Warning: Use of undefined constant image_setup - assumed 'image_setup' (this will throw an Error in a future version of PHP) in /home/clinam5/public_html/clinamen/wp-content/themes/autofocus/functions.php on line 576

Warning: Use of undefined constant image_setup - assumed 'image_setup' (this will throw an Error in a future version of PHP) in /home/clinam5/public_html/clinamen/wp-content/themes/autofocus/functions.php on line 577

Warning: Cannot modify header information - headers already sent by (output started at /home/clinam5/public_html/clinamen/wp-content/themes/autofocus/functions.php:576) in /home/clinam5/public_html/clinamen/wp-includes/feed-rss2.php on line 8
new media – Clinamen http://clinamen.jamesjbrownjr.net thuswise to swerve Fri, 28 Aug 2015 19:28:45 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.25 Rhetorical Distributions http://clinamen.jamesjbrownjr.net/2012/04/05/rhetorical-distributions/ http://clinamen.jamesjbrownjr.net/2012/04/05/rhetorical-distributions/#respond Thu, 05 Apr 2012 15:20:57 +0000 http://clinamen.jamesjbrownjr.net/?p=518 Image Credit: Complex Network by yobink

During the past year and a half, Dale Smith and I have been working on a project entitled “Rhetorical Distributions: The Event and the Archive.” This project began as an essay that attempted to link Alexander Galloway’s work on protocol and networks to conversations about public culture, rhetoric, and the circulation of discourse. We’ve also extended this research into discussions of code, digital poetry, and constrained writing. We have presented portions of this work at the 2011 Texas Institute for Literary and Textual Studies Symposium and the 2011 Computers and Writing Conference.

The essay version of this research has already been cited by one print publication, Byron Hawk’s essay “Curating Ecologies, Circulating Musics: From the Public Sphere to Sphere Publics” (which appears in the edited collection Ecology, Writing Theory, and New Media: Writing Ecology). Additionally, we have received at least five other requests for manuscript versions of this essay. People who attended the aforementioned conferences or who have found reference to the project on the conference websites want to read it and/or cite it. The problem is that Dale and I have had difficulty finding a publication venue for this essay. We’ve submitted it to various journals, each time getting different advice. Each set of reviewers recommended citing different scholarship, making different changes to the argument, and changing the focus of the essay. Part of the problem is that we are hoping to address various audiences in the essay, which is sometimes a difficult thing to do in scholarly journals.

This is the nature of scholarly publishing, and we’re not complaining. We will grant that there are flaws with the essay. However, we have decided to publish it online.

We’ve decided to do this for two reasons: 1) It is already being distributed through various scholarly networks (an interesting thing to consider, given the essay’s discussion of circulation and distribution); 2) We’re open to hearing more feedback about the argument. In fact, perhaps we’ll revise the piece and publish another version.

So, to this end, we’re releasing the essay in two different ways:

1)  As a WordPress installation that uses Commentpress

Commentpress is a WordPress plugin developed by the Institute for the Future of the Book that allows readers to post comments on the entire piece and on each individual paragraph. We welcome feedback on the essay.

2) As a PDF. The version we’re posting was last revised in November 2011.

We’re hoping that this experiment yields feedback and continues the life of this project. We look forward to hearing from scholars in various fields as we think through the argument.

]]>
http://clinamen.jamesjbrownjr.net/2012/04/05/rhetorical-distributions/feed/ 0
Responsible…Responsive http://clinamen.jamesjbrownjr.net/2010/10/06/responsible-responsive/ http://clinamen.jamesjbrownjr.net/2010/10/06/responsible-responsive/#respond Wed, 06 Oct 2010 22:39:28 +0000 http://clinamen.jamesjbrownjr.net/?p=364 Photo Credit: “Doug Engelbart Demo 1968” by mac steve

In a graduate seminar I’m teaching, last week’s reading was an exchange between Steve Mailloux and Diane Davis regarding the hermeneutic dimension of rhetoric. That discussion revolves around the question of whether the category “rhetoric” can be completely collapsed into the category “hermeneutics.” Mailloux argues that we have no choice but to interpret various others and that these interpretations, though they always involve some level of interpretive “ethnocentrism,” offer the possibility for rhetorical exchange between different people and cultures. Davis agrees with all of this. She grants that we have no choice but to interpret others (people, texts, etc.) and that such interpretations are entirely necessary.  However, she also argues that the address of an other to me exposes a non-hermeneutic dimension of rhetoric. That is, the interpretation of the other (inevitable as it is) is not the only portion of the rhetorical situation that we can study.  The approach of the other exposes my exposedness to that other, it communicates communicability.  This exposedness is, for Davis, rhetorical.  She does not argue that we should pay closer attention to the other.  Rather, she argues that we are put into relation with others regardless of any choice on our part and that rhetoricians should consider, study, and “attend to” the approach of the other as other. The approach of the other “brings me more than I can contain,” and it upsets any attempt to collapse rhetoric into hermenuetics.

Now, shift gears.  In an undergraduate course I’m teaching called New Media Across the Disciplines, we recently read a portion of Doug Engelbart’s “Augmenting Human Intellect: A Conceptual Framework.”  In that report, he details his various attempts to augment the intellect by way of digital technologies.  This conceptual framework eventually became a technological framework.  Engelbart and his team developed tools and software that are the basis of today’s Graphical User Interface and Mouse. In what has become known as “the mother of all demos,” Engelbart demonstrated the NLS (oNLine System).  That system included a mouse, a GUI, and a chord keyset. Steve Jobs owes a great deal to Engelbart and his team for at least two reasons: 1) They created the interface that we all now take for granted; 2) They (arguably) created “the demo.”  While Engelbart did not wear a turtleneck, it’s difficult to watch Engelbart’s demo without thinking of the iPad rollout (though, Engelbart is not nearly the ham that Steven Jobs is…in fact, he’s clearly nervous as hell).

Engelbart’s demo is available on YouTube, and I’d encourage you to watch it if you haven’t already.  But my focus is on a short moment toward the very beginning of the demo:

The entire demo reveals a nervous Engelbart. He’s clearly feeling exposed. But beyond a mere linguistic hiccup, this responsible/responsive mixup points to difficult and interesting questions of ethics and technology. Engelbart’s suggestion that a computer would be “alive” for you all day does not trip him up. However, when he accidentally posits a computer as “responsible,” he senses that he’s made a gaffe.

This seems understandable.  We don’t like to think of our machines (digital or otherwise) as being “responsible.”  Rather, we see these machines as tools that we operate, and we see our-selves as the responsible party.  But as any number of posthumanists have suggested, the relationship between machine and human is not so clean.  Human and machine approach one another – this is not a one-way relationship.  Further, this approach points out what Davis calls response-ability. The ethical question here is not about what we should do (i.e. a set of maxims about what is good). That question is an important one, and it focuses on how we should treat each others.  However, while this question has been the focus of Western Philosophy, it tends to rely on a conscious, coherent, Enlightenment subject.  That is, “I” make decisions and act in the world, and I am completely aware of my motives for those actions.  This has also been the focus of rhetorical studies.

We are exposed before our various machines, and this makes Engelbart’s linguistic hiccup more accurate than he might be willing to admit.  The computer is responsible (or response-able), and it approaches us, exposing us as response-able.  What makes this entire situation even more difficult is that nearly all of our machines are networked.  Thus, it is not just the machine to which we are responsible.  In addition, we are exposed and response-able to all of the various others that arrive via the networked.  How do we deal with this ethical predicament that arrives on our doorstep, prior to (or regardless of) any decision on our part? How do we approach the other?

Software is one mediatory figure that we build to deal with this problematic of the other.  Networked software has to, by definition, deal with the question of the other and the question of hospitality.  How software takes up that question has everything to do with our ethico-rhetorical predicament: The other approaches. I must respond. How will I respond? Engelbart’s project of “Augmenting the Human Intellect” is especially relevant here, since he saw the software and hardware that he was building as much more than a mere “tool.”  He saw the GUI as an augmentation to our thinking, and his nervous laughter upon calling the computer “responsible” suggests that the cyborg he had in mind was not a robot or a calculating machine. The augmented human intellect still had to deal with the approach of the other, with issues of ethics, with the predicament of being response-able.

But the question we might ask, given Engelbart’s Freudian slip, is how response-able our hardware and software is.  How do these tools respond to the problem of the other?  How do they sift and sort the various arrivals of human and nonhuman collaborators (or saboteurs)? How hospitable or tolerant are they?  In short, how response-able are are our machines and how might we attempt to understand their ethical dimensions?

]]>
http://clinamen.jamesjbrownjr.net/2010/10/06/responsible-responsive/feed/ 0
Spam and the Rhetoric of Objects http://clinamen.jamesjbrownjr.net/2010/08/25/spam-and-the-rhetoric-of-objects/ http://clinamen.jamesjbrownjr.net/2010/08/25/spam-and-the-rhetoric-of-objects/#comments Thu, 26 Aug 2010 03:12:36 +0000 http://clinamen.jamesjbrownjr.net/?p=312 Photo Credit: Screenshot of Daniel Tankersley’s “The Forest”
What would an object-oriented rhetoric look like?  This question is being asked by a number of scholars, and that is largely due to Scot Barnett’s review essay in Enculturation, “Toward an Object-Oriented Rhetoric.” In addition to this essay, Scot organized a Rhetoric Society of America conference panel addressing the topic.  Scot’s essay has been examined by many, including Graham Harman, whose work serves as Scot’s focus.  That review suggests that an object-oriented rhetoric would attend to rhetoric’s “missing masses.”  Beyond examining the rhetorical actions of humans, an object-oriented rhetoric would account for objects as well, and it would no longer consider human activity as the focal point of the rhetorical situation. In his response to my post at The Blogora about object-oriented rhetoric, Ian Bogost suggested that OOR can (should?) address “the rhetoric of objects”:
“Do things like traffic lights and kohlrabis persuade one another in their interactions? What would it mean to understand extra-human object relations as rhetorical? When Bruno Latour suggests that trees also might use us ‘to achieve their dark designs,’ does such a use count as rhetoric? It’s a question related to what I call alien phenomenology, but more specific in nature: one that would address how speculation can provide insight into the coaxings of withdrawn objects.”

Given that rhetorical theory has often considered human activity to be its central concern, I think these are interesting and necessary questions.  Rhetoricians usually focus on accounting for how humans persuade other humans, and this is an understandable focus.  But how might we apply the terms, concepts, and methods of rhetoric to objects.  As Bogost asks, how might we study how objects persuade one another?

This brings me to Daniel Tankersley’s “The Forest” (pictured above), an art installation that I saw in February during the Future of Digital Studies conference in Gainesville, Florida. Tankersley explains “The Forest” this way:

“The Forest is produced in collaboration with spambots. These automated bits of code, created by a programmer unknown to me, post strings of text to my online guestbook. My site replaces certain combinations of letters with small graphics. The result is a machine producing a constant stream of quasi-pictographic digital writing. In a way, the text is a mirror, reflecting the preoccupying thoughts of everyday web surfers whose search terms provide fodder for the bots to regurgitate.”

“The Forest” scrolls through thousands of posts to this “guestbook” to show us that bots have been communicating in this space for quite some time, and as we scan we can begin to learn Tankersley’s algorithm for textual manipulation.  For example, any instance of the string “hi” is replaced with a small, smiley-faced heart. Tankersley’s guestbook plays host to various spambots, and he uses that steady stream of text to collaborate with his guests.  When I spoke to Tankersley about “The Forest,” he told me that he was fairly certain that there was some “communication” happening between spambots.  He didn’t provide specifics, but he did say that upon watching the activity for a while he could see patterns and communications.

So, what would rhetoric bring to this discussion? Are these spambots persuading one another? How would we talk about the various interactions in “The Forest” with the tools of rhetorical theory? Would such an endeavor be fruitful?  My sense is that it would be fruitful, and here’s why: the average Internet user considers spam to be little more than an annoyance. For this reason, we use software to protect our blogs and email accounts from spam.  We filter out the noise of spam.  We consider spam to be in the realm of “object,” and thus we look only for ways to eliminate it. We are dismissive of spam.

But spam is playing an important role in our various Internet communications.  We spend time, effort, and resources trying to eliminate it, and we have set up complex systems to prevent the spamming of many digital spaces.  We now have services like Disqus, which creates a central profile for blog commenters.  That central profile not only prevents spam, it also pulls all of a user’s comments together into one space.  If I were to use Disqus (I have an account, but I don’t really use it), my profile would show comments on blogs and websites having to do with baseball, rhetoric, composition studies, new media, and more.  All of these “flecks of identity” (Fuller uses this term in Media Ecologies) are collected in one place.  My identity is no longer as “distributed” as it once seemed, and I am now defined by these various internet postings.  Spam is not the sole cause of this situation, but it is certainly an actant. Spam has spawned any number of technologies, and the effects of those technologies are far reaching.  Our dismissal of spam as noise or annoyance might prevent us from seeing this.

So, how does a spambot persuade, and how does it play a part in the rhetorical ecology of the Internet?  This is a question I am only now beginning to research, but it will require that I examine how spambots work.  It will also require that I examine how software like Disqus works.  But while I am by no means an expert in spam or the filtering of it, my sense is that the rhetoric of spam is very much driven by ethos. Spambots are designed to drive traffic to particular sites, and the tools designed to limit spam are an attempt to kill the ethos of spambots and of particular sites. Spambots learn whether or not to trust one another.  They are drawn to the spaces and networks that other Spambots have discovered. “The Forest” is one example of this – it serves as a kind of honeypot by inviting spambots who, in turn, invite other spambots.

Beyond this, spam intersects with ethos at a different point as well.  Ethos, in addition to referring to a speaker’s credibility, also refers to a space or dwelling. In The Ethos of Rhetoric, Michael Hyde explains that

“discourse is used to transform space and time into ‘dwelling places’ (ethos; pl. ethea) where people can deliberate about and ‘know together’ (con-scientia) some matter of interest.  Such dwelling places define the grounds, the abodes or habitats, where a person’s ethics and moral character take form and develop.” (xiii)

Carolyn Miller, in the same book, suggests that dwellings (ethea) play a major role in shaping the rhetor’s ethos:

“Those who dwell within a rhetorical community acquire their character as rhetorical participants from it, as it educates and socializes them.  The community does this at least in part by supplying the Aristotelian components of ethos—the judgment (phronesis), values (arête), and feelings (eunoia) that make a rhetor persuasive to other members of the community.” (198)

Spambots are part of our dwellings and, therefore, do important work in shaping them.  Technologies like Disqus completely refigure rhetorical activity online, and legitimate blog comments can easily become casualties of war, erroneously caught up in spam filters.

Closer attention to the rhetorics of spambots would help us understand how they persuade one another, and might also help us better understand our various Internet dwellings.  I suspect that a closer analysis of spam will reveal a great deal about rhetorical activity in general, whether that activity is being carried out by computer programs or humans. “The Forest” offers a particularly striking example of how humans, spambots, and various other actants collaborate to construct our various rhetorical dwellings.  Any full understanding of how persuasion happens will have to examine these collaborations, and such work will be much easier to do if we let go of the hierarchy between human and object.

But this approach also makes important ethical assumptions. Object-Oriented Philosophy is an attempt to account for relations between all objects in the world.  Included in this plane of objects are humans.  Thus, the relation between human and object (or human and world) is not necessarily a priveleged one for the Object-Oriented Philsopher. Graham Harman’s Prince of Networks describes Bruno Latour as an object-oriented philosopher because of his insistence on granting “full democratic rights to all actants in the cosmos” (35). If we insist on full democratic rights to all actants, we are putting forth a fairly radical ethics.  We insist that all actants – human and otherwise – escape any easily determined interpretation. Objects constantly escape our grasp, and they exist outside of how we perceive them. Accepting this would be another step toward an ethics that is not reduced human subjectivity or intention. The point is not that this approach is more ethical, but rather that it attempts to provide the richest possible account of rhetorical situation.

]]>
http://clinamen.jamesjbrownjr.net/2010/08/25/spam-and-the-rhetoric-of-objects/feed/ 2
Facebook, Protocol, and WWHD http://clinamen.jamesjbrownjr.net/2010/05/17/facebook-protocol-and-wwhd/ http://clinamen.jamesjbrownjr.net/2010/05/17/facebook-protocol-and-wwhd/#comments Mon, 17 May 2010 20:25:13 +0000 http://clinamen.jamesjbrownjr.net/?p=251 Photo Credit: “Private” by Malabarista

I haven’t been able to locate the exact quote, but while President Obama was candidate Obama he explained his simple policy with regard to email.  That policy was this: he assumed anything he sent via email could be published in the New York Times.  I remember saying (and probably posting to Facebook) that I thought this was a good policy for everyone.  While it’s unlikely that my emails will find their way into a major newspaper, I think it’s only safe and prudent to assume that my emails, IMs, text messages, and even Facebook posts can (and will) find their way into various digital nooks and crannies that I never considered.

This brings me to the recent bellyaching about Facebook’s privacy policy.  Twitter (well, at least my Twitter feed) and various tech publications have been littered with righteous indignation about Facebook’s slimy privacy policies.  Yes, Facebook pulled various bait-and-switch moves on users by making more and more information “public.”  Yes, Zuckerberg and Co. are being extremely disingenuous when they say that they only care about users being able to “communicate more effectively” or have more control over “their data.”

I get the frustration with Facebook’s various deceptions. However, the data was always public and it was never yours.  If any Facebook user thought they could exert control over where their status updates or images ended up, they were mistaken. Not only did they lack a healthy dose of skepticism with regard to corporate profit motives, they also completely misunderstood how the Web works and how protocol works. As Alexander Galloway argues in Protocol: How Control Exists After Decentralization, networks operate within the realm of protocols, “a set of recommendations and rules that outline specific technical standards” (6).  There is no Web without its various protocols, and understanding these protocols is essential to those who decide to live or interact online.  Those protocols dictate what we can and can’t do online, and they care very little about what is “right” or “wrong.”  The protocols of the Web are not like rules of etiquette (though, this is where the word comes from):

Instead of governing social or political practices as did their diplomatic predecessors, computer protocols govern how specific technologies are agreed to, adopted, implemented, and ultimately used by people around the world. What was once a question of consideration and sense is now a question of logic and physics. (7)

People are arguing about the “ought” and they are completely missing the more important fact of the “is.” Trusting Facebook to parse out the information you provide (images, videos, status updates) is not only naive but also rests on a misunderstanding of how protocol shapes our online existence. The network is built so that information moves and flows easily. We can build certain reservoirs and walls (or we can attempt to), but the protocol will always win out. Galloway explains this in terms of hackers, who are often (like Facebook) accused of being unethical:

Hackers don’t care about rules, feelings, or opinions. They care about what is true and what is possible. And in the logical world of computers, if it is possible then it is real. Can you break into a computer, not should you or is it right to. When poured in a vessel, water will fill the vessel completely; when poured into a computer network, the hacker will enter any space available to him.

In fact, possibility often erases the unethical in the mind of the hacker. An anecdote from the legendary hacker Acid Phreak illustrates this well. After being told certain personal details about his rhetorical opponent John Perry Barlow, informationthat he would later use to obtain Barlow’s credit history, Acid Phreak screamed, ‘Mr Barlow: Thank you for posting all I need to know to get your credit information and a whole lot more! Now, who is to blame? ME for getting it or YOU for being such an idiot?’ Most hackers would answer: You, for being such an idiot. (168)

I’m not calling people idiots for thinking that they could control the information they post to Facebook (though, a hacker most certainly would), but I am asking them to re-examine their relationship to the network and to protocol. We would all do well to think WWHD (What would hackers do?) before clicking submit, save, or send. Before you jump online and broadcast information about you, your family, or anything else, consider that the network (protocol) operates in the realm of what is possible not in the realm of what should happen. You may view hackers as nefarious for exploiting such protocols, but its the network (and the various RFCs put out by standardization bodies) that lays out the rules. Hate the network, not the hackers. Or, better yet, attempt to understand the network.

I am not defending Facebook. However, Facebook’s actions are, for me, very much beside the point. Facebook operates in the realm of protocol, and this means that we should assume that they operate in the realm of the possible. Whatever can be done with “your” data (it ceases to be “yours” when you put it online) – sold to companies, offered to search engines, sent to people for which it was not intended – will be done. If you’re not comfortable with this, you need a deeper understanding of what you’re getting yourself into before you leap into the next digital fad.

]]>
http://clinamen.jamesjbrownjr.net/2010/05/17/facebook-protocol-and-wwhd/feed/ 5
Working Through ‘Hospitable Code’ http://clinamen.jamesjbrownjr.net/2010/03/16/working-through-hospitable-code/ http://clinamen.jamesjbrownjr.net/2010/03/16/working-through-hospitable-code/#comments Tue, 16 Mar 2010 17:13:28 +0000 http://clinamen.jamesjbrownjr.net/?p=241

A Malian woman builds a small tent for her family so that her guests can sleep in the family’s home.

Photo Credit: “Hospitality II” by Arriving at the horizon

In my book project I use the phrase “hospitable code” (this also serves as the title of the project) to discuss software that addresses the problem of the other. But this phrase requires some unpacking, and I’d like to work through that unpacking here. My hope is that readers will respond to this post so that I can continue to refine this idea/concept.

First, let’s tackle “hospitality.” Hospitality is typically considered in terms of the choice to welcome another into our home. Thus, the picture above indicates the hospitality of the Malian people. The photographer describes the image this way:

“When we got to Mohammed’s campement, the women instantly got very busy dragging out cloth and sticks, destined to become a provisional tent. Great, I thought, we get a little tent for ourselves. And a little tent there was, but to my great surprise and embarrassment the whole family — Mohammed, his wife, their six children, and two visitors — moved in there, and left the big tent to us. Then women from surrounding campements came over with beautiful pillowcases and essabbar and other wallhangings, and decorated the tent! I think it was the nicest-looking tent I have ever seen. Desert hospitality at its best. More about it here.”

This kind of hospitality assumes a clean separation between “my home” and “my guest.” ��It suggests a definite threshold, a border between inside and outside. But I am attempting to discuss software in terms of hospitality, and there is no real “home” or clear threshold when it comes to software. So, let me try to explain how I’m using the term hospitality

The hospitality I have in mind is less an intentional, welcoming gesture than it is a predicament. In networked environments, others will continually arrive. This situation has its promises – the crowdsourcing of various problems and the possibility of a more inclusive conversation are two such promises – but it also has its pitfalls. Which others will arrive and when? What are their motivations? Who are they? How do I engage them? What will they do to me or my “home” or my text? Networked software is forced to deal with all of these questions in ways that an application such as Microsoft Word does not. To be sure, other writers can enter and edit my word document; however, this is not necessarily an integral part of the software platform. Word can be a perfectly useful piece of software on a machine that is not networked. Media Wiki, on the other hand, would be much less useful in a non-networked environment. One could use Media Wiki as a kind of content management system or as a personal CVS repository (I myself have used wiki software in this way), but this does not change the fact that the software was designed for networked environments and thus takes particular ethical stances with regard to other users/writers.

My case study in “Hospitable Code” is Wikipedia and its software platform, Media Wiki. Media Wiki is hospitable in that it deals with the question of the other much more explicitly than an application like Word. Whether or not Media Wiki is sufficiently hospitable or whether it welcomes all others is a more difficult question. No software platform teaches a pure hospitality (what Derrida would call absolute hospitality). This is an unreachable ideal. Nonetheless, hospitable code addresses the question of the foreigner in particular ways because the arrival of others is part of its functionality. Media Wiki is just one example of hospitable code. We could consider a variety of software platforms that deal with a similar set of questions: Google Documents, Google Wave, networked videogames, Twitter, Facebook, and many others. Further, given the recent trend toward online applications, it seems that more and more software platforms will be forced to deal with the question of the other. My book is an attempt to think through the implications of that shift and to understand the ethical stances built into software.

But the second part of the concept of “hospitable code” is worth unpacking as well. While this term has been dissected in various places (Kittler’s mediation on “Code” in the Software Studies Lexicon is but one example of this), I’d like to explain the two senses in which I’ll be using the term. My use of code evokes both software (code as ones and zeros) and the idea of an ethical code (code as ethical constitution). Given Lawrence Lessig’s argument in Code that “code is law,” separating these two notions of code is difficult:

In real space we recognize how laws regulate—through constitutions, statutes, and other legal codes. In cyberspace we must understand how code regulates—how the software and hardware that make cyberspace what it is regulate cyberspace as it is. As William Mitchell puts it, this code is cyberspace’s “law.” Code is law. (5)

Building upon this definition of code as law, I am arguing that software makes ethical arguments – code establishes ethical codes. Those ethical codes are not the final word, and my project demonstrates how users grapple with and interrogate those codes. Nonetheless, code establishes a groundwork or a context in which we deal with one another, and in this sense code establishes an ethical dwelling (an ethos) in which rhetors/users/writers interact with one another. Those interactions are, in my view, inherently rhetorical.

But it will be necessary to define a couple of more terms as well: rhetoric and ethics. Stepping through the various definitions of rhetoric would be nearly impossible. This term has morphed over and over again over the past 2000 years. At various historical moment, rhetoric has been understood as the faculty of discovering the available means of persuasion (Aristotle), the study of misunderstanding and its remedies (I.A. Richards), the art of speaking well (Quintillian), and “a powerful instrument of error and deceipt” (Locke). This list is by no means exhaustive, but even these few examples exhibits the range of the term “rhetoric,” and the various ways in which it is put to use. However, I would like to indicate that “Hospitable Code” makes use of a modern definition of rhetoric developed by Kenneth Burke. Burke famously expanded the realm of rhetoric for 20th century rhetoricians, and his framework is particularly useful considering my discussion of how rhetoric and ethics intersect. At its most general level, Burke’s definition of rhetoric encompasses all attempts to make meaning: “Wherever there is persuasion, there is rhetoric, and wherever there is rhetoric, there is meaning.”

But Burke’s definition goes further than this by redefining rhetoric in terms of identification. In A Rhetoric of Motives, Burke explains this framework: “A is not identical with his colleague, B. But insofar as their interests are joined, A is identified with B. Or he may identify himself with B even when their interests are not jointed, if he assumes that they are, or is persuaded to believe so” (20). Thus persuasion is happens (whether the result of an intentional effort or not) through identification, but this identification is not one of fusion or communion. When ‘A’ identifies with ‘B,’ they are substantially one, but each remains a unique individual locus of motives, joined and separate” (20). By understanding persuasion, and thus rhetoric, as identification, we can begin to see the relationship between rhetoric and ethics. Rhetoric as identification implies that we are simultaneously joined and separate from various interlocutors, and any understanding of this predicament will have to engage questions of ethics and how we relate to one another. Persuasion involves “the use of stylistic identifications to establish rapport” between rhetor and audience (46). That rapport is in constant tension as we make and break various identifications and as we deal with various others. We are consubstantial with one another, but we are never fused in any final way.

Understood as identification, rhetoric becomes the indissociable from how we relate to one another. Any time we are making meaning, any time we are attempting to communicate, we are in the realm of identification and we are determining how we can or should relate to one another. Questions of rhetoric and ethics are thus intertwined. This would seem an odd claim given certain definitions of rhetoric. Given a definition such as Locke’s(an instrument of “error and deceipt”), rhetoric is decidedly unethical. And certain rhetorical moves are indeed unethical. However, following Burke’s lead, I see no communicative act that is not shot through with rhetoric. And thus I see no way in which communication does not imply questions of ethics. The study of ethics is the study of how we treat the other (that other can be human, but it does not have to be). The question of the other is the question of ethics. In Derrida’s terms, the question of the “foreigner” (the foreigner here is a kind of metaphor for all of the various others that arrive on our various scenes…or on our desktop) is the question that continually presents itself to us. How we engage the foreigner is directly tied to how (or whether) we identify with the other. The difficulty here is that we do not always choose our identifications. As persuader or persuadee, we are constantly dealing with various, conflicting identifications. We are persuaded (or, better, persuadable) over and beyond any decision to agree or disagree, and we our own acts of persuasion entail identifications that we may or may not have “stylistically” deployed. In this sense, we persuade and are persuaded more (and less) than we ever intend. Thus regardless of whether we are in the “sender” or “receiver” slot, we are in an ethico-rhetorical predicament.

So, hospitable code is rhetorical and ethical; it makes ethical arguments. To some extent, all software makes ethical arguments and determinations. But the networked software that I am most interested in must explicitly address the question of the other. In networked environments, the question of the other is part of the software’s design. When we enter the rhetorical dwelling of a space like Media Wiki, we are put into relation with various others. Those various relations are rhetorical and ethical.

There is much, much more to say here (thankfully…if there wasn’t, then I’d be hard pressed to turn this into a book-length argument), but I’m hoping this can be a starting point. I’m hoping that some readers can help me continue to refine this set of ideas. Comments, questions, and suggestions are welcome.

]]>
http://clinamen.jamesjbrownjr.net/2010/03/16/working-through-hospitable-code/feed/ 2
A Role for Rhetoric in Software Studies, Part 1 http://clinamen.jamesjbrownjr.net/2009/10/26/a-role-for-rhetoric-in-software-studies-part-1/ http://clinamen.jamesjbrownjr.net/2009/10/26/a-role-for-rhetoric-in-software-studies-part-1/#comments Mon, 26 Oct 2009 15:13:25 +0000 http://clinamen.jamesjbrownjr.net/?p=174 2090930340_197f1e90ed

Photo Credit: “Cool Runner” by Nirmal Thacker

Lately, I’ve been thinking a lot about the role of rhetoric, writing studies, and rhetorical theory in the emerging field/subfield of software studies. Software studies was launched by Lev Manovich in The Language of New Media, fleshed out by Katherine Hayles in My Mother Was a Computer, and then extended by scholars like Noah Wardrip-Fruin, Matthew Fuller, Matt Kirschenbaum, and various others. Kirschenbaum provides my favorite description of this emerging subfield:

“What is software studies then? Software studies is what media theory becomes after the bubble bursts. Software studies is whiteboards and white papers, business plans and IPOs and penny-stocks. Software studies is Powerpoint vaporware and proofs of concept binaries locked in time-stamped limbo on a server where all the user accounts but root have been disabled and the domain name is eighteen months expired. Software studies is, or can be, the work of fashioning documentary methods for recognizing and recovering digital histories, and the cultivation of the critical discipline to parse those histories against the material matrix of the present. Software studies is understanding digital objects are sometimes lost, yes, but mostly, and more often, just forgotten. Software studies is about adding more memory.” (153)

While Kirschenbaum’s version has definite “book history” feel to it, I think it helps us think of a broad range of methods that fit under the software studies umbrella. Software studies allows scholars across a broad range of disciplines to examine the far-reaching ramifications of code. Kirschenbaum’s focus is on mechanisms and Wardrip-Fruin’s is on computational processes. As I see it, software studies can be a big tent.

But Collin Brooke notes in Lingua Fracta that Manovich significantly reduces the role of rhetoric in new media studies, making it difficult to see how rhetoricians might fit with the emerging field of software studies. It’s worth briefly revisiting Manovich’s treatment of rhetoric in The Language of New Media. In a discussion of hyperlinking and the Web’s non-hierarchical arrangement of texts, Manovich argues that “the printed word was linked to the art of rhetoric” (77). Traditionally, Manovich argues, texts have “encoded human knowledge and memory, instructed, inspired, convinced, and seduced their readers to adopt new ideas, new ways of interpreting the world, new ideologies” (76-7). Manovich suggests that this approach becomes obsolete with rise of new media and hypertext. After citing Roman Jakobsen’s reduction of rhetoric to “metaphor and metonymy,” Manovich argues that hyperlinking has reduced rhetoric even further by “privileg[ing] the single figure of metonymy at the expense of all others” (77). While he eventually suggests that a “new digital rhetoric may have less to do with arranging information in a particular order and more to do simply with selecting what is included and what is not included” (footnote, page 77), Manovich still bases this discussion on a particularly narrow definition of rhetoric.

Collin suggests that Manovich’s definition of the rhetorical canon of arrangement (and of rhetoric, more generally) is based on a straw man. On the Web, the argument goes, writers/orators no longer painstakingly arrange things in order to persuade in a particular way; therefore, rhetoric is dead. But Collin argues that “the links that allegedly demonstrate the irrelevance of rhetoric are rhetorical practices of arrangement, attempts to communicate affinities, connections, and relationships” (91). As Collin sees it (and I’d agree), arrangement is not an “all or nothing” thing. Arrangement may be further complicated in new media environments, but it still happens. Rhetoric changes in new media environments, but it’s still there.

We can hardly blame Manovich for this reduced rhetoric. Manovich inherits (from Jakobsen and others) a reduced rhetoric, or what Mikkel Borch-Jacobsen would call a “restricted rhetoric.” As Borch-Jacobsen argues, rhetoric’s history is defined by a constant oscillation between “primary rhetoric” and “secondary rhetoric”:

The history of rhetoric is not the continuous and closed story of its progressive restriction, but the discontinuous and indefinite one of permanent tension between two uses of the term: one of extreme generality (and therefore also extreme vagueness), which makes it an art of persuasion (this is its oratorical, pragmatic, or ‘impressive’ pole, corresponding roughly to what G.A. Kennedy calls ‘primary rhetoric’); the other of more restricted scope, which makes it an art of speaking well (this is its literary, poetic, ornamental, or ‘expressive’ pole, corresponding roughly to what Kennedy calls ‘secondary rhetoric’ and V. Florescu letteraturizzazione). Between these two poles there is constant oscillation punctuated by ‘deaths’ and ‘renaissances’ of rhetoric. (128)

Manovich’s rhetoric is still about persuasion, but it is mostly a secondary rhetoric of ornamentation. However, if we accept Borch-Jacobsen’s more complex historical narrative of rhetoric’s constant oscillation, how might we rethink the role of rhetoric in new media studies and, more specifically, software studies? What would a primary rhetoric offer software studies? What does the art of persuasion offer those of us interested in “fashioning documentary methods for recognizing and recovering digital histories”?

I’d like to offer a brief, provisional answer to this question. If rhetoric is bigger than tropes and figures and if it is about how the art of persuasion morphs and changes, then a study of digital histories might trace out the origins and iterations of rhetorical strategies. These rhetorical strategies are shaped by software. Design choices enable and constrain certain rhetorical practices, and a study of these emerging practices would attempt to understand how persuasion and communication can happen in emerging environments.

Let me provide a brief example. The Wikipedia controversy of Essjay is well known, and it is one I dealt with in detail in a recent College Composition and Communication article. That article does not address Wikipedia’s software (Media Wiki) directly, but a consideration of Wikipedia’s code allows us one more way to examine this “scandal.” To recap: Ryan Jordan claimed to be a tenured professor of theology. He used this identity to guide discussion on Wikipedia and to work his way up the Wikipedia food chain. It was eventually discovered (with the help of wiki-critic Daniel Brandt) that Jordan was not a professor, and this opened up a public discussion about how identity operates on Wikipedia.

In the CCC article, I argue that the Essjay controversy demonstrates how ethos operates in Wikipedia and how this community deals with textual origins. Wikipedia’s rules attempt to outlaw any claims to an ethos of real life (RL) expertise. That is, no one can claim to be the origin of an utterance. Writers are not supposed to dictate discussion by pointing to their RL credentials, and they are not allowed to include “original research” in a Wikipedia article. Instead, Wikipedia’s rules require that a contributor build an ethos of citation. Instead of pointing to his or her credentials, a Wikipedian should be pointing to verifiable sources.

This argument is geared toward an audience of rhetoric and composition scholars who are concerned with issues of writing, argument, and intellectual property on the Web. But a discussion of Essjay’s ethos would shift in a software studies conversation. We would have to account for how Wikipedia’s code allows for (indeed, encourages) the building of virtual identities and actively discourages any claim to RL identities. We would have to track the development of Media Wiki software and a number of design decisions: the creation and maintenance of user accounts, access control settings, security settings, and permissions.

For instance, Media Wiki’s rules with regard to user identities and “anonymity” are quirky (these rules expose what Galloway and Thacker might call an exploit…but that is another blog post). Creating a username on Media Wiki masks that user’s IP address. Thus, I can edit without a user account and have my IP address attached to each edit, or I can create a username that is linked to each edit. Only users with CheckUser access can link usernames with IP addresses. Thanks to Virgil Griffith’s Wikiscanner tool, we can link IP addresses with physical locations. But this still doesn’t provide a clean way of linking edits with particular writers.

Media Wiki’s dealings with user accounts are confusing and counterintuitive. What does it mean to edit Wikipedia anonymously? What can anonymity even mean when an “anonymous” user is more easily tracked than a user who creates an avatar. When Ryan Jordan created the identity of “Essjay,” he was able to create an entire identity. That identity was not necessarily tied to a real world location or a real world person. And he was able to do this because of a particular design decision on the part of those who designed Media Wiki. Contrary to what most will say, this policy with regard to RL identity is not in place for all wikis. In fact, the original wiki, Ward Cunningham’s WikiWikiWeb, insisted on “RealNames” because “people who use online nicknames care less about what they write.” This is an arguable claim, but for the time being it’s important to note that Media Wiki’s design is but one way of dealing with user identities. This design decision has shaped the rhetorical situation in which each Wikipedian finds herself.

Using episodes such as the Essjay controversy as starting point, we can track the history of Wikipedia’s code. This history will help us better understand code influences rhetorical action and how the ethics and rhetorics embedded in code bubble to the surface as software is put to use. Essjay made particular choices about how to persuade other Wikipedians, and many of those choices involved a strategic deployment of ethos. But that strategic deployment was not only about Essjay’s (or Ryan Jordan’s) “choice.” It was much more about the code that allowed for and encouraged such a rhetorical strategy.

And I’d like to go one step further here. Even this brief discussion of Essjay’s ethos and how it opens the door for a rhetorical approach to software studies only scratches the surface. Beyond a study of rhetorical strategies and how they’re shaped, a rhetorical approach to software studies would also have to be a discussion of how persuasion happens, regardless of or beyond any conscious choice on the part of the digital rhetor. Yes, we should consider Essjay’s attempt to game the system and persuade. But what about all of the persuasion that happens over and beyond such strategic attempts?

In electronic spaces that invite various digital writer/rhetors regardless of credentials, Web denizens are put into contact with various others regardless of any choice to do so. I do not know who is editing “alongside” me when I contribute to Wikipedia, and this opens up a long list of rhetorical questions: How does persuasion or communication happen amongst a group of writers who may not share the same agenda? How does one track the motives of a writer without knowing his or her identity? What kind of community is a text like Wikipedia?

There are more questions to pursue here, but my hope is to open up a discussion about how rhetoric, rhetorical theory, and writing studies might contribute to the emerging field of software studies. I see a number of openings, and I will be looking to pursue many of them in future blog posts.

]]>
http://clinamen.jamesjbrownjr.net/2009/10/26/a-role-for-rhetoric-in-software-studies-part-1/feed/ 1
Graduate Seminar: New Media Interfaces and Infrastructures http://clinamen.jamesjbrownjr.net/2009/10/16/graduate-seminar-new-media-interfaces-and-infrastructures/ http://clinamen.jamesjbrownjr.net/2009/10/16/graduate-seminar-new-media-interfaces-and-infrastructures/#comments Fri, 16 Oct 2009 22:05:20 +0000 http://clinamen.jamesjbrownjr.net/?p=156 the infrastructure

Photo Credit: “the infrastructure” by haribote

Recently, I mentioned to some folks on twitter that I was putting together a graduate seminar for next semester, and those same folks seemed interested in a bit of crowdsourced syllabus design.

So, I’m posting a draft of a brief course description along with a list of possible readings.  If you’re interested, please drop me a comment and let me know what you think. I’m open to suggestions.

New Media Interfaces and Infrastructures

Recent New Media scholarship is pushing beyond the study of texts online and attempting to study the systems, infrastructures, codes, and platforms that produce those texts. By examining and tinkering with the interfaces and infrastructures of new media, scholars across various disciplines and subdisciplines are looking to develop new rhetorics for new media and new research methods. In this course, we will examine and enter this conversation about new media’s interfaces and infrastructures. The class will share reading notes and the results of their research in a wiki-based “Interfaces and Infrastructures” research database. Students will also write a conference paper, geared toward a particular conference.

Final projects for this course could take many forms. A few examples (this list is not exhaustive): a traditional seminar paper, a grant proposal, a dissertation prospectus draft, the design of a new media interface or infrastructure. Students will work with the professor to develop a project that can aid in the student’s career trajectory.

Possible Readings

Foundations
Lanham, The Electronic Word (selections)
Manovich, The Language of New Media
Kittler, Gramophone, Film, Typewriter
Ulmer, Heuretics (not sure if this fits…but would love to include it)
Ronell, Part I of the UberReader, “The Call of Technology”
Bolter and Grusin, Remediation
Hayles, My Mother Was a Computer

Rhetoric and Composition
Welch, Electric Rhetoric
Rice, The Rhetoric of Cool
Brooke, Lingua Fracta
Reid, The Two Virtuals

Platform Studies/Software Studies
Bogost and Montfort, Racing the Beam
Kirschenbaum, Mechanisms
Wardrip-Fruin, Expressive Processing
Harpold, Ex-Foliations


Other possibilities: Banks’ Race, Rhetoric, and Technology: Searching for Higher Ground, Matthew Fuller’s Media Ecologies, Mark Hansen’s Bodies in Code, Thierry Bardini’s Bootstrapping, Alexander Galloway’s The Exploit, Siegfried Zielinski’s Deep Time of the Media, McLuhan (and many more…)

Note: I am considering pairing each text with a primary source. For instance, Harpold discusses Ted Nelson and Vannevar Bush, and I could pair their writings with Harpold’s.

]]>
http://clinamen.jamesjbrownjr.net/2009/10/16/graduate-seminar-new-media-interfaces-and-infrastructures/feed/ 4