some_metaphorslibrary

cascading trusts (What establishes the trust of the pre -determined “trusted” certificates in a system … and so on down to OS / System / hardware/chip …) at the end failure of trust - not solved yet with pipelines, implied flow. with piplines, implied discussion about container, commodification, legibility content includes container / system + power of control ex money as infrastructure, liquid agency

1

About the book: “Liking, sharing, friending, going viral: what would it mean to recognize these current modes of media interaction as promiscuous? In a contemporary network culture characterized by a proliferation of new forms of intimate mediated sociality, this book argues that promiscuity is a new standard of user engagement. Intimate relations among media users and between users and their media are increasingly structured by an entrepreneurial logic and put to work for the economic interests of media corporations. But these multiple intimacies can also be understood as technologies of promiscuous desire serving both to liberalize mediated social connection and to contain it within normative frames of value. Payne brings crucial questions of gender, sexuality, intimacy, and attention back into conversation with recent thinking on network culture

2

For Fuller it was a great enigma why one form should endure while another does not, especially because he disclaimed both the term “bodies” and the concept of “building blocks” that lead one to believe that it is obvious that a form will be retained. Today every physicist affirms that the concept of “building blocks of material” has been rejected once and for all.

3

Fuller’s little rubber hoses, which he introduced into his model as the nodal connectors for the rods, are a ridiculous detail from a material point of view, but from a conceptual point of view they are a firstrate tool. Flexible nodes, which Fuller stipulated as early as 1932, make it possible to create a model that enables the formation of rigid “bodies” on the basis of moveable constellations and that thinks of stabilization as a self-stabilizing pattern. Fuller attributes the retained form to a recurring pattern; he defines structure as a “locally regenerative pattern integrity.”

4

Robustness principle / postel’s law: “Be conservative in what you produce/output while being liberal in what you accept from others5 Postel’s law is now considered harmful.

6

7

What would be a queer infrastructure? How to speak about this as an infrastructure? Susan Leigh Star: Infrastructure is “fundamentally and always a relation, not a thing

It should be noted that the concept of pipeline in computing field has been criticised. It assumes a rather sequential path with education on the one end and work on the other. In reality, education and training play several diverse roles in scientific preparation of people. There are many different pathways, including a non -traditional pathway, to a computing career8


  1. paper computer science ‘Reflections on trusting trust’ https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761 -thompson.pdf
  2. Robert Payne. The Promiscuity of Network Culture: Queer Theory and Digital Media. 2015.
  3. Richard Buckminster Fuller, Joachim Krausse, and Claude Lichtenstein. Your Private Sky: Discourse. 2001.
  4. Richard Buckminster Fuller, Joachim Krausse, and Claude Lichtenstein. Your Private Sky: Discourse. 2001.
  5. https://en.wikipedia.org/wiki/Robustness_principle
  6. The Robustness Principle Reconsidered. Eric Allman. doi:10.1145/1978542.1978557 http://cacm.acm.org/magazines/2011/8/114933 -the-robustness-principle-reconsidered/fulltext
  7. The Harmful Consequences of Postel’s Maxim https://tools.ietf.org/html/draft -thomson-postel-was-wrong-00
  8. R. Varma and H. Hahn, Gender and the pipeline metaphor in computing (2007) http://www.unm.edu/~varma/print/EJEE_Pipeline.pdf