture, Tulipomania Dotcom Conference
June 2, 2000
Amsterdam
<http://www.balie.nl/tulipomania/>
------------------------------------------------------

In memory of Benno Ohnesorg who was killed on this day
33 years ago during an Anti-Shah-Demonstration in Berlin.


Kung Fu and Cheng Ho

Around 1400, no region of the world could measure up to
China.  Since the eleventh century, all fertile lands were linked
by a huge network of canals.  Paper money accelerated the
exchange of commodities, printing with movable type accelerated
the transfer of knowledge.  Gun powder and cannons had
defeated the Mongols and secured the caravan routes to
Russia and the Middle East.  However, the new medium was
fresh water -- even more so, salt water.  Private and public
fleets competed over trade in the canals, on the coast and
over the Indian and Pacific Oceans to Africa and Japan.  The
navigation instrument of the seas, the magnetic compass, is
a Chinese invention, it is conceivable that the official fleets
of Cheng Ho could have "discovered" the Portuguese natives
on the Southwest tip of Europe. But within a few years, the
Confucian bureaucracy let the routes of the new medium silt
up, and in 1436 even forbade the construction of sea-worthy
ships.  The Chinese spent the next 564 years around their canals,
and they are still waiting today for entry into the World Trade
Organization.


Professionalization of Sects

Imagine an infinite regress, leaving behind world, body, and
the ego (das Ich).  In a purely mental process, the empty
reception faculties experiences itself as pure medium.  Adepts
from all around the world have created this condition of
luminous self-medialization, and interpreters from all cultures
have semanticized "notions" (Einfaelle) of transcendence into the
conventional world to every form of belief system.  Western
philosophers theorized this pneumatic process as a reflection
of eternal ideas, and the bearer of this reflective knowledge
stretches from the ancient theoria through the medieval artes
liberales to the modern humanities.   In contrast, if we isolate
a technological process in a black box, we are using a totally
different form of knowledge.  At issue here is a applicable,
control knowledge, intent on obtaining from a process the
most efficiently produced output possible.  Here, the Western
lines of tradition lead from the ancient techne through the
medieval artes mechanicae to the modern engineering sciences.
The object-oriented programming of computer science, in my
opinion, professionalizes a third form of knowledge, which I
term "network knowledge" (Netzwissen).  Again, this begins
with an encapsulation.  The informatized "object" is encapsulated
as a module.  This is still all quite similar to the industrial black
box.  But the object would merely be a meaningless component
on its own if it could not by definition communicate with other
objects.  A system of objects is structurally a communication
network, the conditions of which are always in fluctuation.
Object-oriented software is nothing but the "self-descriptive
language" of the network knowledge implemented in it.


Clash of Codes

1. In all human societies, there are three forms of knowledge:
reflection knowledge, application knowledge, and network
knowledge. 2. In all human societies, there are clashes of
codes between the forms of knowledge and their representatives.
3. With the technological media, network knowledge is undergoing
a tremendous burst of professionalization. 4. Beside reflection
science and application science, network science (Netzwissenschaft)
will establish itself as a third pillar of science. 5. Modularization
creates degrees of freedom. 6. The communicability of objects will
become increasingly intelligent. 7. The controlling powers find
themselves strategically in the defensive. 8. The controlling
powers must operate in codes of network knowledge. 9. All
codes are beautiful, because they increase complexity. 10. The
essence of the Net is flow, and in its disjointed character cannot
be controlled. 11. The happy Chinese: a second 1436 will not
take place.


Informational Cultivation

Information emerges as a local event in a narrow personal
context.  Fixed as a freely duplicable sequence of bits, the
now mobile information loses its local horizon of understanding
and reaches in a process of all world wide personal environments,
which can use the information;  this process has no monetary
value and is temporally successive.  Structurally speaking,
information is not a good of scarcity, but a good of abundance,
and there are essentially only three strategies to impose a fictional
scarcity onto information.  First:  one can make the transmission
channels scarce, and thus secure a transaction premium (Maut).
This is precisely what is done by the current domain name system,
which only makes a tiny spectrum of the in principle limitless space
of addresses available, and thus cultivable.  Second:  individualize
information, and thus create a positional surplus value which
makes the free good tradable in the market sense (the formation
of brands).  If one imposes a lexicon of domain names on the
asemantic field of numbers in the IP-address space, then all
social differences which this lexicon contains are capitalized to
become to positional goods with a monetary value.  The first
information transfer which here takes place is that of the social
distribution of the power structure itself.  Third, the abundant good
information takes on commodity form through strategies for the
informational production of surplus value. If one for example
reconstructs the semantic environment where information makes
sense, or if one develops a scenario of application options, or
if one shortens the time interval required until the information
reaches an interested customer, or if one translates it into
another language, one adds to the information a monetizable
informational surplus value.  The DNS System can take credit
for the fact that in relation to the IP-System it accelerates
and simplifies search and bookmarking operations, and thus
creates an informational surplus value.  If information must
be first produced, the theory of property rights, which predicts
a more steep path of knowledge production for private rights
of use, and open source theory, which expects comparative
development advantages through prestige-driven cooperation
chains, given open competition.  An optimal information
production and distribution, which both produces information
and distributes it rapidly, can probably only be achieved in a
hybrid mix -- which must constantly be renegotiated -- of
property rights and open source, and from partial information
cultivation with largely free information access.  General
solutions here arouse the most doubt.


Research Agenda

1)  The principle of counter-differentiation formed an enormous
drive for European development.  In this model, two irreducible
antagonists are sent out to compete in expenditures -- for example,
pope and emperor -- and both attempt to achieve hegemony by
stimulating, evolving, and outdoing the resources of their counterparts.
This leads at first to remarkable increases in internal differentiation
on both sides, and at some point to a shared collapse, which allows
those sailing along on board, protected from the wind -- for
example mercantile territorial states -- to then set full sail.   Instead
of now require from the Internet economic theory a decision
between market economy and gift economy, perhaps it is more
productive to first play out the model of counter differentiation
and to thematize the complex interplay of market and gift economy.

2)  I consider the fact that highly developed societies, down
into the upper margins of the lower classes, are pumping
gigantic sums of money into high risk sectors like the Internet
economy, to be a burst of vitality, regardless of any stock
market crash, comparable to tattooing and piercing; it burns
the ships it leaves behind, in order to then break out into the
unknown.  For just that reason, it would be good to know
exactly where the money has ended up.  We need to study
the actual property and power relations in the Net.  How
much actually flows into the evolution of net technology,
content and social structures?  How much is spent consumeristically
on the sweet trip of the dolcefarniente to bankruptcy?  And how
much is  being skimmed off the top of the bubble economy, without
having seen anything of the Net besides financial transfers?

3) Since the end of the 1960s, economists outdo one another
with arguments about why national economies suffer a loss of
prosperity due to inflationary tendencies.  By now, every television
viewer jumps at the word inflation.  The high flights of the
exchanges are however universally praised in the most glowing
terms.  The million dollar prize question is then why moderate
inflation for consumer goods is an evil, but a galloping inflation
on the stock markets a blessing?

4)  We now need to separate the dotcom from the Net
economy, and to study both separately.  I see most of the
dotcom economy as nothing else but a transfer of the paradigm
of process control from the industrial age to the Net, in many
cases doomed to failure.  These are businesses with vision,
corporate identity and business plan.  None of this functions
in the Net.  Net economy is pure fluxus, micro-networking,
modularization of the smallest units, work in parallel worlds.
Following emerging paths, delete everything else.  Fluid borders,
fluid knowledge. Multilogic instead of monologic.


Don't be afraid of dotcoms.

In the 1950s, in the factories of the Northern Italian automobile
industry, small groups of worker radicality formed which
distinguished themselves from the traditional union and party
representation with the term "operaismo."  The basic idea of
operaimso was to attack the capitalist production of surplus
value at the center of the capitalist production process,  and
thus to block the capitalist dynamic of development. In order
to do this, the entire production logistic of the automobile industry,
across divisions and factories, was reconstructed, all by hand
and without the help of a single computer.  In the end, all
neuralgic points of the entire matrix of value production were
known, so that a counter matrix of absenteeism, blockades
of deliveries and surprise strikes in the shortest period of time
brought the entire automobile industry to a standstill.  The
trick was to bring a more powerful enemy to the mat without
expense.

EToys ran into a similar trap.  After going public on May 20,
1999, it could barely walk, weighted down by all its financial
muscle.  In June, they began dealing with etoy, the first offer
was $30,000 -- answer a smiley -- in order to get rid of the
annoying domain neighbors once and for all .  When etoy
refused higher offers, they played the only trump card they
had, to bury etoy in an avalanche of legal costs -- and disappeared
until the end of the campaign from the radar screen.  As a typical
dotcompany lost in the Net, it was stuck in the circle of their
business-plan economic monologic, and found no way to counter
the possibilities of the Net which were breaking down on top
of their heads. To refresh your memory:  legally speaking, this
was a disagreement about brand names.  In the course of the
legal battle, eToys' argumentation crumbled more and more.
They even risked losing their legal claim on the trademark to etoy.
On the business level, in direct contact with the opponent, etoy
by no means limited itself to defending their domain.  etoy even
offered a merger, where they would have brought their own
domain into the merged company.  This kind of business logic
confused the enemy as much as the gearing of the campaign to
totally annihilate the stock value of eToys, which I developed
and set up, together with RTMark .  I have extensively described
the motives for this strategy in "Telepolis," and therefore will
here only give the pure numbers.  When I threw out the suggestion
to the lists, eToys stood at $55, when etoy was back on the Net
at $13.75: this means a loss in stock value loss of $4.97 billion
dollars. Stock market insiders attribute the loss in part to the
campaign.  In terms of the campaign, it is even more interesting
how a seemingly decisive strategy element occupied minds on
both sides.  A direct shock to customer relations, which eToys
can only build up on its web page, was threatened by a virtual
sit-in;  on the 10 days before Christmas, for five 15 minute
periods, campaign participants called up the web page of the
web server of eToys in masses, and sent it spinning.  Shortly
afterwards, a chain of 700 avatars formed on the Toywar
platform, one more ready for battle than the next, and no one
knew what they were plotting.  Soon, there were 3 toy warriors
for every eToys employee.  To top it all off, a constant stream of
protest mails, and a media campaign which spun faster and faster
until it reached the peaks of the world press.  Web campaigns
are won by those who tax the time and fantasy of the management
to an unimaginable extent.


What isn't code, isn't real.

A world cultural medium shaped by hundreds of millions of people
needs other rules than an Internet for a few ten thousand military
officers, scientists and computer freaks. First, because the cultural
bearers of past epochs, modeled for reflection and control, legally
attack the openness, freedom and transparency of implemented
net architectures with their claims on copyright, patent, brand
and liability and try to recode their ideological and mercantile
interests accordingly.  Second, the regulations governing of
bourgeois collective life like anonymity, crypto, privacy, and
security need new regulations.  Third, because the incompatibilities
between transnational attempts at regulation,  national legal systems,
and the system of developing rules are dramatically growing,
this opens for some a nostalgia for the good old days of the
pioneer years, for others, areas for action for a progressive
politics of the code, and for still others hopes for a "contrat
digital" of all netizens towards constructing a global net democracy.


Areas of action for a progressive politics of the code

In conclusion, a short sketch of possible areas for action,
which -- like dotcoms and the rest of us -- must answer the
following questions:  what is to be networked?  Why?
Which kinds of network knowledge will be professionalized?
Is the Internet making progress as a world culture medium?
Are new chances opening up for the production of world cultural
capital?

1.) ICANN. ICANN stands for a total control of the Internet
by the US government and for an artificial limitation of domain
names. ICANN is to take over the management of the A-Root
Server and become the highest regulatory authority of the Internet.
For this, there needs to be a double strategy:  a relentless
delegitimization from outside and a massive democratization
movement from the inside.  On the one hand, implementing
new top level domains throughout the entire existing system,
on the other hand obtaining ICANN membership and offering
a progressive politics from the inside.

2) Directing development policies towards financing wireless
broadband networks for developing regions.

3) A world-wide campaign towards introducing Open Source
in international organizations, governments, administrative units,
firm networks and schools.

4) Globalization of the multiplicity of languages.  90% of Net
intelligence falls through the cracks due to the forced use of
English.  The Anglocrats are just the other side of the virtual class.

5) The development of peer-to-peer architectures. Peer-to-peer
means that users give free access to files from their hard drive
to the Net without a server between them.  The future belongs to
Open Source projects like Freenet, especially if they export all
file formats, encrypt all files and make all computers anonymous.

6)  Calling in old protocol promises.  Further development of
the WWW towards a multiplicity of versions on user-alterable
web pages (editable documents) and towards free linking in
existing web pages (reversible links).

7)  The establishment of browserless networks as a further
development of Netomat.

8) Technification of the Internet culture. Mailing lists embody
the ideology of the status quo.  They can be transformed into
real cooperation platforms, so that multiple working groups
can work on parallel projects. Mailing list archives gain in
value, if the contributions are constantly re-linked with one
another.  Blaster technology can do this: it automatically links
references to topics.

9)  The construction of technical, media, and social infrastructures
of virtual protest.  In this direction, Alvar Freude, a co-author
of the "association blaster", as a semester project for Olia
Lialina's "Active Link"" seminar at the Merz Academy in
Stuttgart, is developing a "virtual demonstration network"
which can be used for virtual sit-ins.  Parallel to this, an
accompanying group of lawyers, political scientists, and
journalists has formed, which will bring the discussion on
the legitimacy and legality of net-activism to the public.


(This text was written as a discussion paper for the
Tulipomania Dotcom-Conference in Amsterdam and
Frankfurt. The political part of the paper owes a great
deal to the net politics debate in the mailing list "rohrpost".
Much of my thinking on this owes a great deal to Dirk
Schroeder. Brian Currid provided in no time the excellent
English translation.)

-----------------------------------------------------
Benno Ohnesorg
http://www.hdg.de/lemo/objekte/pict/KontinuitaetUndWandel_photoTodBennoOhnes
org/index.html
Code and other Laws of Cyberspace
http://code-is-law.org/
ICANN
http://www.icann.org/
Freenet
http://freenet.sourceforge.net/
Netomat
http://www.netomat.net/
Alvar Freude
http://student.merz-akademie.de/user/alvar.freude/
Assoziations-Blaster
http://www.assoziations-blaster.de/prixars/
rohrpost
http://www.mikro.org/rohrpost/
-----------------------------------------------------
Reinhold Grether
How the Etoy Campaign Was Won
http://www.heise.de/tp/english/inhalt/te/5843/1.html
Reinhold Grether
Durchbruch zum Weltcode
http://www.heise.de/tp/deutsch/inhalt/sa/8090/1.html
Reinhold Grether
Von der Netzkritik zur Politik des Code
http://www.heise.de/tp/deutsch/inhalt/co/8212/1.html
-----------------------------------------------------





%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager