Shared posts

02 Oct 15:26

The Product Designer Role

The Product Designer Role

You got the go ahead to hire some in-house designers. That’s great news! Up until now you’ve been relying on an external agency for the majority of your design work and this is going to enable you to create a team that is much more responsive and predictable.

Your next task is to define the product design role within your company. This is an important one to get right. You don’t want to simply recreate an internal version of the agency model. The way that products are created has changed dramatically in recent years and new models for design are a critical part of this.

Here's a short list of important attributes of the modern product designer role:

(1) Product Orientation

In the old model, designers took requirements or specifications from product managers and used that to create their designs. Modern product designers continuously collaborate with product managers and engineers. Rather than work on the latest project in “design phase” (ironic quotes), the modern product designer participates in all phases of a product, from discovery to delivery to iteration. Rather than sitting with fellow designers, the modern product designer sits together with his or her product manager and if at all possible the team of engineers building the product. Rather than being measured on the output of their design work, the product designer is measured on the success of their product. 

Given this, good product designers have many of the same concerns as product managers. They are deeply oriented around actual customers and the value their product is bringing to those customers. They also understand that the product is in service of a business and can incorporate those concerns and constraints into the design of a product. Designers further understand that the user experience is as important to customer value as the underlying functionality. 

(2) Holistic Experience Design

User Experience (UX) is much bigger than User Interface (UI). Some people even use the term “Customer Experience” to further emphasize the point. UX is any way that customers and end-users realize the value provided by your product. It includes all the touchpoints and interactions a customer has with your company and product over time. For modern products, this usually includes multiple different UI’s (web, mobile, desktop, etc.) as well as other customer touch points (email, customer support, notification, online storage integration, etc.). With some products, UX also includes offline services like riding in an car summoned through Uber, or staying in a house sourced through AirBnB.

Good product designers anchor their work with a broad view of UX. They think about the customer's journey over time as they interact with the product and company as a whole. Depending on the product, the list of touch points could be very long. Good product designers consider questions like:

  • how will customers first learn about the product?
  • how will we onboard a first-time user and (perhaps gradually) reveal new functionality?
  • how might users interact at different times during their day?
  • what other things are competing for the user’s attention?
  • how might things be different for a 1-month old customer differ from a 1-year old customer?
  • how will we motivate a user to a higher level of commitment to the product?
  • how will we create moments of gratification?
  • how will a user share their experience with others?
  • what is it like to resolve a support issue?
  • how will customers receive an offline service?
  • what is the perceived responsiveness of the product?

(3) Prototyping

One of the most important tools of modern product teams are prototypes. Discovering products that customers love requires continuous collaboration with colleagues as well as frequent validation with external users and customers. Prototypes provide the vehicle to facilitate that communication. They are a far more accurate representation of intent than wireframes or screenshots as they are able to capture many other aspects of the full user experience.

Prototyping used to require engineers, but the quality of prototyping tools has improved so much that this is no longer the case. There are some exceptions, but today the majority prototypes don’t require engineers.  Instead, they are created by designers, and the tools they have available to them have improved dramatically. Good product designers use prototypes as their primary canvas for communicating ideas both internally and externally. They are generally comfortable with a number of different prototyping tools, and able to apply the correct one for the task at hand.

(4) User Testing

Good product designers are constantly testing their ideas with real users & customers. They don’t just test when a prototype or idea is ready, they build testing into their weekly schedule. The regular cadence means that they’re able to constantly validate and refine ideas as well as collect new insights that they may not have even been looking for. It also means that they aren’t as likely to become too attached to ideas before they come in contact with objective outside opinions.

User testing is much broader than usability testing. Product designers and their product teams utilize the opportunity to assess the value of their ideas. Will customers actually use or buy the product and if not, what would it take?

(5) Interaction and Visual Design

Visual design and interaction design have historically been considered separate roles. Visual design includes things like composition, typography and how the visual brand is expressed. Interaction design generally includes things like the underlying conceptual models (e.g. a photo management application may have “photos”, “albums”, “projects”, etc.), task flows and control layouts to manipulate those concepts. 

Modern product designers may have different strengths, but generally have some level of skill with both visual and interaction design. Having a more complete toolset allows them to work quickly at different levels of fidelity depending on the context. It also allows them to design experiences in ways that wouldn’t have been possible when thinking of interaction and visual separately. This is particularly important in mobile interfaces where designers must often create new models of interaction that are fundamentally intertwined with the visual design. 

So Now What?

This is all well and good you say, but these people are hard to hire.  Hiring strong people is always hard work, but just as we need to hire a strong product manager and strong engineers, it is critical to hire a strong product designer. 

It’s true that you want to bring strong designers into your organization as quickly as you can, but the burden of strong UX should not come only from them. It also involves the other members of your product team like the product manager and engineers. You can up your game right now by growing awareness and setting expectations on what strong UX involves. Ensure that your engineers and product managers understand that much of the value of the product is in the user experience. Encourage them to think broadly about a holistic experience that starts before the customer even learns of your product.  Have them use prototypes and user testing to validate their ideas.

Modern product design is not simply about hiring the staff. It involves moving design front-and-center for your team and your process.


30 Aug 20:42

The Fed’s own uncertainty about the economy’s underpinnings is...



The Fed’s own uncertainty about the economy’s underpinnings is more than a decade in the making and traces back to three key developments that have thrown officials for a loop.

A Wall Street Journal series examining the causes and consequences of 2016’s political upheaval

First, officials missed signs that a more complex financial system had become vulnerable to financial bubbles, and bubbles had become a growing threat in a low-interest-rate world.

Secondly, they were blinded to a long-running slowdown in the growth of worker productivity, or output per hour of labor, which has limited how fast the economy could grow since 2004.

Thirdly, inflation hasn’t responded to the ups and downs of the job market in the way the Fed expected.

30 Aug 18:09

The luxury of cycling

A few days ago a senator tweeted this:

This weekend I attended the Ride to Conquer Cancer and cheered along my wife and the other members of her team as they completed a 250km ride from Vancouver to Seattle. It was moving to see cancer survivors and people who've lost loved ones to cancer, doing their bit to help fight cancer.

And let me tell you, these days I treat my ability to ride a bike as a luxury. It's all too easy to get struck down by any number of diseases and be unable to ride. To get into an accident and get injured so you can't ride. To live in a place that doesn't make riding possible. To have a family situation that makes it hard to ride.

A couple of years ago my sister got really sick. When I said I was thinking of doing the Gran Fondo "you are so lucky, I wish I could do that". So I did. And this year is my second race.

Oh and I pretty much obey all the traffic laws, unlike all the asshole car drivers who cut down the bicycle routes in Vancouver.

30 Aug 18:09

Apple will reportedly release new Mac products in October at the earliest

by Rose Behar

Apple might debut new Mac products as early as October 2016 and is also planning to release stylus-enhancing iPad software updates in the near future, according to prolific Apple leaker Mark Gurman of Bloomberg.

Bloomberg’s expansive report, which shares information from unnamed sources that are “familiar with the matter,” contradicts recent rumours that new Macs will be released during Apple’s upcoming September 7th mobile unveiling event, instead pushing the expected release back by at least a month.

Anticipation for new Mac products is already high, considering the only Mac debut this year has been the less-than groundbreaking 12-inch 2016 MacBook.

Bloomberg states the update Mac line will include “tweaked” MacBook Airs with multi-functional USB-C technology, iMacs with an option for new graphics chips from AMD and a thinner MacBook Pro with a flatter keyboard.

The Pro will also have an intriguing new feature, according to Gurman’s sources, which shows digital versions of function keys — generally relegated to physical buttons that run along the top of the keyboard — on the bottom of the computer’s display. The function options shown will change depending on application. For instance, the function for searching words and phrases is displayed front and center in the Safari browser, while functions for cutting clips and sliding volume is key in iMovie.

This feature will be a part of the Sierra macOS, which could be released as early as the end of September, say the sources.

In addition, Bloomberg details an iPad update that will reportedly give the Apple Pencil stylus more purpose by letting users annotate with the tool in many more applications, including Mail, Safari and iMessage. This update could take place in either an iOS10 upgrade in early 2017, or launch with the next version of iOS.

Bloomberg also briefly mentions that Apple is working on a standalone 5K monitor with LG, which would offer over seven times as many pixels as 1080p displays.

Related: Apple to unveil next iPhone on September 7

SourceBloomberg
30 Aug 01:22

Multitasking on a Surface may be a Snap but is it Predictable?

by Bardi Golriz

Lukas Mathis considers the ability to swipe between two apps on Windows 8 to be clever, but also expresses concern:

This is pretty clever, but probably often results in showing an app the user did not expect. 
Until I set aside time to understand the behaviour, my expectations were being satisfied 50% of the time -  when I'd access an app through another. For example, when I'd tap on a link to Mail to open it in Internet Explorer, I expected a left-swipe to be interpreted as a back to last app gesture. And it did. The confusion arose when the subsequent deferred left-swipe was interpreted similarly when I didn't specifically want it to i.e. I was not working between two apps. For example, I was returned as expected to Mail, sent my mail, and wanted to swipe to another non-particular app but to my surprise was taken back to IE. Practically speaking, this doesn't make a difference as I wouldn't be looking to swipe to a particular app, but must admit being surprised every time this happened. Judging by feedback I've received from other Windows 8 users, I was not the only one, supporting Lukas' reservations. 

In the behaviour's defence, I consider this as logic assisting the user that doesn't necessarily need their knowledge. When you are working between two apps, it works how you want it to. In this context you're too immersed in your workflow that as far as you're concerned the device is running just these two apps, and nothing else, and so your expectations are met.

I think webOS and the Blackberry PlayBook solved this better, by spatially arranging running apps horizontally. This way, it’s always clear which app you switch to when you edge-swipe, because apps never «move»; the same apps are always located to the left and right of any given running app.

I've never used the Blackberry PlayBook, but I did buy my girlfriend a Palm Pre a couple of years ago for mostly selfish reasons (I knew the mirror back would make her warm to the device quickly). I had always been fascinated by webOS and wanted to play with one. The cards system didn't disappoint. It was only a week ago that I tweeted:

Having said that, I don't know how the PlayBook does it, but I wouldn't compare the edge-swipe on Windows 8 to webOS's cards. In order to switch apps on a Pre, you need to leave the app first and then swipe through the list of cards. That is, you can't switch between apps without passing through the home screen. 

That said, I do consider Windows 8's app-switcher to be its version of webOS cards. I never use it primarily because the gesture to invoke it is ridiculously unintuitive. If you get pass this, you'll notice apps on the list do get rearranged, unlike webOS cards. I originally thought they move up the list by one after every swipe, but after some rudimentary testing this doesn't appear to be the case all the time. I need to look into this more. But it's fair to concede, even at this point, that it's a bit of a mess and cannot compare with the predictability, fluidity and playfulness of webOS cards. I will say I'm not entirely dismissive of the concept of apps moving up the list, as they do on Windows 8's app-switcher, so long as the logic dictating the order is consistent. At the moment, it doesn't appear so but will leave that for another day to verify. 

Update: Lukas Mathis has clarified that the PlayBook, unlike webOS, does in fact support the Windows 8 like edge-swipe gesture to switch between apps.

30 Aug 01:21

On the Merits of Bug Tracking

by Mark Finkle

Yes, I wrote a whole blog post about bugs. Bugs are boring and managing bugs can be mind-numbing. However, all software has bugs and managing those bugs helps you understand the health and quality of your software, helps you understand the risk associated with new features, and helps you figure out if you’re ready to ship or not.

At some point in our careers, developers have a desire to fix all bugs before releasing. This might work for small projects or in situations where you don’t have a lot of testing. For larger projects, especially as projects mature, it’s just not possible to fix all the bugs before releasing an new version, so it’s time to manage your backlog. Creating good bugs helps reduce the time it takes to manage and fix bugs.

  • Summary – Be explicit and contextual. This is the text that shows up in bug lists. Something too vague, like “Crash when posting” will require people to always open the details to figure out the context.
  • Steps to reproduce – Be clear and precise. What was the expected behavior vs actual behavior? Does it happen all the time or is it intermittent and hard to reproduce?
  • Description – Is the bug a crash, broken behavior, performance or regression? Make sure you add these details. For UI related issues, add a screenshot or video. Can you provide a minimal test case for the issue?

You can’t fix them all, so it’s time to triage. Bug debt contributes to the risk of shipping, so you need to manage the set of bugs like many other aspects of your development process. Don’t be frightened by a large quantity of bugs in your backlog. It just means people are testing your software, which is a good thing.

Bug triage is the process of going through the list to find bugs that need assistance, escalation, or follow-up. This is usually done in a group, but sometimes individually to clean incoming bugs. Through this process the nastiest, riskiest bugs are identified.

  • Prioritize – Don’t guess. Use a decision tree, or some other system, to determine a real priority.
  • Estimate – Don’t guess. If it’s too hard to figure out, you should break the work up into smaller tasks. Link those sub-tasks back to the original bug.
  • Adjust – Bug metadata is not set in stone. Situations change over time, so can the bug priority.

Bugs have their own social networks. New code always spawns bugs so link those regressions back to the source feature or fix. Link duplicates back to the original issue. Sometimes those are not 100% duplicates and it’s good to verify all the duplicates are really fixed. Link code landings back to bugs. Code archeology is a real thing so make it easier by creating a map of bugs to code. You should be able to start with a line of code and easily find out why/when it was added. You should also be able to start with a bug and find the code used to fix the issue.

The bug metadata should be factual, but separate from the decision to ship. Don’t lower a bug priority just to make the decision to ship easier for someone else. Let those people own the decision to ship with a known level of quality.

Triage helps keep bug status up to date, which is how real-time roadmaps are created. In a time-oriented release schedule, release roadmaps can change because some features aren’t ready to ship. When the enough code lands and regressions that need to be fixed are fixed, a feature is ready to ship. Triaging bugs and managing feature status frequently allows you to be proactive about changes in roadmaps, not reactive.

29 Aug 21:57

Robert Shiller, Today’s Inequality Could Easily Become Tomorrow’s Catastrophe

Robert Shiller, Today’s Inequality Could Easily Become Tomorrow’s Catastrophe:

Along with nine other economists, I contributed to a project that engaged in really long-term forecasting. The results appeared in a book edited by Ignacio Palacios-Huerta of the London School of Economics: “In 100 Years: Leading Economists Predict the Future,” (M.I.T., 2013). None of us expressed optimism that inequality would be corrected in the future, and none of us ventured that any major economic policy was likely to counteract recent trends. For example, Angus Deaton of Princeton, commenting on what he called the “grotesque expansions in inequality of the past 30 years,” gave a pessimistic prediction: “Those who are doing well will organize to protect what they have, including in ways that benefit them at the expense of the majority. ” And Robert M. Solow of M.I.T. said, “We are not good at large-scale redistribution of income.” Both Professor Deaton and Professor Solow are fellow Nobel laureates. No one seems to have an effective plan to deal with the possibility of much more severe inequality, should it develop. In the disturbing book “Poverty and Famines: An Essay on Entitlement and Deprivation,” (Oxford, 1983) Amartya Sen, a Harvard professor, documented an extraordinary thing: In each of four devastating famines in different parts of the world, there was enough food to keep everyone alive. The problem in each case was that the food was not shared adequately. Systems of privilege and entitlement permitted hoarding of food by people of status whose lives went on much as usual, except that they had to brush off starving beggars and would occasionally see dead bodies on the street.

29 Aug 21:57

Who to snog, marry and avoid at the G20 – or, the essential guide to international relations

by admin

Forget rational choice theory and highfalutin ideas about ideology. The most useful tool for political analysis was lit upon by P. J. O’Rourke, who has made a career from arguing that politics is boring. A few years ago, the American author of Don’t Vote!

29 Aug 21:57

Which Of These Is More Important?

by Richard Millington

Why people aren’t participating or why people are participating?

Both can reveal useful data, but the latter is usually more important than the former.

The problem with the non-participants is they might not be part of your target audience. They’re simply people who were caught up in the recruitment net. If you’re carving out a really unique niche (as you should), then most people won’t be part of your target audience.

Adjusting what you do to appeal to the non-participants can do a lot of harm. It feels smart to figure out why people aren’t participating. But it’s not usually a great idea.

Why people are participating, however, is really interesting. It reveals their emotional state and highlights the kind of emotions you can amplify to drive results. You can then work to amplify these emotions, which are the very emotions that will appeal to the crowd you are trying to attract.

29 Aug 21:54

D3 in Depth

by Nathan Yau

D3 in depth

D3 is the most commonly used JavaScript library for visualization on the web, but there’s a bit of learning curve, especially for those new to programming. Peter Cook hopes to make this beginning step easier with his newly started online resource D3 in Depth.

Pair this with many, many examples and you’re set.

Tags: d3js

29 Aug 21:54

Broken Windows, Broken Code

by R. Joshua Scannell

This year, the federal government announced it will phase out its use of all privately operated prisons. Many progressives have heralded this as a victory. It is not.

Although for-profit prisons are transparently evil, they house a very small percentage of people ensnared by American mass incarceration. The problem with for-profit prisons is prison, not profit. Without an accompanying effort to draw down the reach, power, and discretion of criminal-justice institutions, the injuries these institutions inflict will be redistributed rather than redressed. When, for instance, federal courts have ordered states to reduce prison inmate populations, the effect has mainly been to increase the strain on already overburdened state and local courts, while inmates are merely reassigned from state to local jails or “resentenced” (as when judges retroactively change sentences after legal statutes change). In large states like California and Michigan, this has forced courts to “do more with less” in expediting the criminal-justice process. That means that judges have had to industrialize how they sentence people.

Government, and especially the overburdened criminal justice system, is supposed to do two things at once: to be more economically efficient and more ethically just. That is where the U.S.’s most spectacularly capitalized industry sector steps in: Silicon Valley caters to the fantasy that those two incompatible goals can be met through a commitment to data and a faith in the self-evident veracity of numbers.

This spirit animates a software company called Northpointe, based in the small, predominantly white town of Traverse City, in northern Michigan. Among other services, Northpointe provides U.S. courts with what it calls “automated decision support,” a euphemism for algorithms designed to predict convicts’ likely recidivism and, more generally, assess the risk they pose to “the community.” Northpointe’s stated goal is to “improve criminal justice decision-making,” and they argue that their “nationally recognized instruments are validated, court tested and reliable.”

Northpointe is trying to sell itself as in the best tradition of Silicon Valley startup fantasies. The aesthetic of its website is largely indistinguishable from every other software company pushing services like “integrated web-based assessment and case management” or “comprehensive database structuring, and user-friendly software development.” You might not even infer that Northpointe’s business is to build out the digital policing infrastructure, were it not for small deviations the software-company-website norm, including a scrubber bar of logos from sheriffs’ departments and other criminal-justice institutions, drop-down menu items like “Jail Workshops,” and, most bizarrely, a picture of the soot-covered hands of a cuffed inmate. (Why are those hands so dirty? Is the prisoner recently returned from fire camp? Is it in the interest of Northpointe to advertise the fact that convict labor fights California’s wildfires?)

Silicon Valley caters to the fantasy that the two incompatible goals of efficiency and ethical justice can be met through a commitment to data. That industry believes itself to be in the business of building crystal balls

Moreover, in the Silicon Valley startup tradition, Northpointe has developed what it views as an objective, non-ideological data-driven model to deliver measurable benefits to a corner of the public sector in need of disruption. If only the police, the courts, and corrections departments had better data or a stronger grasp of the numbers — if only they did their jobs rationally and apolitically — then we could finally have a fair criminal justice system. This is essentially the neoliberal logic of “smaller, smarter government,” spearheaded in the U.S. by Bill Clinton and Al Gore, who ran a “reinventing government” task force as vice president, and it has defined what is regarded as politically permissible policy ever since.

But Northpointe’s post-ideological fantasies have proved to be anything but in practice. At the end of May 2016, ProPublica published a thorough and devastating report that found that Northpointe’s algorithms are inaccurate — in that they have assigned high risk values to people who are not recidivist — as well as racist, consigning a lot of brown, black, and poor white bodies to big houses under the cover of the company’s faux-progressive rhetoric about “embracing community” and “advancing justice.”

The ProPublica report confirmed the suspicions of many activists and critics that emerging technological approaches designed to streamline the U.S.’s criminal justice system and make it fairer might in fact do the opposite. Northpointe, of course, disputes ProPublica’s analysis. In a letter to the publisher, they wrote that “Northpointe does not agree that the results of your analysis, or the claims being made based upon that analysis, are correct or that they accurately reflect the outcomes from the application of the model.”

Of course, their model is proprietary, so it is impossible to know exactly how it works. ProPublica did manage to find that it is based on 137 Likert-scale questions that are broken down into 14 categories. Some of these have obvious relevance, like criminal history and gang membership. Others are specious and confusing, like leisure/recreation (“Thinking of your leisure time in the past few months … how often did you feel bored?”), social isolation (“I have never felt sad about things in my life”), and “criminal attitudes” (“I have felt very angry at someone or something”).

Northpointe makes for an easy target for critics of predictive analytics in contemporary criminal justice. It’s a for-profit company, with an inherent interest in expanding the state’s carceral reach. Its business model depends on a criminal-justice system oriented toward perpetually churning people through its courts and being overburdened. The more overtaxed a court, the more attractive a program that can tell a judge how they ought to rule. But to blame mass incarceration on companies like Northpointe would be akin to blaming private prisons (which house about 11 percent of prisoners) for mass incarceration. The public sector may work with the private sector to outlay some costs and provide some services, but the government makes the market.

A common critique of algorithmic systems like Northpointe’s is that they replicate existing bias. Because people program algorithms, their biases or motives get built in. It seems to follow, then, that were we to open up the algorithms, we could train them out of their prejudicial ignorance and thereby solve the problems of racism, sexism, queerphobia, and so on that are otherwise written invisibly into the source codes of everyday life. We may not to be able to reprogram humans to be unbiased, but we can rewrite algorithms.

But the problem with predictive policing goes beyond Northpointe or biased algorithms. Focusing on the algorithms relies on a delimited analysis of how power works: If only we could have woke programmers, then we would have woke systems. Swap out “programmers” for “cops” and you have a version of the “few bad apples” theory of policing, which ignores the way in which violence and repression are inherent and structural within law enforcement. The problem with predictive policing algorithms, and the fantasy of smart government it animates, is not that they can “become” racist, but that they were built on a law-enforcement strategy that was racist all along.


Northpointe is emblematic of the sort of predictive and data-driven approaches that have become accepted commonsense policing practices, techniques such as hot-spot policing and situational awareness modeling. And while these methods are often presented as social or politically “neutral,” there is an enormous body of research that has demonstrated repeatedly that they are not. But what made data-driven predictive policing seem like common sense?

To begin to answer that question, one must trace the disparate histories of predictive policing’s component parts through a series of crises and conjunctions. Actuarial techniques like Northpointe’s (or the older Level of Service Inventory–Revised, another recidivism-risk-assessment battery) emerge out of insurance companies’ demand for risk management during the late 19th and early 20th centuries’ chronic economic crises.

Two more pieces of the puzzle, biometrics and organized surveillance, emerge in the 18th and 19th centuries out of the shifting tactics for maintaining white supremacy in both southern slave plantations and northern cities. Simone Browne, for example, has shown that New York’s colonial “lantern laws,” which forbade unaccompanied black people from walking the streets at night without carrying a lit lantern, were originally instituted because of white fear of antislavery insurrection.

And lastly, statistical techniques of crime prediction come down to us through the early-20th century Chicago School of sociology, which swapped cruder theories of physically inherent racial difference for more refined spatio-cultural theories of industrial capitalist “social disorganization.” These shored up sexuality and the color line as the key arbiters of cultural degradation, as in studies positing a “culture of poverty” that generates criminality. This is Roderick Ferguson’s point in Aberrations in Black when he argues that “the Chicago School’s construction of African American neighborhoods as outside heteropatriarchal normalization underwrote municipal government’s regulation of the South Side, making African American neighborhoods the point at which both a will to knowledge and a will to exclude intersected.”

All these histories are individually crucial. But there is a particular point when they all converged: at the 1993 election of Rudy Giuliani as mayor of New York City. A combination of white resentment against David Dinkins, the city’s first black mayor; a referendum on Staten Island’s secession from New York City; and incessant dog whistling about “improving the quality of life” in the city allowed Giuliani to win the mayoral race. The “quality of life” issue stemmed from the unprecedented spike in homelessness and poverty in the wake of the city’s 1970s fiscal crisis. The racist political economy of New York City ensured that poverty and homelessness — coded as “disorder” — fell disproportionately to people of color.

What the NYPD authorities wanted was real-time data on the dispositions and intentions of their “enemies,” to know where “knuckleheads” and “predators” would be before they did. And they wanted it to be legal

None of this was accidental. Robert Moses was a key player in a power elite that famously engineered New York as an apartheid city in the 1950s and 1960s, just as many people of color were immigrating there, particularly from Puerto Rico and the American South. They were largely renters, living rent-gouged in the subdivided former homes of white families who had taken advantage of the GI Bill and home-loan programs to move to the suburbs. When New York City’s industrial core collapsed in the 1960s, it devastated working class neighborhoods, where poverty skyrocketed and landlords systematically abandoned property. Aside from industry, black and Latinx workers had won the greatest labor victories and made the deepest inroads in the public sector. After the federal government induced the fiscal crisis of the ’70s and crippled the municipal government, the city cut one-third of its workforce, further decimating the black and Latinx working and middle classes.

As the city sought to lure major corporate headquarters, financial houses, and wealthy real estate investors back from the suburbs in the 1980s, controlling this racially coded “disorder” became the city government’s paramount concern. The police did this by combining a generalized ratcheting up of displays of spectacular violence meant to “retake” places like Tompkins Square Park from the queer and homeless communities that had set up there, with a “community policing” strategy that focused on outreach to “community leaders” to make the department more responsive. Dinkins’ administration also made harassing black “squeegee men” a centerpiece of its crime fighting effort, a tactic that Giuliani, while campaigning, would point to as a matter of “restoring the quality of life.” That was thinly veiled code for aggressively targeting the poor, people of color, queer people, sex workers, and teenagers as part of a general campaign to, as Police Strategy No. 5 put it, “reclaim the public spaces of New York.”

This policing strategy “worked” in that, by the early 1990s, crime rates had begun to fall, real estate values skyrocketed, and “undesirable” populations had been pushed further to the margins. It also fomented the toxic electoral mood that got Giuliani elected. He appointed William Bratton as police commissioner (the first of his two tours of duty in the position), and Bratton would implement the infamous policing strategy known as “Broken Windows.”

Broken Windows is usually explained as the idea that police should rigorously enforce violations of small crimes with maximum penalties to both deter people from committing larger crimes and incapacitate people who cannot be deterred. But while that is an accurate depiction of how Bratton and other backers have described the approach to the press, the actual Broken Windows theory, developed in the early 1980s and revised through the mid-1990s, is never so coherent. Critics (who have often been cops) have repeatedly pointed this out from the moment the Atlantic first published the article by James Q. Wilson and George L. Kelling that gave the approach its name in 1982. I am partial to Rachel Herzing’s recent description of Broken Windows in Policing the Planet, where she describes the theory as “not much of a theory at all,” but rather “an incantation, a spell used by law enforcement, advocates, and social scientists alike to do everything from designing social service programs to training cops.”

To the extent that Wilson and Kelling’s case can be condensed into a logical argument, it is this: Reforms designed to address corruption and racism in American police departments have incapacitated their ability to fulfill the order-maintenance component of their mission. This crippled American cities in the 1970s by instilling a culture of disorder in the streets and a fatalist sense of impotency in police departments. To fix this, these reforms must be abolished. In their stead, police should walk around more than they drive, because it is hard to be scared of someone when they are in a car (?). They should “kick ass” more than they issue summonses or arrests, because it is more efficient and the criminal justice system is broken (??). They should use their subjective judgment to decide who will be on the receiving end of this order maintenance, rather than defer to any legal regime (???). They should do all this without worrying about whether what they do would stand up in a court of law, because the interests of the community far outweigh the individualized injustice that police may mete out (????). That, plus a chilling nostalgia for Jim Crow and the befuddling decision to rest the entire scientific basis for their case on a study organized by Philip Zimbardo, who also ran the Stanford Prison Experiment (among the most unethical social science studies ever performed), gives the gist of the thing.

Even Bratton’s second-in-command during his first stint as NYPD commissioner in the Giuliani years, Jack Maple, thought that the Broken Windows theory was bogus. He called it the “Busting Balls” theory of policing and said that it was the oldest and laziest one in the history of the profession. He thought that only academics who had never actually worked on the street could ever think it would effectively drive down crime. In practice, he argued, non-systematically attacking people and issuing threats would displace unwanted people to other neighborhoods, where they could continue to “victimize” innocents. Because Broken Windows did not advocate mass incapacitation through mass incarceration, Maple thought it ineffective.

So the strategy that Bratton implemented was not the Broken Windows detailed in the Atlantic essay. Nor was it, as it is sometimes described, a hardline interpretation of Wilson and Kelling’s ideas. But Broken Windows theory did offer Bratton and Maple an intellectual scaffold for reversing what had been considered the best practices in policing for decades. Over more officers and equipment, Bratton and Maple wanted more intelligence. Broken Windows provided a reason to replace six-month or annual target benchmarks for reduction of “index crimes” (crimes reported in Part I of the FBI’s Uniform Crime Reports: aggravated assault, forcible rape, murder, robbery, arson, burglary, larceny-theft, and motor-vehicle theft) with the monitoring of granular crime data on a geographic information system in near real time, to meet day-to-day targets for reductions in the full range of crimes, and not just the most serious.

What Bratton and Maple wanted was to build a digital carceral infrastructure, an integrated set of databases that linked across the various criminal-justice institutions of the city, from the police, to the court system, to the jails, to the parole office. They wanted comprehensive and real-time data on the dispositions and intentions of their “enemies,” a term that Maple uses more than once to describe “victimizers” who “prey” on “good people” at their “watering holes.” They envisioned a surveillance apparatus of such power and speed that it could be used to selectively target the people, places, and times that would result in the most good collars. They wanted to stay one step ahead, to know where “knuckleheads” and “predators” would be before they did, and in so doing, best look to the police department’s bottom line. And they wanted it to be legal.

A company that develops tools to rationalize and expedite the process of imprisoning people is not technically a part of any criminal justice institution, but it automates the mechanics of one

For this corporate restructuring of policing to be successful, they had to populate the city’s databases with as many names as possible. But these institutions were reluctant to adopt new tech — for reasons of expediency (people hate learning new systems, especially when they are untested) as well as for moral reservations about automating criminal justice.

If Bratton and Maple could expand the number of arrests the system was handling, they could force the issue. By their own admission, they created a deliberate crisis in the accounting capacities of New York City’s criminal justice institutions to necessitate the implementation of digital technologies. For instance, they ordered enormous sweeps aimed at catching subway fare-beaters, in which the police charged everyone with misdemeanors instead of issuing warnings or tickets. This flooded the courts with more cases than they could handle and overwhelmed public defenders. To cope, the courts automated their paperwork and warrant-notifications system, and public defenders turned increasingly to plea deals. This piled up convictions, inflating the number of people with criminal records and populating interoperable databases.

Case information was then fed to the NYPD’s warrant-enforcement squad, which could then organize their operations by density (where the most warrants were concentrated) rather than severity of the crime. Most warrants were served for jumping bail, a felony that many don’t realize they are even committing. Faced with the prospect of abetting a felon, many people that the police questioned in the targeted enforcement areas were willing to give up their friends and acquaintances to stay out of trouble. The surveillance net expanded, and the data became more granular. Officers in areas with high concentrations of incidents, newly empowered to determine how to police an area based on their idea of how risky it was, would step up their aggression in poor, black, Asian, and Latino neighborhoods, in queer spaces, and in places where they believed sex workers did their jobs. It was, and is, Jim Crow all over again, but this time backed by numbers and driven by officers’ whims.


By providing the framework for a massive increase in aggressive police behavior, Broken Windows made this possible. It gave a rationale for why officers should be permitted to determine criminal risk based on their own subjective interpretations of a scene in the moment rather than abiding strictly established protocols governing what was and was not within their jurisdiction. This helped support the related notion that police officers should operate as proactive enforcers of order rather than reactive fighters of crime. That is, rather than strictly focus on responding to requests for help, or catching criminals after a crime occurred, Broken Windows empowered cops to use their own judgment to determine whether someone was doing something disorderly (say, selling loose cigarettes) and to remove them using whatever force they deemed appropriate. Broken Windows plus Zero Tolerance would equal an automated carceral state.

A carceral state is not a penal system, but a network of institutions that work to expand the state’s punitive capacities and produce populations for management, surveillance, and control. This is distinct from the liberal imagination of law and order as the state redressing communal grievances against individual offenders who act outside the law. The target of the carceral state is not individuated but instead group-differentiated, which is to say organized by social structures like race, class, gender, sexuality, ability, and so on. As Katherine Beckett and Naomi Murakawa put it in “Mapping the Shadow Carceral State,” the carceral “expansion of punitive power occurs through the blending of civil, administrative, and criminal legal authority. In institutional terms, the shadow carceral state includes institutional annexation of sites and actors beyond what is legally recognized as part of the criminal justice system: immigration and family courts, civil detention facilities, and even county clerks’ offices.”

In a liberal law-and-order paradigm, individuals violate norms and criminal codes; in the carceral state, racism, which Ruth Wilson Gilmore defines “specifically, is the state-sanctioned or extralegal production and exploitation of group-differentiated vulnerability to premature death” is the condition of possibility for “criminality.” The political economic structures of a carceral state deliberately organize groups of people with stratified levels of precarity through mechanisms like red-lining, asset-stripping, predatory lending, market-driven housing policies, property-value funded schools, and so on.

The consequence of these state-driven political decisions is premature death: Poor people, who in American cities are often also black, Latinx, Asian, and First Nation, are exposed to deadly environmental, political, sexual, and economic violence. Efforts to survive in deliberately cultivated debilitating landscapes are determined to be “criminal” threats to good order, and the people who live there are treated accordingly. Lisa Marie Cacho argues that the effect is social death: The “processes of criminalization regulate and regularize targeted populations, not only disciplining and dehumanizing those ineligible for personhood, but also presented them as ineligible for sympathy and compassion.” This is how technically nonpunitive institutions become punitive in fact, as in immigration detention, civil diversion programs that subject bodies to unwanted surveillance and legal precarity, educational institutions that funnel children into a pipeline to prison, and civil-injunction zones that render traversing space a criminal act.

The carceral state’s institutions and cadres are both public and private. For example, a company like Northpointe that develops tools designed to rationalize and expedite the process of imprisoning people, is not technically a part of any criminal justice institution, but it automates the mechanics of the carceral state. Securitas (née “Pinkerton”) might not be a state agency, but it does the labor of securing the circulation of capital to the benefit of both corporations and governments.


For any buildup in surveillance to be effective in sustaining a carceral state, the police must figure out how to operationalize it as a management strategy. The theoretical and legal superstructures may be in place for an expanded conception of policing, but without a rationalized command-and-control process to direct resources and measure effectiveness, there is little way to make use of the new data or assess whether the programs are accomplishing their mission of “driving down crime.” In 1994, the NYPD came up with CompStat to solve this problem, and we are living in its world.

Depending on who is recounting CompStat’s origin story, it stands for “Compare Statistics,” “Computerized Statistics,” or “Computer Statistics.” This spread is interesting, since all three names imply different ideas about what computers do (as well as a total misunderstanding of what “statistics” are). Let’s take these from least to most magical. “Compare Statistics” designates computers as capable merely of the epistemological function of rapidly comparing information curated and interpreted by people. “Computerized Statistics” implies an act of ontological transformation: The information curated and interpreted by humans is turned into “Big Data” that only computers have the capability of interpreting. “Computer Statistics” instantiates, prima facie, an ontological breach, so that the information is collected, curated, and analyzed by computers for its own purposes rather than those of humans, placing the logic of data squarely outside human agency.

These questions aren’t just academic. The Rand Corporation, in its 2013 report on predictive policing, devotes an entire section to dispelling “myths” that have taken hold in departments around the country in the wake of widespread digitization of statistical collection and analysis. Myths include: “The computer actually knows the future,” “The computer will do everything for you,” and “You need a high-powered (and expensive) model.” On the spectrum of Compare Statistics to Computer Statistics, Rand’s view is closest to Compare, but companies like Northpointe are at the other end. That industry believes itself to be in the business of building crystal balls.

And were one to embark on a project of separating out industry goals from the ideologies and practices of smart government, one would find it impossible. Massive tech companies like Microsoft, IBM, Cisco Systems, and Siemens, as well as smaller, though no less heavy, hitters like Palantir, HunchLab, PredPol, and Enigma are heavily invested in making government “smarter.” Microsoft and New York City have a profit-sharing agreement for New York City’s digital surveillance system, called AWARE (the Automated Workspace for the Analysis of Real-Time Events), which has recently been sold to cities like Sao Pãolo and Oakland.

The NYPD’s “Computer Statistics” approach provides easy transparency, in that anybody can look at a map and see if there are more or fewer dots than before. More dots mean the cops are failing. Fewer dots mean they’re doing their job

CompStat sits at the fountainhead of an increasingly powerful movement advocating “responsive,” “smart” government. It has become ubiquitous in large police departments around the world, and in the U.S., federal incentives and enormous institutional pressures have transferred the burden of proof from those departments that would adopt it to those departments that don’t.

Major think tanks driving the use of big data to solve urban problems, like New York University’s Center for Urban Science and Progress, are partially funded by IBM and the NYPD. Tim O’Reilly explicitly invokes Uber as an ideal model for government. McKinsey and Co. analysts advocate, in a Code for America book blurbed by Boris Johnson, that city government should collect and standardize data, and make it available for third parties, who can then use this to drive “significant increases in economic performance for companies and consumers, even if this data doesn’t directly benefit the public sector agency.” In the context of a carceral state, harassing and arresting poor people based on CompStat maps delivers shareholder value for Microsoft, speculative material for some company whose name we don’t know yet, and VC interest in some engineers who will promise that they can build “better” risk analytics algorithms than Northpointe.

A hybrid labor management system and data visualization platform, CompStat is patterned on post-Fordist management styles that became popular during the 1980s and early 1990s. Although it draws liberally from business methodologies like Six Sigma and Total Quality Management, it is most explicitly indebted to Michael Hammer and James Champy’s Re-engineering the Corporation, which calls for implementing high-end computer systems to “obliterate” existing lines of command and control and bureaucratic organization of responsibility. Instead of benchmarks and targets set atop corporate hierarchies in advance of production, Hammer and Champy advocate a flexible management style that responds, in real time, to market demands. Under their cybernetic model, the CEO (police commissioner) would watch franchisees’ (precincts) performance in real time (CompStat meetings), in order to gauge their market value (public approval of police performance) and productivity (crime rates, arrest numbers).

Under CompStat, responsibility for performance and, in theory, strategy, devolves from central command to the middle managers (a.k.a. precinct commanders), who must keep their maps and numbers up to date and are promoted or ousted based on their ability to repeatedly hit target numbers (in their case, crime rates and arrests). Because the responsibility for constantly improving the bottom line has been transferred to the precinct commanders, they lean on their sergeants when the numbers are bad, and the sergeants in turn lean on their patrol officers.

CompStat also gives police managers a simple, built-in way of easily telling whether or not their cops are doing their jobs. They can look at maps to see if they’ve changed. This simplicity has the added bonus for governments of providing easy “transparency,” in that anybody can look at a map and see if there are more or fewer dots on it than there were a week ago. More dots mean the cops are failing. Fewer dots mean they’re doing their job.

This appeals to the supposed technocratic center of American politics, which regards numbers as neutral and post-political. It lends apparent numerical legitimacy to suspicions among the privileged classes about where police ought to crack heads hardest. It also, in theory, saves money. You don’t have to deploy cops where there aren’t incidents.

CompStat is rooted in a sort of folk wisdom about what statistics are: uncomplicated facts from empirical reality that can be transformed automatically and uncontroversially into visual data. The crimes, the logic goes, are simply happening and the information, in the form of incident reports, is already being collected; it merely should be tracked better. Presumably, CompStat merely performs this straightforward operation in as close to real time as possible. Departments can then use these “statistics” to make decisions about deployment, which can be targeted at spaces that are already “known” to have a lot of crime.

But this overlooks the methodological problems about how data is to be interpreted as well as the ways in which the system feeds back into itself. Statistics are not raw data. Proper statistics are deliberately curated samples designed to reflect broad populational trends as accurately as possible so that, when subjected to rigorous mathematical scrutiny, they might reveal descriptive insights about the composition of a given group or inferential insights about the relationships between different social variables. Even in the best of cases, statistics are so thoroughly socially constructed that much of social science literature is devoted to debating their utility.

When CompStat logs arrest information in a server and overlays it on a map, that is not statistics; it is a work summary report. The “data” collected reflects existing police protocol and strategies and are reflective of police officers’ intuitive sense of what places needs to be policed, and what bodies need to be targeted, and not much else. New York City cops don’t arrest investment bankers for snorting their weight in cocaine because they are not doing vertical patrols in Murray Hill high rises. They are not doing vertical patrols in Murray Hill high rises not simply because the police exist to protect rather than persecute the wealthy, but because they have labored for 20 years under a theory of policing that effectively excludes affluent areas from routine scrutiny. It so much as says so in the name: These high-rises don’t have broken windows.

Similarly, the National Center for Women and Policing has cited two studies that show that “at least 40 percent of police officer families experience domestic violence,” contrasted with 10 percent among the general population. Those incidents tend not to show up on CompStat reports.

The reverence with which CompStat’s data is treated is indicative of a wider fetishization of numbers, in which numbers are treated as more real than social structures or political economy. Indeed, it often seems as though metrics are all that there is.


The transparent/responsive/smart government movement argues for reconstituting governance as a platform, transforming the state into a service- delivery app. Its thought leaders, like Michael Flowers and former Maryland governor Martin O’Malley, routinely point to CompStat as the fountainhead of postpolitical governance, as if such a thing were possible. But as feminist critics of technology like Donna Haraway and Patricia Ticineto Clough have long pointed out, technology is political because it is always, everywhere, geared toward the constitution, organization, and distribution of differentiated bodies across time and space. And bodies are politics congealed in flesh. CompStat is designed to maximize the efficiency and force with which the state can put police officers’ bodies into contact with the bodies of people that must be policed.

And how do police determine which bodies must be policed? They do it based on what “feels” right to them, the digital inheritance of Broken Windows. Even cops that are not racist will inevitably reproduce racialized structures of incarceration because that is what policing is. In a city like New York, in a country like the U.S., that level of police discretion always points directly at the histories of unfreedom for black, brown, and queer people that are the constitutive infrastructures of our state.

Northpointe’s algorithms will always be racist, not because their engineers may be bad but because these systems accurately reflect the logic and mechanics of the carceral state — mechanics that have been digitized and sped up by the widespread implementation of systems like CompStat. Policing is a filter, a violent sorting of bodies into categorically different levels of risk to the commonweal. That filter cannot be squared with the liberal ideas of law, order, and justice that a lot of people still think the United States is based on. Programs like CompStat are palliative. They seem to work in data, in numbers, in actual events that happened outside of the context of structural inequalities, like racism or patriarchy, or heteronormativity. But CompStat links the interlocked systems of oppression that durably reproduce the violence of the carceral state to a fantasy of data-driven solutionism that reifies and reproduces our structural evils. Whether or not a human is remanded to a cage because of their race and sex, or because of a number on a dashboard, means very little once the door slams shut.

29 Aug 21:53

Analysing writing

files/images/selection_877.png


Doug Peterson, doug — off the record, [Sept] 01, 2016


Doug Peterson introduces us to a lovely application called FoxType, which I tried out this morning. Essentially, the idea is that it provides a number of services to help you understand your own writing. The most visually appealing is the parser, which will diagram your sentence as you write. But iit also assesses sentences for things like politeness and vocabulary. Some of these are very arbitrary - I, for example, would consider writing in the first person to be more polite, and less stuffy and formal. FoxType takes the opposite view. But who cares? The ultimate goal here (in the 'still to come' department) is to create a general writing scaffold. It will help you write well as you write. This is the tip of a much larger iceberg.

[Link] [Comment]
29 Aug 21:53

When To Use A Subdomain Or Subfolder In Your URL

by Michael Keshen

Depending on where and when you look, the consensus on whether you should or shouldn’t use a subdomain for your website can lie on either side of the argument. It can be a lot of work to change your site architecture back and forth from subdomains to subdirectories — not to mention the potentially disastrous SEO implications of choosing the wrong structure — which is why it’s so important to start your website off on the right foot.

Whether you know all about subdomains or you’re thinking “a subwhat?”, let’s take a look at the subdomain/subfolder debate and see where it stands today.

What are Subdomains and Subfolders?

Subdomains

Every website that you visit has a subdomain. Using this website as an example — www.hover.comwww is the subdomain. A subdomain is an alias of your domain name with its own IP address, making it essentially a different website. Although it shares your domain name, the subdomain allows it to be controlled independently with its own hosting provider, content management system, and site architecture.

Because of all this, however, subdomains also require more work to maintain. Also, SEO gains for one subdomain will not carry over to other subdomains, so you’ll need to work extra hard to get all of your subdomains to rank well in search results.

Subfolders

Your website is a collection of folders that contain site files, and a subfolder (also known as a subdirectory) is one of these folders. In this URL — www.hover.com/blog/blog is the subdirectory. A subdirectory is much more integrated with your website, sharing traffic/hosting and SEO benefits that other pages on your site earn.

A Quick History of Subdomains

Once upon a time, Google used to treat subdomains as separate websites in search results. Capitalizing on this, many people would create a ton of subdomains for their websites with targeted keywords as the subdomain. This would often result in one website taking up most of the top results in a related search.

As you can imagine, this did not often yield the best results. Many websites were ranking well because of their ability to hack the system, as opposed to the quality of their website’s content. A few years ago, Google solved this problem by beginning to treat a website’s subdomains as part of one domain name. Now, where a website would have ten results for a search, it would only have one. Some experts have even noticed a decline in rankings for attempting this old strategy.

Why Use a Subdomain?

If Google is more skeptical of subdomains, you may be wondering why you should even bother using one. Here are some reasons why a subdomain may still make sense for your website.

Language

For businesses that operate in different languages, subdomains are a common way to provide alternate versions of your website according to a visitor’s language preference. This will commonly be displayed with a two-letter subdomain indicating the language, such as en.domain.com for english or fr.domain.com for french.

Localization

If your website represents multiple locations, each with its own distinct web presence, then subdomains are suitable for providing each location its own independent version of your site. Craigslist uses this technique for the many cities it represents, such as toronto.craigslist.org or chicago.craigslist.org.

Franchises

Franchise websites will typically have mostly the same content as other franchises, with only a few variations such as location, store hours and updates. Using subdirectories, a business risks being penalized for having duplicate content by having many pages on the domain with the exact same content. By using a subdomain for each location, there is less risk for duplicate content because each subdomain is regarded more as its own website.

What do you think?

Is there still a need for subdomains or should they be avoided at all costs? Let us know in the comments!

29 Aug 21:53

Technologies of Belonging in an Era of Precarity

by Justin Quinn

14159070_10154349226626070_1229869182_n

How does technology mediate belonging in an era of both rising connectivity and xenophobia? The rhetoric of globalization would have us believe we are entering a new era of integration facilitated by advances in transportation and information technology, while racist populism is finding currency unseen since the Second World War. These perspectives represent very different views of how the world should work, and reflect one’s position and ability to navigate multiple, entangled systems of belonging, and the technologies making such movement possible.

We order our world with technology, in ways so mundane they escape detection without effort to separate representation of the world from the world itself. This is difficult because language itself is a sort of representational technology. Think of language as the software used in “hardware” (like stop signs or birth certificates) designed to order society.

The last decade has seen dozens of new kinds of hardware and software created to manage individuals’ relationships with the state. What does it mean to “belong” in a state? Is it enough to have legal credentials, or are there cultural and social dimensions that make belonging more than a value in a spreadsheet? Rather than thinking of belonging as a thing one has or does not have, we should think of it as a constantly evolving process. Systems of belonging operate by ordering relations between spaces, things and people, and, importantly, what counts as “people”. This latter distinction is the bedrock from which all other relations are imagined. To be a “person” signifies a special status, the right to have rights. One cannot own things if one does not own one’s self, and one cannot own one’s self if one is not a person.

Belonging has a context in which it operates – a domain where definitions are generally agreed upon, with a stable if evolving framework of relations between people and things, and a means of negotiating them. In the context of globalization and xenophobia, that context is the state, and the means of negotiating these ties are technologies of belonging.

Language and sight are primary technologies of belonging – what language you speak, and how you speak it signals others as much as appearance and behavior can, and all have a long history in the service of the state in determining property and citizenship rights. Every time you hear about a legislature mulling the idea of recognizing an “official language”, you are witnessing an aspect of belonging being crafted.

All persons are entangled with state systems of belonging, though in practice the reach of such systems is uneven and irregular. Many experience dissonance between representations and realities of social relations, and there is often a connection between asymmetrical distributions of power and these dissonances. In present-day liberal democracies, the promise of belonging is a promise of equal protection and access to the law. Between promise and reality, however, is the space where technologies of belonging are employed, co-opted, or subverted, as individuals and groups seek to redefine – or escape – actually existing relations in their respective states.

To answer how technology mediates belonging in a state system, we should begin by outlining how individuals  encounter and interact with such technologies. Technologies of belonging are both mundane and extraordinary, depending on context. They are mundane in that our shared acceptance of their efficacy (if not always legitimacy) allows other systems to function. They are extraordinary in that they become most visible and powerful at the limit of their domain – the border – where one of if not the most visible and powerful examples of a technology of belonging, the border security apparatus, hereafter “BSA”, operates.

US BSAs are sorting machines for belonging to or in a liberal democratic state, yet are often neither liberal nor democratic in practice. Ostensibly designed to protect civil and property rights of US citizens while securing authorized movement of goods and persons in and out of national territory, it often suspends or violates these rights while proving at best ineffective at preventing movement of unauthorized goods and persons across the border, and at worst actively making the border region less secure.

This can be better understood if we separate the framing of BSAs from actually existing BSAs, or more simply, how we talk about them from how they actually work.

BSAs recognize a kind of formal belonging to one or more states – citizenship – established through birthplace, family relation or both, documented with context-specific forms of identification, such as passports and visas, which also affect one’s relationships with states to which one does not belong, with the intent of creating unambiguous ties between persons and states.

Increasingly, however, actually existing relations between people and states may be more precarious than ever, whether possessing documentation of citizenship or not, and struggles for civil and property rights increasingly invisible to persons in different networks of social relations until they reach a breaking point, often taking the shape of direct actions seeking to reframe the social order through co-opting, disrupting, or defying existing technologies of belonging. These networks of social relations may be deeply entangled in physical space and dependency, yet almost entirely isolated from each other in how they perceive the status quo. And when the status quo becomes an existential threat, some kind of direct action challenging the status quo is almost guaranteed.  

Belonging-as-tourist, as-migrant, as-refugee, and even as-citizen are filtered through the lens of the “software” of belonging, and ordered through its “hardware” –  passports, visas, customs declarations, and so on. However, these formalized representations of belonging are often mediated as much by history, economics, and the subjectivity of the person assessing the situation as an individual’s safety or documentation does.

For example, non-citizens may be required to secure visas when travelling abroad, depending on country of origin and destination, and that visa may also require a certain level of financial liquidity, good health, or colonial history to be granted. The conditions of the visa may also dictate whether employment is allowed – or required – as a condition. Individuals who cannot meet the requirements of the visa process but are recognized to have imminent threats to their lives or rights may also be granted refugee status in order to achieve recognized entry, yet what is considered an imminent threat varies widely from context to context, again often mitigated by issues with little connection to the individual’s motivation for travel.

Speaking, looking, or acting in ways deemed threatening to a BSA may cause claims of belonging—rooted in formal citizenship or no—to be questioned or denied. Using language associated with threats to the state—perhaps Arabic, Urdu, or a turn of phrase taken out of context—can entangle you just as easily as having the wrong color skin might at a traffic stop dozens of miles from the actual border.

14193831_10154349226396070_74022283_n

Ironically, increasingly militarized border security practices over the last three decades have seemingly had the opposite effect intended, with little evidence showing drops in undocumented migration, drug trafficking, or terrorism. Such practices restricting movement of persons while facilitating trade may have strengthened organized crime networks while destabilizing local economies, forcing many living in parts of the world where agriculture is the only means of earning a living to either relocate to a place they can sell their labor, or become criminals themselves as a matter of survival. For many, the difference between being a refugee and criminal is as little as how long it has been since they have eaten, or if the odds of being killed by a gang for refusing to join are greater than trying to flee.

Often, the difference between an economic migrant and refugee is so minor as to be irrelevant, the line between organized crime and the state indistinguishable, and to remain in their home country a death sentence.

Such conditions render BSAs ineffective, as they assume non-citizens will be deterred by threat of detention or deportation. In practice, however, consequences of falling afoul of a BSA pale in comparison to motivations for many non-citizens, while their citizenship does not protect them.

Seemingly an incongruous juxtaposition, the ascent of neoliberal and xenophobic perspectives are two sides of the same coin, a product of how technologies mediate belonging in transnational and national social orders. Destabilization created by technologies of belonging facilitating (some) mobilities has generated powerful challenges to existing social orders, and also problematic yearnings for a return to an oppressive past free from such challenges. When the framing of social relations fails entire subsets of the population on an existential level, renegotiation of that framing arising from that breakdown is almost certain.

Breakdown between the framing of belonging and its actual practice need not be a story of failure, however. Dissonance between existing and imagined social relations come to light in practice, and are the data we need to make substantive changes to both the technologies we use to order our world, and between actually existing people who live in it. Failure is the absence of dialogue, and our best defense is to instead to embrace it.

Justin Quinn is a PhD graduate student of anthropology at the University of Florida. His research interests include the anthropologies of the translocal, the state, infrastructure, and development. He has worked in Yucatan on the sustainability of tourism, in Southwest Florida on the role of non-profit organizations in local development, and was a founding researcher of the Sarasota County Water Oral History Project. He is currently researching how various publics represent and practice infrastructure development in México.

29 Aug 21:53

Office Lens on Windows 10

by Volker Weber

a19fd2f71f51b7be7b39a260d62a1bdd

Microsoft has quietly published the Office Lens app for Windows 10. However, Windows Store tells me it is not supported on Surface. Let's hope this is just one of those Windows Store quirks.

Update: Yes, it was only a Windows Store quirk. Now it's available for everything Windows 10.

ZZ57773707

And it works just as you would expect it:

ZZ195DB4A7

ZZ6F2C954F

29 Aug 21:53

The Trouble With Big Cities

by Helen Keegan
Although I live in London, I spend a lot of time with my Mum in the city where I grew up. I say city, but Worcester is actually very small when it comes to town and city sizes. And it's a long way from anywhere. It's quicker for me to fly to Barcelona than it is to visit my Mum. Worcester suffers on the GWR Hereford to London line as part of the route is single track through the Cotswolds. I read somewhere that the train journey takes longer now than it did in the days of steam trains. There are local buses, but you really need to understand the timetables as most services are not very frequent and don't run every day and don't have services after 5pm. How you are supposed to use those buses to get to or from work, I really don't know! And let's not talk about the local motorway traffic which seems to get more congested year on year.

As a city, Worcester seems to be suffering from lack of job and career prospects, especially for young people, despite being home to a large university. It's a nice enough place to live with beautiful countryside nearby, a river running through it, a sizeable Marks & Spencer in the High Street and some lovely places to eat and drink. But that's the trouble, the new job opportunities in the city are all hinged on retail and catering jobs. Gone are the days of the big employers like Kays Catalogue, Dents Gloves, Cinderella Shoes, Worcester Royal Porcelain and Metalbox. Maybe, it was like this back in the 1980s when I left school. The majority of my generation left Worcester at the earliest opportunity. A few stayed, but they could be counted on the fingers of one hand. A lot of us left for London. I certainly did and I wasn't alone.

I'd love to see an innovation space in Worcester - in the city centre - showcasing young retail and creative talent and giving them the opportunity to try out their ideas in the city and providing a business hub. I've always thought the old Corn Exchange would make a great space for that. It has been lying empty for so long with a string of failed restaurants behind it, yet it's in a central  location in an interesting and historical building. Or failing that, the Angel restaurant could be reverted back to a market hall but focused on new retailers and have a mix of small office and retail units. I'm heartened to find out that there is an organisation who have similar desires called The Kiln. I'm interested to see what they come up with and wish them every success.

I mentioned all this in passing in a conversation I had with friend and retail expert, Eva Pascoe, and she was telling me that the network effect of new technology was boosting cities and was keeping smaller towns and cities down. It's not something I'd really heard before but it made sense. This article, 'The problem with London Guilt' explains how that works in more detail and why London has become so dominant over other British cities over the years.

I'm not sure where that leaves places like Worcester but it makes for interesting reading to understand the dynamics we're living in right now and why the focus is on 'smart cities' rather than 'smart towns' or 'smart villages'.

I welcome your thoughts and comments on the topic.
29 Aug 20:43

Much leading

by Volker Weber

b084a3fbd0c489075d84ec1f7127a6c9

IBM publishes a blog post naming Inhi Cho Suh as the author. It celebrates an IDC finding that positions IBM as the leading enterprise social software vendor.

I can't help thinking that the community is waiting for a different blog post, addressing the Notes/Domino situation.

29 Aug 20:43

Our tiny autonomous killer drone future

jkottke:

The very beginning of Attack of the Killer Robots by Sarah Topol features this quote by Stuart Russell, a Berkeley computer science professor. It is terrifying:

A very, very small quadcopter, one inch in diameter can carry a one- or two-gram shaped charge. You can order them from a drone manufacturer in China. You can program the code to say: “Here are thousands of photographs of the kinds of things I want to target.” A one-gram shaped charge can punch a hole in nine millimeters of steel, so presumably you can also punch a hole in someone’s head. You can fit about three million of those in a semi-tractor-trailer. You can drive up I-95 with three trucks and have 10 million weapons attacking New York City. They don’t have to be very effective, only 5 or 10% of them have to find the target.

There will be manufacturers producing millions of these weapons that people will be able to buy just like you can buy guns now, except millions of guns don’t matter unless you have a million soldiers. You need only three guys to write the program and launch them. So you can just imagine that in many parts of the world humans will be hunted. They will be cowering underground in shelters and devising techniques so that they don’t get detected. This is the ever-present cloud of lethal autonomous weapons.

They could be here in two to three years.

Who needs a hug?

Where’s Magnus, Robot Killer, when you need him?

29 Aug 20:43

"There are some enterprises in which a careful disorderliness is the true method."

“There are some enterprises in which a careful disorderliness is the true method.”

- Herman Melville, Moby Dick
29 Aug 20:42

A morning snapshot: Dunsmuir and Hamilton

by pricetags

Tim Pawsey reports in today:

I frequently catch the 257 bus at Dunsmuir at Hamilton Street. I like to get on at the originating terminus, which allows me plenty of time to take in the surrounding activity. (It also guarantees me a seat because the bus is very often overloaded. West Van Blue Bus hasn’t quite figured out how popular this route has become.)

Over the last few months, it’s been interesting to watch the increase in traffic on this bike lane, which runs right behind the stop.

I wasn’t able to capture the large number of cyclists today, as it is just too dangerous to stand in the way. There is actually a crosswalk between the sidewalk and the stop, which is on an island. But pedestrians know that it is best to stay out of the way.

This has become a formidable commuter route. Maybe the city should consider putting a counter here …

Tim


29 Aug 20:42

Arbutus Greenway — Examples and Ideas

by Ken Ohrn

Operating on the premise that we’ve built Greenways before in Metro Vancouver, and don’t have to start from a conceptual vacuum, I rode the Railway Greenway in Richmond yesterday.  It follows the route of the ancient (1902 vintage), pre-motordom, Interurban tram line from (more or less) the north arm of the Fraser to Steveston.  History material HERE.

The Greenway map (above) is out of date, it seems, since the ride yesterday was on asphalt.  The Greenway passed through totally car-dependent suburbs, but still attracted people as you can see in my pix. It’s around 5 km long, roughly half the length of the Arbutus Greenway.

Richmond's Railway Greenway The Greenway splits here into two for a short distance, one gravel, one asphalt. Having some fun with the heritage, this is a mock tram schedule at a rest area (reminiscent of a tram station perhaps) Rest area.  Note the all-mode accessible path from suburb on the west to bus stop (not visible) on the right A more elaborate rest area, accessible to all. Note the pathway from the adjacent townhouse complex to the Greenway. And, oh my, blackberry bushes for all. The southern terminus, with the original tram tracks leading to the Interurban Tram Museum.

 


29 Aug 20:42

How a Japanese Printmaker Influenced 'Kubo,' the Biggest Stop-Motion Film Ever

by Beckett Mufson for The Creators Project

Images courtesy LAIKA Studios

The DNA of a Japanese woodblock printing master runs through the veins of Kubo and the Two Strings, which is shaping up to be year's biggest animated film (sorry, Sausage Party).

Boasting groundbreaking 3D printing technology, hybrid CGI innovations, and an 18' tall stop-motion puppet, LAIKA Studios' latest film is a behemoth. Like their previous films Coraline, ParaNorman, and The Boxtrolls, Kubo is a mix of larger-than-life action sequences and mature themes. In a setting electrified by Studio Ghibli-esque magical realism, young Kubo (Art Parkinson) deals with both exhilarating conflict and debilitating loss. Oh, and it doesn't hurt that the rest of the voice talent roster includes Matthew McConaughey, Charlize Theron, George Takei, and Ralph Fiennes—or that the whole affair has received a media blitz that included everything from custom sneakers to custom Snapchat filters.

As part of that campaign, LAIKA invited me to visit their studio in Portland, Oregon where I got to see a mammoth skeleton called the "Hall of Bones," the robotic eye of an underwater monster, and a Smart car-sized model ship made from autumn leaves. But amidst all the film's visual delights, in talking to the creatives behind Kubo, one name was all but unavoidable: that of Japanese woodblock print artist Kiyoshi Saito.

Kiyoshi Saito, Village With Persimmon Tree. "'Village With Persimmon Tree’ resonated with me," says Lowry. "It had a distinctive shape language and lovely textures within those shapes. Saito uses texture and color to suggest detail rather than slavishly rendering them. We saw this as a way to illustrate the world of Kubo."

Early Saito-inspired concept art by texture artist Dan Casey

"Kiyoshi Saito was the key stylistic influence that was the unifying design element throughout the entire movie," Kubo director and LAIKA President and CEO Travis Knight tells The Creators Project. The artist's influence is evident in every aspect of the film, from the costumes and sets, to the framing of the camera.

"Saito's poetic view of the rich history of rural Japan struck a note with me. His artwork was a great place to start in the development of Kubo," adds production designer Nelson Lowry. "Our characters are stylized. The world they travel through needed to support that. During the development process we started adding some of this texture into set pieces and clothing. Rather than depicting every grain of sand and snowflake we used a woodblock like texture across most of the surfaces in the film to imply detail. The technique gave the film a slightly grainy look evocative of Saito's work."

Later concepts by texture artist Dan Casey

Even the CGI is inundated with Saito's woodblock print aesthetic. As VFX supervisor Steve Emerson explains in a presentation during the studio tour, "One of the signatures of the work he does is paying attention to the economy of space and simplicity. We knew that was something we were going to want to fold into the water system." While LAIKA goes to great lengths to keep their films as physical as possible, some problems needed to be solved with computer graphics. Two scenes that could not have been shot with practical set pieces—though LAIKA designers tried—were the massive wave from Kubo's eye-grabbing initial teasers, and an epic swordfight in a rainstorm at sea. Saito's textural qualities tie all the digital elements into the 'look' and 'feel' painstakingly crafted by LAIKA's production designers. "In the final water system for Kubo, if you were to stop the frame and zoom in, you would see the Japanese woodblock Saito texture patterning in every one of these rain drops," says Emerson.

"[Saito's] artwork is just so potent," Lowry says. "He had a wonderful way of organizing nature into distinctive shapes. We needed to do the same. The story of Kubo required us to world-build on an epic scale. Rivers, mountains and distant wheat fields needed to feel organized, understandable. Studying Saito's stylized approach to illustrating both natural and architectural subjects helped us do this, too."

Kubo and the Two Strings is in theaters now. Learn more about LAIKA Studios on their website.

Related:

Unpacking The Stop-Motion Magic Of "The Boxtrolls"

New Software Tool Lets You 3D Print Any Video Game Character Into Fully-Articulated Action Figure

Laika Uses Thousands Of 3D-Printed Faces For Their New Animated Feature ParaNorman

29 Aug 20:42

Ohrn Image — Multi-mode Travel

by Ken Ohrn

Rode the Canada Line yesterday with my bike, and saw the usual people on it with me. Somehow, this variety is always there, but the populist narratives of riders’ demographics don’t come close to matching it. Odd, really.

Heading to YVR with luggage:   check

Earphone dudes (heading to or from school or work):  check

Recreational dude with bike:  check

Dude in suit with bike:   check

Canada.Line


29 Aug 20:41

Apple Announces September 7 Event

by John Voorhees

As first reported by Jim Dalrymple at The Loop, Apple has announced a media event for September 7 at 10 AM. The event will be held at the Bill Graham auditorium in San Francisco.

Based on recent speculation and rumors, Apple is widely expected to introduce a new iPhone 7 line, which may eliminate the 3.5 mm headphone jack and include a dual camera system in the higher-end model. A second generation Apple Watch and refreshed Retina MacBook Pros may also be announced at the event. There have been few rumors about what to expect from a new Apple Watch, but the Retina MacBook Pro is rumored to be thinner, lighter, and include a touch sensitive strip on the keyboard that replaces the function keys and can be programmed to perform different tasks.

In addition to hardware, Apple is expected to announce release dates for iOS 10 and macOS Sierra, which have been in public and developer beta since WWDC in June. As in the past, Apple should release a Golden Master seed of iOS 10 and macOS shortly after the event, with a public release to follow within about 10 days.


Like MacStories? Become a Member.

Club MacStories offers exclusive access to extra MacStories content, delivered every week; it’s also a way to support us directly.

Club MacStories will help you discover the best apps for your devices and get the most out of your iPhone, iPad, and Mac. Plus, it’s made in Italy.

Join Now
29 Aug 20:41

Twitter Favorites: [Justin_Ling] A social license saves you lawsuits, protests, political scandal, and, I can't stress this out enough, DEAD WORKERS.

Justin Ling @Justin_Ling
A social license saves you lawsuits, protests, political scandal, and, I can't stress this out enough, DEAD WORKERS.
29 Aug 20:41

Twitter Favorites: [adamrg] @sillygwailo entirely prediction. Ideally the idea's weight would carry the day, but real world id, CV, etc. acts like a checksum.

Adam Gessaman @adamrg
@sillygwailo entirely prediction. Ideally the idea's weight would carry the day, but real world id, CV, etc. acts like a checksum.
29 Aug 20:40

Twitter Favorites: [kaler] @allbombs You’re talking like a marketer. The cool kids are posting cool shit on Snapchat. IG Stories is all fake ass marketing.

Parveen Kaler @kaler
@allbombs You’re talking like a marketer. The cool kids are posting cool shit on Snapchat. IG Stories is all fake ass marketing.
29 Aug 20:40

Twitter Favorites: [jeffjedras] Sigh. Every vote does count under FPTP. Every vote counts doesn't mean everyone gets what they want; it means they all get a say. Democracy.

Jeff Jedras @jeffjedras
Sigh. Every vote does count under FPTP. Every vote counts doesn't mean everyone gets what they want; it means they all get a say. Democracy.
29 Aug 20:40

The Turnaround

by Eric Karjaluoto

Gary got the call on Tuesday. The clerk noted, “We’re terribly sorry… there’s a problem with your scheduled stay.” He went on to explain that the power company had an upgrade scheduled. This involved ripping open the adjacent street. As a result, the hotel would be without power for several hours.

Having planned this weekend some while in advance, Gary felt disappointed. He and his spouse, Amber, planned to see a concert, visit some good restaurants, and shop. Before he could dwell on this, though, the clerk continued, “We can refund your deposit if you’d like. Or, if you prefer to stay, we’ll give you a 20% discount.” Gary realized that a few hours without power wasn’t a big deal, and accepted the discounted rate.

Things go wrong. When they do, you have a couple of options. You can avoid your guests and hope they’ll eventually go away. (Not a great approach.) Alternately, you can take ownership, and apologize. The Victorian Hotel did the latter, and they even did one better: they gave Gary the option to choose which solution he preferred.

They didn’t stop there, though. On Saturday, the night of the power outage, Gary found a surprise in the lobby. There was a humming in the air—from a generator running in the back lot. It powered a set of decorative lights strewn festively about the space. (Guests received flashlights to use while making their way to their rooms.)

A TV was also plugged into the generator, and turned to the Comedy Channel to entertain visitors. Around it congregated a gaggle of guests. They all talked, and got to know one another. Meanwhile, the hotel manager took the evening to chat with folks like Gary—and share stories about the hotel business, and such. Additionally, staff members provided guests with complimentary champagne. Gary describes the evening as strangely joyful, almost like a special occasion.

Should that have been an ordinary night, I bet Gary and Amber would have retreated to his room to watched TV on their own. They would have had a fine visit, but never spoke of it again. That’s what’s so notable about what The Victorian Hotel’s people did. They turned an unplanned interruption into something rare: a memory.

Gary took 10 minutes, during our next meeting, to tell me about this experience. And now I shared it with you. This wasn’t a campaign. There was no Like Button. The hotel didn’t ask anyone to retweet anything. Instead, The Victorian Hotel gave Gary something worth mentioning—so he did.

Every marketer is happy to promote when all is well. However, when something goes wrong, they tend to fall silent. This is a mistake. It alienates customers, and allows others to control the narrative. Worse yet, it strips the marketer of an opportunity to show that they’re there for customers—in thick or thin.

29 Aug 20:39

Philips’ new motion sensor automatically turns on Hue lights [Update]

by Patrick O'Rourke

Philips’ Hue light bulbs are widely regarded as the smart home industry’s best Wi-Fi-enabled light bulbs.

They can be controlled with your smartphone, run through Amazon’s voice activated device the Echo and now, can be linked to Philips new smart motion sensor that automatically switches on the lights in a room when it senses movement, complete with scene creation.

image001

The motion sensor is powered by three AAA batteries and features a magnetic rear, allowing it to easily attach to any metallic surface. Up to 12 motion sensors can be connected on a single Hue Bridge.

While there are a variety of smart lightbulbs on the market, deep integration with other devices, as well as the ability to heavily customize how they work, make Philips’ Hue series of products stand out from other Wi-Fi-enabled devices.

Philips says that the Hue motion sensor is priced at $39.95 in Canada and the United States. The device will be sold at Amazon.com and Best Buy in October 2016.

Related: Philips Hue and the smart lightbulb conundrum