Tunisian and Egyptian protestors famously made use of social media to rally supporters and disseminate information as the “Arab Spring” began to unfold in 2010. Less well known, but with just as much potential to bring about social change, are ongoing local efforts to use social media and other forms of technology to prevent deadly outbreaks of violence. In The Technology of Nonviolence, Joseph Bock describes and documents technology-enhanced efforts to stop violence before it happens in Africa, Asia, and the United States.
In the dot-com boom of the late 1990s, employees of Internet startups took risks--left well-paying jobs for the chance of striking it rich through stock options (only to end up unemployed a year later), relocated to areas that were epicenters of a booming industry (that shortly went bust), chose the opportunity to be creative over the stability of a set schedule. In Venture Labor, Gina Neff investigates choices like these made by high-tech workers in New York City’s “Silicon Alley” in the 1990s.
Camouflage is an adaptive logic of escape from photographic representation. In Hide and Seek, Hanna Rose Shell traces the evolution of camouflage as it developed in counterpoint to technological advances in photography, innovations in warfare, and as-yet-unsolved mysteries of natural history. Today camouflage is commonly thought of as a textile pattern of interlocking greens and browns.
Recent advances in disciplines such as biotechnology, nanotechnology, and neuropharmacology entail a “dual-use dilemma” because they promise benefits for human health and welfare yet pose the risk of misuse for hostile purposes. The emerging field of synthetic genomics, for example, can produce custom DNA molecules for life-saving drugs but also makes possible the creation of deadly viral agents for biological warfare or terrorism. The challenge for policymakers is to prevent the misuse of these new technologies without forgoing their benefits.
For centuries, both mathematical and military thinkers have used game-like scenarios to test their visions of mastering a complex world through symbolic operations. By the end of World War I, mathematical and military discourse in Germany simultaneously discovered the game as a productive concept. Mathematics and military strategy converged in World War II when mathematicians designed fields of operation.
Uranium from Africa has long been a major source of fuel for nuclear power and atomic weapons, including the bomb dropped on Hiroshima. In 2002, George W. Bush claimed that Saddam Hussein had “sought significant quantities of uranium from Africa” (later specified as the infamous “yellowcake from Niger”). Africa suddenly became notorious as a source of uranium, a component of nuclear weapons. But did that admit Niger, or any of Africa’s other uranium-producing countries, to the select society of nuclear states? Does uranium itself count as a nuclear thing?
In Progressive Enlightenment, Leslie Tomory examines the origins of the gaslight industry, from invention to consolidation as a large integrated urban network. Tomory argues that gas was the first integrated large-scale technological network, a designation usually given to the railways.
The scanning tunneling microscope (STM) has been hailed as the "key enabling discovery for nanotechnology," the catalyst for a scientific field that attracts nearly $20 billion in funding each year. In Instrumental Community, Cyrus Mody argues that this technology-centric view does not explain how these microscopes helped to launch nanotechnology--and fails to acknowledge the agency of the microscopists in making the STM and its variants critically important tools.
The intrauterine device (IUD) is used by 150 million women around the world. It is the second most prevalent method of female fertility control in the global South and the third most prevalent in the global North. Over its five decades of use, the IUD has been viewed both as a means for women's reproductive autonomy and as coercive tool of state-imposed population control, as a convenient form of birth control on a par with the pill and as a threat to women's health. In this book, Chikako Takeshita investigates the development, marketing, and use of the IUD since the 1960s.
A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China--home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique.