<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 101 to 115.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/dn1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/publications-automated/cis/nishant/material%20cyborgs%20ejes.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/column-on-digital-natives"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-october-2-2016-nishant-shah-love-in-the-time-of-tinder"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/pathways/blog/learn-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/keeping-it-private"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-nishant-shah-september-15-2019-kashmirs-digital-blackout-marks-a-period-darker-than-the-dark-side-of-the-moon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/home-images/Jamillah"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/Introduction"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/ip-v-6"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/digital-natives/blog/dn1">
    <title>Meet the Web 2.0 Suicide Machine</title>
    <link>https://cis-india.org/digital-natives/blog/dn1</link>
    <description>
        &lt;b&gt;Digital Natives live their lives differently. But sometimes, they also die their lives differently! What happens when we die online? Can the digital avatar die? What is digital life? The Web 2.0 Suicide machine that has now popularly been called the 'anti-social-networking' application brings some of these questions to the fore. As a part of the Hivos-CIS "Digital Natives with a Cause?" research programme, Nishant Shah writes about how Life on the Screen is much more than just a series of games. &lt;/b&gt;
        
&lt;p&gt;
In the new year, 2010, one of the most startling stories was of mass 
suicides. About 50,000 people were affected. Legal cases were filed. The
 interwebz were abuzz with the tale of how they did it. There was talk 
about a website that was responsible for this. The blogosphere went into
 a frenzy discussing the ‘new lease of life’ that these suicides 
provided. Videos of people caught in the act found their way onto 
popular video distributing spaces. And for everybody who talked about 
it, it was partly a joke and partly a gimmick. However, for a 
significant population, across the globe, the news came as a shock and a
 moment of self-reflection.&lt;/p&gt;
&lt;p&gt;
Meet the Web 2.0 Suicide Machine. It is a simple online machine which 
helps people commit digital suicide by destroying their digital 
identities on popular social networking sites like Facebook, Twitter, 
LinkedIn and Myspace. It is software that deletes every single 
transaction which you may have ever performed in your digital avatar. 
Messages sent to and received from friends, stored notes, results of 
viral quizzes, pictures of the last party that you attended, status 
messages describing state of mind, high scores and social assets on 
social networking games, links shared, videos uploaded – everything gets
 deleted, allowing you one last chance to re-live your digital life 
before it locks you out of the 2.0 web for once and for all. To many 
this might sound funny, but for the people, whose lives are lived, 
stored, shared and experienced in the online spaces that Web 2.0 has 
developed.&lt;/p&gt;
&lt;p&gt;
We find them in universities and colleges, multitasking, preparing a 
classroom presentation while chatting with friends and keeping track of 
their online gaming avatars. We encounter them in offices, glued with 
equal passion, to dating or social networking sites, and moderating geek
 mailing lists. We chance upon them in homes and bedrooms, sharing the 
most private and intimate details of their lives using live cam feeds 
and audio/video podcasts. If these images are familiar to you, you have 
encountered a digital native. It might have, recently, been a ‘child’ 
who knows how to use the mobile phone more effectively than you do, or a
 teenager who can connect your machine online while thumb typing on the 
cell phone, in a language which is not very familiar to you. It could 
also be the saucy colleague in office, who is always on the information 
highway, making jazzy presentations and animations or playing games with
 their virtual avatars, or the taxi driver who has learned the power of 
GPS maps or even the &lt;em&gt;chaiwallah&lt;/em&gt; around the corner who uses his 
mobile phone to download new music and conduct a romantic affair.&lt;/p&gt;
&lt;p&gt;
These techno-mutants are slowly, but surely taking over the world. By 
the end of 2010, the global youth population will be about 1.2. Billion 
and 85 per cent of it will be in the developing countries of the world, 
growing up with digital and Internet technologies as an integral part of
 their life. They might not be a significant number now, but they are 
going to be the citizens of the future, taking important decisions about
 the destinies of nations and states, creating businesses and running 
economies, educating young learners and shaping public opinions. And 
they are learning the fundamentals of these actions in their online 
interactions on Web 2.0 spaces using digital tools to morph, mobilise, 
mutate, and manage their social, cultural and political lives and 
identities. It is of these people that this column writes of – people 
who are marked by digital and Internet technologies in strange and 
unprecedented ways.&lt;/p&gt;
&lt;p&gt;Originally published at http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Digital-Natives-with-a-Cause/News as a part of the Knowledge Programme: "Digital Natives with a Cause?"&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/dn1'&gt;https://cis-india.org/digital-natives/blog/dn1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Agency</dc:subject>
    
    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    

   <dc:date>2011-08-04T10:34:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator">
    <title>Material Cyborgs; Asserted Boundaries: Formulating the Cyborg as a Translator</title>
    <link>https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator</link>
    <description>
        &lt;b&gt;In this peer reviewed article, Nishant Shah explores the possibility of formulating the cyborg as an author or translator who is able to navigate between the different binaries of ‘meat–machine’, ‘digital–physical’, and ‘body–self’, using the abilities and the capabilities learnt in one system in an efficient and effective understanding of the other. The article was published in the European Journal of English Studies, Volume 12, Issue 2, 2008. [1]&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Download the paper &lt;a href="https://cis-india.org/publications-automated/cis/nishant/material%20cyborgs%20ejes.pdf/at_download/file" class="external-link"&gt;here&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the original paper published by Taylor &amp;amp; Francis &lt;a class="external-link" href="http://www.tandfonline.com/doi/abs/10.1080/13825570802151504"&gt;here&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;I, the cyborg&lt;/h2&gt;
&lt;p&gt;The cyborg, a combination of hardware, software and wetware, stands as one of the most visible figures of the cybernetic age. A portmanteau of two words: cybernetic and organism, the term cyborg refers to a biological being with a kinetic state that can be transferred with ease from one environment to another, able to adapt to changing environments through technological augmentation. The first living Cyborg to find its way into the human family tree was a rat. Manfred Clynes and Nathan Kline – two astrophysicists, in 1960, thought of a ‘hybrid-organism’ system (a rat with an osmotic pump) that provided biological stability to an organism in response to its constantly changing environment. In their paper in Astronautics they wrote:&lt;/p&gt;
&lt;blockquote&gt;For the exogenously extended organizational complex ... we propose the term ‘cyborg’. The Cyborg deliberately incorporates exogenous components extending the self-regulating control function of the organism in order to adapt it to new environments. (Clynes and Kline, 1960: 1)&lt;/blockquote&gt;
&lt;p&gt;Notwithstanding this, the cyborg is most commonly thought of in a futuristic vein, escaping the confines of the physical body and recreated through various digital forms like databases, networks and archives.&lt;/p&gt;
&lt;p&gt;With the emergence of the WorldWide Web, the cyborg has strategically evolved in our imaginations as a metaphor of our times.We are already in the age where the ‘first living cyborg’ (Warwick, 2000: 15) has announced his arrival. In his autobiography I, Cyborg, Stephen Warwick, a professor of cybernetics and robotics, unveils how he became the first human cyborg through a series of path-breaking experiments. He begins his narrative by saying, ‘I was born human. But this was an accident of fate – a condition of time and place. I believe it’s something we have the power to change’ (Warwick, 2000: 5). Cybercultures theorist David Bell, on the other hand, especially with the proliferation of new digital technologies, in his preface to The Cybercultures Reader, locates the cyborg in ‘the crucial mechanics of urban survival’ (Bell, 2000: xxi) that produce everyday cyborgs through digital transactions and technologically augmented practices. Sherry Turkle, looking at the experiments in genetic engineering and reproductive practices, traces the processes of ‘cyborgification’ in the production of ‘techno-tots’ (Turkle, 1992: 154) – a new generation of designer babies who have been augmented by technology to have the perfect genetic composition.&lt;/p&gt;
&lt;p&gt;In this paper, I seek to explore the possibility of formulating the cyborg as an author or translator, who is able to navigate between the different binaries of ‘meat– machine’, ‘digital–physical’, ‘body–self’, using the abilities and the capabilities learnt in one system in an efficient and effective understanding of the other. What does the cyborg as a translator add to our understanding of the processes of translation? If we were to examine the formation of a cyborg identity embedded in the digital circuits of the World Wide Web, what is the text of translation? What are the translated objects? Who performs these translations? Is the user the omnipotent translator who brings to this site, her special knowledge of distinct systems to make meaning? When inflected by technology, does the process of translation, performed by the cyborg, enter into realms of incomprehensibility which get translated as illegality? How does the figure of the translating cyborg enable an analysis of the cyborg as materially bound and geographically contained, rather than the earlier ideas of the cyborg as residing in a state of ‘universal placelessness’ (Sorkin, 1992: 217)?&lt;/p&gt;
&lt;h2&gt;Configuring the cyborg as a translator&lt;/h2&gt;
&lt;p&gt;The cyborg, as fashioned by science fiction narratives, cinema and cartoons, conjures images of human–machine hybrids and the physical merging of flesh and electronic circuitry. Different representations of the cyborg abound in science fiction narratives in print, film, animation and games, from reengineered human bodies showcasing fin de millennia nostalgia for large robotic machines of power and strength to sleek and suave microchip-implanted silicon-integrated human beings who work in their artificially mutated enhancements. The cyborg has covered a wide imaginative range from looking at a happy human–machine synthesis to a degenerate human body made grotesque by machinistic implants to a rise of a potent cyborg community that threatens to overcome the human world of biological certainty and mortality. Some of the most famous instances of cyborgs in popular narratives illustrate this wide spectrum; from Maria the robot in Metropolis (Fritz Lang, 1927) to Lara Croft in the The Tomb Raider series (Toby Gard, 1996); from Case in William Gibson’s Neuromancer (1984) to Mr Anderson a.k.a. Neo in The Matrix Trilogy (The Wachowski Brothers, 1999–2003); from Johnny Quest (Hannah-Barbara Cartoons, 1996–7) in the eponymous animated series to avatars created on social networking sites and MMORPGs &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; like Second Life.&lt;/p&gt;
&lt;p&gt;However, with the popularization and democratization of new digital technologies of information and communication (ICTs), we see a certain evolutionary production of the cyborg as an increasing number of people interact with digital spaces and sites and adopt mobile gadgets of computation and information dissemination as an extension of their bodies. The cyborg, as imagined within the digital realms of cyberspace, is imagined differently from the more hyper-real, hypervisible constructs within the fictional narratives.&lt;/p&gt;
&lt;p&gt;Arjun Appadurai (1996), in his formulation of post-electronic modernity, explores how electronic media offer new everyday resources and disciplines for the imagination of the self and the world. He argues that the individual body and its ownership are wedded to the logic of capitalism and the notion of ownership that characterized most of the twentieth century. Appadurai suggests that the body becomes a site of critical inquiry and contestation because a capitalist state grants the individual the rights to his/her body and the choice to fashion that body through consumption patterns. When talking of Technoscapes &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt;, Appadurai posits the idea of a technologically enhanced sphere of activities and identity formation that defy the processes of capitalism and produce new instabilities in the creation of subjectivities.&lt;/p&gt;
&lt;p&gt;Cyberspace has become such a site where the individual body, marked in its being (genetically, biologically, socially and culturally) and circumscribed by the (physical, reluctant and cumbersome) space, can free itself from the relentless materiality of a capitalist set of reference points, to create a truly global self and a universally accessible space. Katie Hafner and Matthew Lyon, in their comprehensive history of the origins of the web, mention how in 1968 Joseph Carl Robnett Licklider and Robert Taylor, who were research directors of the United States of America’s Department of Defense’s Advanced Research Projects Agency (ARPA) and who also set in place the first online community (ARPANET), prophesied that online interactive communities ‘will consist of geographically separated members, sometimes grouped in small clusters and sometimes working individually. They will be communities not of common location but of common interest’ (Hafner and Mathew, 1996: 44). This prophesy was realised by the end of the twentieth century, as scholars announce the construction of the ‘discontinuous, global agoras’ (Mitchell, 1996: 27) and the arrival of the new commons shaped within the technoscapes of the internet. The imagination of the internet as the new public sphere of communication, interaction and collaboration also brought into focus the skills that a cyborg requires in order to materially exist on the intersections of various domains. Donna Haraway, in her seminal essay ‘A cyborg manifesto’ (1991), posited one of the most influential imaginations of the cyborg as residing in the ‘optical illusion between social reality and science fiction’ (Haraway, 1991: 151) Haraway’s cyborg hints at the possibility of imagining the cyborg as a translator:&lt;/p&gt;
&lt;blockquote&gt;The cyborg is resolutely committed to partiality, irony, intimacy, and perversity. It is oppositional, utopian and completely without innocence. No longer structured by the polarity of public and private, the cyborg defines a technological polis based partly on a revolution of social relations in the oikos, the household.&lt;br /&gt;(Haraway, 1991: xxii)&lt;/blockquote&gt;
&lt;p&gt;This cyborg, in the blurring of the public and the private, in the diffusion of the physical and the virtual, and in the yoking together of economic practices and social identities, becomes an agential subjectivity that translates one system into another, using the referents of meaning making and processes of knowledge production in one system for deciphering and navigating through the other system. Haraway’s cyborg is a willing and conscious extension; an illustration of what Judith Butler, in Bodies That Matter (1993) calls the ‘performative’, thus infusing the figure of the cyborg with the ability to negotiate with its immediate environment and shape it through the material practices it engages with. The cyborg as a translator, thus has an interesting role as a mediator between the two systems. The cyborg no longer makes the distinction between an original and a translated text – the two systems occupy equal and often contesting zones of reality and authenticity for the cyborg.&lt;/p&gt;
&lt;p&gt;Sandy Stone, in her anthropological study on technosociality – the technologised social order that emerges with ICTs and the social order of the technologised communities – emphasizes this very critical role of the cyborg:&lt;/p&gt;
&lt;blockquote&gt;In technosociality, the social world of virtual culture, technics is nature. When exploration, rationalisation, remaking, and control mean the same thing, then nature, technics, and the structure of meaning have become indistinguishable. The technosocial subject is able successfully to navigate through this treacherous new world. S/he is constituted as part of the evolution of communication and technology and of the human organism, in a time in which technology and organism are collapsing, imploding, into each other.&lt;br /&gt;(Stone, 1991: 81)&lt;/blockquote&gt;
&lt;p&gt;Stone’s idea of the cyborg as collapsing the binary between the organism and technology is indicative of how the cyborg, in its processes of translation, reproduces both the worlds, and in fact allows for a dual process of translation between the two so that systems implode to form a complex set of references that determine the meanings of the text. This dual process of translation produces a critical episteme to revisit the notion of translation where the skills of the translator and the figure of the translator are generally looked upon as residing in a nuanced and close reading of the original text and the interpretative techniques by which it is reproduced in the ‘new’ or translated text, making sure that the original gets suffused with the meaning and ironies of the other language. Stone also adds to Haraway’s conception of the cyborg as she recognizes another distinction that the cyborg as a translator blurs in its being – the distinction between technique and the structure of meaning.&lt;/p&gt;
&lt;p&gt;The cyborg as a translator, because it produces its identities through the same techniques that it produces the translated texts, internalizes the very techniques of translation. However, this process of internalization, instead of making the techniques invisible, foregrounds them as essential to the comprehension and understanding of the meanings which have been produced in this dual process of translation. The next section of this paper does a close reading of an instance of particular cyberspatial form – the social networking systems – to illustrate the dual processes of translation and the textuality of the texts involved.&lt;/p&gt;
&lt;h2&gt;Lost in translation&lt;/h2&gt;
&lt;p&gt;Both Haraway and Stone imagine the cyborg in a process of self-authorship through the interaction with the digital technologies. However, both of them only deal with the conceptual category of the cyborg and do not really examine the specific practices that this cyborg produces. Within cyberspaces, social networking systems, blogs, MMORPGs, multiple user dungeons (MUD), discussion boards, media sharing platforms, p2p networks &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;, etc., all create different conditions within which the physical users, through their digital avatars, interact with each other and form complex models of social networking and personal narratives. In this section I look at the notion of this self-authoring cyborg, embedded in the social networking system of ‘Orkut’, to illustrate and examine the discussions in the preceding section.&lt;/p&gt;
&lt;p&gt;Orkut, a Google project, is one of the most thriving social networking systems that allows people to reacquaint themselves with people they have known in the past – friends, colleagues, acquaintances, family – who might be distributed across geography and lifestyles. Orkut also enables people with similar interests to form communities and interact, network and form new relationships with strangers in an unprecedented fashion. Orkut follows the AmWay &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; Economic model for its social networking, whereby an individual person inherits the friends of friends, thus often connecting themselves down more than 50 levels of friendship. Such a connection, such possibilities of networking, and the overall feeling of belonging to a dynamic, ever-growing network, gives the users a heady rush of emotions, using Orkut for various personal and professional reasons – from dating to holding meetings, from public performances to professional networking.&lt;/p&gt;
&lt;p&gt;Most users within Orkut find themselves members of communities which are created around themes, hobbies, issues, ideas, movies, heroes, idols, books, religions, universities and schools, organizations, institutions, subjects, disciplines and music. One of the pre-requisites for using the various services on Orkut to their full potential is the creation of a profile. The profile, unlike a personal ad, is a concentrated effort at translating the ‘physical’ self of the person into ‘digital’ avatars that refer to the ‘original’ user behind the profile. Because of the pseudonymous nature of cyberspatial interactions, there is also an extra effort at making these avatars more verifiable, more real and more trustworthy. As an increasing number of users use social networking systems to find friends, to connect with partners and form communities that often translate back into the physical world, they spend a lot of effort on their profiles, trying to simulate (or translate) their personal identities and ideas into the digital world.&lt;/p&gt;
&lt;p&gt;Most users put pictures of their face, along with populating their own virtual photo album with pictures of their pets, partners, friends, family and places they have visited. Profiles often change, adding ‘new pictures uploaded’ as a caption, to invite friends to visit their space and find out what is new about their virtual lives. Users can also keep track of all the changes that the people in their networks are making to their profiles, thus giving the sense of a fluid and a changing persona rather than a static description. Applications which allow the users to track birthdays, special dates, online calendars and the important events in their friends’ lives, add to the nature of communication and interaction. Most profiles have a fairly detailed narrative, using poetic imagery, exaggerated style, witticisms and pop philosophy to translate the person behind the screen. The profiles are also filled with their favourite activities, TV shows, music and books. This process of mapping a virtual body and producing texts of the physical body is the first level of translation that the users perform. The model of cyborgs that Haraway and Stone posit look upon the possibility of role playing, of fantasy, of adaptation and of authoring the self, in this process of cyborgification, as extremely liberating and subversive.&lt;/p&gt;
&lt;p&gt;The social networking system and the related profiles also draw our attention to the dynamic interactions of the translated self within the digital domains. Through a metonymic process, the digital profile – the translated self – comes to stand in for the bodies of the users who not only create the translated self but also mark it with desires and aspirations. The translated self is largely under the control of the physical body. And yet, there are several ways in which the translated self does not allow for the physical body to emerge as the original, the authentic or the primary self within the dynamics of this site. On the one hand, it is the physical body of the user that authors the digital self, and hence it should be looked upon as the primary or the authentic text. On the other hand, the interactions that happen within the social networking system are interactions of the authored/translated self. The responses that the profile receives, the way in which the self is represented, the techniques used to engage with more people or invite strangers to communicate, are all the practices of the digital self.&lt;/p&gt;
&lt;p&gt;Within Orkut, the profile of the person is bound to the physical body of the user behind the profile. While it is of course necessary to invoke a virtual avatar, because of the nature of social networking with people one already knows or has known, there is a certain disinvestment of fantasy within Orkut. Several users select pseudonyms which allow them to remain totally anonymous, but most of them have a visible face which tries to approximate their real-life persona online. Unlike the circuits of blogging or role playing games, Orkut emphasizes the need to be a ‘real’ person, thus validating its unique feature of ‘scrapping’. By employing it, users are encouraged to publicly perform their intimacies and relationships, which can be easily documented and tracked by others outside the one-to-one interaction. Thus, there seems to be a specific need to narrativize the self though the profile and the various functionalities available on Orkut. Members of the Orkut community are encouraged to think of themselves as part of a larger database – transmutable, transferable sets of data which they have authored for themselves – and can mobilize their virtual self across different networks to enhance their sense of social interaction and networking.&lt;/p&gt;
&lt;p&gt;Also, the digital self is not translated solely by the physical user. Orkut has a feature of testimonials where the people in the networks of the translated self, also author opinions, observations and endorsements for the profile. Moreover, the public nature of communication and the archiving of this, add to the meaning and the functioning of this translated self. This production of the meta-data introjects the translated self into a circuit of meaning making and producing narratives that is beyond the scope of the physical body. Thus, there is a strange tension between the physical body of the user and the translated self that the user produces, which leads to the emergence of a cyborg identity. The cyborg is neither the physical body nor the translated digital self. It resides in the interface between the two, each constantly referring to the other, creating an interminable loop of dependence. The cyborg, because it is produced by the very technologies of the two systems that it is straddling, makes these techniques or the technologisation of the self synonymous with the processes of producing the narratives or making meaning.&lt;/p&gt;
&lt;p&gt;This production of narratives of the self through different multimedia environments is not simply a process of writing biography or making self-representations. The users on Orkut (as well as other social networking sites like MySpace or blogging communities like Livejournal) are authoring avatars or substitute selves which are intricately and extensively a part of who they are. These translated selves do not live independent lives, but are firmly entrenched in the physical body and practices of the users. While there is a certain flexibility in the scripting of the avatar, the projections are more often than not premised upon the possibility of a Real. The avatars are also scripted as engaging in extremely mundane and daily activities to create verisimilitude and to map the physical body on to the avatar. To leave status messages like ‘stepped out for lunch’ or ‘Working really hard’ or ‘I am bored, entertain me’ is common practice for the users. As increasingly more users stay connected but are not always present on these digital platforms, they also let the avatars ‘sleep’ or ‘eat’ or ‘go away for some time’, synchronizing the avatar’s actions with their own.&lt;/p&gt;
&lt;p&gt;A look at many other similar sites like blogging communities on ‘Livejournal’, or dating communities like ‘Friendster’, can give us an idea that the first stage in authoring a cyborg rests in creating these profiles, or avatars. Users spend an incredible amount of time trying to create for themselves the best avatars, which will be continued projections of the self. These tend to rely mainly on the visual component, as in games like ‘Second Life’ and chatting platforms like ‘Yahoo!’, but they can also rely on a combination of visual and verbal elements. Thus, the cyborg starts a process of translation whereby both the physical body and the translated self are distilled into data sets that get distributed across different practices and platforms, changing continuously and feeding into each other. Thus, just the first step of translation – the translation of the physical body into the digital avatar – is already a complex state, where we it is not as if the cyborg exists ex-nihilo and then translates from one system to the other but that the cyborg is produced in this very process of translation. Moreover, the translated text is not simply the sole authorship of the cyborg but has other players, who are a part of either of the systems, adding meanings and layers to the text.&lt;/p&gt;
&lt;p&gt;The second step in this process is a reverse translation. Even within role playing games, where the alienation of the avatar from the body reaches its highest levels, there is an invested effort on the part of the gamer to provide physical and material contexts to the imagined bodies which they have created. Mizuki Ito (1992), in her work about online gamers, looks at how, with an increased investment in the digital lives, users tend to shape their own physical selves around their projected avatars. Many chronic users of cyberspaces have their language, their social interaction and even the way they dress and behave affected by their practices online. Sherry Turkle, in her analysis of the MUD world in Life on the Screen (1996), points out that an increasing number of users start looking upon their screen lives as a constitutive part of their reality rather than an escape from it.&lt;/p&gt;
&lt;blockquote&gt;A computer’s ‘windows’ have become a potent metaphor for thinking about the self as a multiple and distributed system. The hypertext links have become a metaphor for a multiplicity of perspectives. On the internet, people who participate in virtual communities may be ‘logged on’ to several of them (open as several open-screen windows) as they pursue other activities. In this way, they may come to experience their lives as a ‘cycling through’ screen worlds in which they may be expressing different aspects of self.&lt;br /&gt;(Turkle, 1996: 43)&lt;/blockquote&gt;
&lt;p&gt;In another essay, titled ‘Playblog: Pornography, Performance and Cyberspace’ (Shah, 2005), I illustrate how the process of ‘reverse embodiment’ takes place in the lifecycle of bloggers. This process entails a mapping of the translated avatar on to the physical body of the users. This process of reverse translation often leads to the users abandoning their avatars, cutting down on their public presence or sometimes actually committing ‘digital suicides’, killing their own selves to start new identities and networks. Julian Dibbell, in his celebrated essay, ‘A Rape Happened in Cyberspace’ (1994) looks at the dynamics of this reverse mapping or inverted translation as well. Dibbell was witness to one of the most popular cases of ‘digital violence’ in the late 1990s, when in an MUD, a particular user called Dr Bungle, devised a ‘voodoo doll’ on the Lambda MOO MUD, which gained control over two of the other users, making them enter into a series of involuntary sexual acts of deviousness and perversion, in a public ‘room’ where all the other users could see them. What might be looked upon as a simple gaming aesthetic of a more powerful player taking over the avatars of two players with lesser power became a topic of huge discussion as the physical users behind the translated avatars complained of feeling violated and ‘raped’. This claim had very serious consequences because it no longer allowed for a linear notion of the physical body being translated into a digital avatar but insisted that the translated avatar is always, because of the users’ emotional involvement but also because of the practices that the avatar initiates, mapped back on to the body of the physical user. This is a process of reverse embodiment where the presumed ‘original’ is now re-shaped and re-configured to suit the translated object. Such a phenomenon is perhaps possible only in the domains of the cyberspace. Also, the cyborg, generally presumed as residing in the physical body, is now relocated in this two-way process, at the borders where it not only facilitates meaning but also realizes itself in the process of facilitation.&lt;/p&gt;
&lt;p&gt;The digital transactions in which the users within such spaces engage have huge social, economic and cultural purport. The authoring of these selves, of these digital avatars, leads to the idea of the cyborg as not simply a synthesis – a site upon which the synthesis happens – but as a dynamic situation in which all subjects participate, producing and supporting its own identity. The cyborg exists in the interstices of the different oppositions of the real and the virtual, the physical and the digital, the temporal and the spatial, the biological and the technological. Moreover, the cyborg does not reside simply within the digital domains but becomes and embodied technosocial being, with a material body that enters into other realms of authorship and subjectification. It is necessary to recognize that the cyborg is not simply a self authored identity but is also subject to various other realms of governance. These material cyborgs, then, assert the need for the body as central to their imagination.&lt;/p&gt;
&lt;p&gt;This bounded cyborg is also subject to the territories that it resides within. The last section of the paper looks at the State as a critical part of the production of these material cyborg identities and analyses how the incomprehensibility of this particular identity reproduces it in a condition of illegality, rescuing it from the boundless universal imagination and reasserting the geographical and the territorial boundaries that the cyborg exists within. In this particular analysis, because of my own familiarity with the context and also because new digital technologies are still emerging and unfolding into new forms in India, I shall speak specifically of the Indian State but hope that the particular case that I analyse shall have resonances for other geo-cultural and socio-political contexts as well.&lt;/p&gt;
&lt;h2&gt;The state of the cyborg&lt;/h2&gt;
&lt;p&gt;The cyborg, thus residing on the interstices of so many different paradigms, can no longer be limited to aesthetized representations and narratives, but is becoming a part of everyday practices of global urbanism. The range of human–machine relationships is diverse and increasingly varied. We might not be complete cyborgs but we do deal with ‘intimate machines’ (Turkle, 1996: 142) and live in ‘cyborg societies’ (Haraway, 1991: 179). The cities where we we live constantly remind us of the machinations we are dependent on; sometimes they blind us of our dependence on the technology, sometimes they make it starkly visible. Different organizations like the Military, Space Studies, Medicine, Human Research and Education are using new forms of organism–technology interactions in the increasingly urbanised world. Just like the interactions of the translated avatara and the physical users, David Bell and Barbara Kennedy, in their introduction to The Cybercultures Reader, look at the interactions with various different technologies of communication and transport, and posit the notion of an ‘Everyday Cyborg’ that gets produced in everyday practices:&lt;/p&gt;
&lt;blockquote&gt;Taking Viagra, or [using] a pacemaker, or riding a bike, or withdrawing cash from an ATM, or acting out [our] fantasies as Lara Croft in the latest Tomb Raider game or as a Nato bomber pilot blitzing Kosovo, or anyone watching footage from Kosovo live on the late-night news.&lt;br /&gt;(Bell, 2000: ix)&lt;/blockquote&gt;
&lt;p&gt;In their list, the authors are more interested in looking at human–machine interaction and making historical continuities to the production of a technosocial identity or a cyborg self. This ‘naturalized’ cyborg robs the cyborg of its criticality or importance. It seems to posit the cyborg as simply a coupling of organism and machine, and hence a benign cultural formulation which can now be decontextualized and analysed in the digital domains. The cyborg as a translator – initiating a complex and intricate set of relationships between the different systems of meaning making that it&lt;/p&gt;
&lt;p&gt;straddles – questions this trvialization of the cyborg and instead helps produce the cyborg identity as an epistemological category which needs to be analysed to see the processes that produce it and the crises it produces in the pre-digital understanding of text and textuality.&lt;/p&gt;
&lt;p&gt;It is with these questions that I begin the analysis of what has popularly been dubbed as the ‘Lucknow Gay Scandal’ in India. In India, under the Section 377 of the Indian Penal Code, as a part of larger ‘Unnatural Sex Acts’, homosexual activity is a punishable offence &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt;. However, the reading of this particular act has always been invoked in dealing with the act of same-sex sexual behaviour and not to punish a particular identity. However, when the queer rights and gay collectives started gaining momentum because of the rise of digital technologies (Singh, 2007), the production of the queer cyborg produced an anxiety about the fantasies, the digital avatars and the material practices of the users behind the avatars. In January 2006, policemen in the city of Lucknow, masquerading as gay men, registered with a popular queer dating website called ‘Guys4men’. Explicitly a gay dating site, it allows users to create their profiles, add pictures and text, translate their personal data in a scripted space, exchange messages and chat. Like the earlier discussed social networking sites, Guys4men also allows users to search and befriend each other, encouraging public discussions and arranging for physical encounters at a personal or a collective level.&lt;/p&gt;
&lt;p&gt;These policemen created profiles and listed themselves as gay men, to start interacting with the members of the site. They solicited sex and meetings and finally invited five men to come and meet them in a public garden in Lucknow. When four of the five men turned up for the rendezvous, they were arrested on charges of obscenity, of soliciting sex in public and engaging in homosexual fantasies. The media reported this as ‘Gay Club Running on the Net Unearthed’ (The Times of India, 5 January 2006). The website was looked upon as a physical space where people indulged in ‘unnatural sex acts’.&lt;/p&gt;
&lt;p&gt;The four men were punished, not for anything that they did in public or in the physical world but for their projected fantasies online. They were publicly humiliated, exhibited to the media as a ‘homosexual coup’ and put under arrest by the police. While a large part of the political society in India erupted in fury at the gross violation of the human rights and the punishment of fantasies, leading to a raging court case which still has not found resolution, what this paper hopes to glean from this particular case are four interesting points. Firstly, three of the four men, in their physical existence, were married and had children. They were not suspected to have homosexual inclinations by their family or friends, to whom this came as a huge shock. The evidence of the material practices of their physical bodies was not looked upon as strong enough to acquit them. Secondly, the policemen who were luring these men towards a homosexual encounter were themselves projecting similar fantasies. However, as theirs were sanctioned by some high authority, they gained validity and were not to be punished. It was almost as if the fantasies and the avatars that the policemen had were legitimate, sanctified translations of their selves, which made them different. Thirdly, while the men were caught in the physical meeting space, the charges against them were all based on their online activities. What was being produced was not even the act of translating their physical bodies into digital avatars. What was at stake in the particular case was the fact that, in the processes of translation, a reverse translation was also set into place, where the digital avatars and the circuits of consumption and interaction that these avatars entered into were mapped on to the physical bodies, reconfiguring them and marking them as queer. The men were punished not because they claimed a queer identity or because they had fantasies online which did not subscribe to the State’s directive. These men were being punished for the production of a cyborg self – a self which on the one hand was contained by the physical bodies of the users, thus subject to the processes of governance and administration applicable in the geography that they are located in, and on the other hand produced by the imagined selves – the translated avatars which reside outside of the geo-territorial regimes. It is this production of the queer cyborg, residing on the boundaries of sexuality, of nationality and subjectivity that was sought to be punished in this particular case.&lt;/p&gt;
&lt;p&gt;On the whole, this case seems to prove that there is a very definite move, on the part of the State, towards the recognition of online avatars as not only extensions of the self but as more powerful identities than the physical self. The State imagines the users of cyberspace as ‘real’ cyborgs and conceives their online activities, fantasies and role-plays as punishable offences. The State also recognizes their translated selves – their datasets that they authored – as verifiable proof of their existence and actions online. The story of the Lucknow incident brings to the fore the possibility that there might also be reluctant cyborgs. The notion of the translator is always somebody who is in a conscious condition of deploying knowledge in order to bridge the gap between different paradigms. However, as the digital world becomes more democratic and becomes a part of our daily transactions, an increasing number of users enter into conditions of translation which they might not recognize as translation. It is also imaginable that a large number of users might resort to the cyberspace to reach a particular aim, without wishing to produce any elaborate narratives of themselves. They might be completely unaware of the processes of reverse translation which follow. However, because of the State’s investment in digital technologies and its infrastructures, individuals get authored as cyborgs, having to take responsibility for their actions and fantasies online, against their will and outside of their knowledge.&lt;/p&gt;
&lt;p&gt;The implication of the State or other State-like bodies in the production of these cyborg identities and texts makes us aware of the fact that processes of translation are not simply about the intention and the effort of the translator, but are also severely embedded in the techniques used for translation and the contexts within which the translator and the translated identities are produced. In earlier discussions of testimonials and scraps on Orkut or commentating and editing on blogging platforms, we had already looked upon how the translated text, even when it is a self-narrative, on the digital interfaces, is already a product of multiple authorships and can no longer be attributed to a single individual translator. Similarly, the cyborg identity that is produced in the processes of translation – the cyborg as a translator – is also not a product of individual desire or intention but is often brought into being through the various other players within the internet as well as within the physical contexts of the users.&lt;/p&gt;
&lt;h2&gt;Why cyborg?&lt;/h2&gt;
&lt;p&gt;The everyday embodied cyberspace cyborg thus becomes subject to the state as well as the technology. People who enter the digital matrices are made accountable for their actions and travels in cyberspaces. There is an increased anxiety around monitoring these processes of translation, of reverse translation and production of translated cyborg identities that are becoming such an integral part of cyberspatial platforms.&lt;/p&gt;
&lt;p&gt;The virtual avatars are re-mapped onto the body of the user, thus reconfiguring the notion of the self and the body. The state, through its efforts, becomes a major player in the authoring of the cyberspace cyborg. Other surveillance technologies like Close Circuit Television (CCTV) for instance, also produce unwilling or unwitting technologized narratives of the users caught under the camera. It is possible to use CCTV in public spaces and capture users in different actions which they can be held responsible for later. However, the cyberspace cyborg differs significantly from this model because the users of cyberspace are willing participants of the spaces which they occupy.&lt;/p&gt;
&lt;p&gt;The positing of the cyborg as a translator and as an identity that emerges out of translation practices defines a clearer role for translation and a larger definition for translation as it gets inflected by digital technologies. Instead of the universal hyperreal agent, the cyborg as a translator emphasizes one of the fundamental principles of understanding translation – the context of the translator, the agential negotiations of the translator with the original text, the processes by which the self of the translator get produced and the importance of the technologies within which the translation occurs. The collaborative nature of digital technologies and cyberspatial forms illustrates how the process of translation is not singular and that the relationship between the presumed original and the translated text also need to be re-visited. However, more that anything else, the cyborg as a translator makes it clear that the translated text is not produced in isolation or by a single author. There are various contributions that emerge from the networks within which the cyborg translator operates and from the different technologies of governance that the cyborg translators as well as the translated texts are subject to. On the other hand, to the body of cybercultures which has sustained interest in the production and imagination of the cyborg, the cyborg as a translator offers a different way of locating the cyborg identity – not as an identity produced through cyberspaces, but as an embodied cyborg that emerges as an epistemological category to explain the processes of collaboration, sharing, collective authoring and possession of the new digital spaces.&lt;/p&gt;
&lt;h2&gt;Notes&lt;/h2&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;] This paper owes huge intellectual and emotional debt to Rita Kothari who first invited me to contribute to this issue, helping me formulate the germ of the idea and to Elena Di Giovanni who has been an extremely patient editor, guiding me through the many drafts that gave shape to this final version.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;] MMORPG – Massively Multiple Online Role – playing game is a genre of gaming in which a large number of players interact with one another in a virtual world. The MUDs that Sherry Turkle studied can be looked upon as the direct antecedents to MMORPGs like Second Life and War of Warcraft – two of the most popular gaming platforms in current times.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;] Technoscapes are the landscapes of technology. They refer to technology as both high and low, informational and mechanical, and the speed at which it travels between previously impassible boundaries. Appadurai uses the idea of Technoscape to imagine a fluid and transmittable topography of technology, where the different transactions and the identities formed online have material consequences in economic flows and societal formations. The cyborg thus produced actively chooses and negotiates its identity. Identities are no longer solid, but become fractured, in that we no longer have to choose the identities or accept the ideas of the local community. We are actively choosing our programming based on that which is available to us. While the cyborg may choose to act in a manner most appropriate or relative to the cultures and geographies it is embedded within, that is no longer the only programming option available to it and many are choosing to look beyond their own cultural arenas.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;] P2P networks – peer-to-peer networks – inherit the cyberspatial aesthetics of decentralized networks; of nodes being distributed across the circuits of the internet and talking to each other, collaborating in projects, sharing information and exchanging digital material. The p2p networks have been under severe focus because they allow for unmonitored piracy and exchange of information&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;] AmWay emerged in the 1960s as the first of its kind of multi-level marketing company where the individuals inherit each other’s customers and profits through a simple system of multi-directional networking.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;] The Wikipedia entry for IPC Section 377 reads: ‘Homosexual relations are technically still a crime in India under an old British era statute dating from 1860 called Section 377 of the Indian Penal Code which criminalises ‘‘carnal intercourse against the order of nature.’’ Since this is deliberately vague in the past it has been used against oral sex (heterosexual and homosexual), sodomy, bestiality, etc. The punishment ranges from ten years to lifelong imprisonment’. The relevant section reads: ‘Whoever voluntarily has carnal intercourse against the order of nature with any man, woman or animal, shall be punished with imprisonment for life, or with imprisonment of either description for a term which may extend to ten years, and shall also be liable to fine’.&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;Appadurai, Arjun (1996). &lt;em&gt;Modernity At Large&lt;/em&gt;. New Delhi: Oxford UP.&lt;/p&gt;
&lt;p&gt;Bell, David (2000). ‘Introduction I Cybercultures Reader: a User’s Guide’. &lt;em&gt;The Cybercultures Reader&lt;/em&gt;. Eds David Bell and Barbara M. Kennedy. London and New York; Routledge.&lt;/p&gt;
&lt;p&gt;Butler, Judith (1993).&lt;em&gt; Bodies That Matter: On the Discursive Limits of ‘Sex&lt;/em&gt;’. New York: Routledge.&lt;/p&gt;
&lt;p&gt;Clynes, Manfred and Nathan Kline (1960). ‘Cyborgs in Outerspace’ 20 November 2002. &lt;a href="http://search.nytimes.com/library/cyber/surf/022697surf-cyborg.html"&gt;http://search.nytimes.com/library/cyber/surf/022697surf-cyborg.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Dibbell, Julian (1994). ‘A Rape in Cyberspace, or How an Evil Clown, a Haitan Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society’.&lt;em&gt; The Village Voice&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;‘Gay Club Running on Net Unearthed’. &lt;em&gt;The Times of India&lt;/em&gt;. 5 January 2006. &lt;a href="http://timesofindia.indiatimes.com/Cities/Lucknow/Gay_club_running_on_Net_unearthed/articleshow/msid-1359203,curpg-2.cms"&gt;http://timesofindia.indiatimes.com/Cities/Lucknow/Gay_club_running_on_Net_unearthed/articleshow/msid-1359203,curpg-2.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Gibson, William (1994). &lt;em&gt;Neuromancer&lt;/em&gt;. New York: Ace Books.&lt;/p&gt;
&lt;p&gt;Hafner, Katie and Mathew Lyon (1996). &lt;em&gt;Where Wizards Stay up Late: The Origins of the Internet&lt;/em&gt;. New York: Simon and Shuster.&lt;/p&gt;
&lt;p&gt;Haraway, Donna (1991). ‘A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century’. &lt;em&gt;Simians, Cyborgs, and Women&lt;/em&gt;. New York: Routledge, 149–81.&lt;/p&gt;
&lt;p&gt;Ito, Mizuko (1992). ‘Inhabiting Multiple Worlds: Making Sense of SimCity2000TM in the Fifth Dimension’. &lt;em&gt;Cyborg Babies: From Techno-Sex to Techno-Tots&lt;/em&gt;. Eds Robbie Davis-Floyd and Joseph Dumit. New York: Routledge.&lt;/p&gt;
&lt;p&gt;Licklider, C. R. and Robert Taylor (1968) ‘The Computer as Communication Device’. &lt;em&gt;Science and Technology&lt;/em&gt;, 21–31 April. &lt;a href="http://www.cc.utexas.edu/ogs/alumni/events/taylor/licklider-taylor.pdf"&gt;http://www.cc.utexas.edu/ogs/alumni/events/taylor/licklider-taylor.pdf&lt;/a&gt;. Accessed 5 November 2005.&lt;/p&gt;
&lt;p&gt;Mitchell, William (1996). &lt;em&gt;City of Bits: Space, Place and the Infobahn&lt;/em&gt;. Cambridge: MIT.&lt;/p&gt;
&lt;p&gt;Shah, Nishant (2005). ‘Playblog: Pornography, Performance and Cyberspace’. &lt;a href="http://networkcultures.org/blog/publication/the-art-and-politics-of-netporn/"&gt;http://networkcultures.org/blog/publication/the-art-and-politics-of-netporn/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Singh, Pawan Deep (2007). ‘Inside Virtual Queer Subcultures’. MA Thesis. Hyderabad Central University.&lt;/p&gt;
&lt;p&gt;Sorkin, Michael (1992). ‘See you in Disneyland’. &lt;em&gt;Variations on a Theme Park: The New American City and the End of Public Space&lt;/em&gt;. New York: Noonday Press.&lt;/p&gt;
&lt;p&gt;Stone, Sandy (1991). Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, MA: MIT Press. 81–118.&lt;/p&gt;
&lt;p&gt;Turkle, Sherry (1992). ‘Cyborg Babies and Cy-dough-plasm’. &lt;em&gt;Cyborg Babies: From Techno-Sex to Techno-Tots&lt;/em&gt;. Eds Robbie Davis-Floyd and Joseph Dumit. New York: Routledge.&lt;/p&gt;
&lt;p&gt;Turkle, Sherry (1996). &lt;em&gt;Life on the Screen: Identity in the age of the internet&lt;/em&gt;. London: Weidenfeld and Nicolson.&lt;/p&gt;
&lt;p&gt;Warwick, Stephen (2000). &lt;em&gt;I, Cyborg&lt;/em&gt;. London: University of Reading Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator'&gt;https://cis-india.org/raw/material-cyborgs-asserted-boundaries-formulating-the-cyborg-as-a-translator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Body</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Cyborgs</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-25T05:57:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/publications-automated/cis/nishant/material%20cyborgs%20ejes.pdf">
    <title>Material Cyborgs; Asserted Boundaries</title>
    <link>https://cis-india.org/publications-automated/cis/nishant/material%20cyborgs%20ejes.pdf</link>
    <description>
        &lt;b&gt;The essay was published in the European Journal of English Studies in a special issue on Multimedia Narratives. Emerging as an epistemological category with the rise of the Information and Communication Technologies, the cyborg leads to a complex set of negotiations about the production of a cyborg identity. This paper looks at the cyborg as a translator, to see the new mechanics of translation that come into play as the cyborg straddles multiple systems of making meaning and producing itself. Analysing the new social networking systems that have emerged in the last few years, the paper posits the cyborg as not only an author of translated texts but also as produced in the processes of translation. Focusing on one particular instance of the production of a cyborg identity, exploring the various players involved in the process of cyborgification and the material consequences of imagining the cyborg,  the paper seeks to analyse the new incomprehensibility or illegalities that the cyborg, in its role as a translator, gets produced within. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/publications-automated/cis/nishant/material%20cyborgs%20ejes.pdf'&gt;https://cis-india.org/publications-automated/cis/nishant/material%20cyborgs%20ejes.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-11-03T20:14:45Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/column-on-digital-natives">
    <title>Make a Wish</title>
    <link>https://cis-india.org/digital-natives/blog/column-on-digital-natives</link>
    <description>
        &lt;b&gt;It is that time of the year again, where we ring in the new, ring out the old, and say goodbye to another year that has passed us by. The earnest will take the time to reflect on things gone by, the romantics will look forward with hope to the future and the realists will point out that we are now one decade into the 21st century, and the world is changing. However, if you are a true digital native, you are probably going to head over to a website that helps you figure out 43 things that you want to do, not just in the next year, but in your foreseeable future. &lt;/b&gt;
        &lt;p&gt;43things.com is a unique social networking site, where you make a to-do list of things that you want to do in life. The list is a zeitgeist of possibilities: from losing that extra weight that has always bothered you, to spending quality time with your family to getting that degree you have desired for long from the university of your choice, to finding bliss. The lists are varied, unique and challenging. In almost six years of its existence, this website has drawn more than 2 million users from 82 countries, who have created a list of more than 30,000 unique goals that people want to fulfil in their lives.&lt;/p&gt;
&lt;p&gt;Why is making such a list important? And why would you want a website to do it? Probably because in our humdrum lives, where every minute is spent in thinking about the next, we often forget the dreams that are important. On an everyday basis, the most interesting or important things in our lives are always things that we shall do “tomorrow”.&lt;/p&gt;
&lt;p&gt;43 Things injects life back into the passions and hopes that we have for our future. It helps people to take a step back from routine life, to reflect on what is important to them. It works on the old idea of birds of a feather flocking together, this time enabling it through the power of the Web. People find connections because other people want to do the same thing as them. People describe their experiences, their failures, obstacles and the strategies they deployed in order to reach goals they thought were unreachable. There are stories being told and lessons being learned. And if nothing else, you are bound to get “cheer” from a passing stranger because your goal made them smile. Often a unique goal becomes a source of inspiration for others who might shape their lives around it. Sure, some goals will lose their charm, some will be replaced, and some will never be achieved, but you will always have the space to know that you have a dream, and you shared it with somebody else.&lt;/p&gt;
&lt;p&gt;My favourite story is of a 22-year-old friend who, ever since she was three years old, wanted to be a fairy. As she grew up, she realised that it is not something that you can share with everybody. She knew that she would be laughed at, if she ever made it public. Earlier this year, she stumbled across 43 Things and just on a whim, put down as one of her goals “I want to become a fairy”. To her surprise, she discovered other adults around the world who have the same goal. They don’t really want to become fairies, but it is a dream about how they see themselves, and they all got together to voice it on the website. They connected and started talking about what attracted them to fairies, and why there is more to fairies than magic wands and gossamer wings.&lt;/p&gt;
&lt;p&gt;They realised that what attracts them to thinking about themselves as fairies are kindness, generosity and the happiness in helping each other. From this discussion, 19 people from 11 countries, who were involved in the conversation, decided to do 12 random acts of kindness through 2010. And as the year draws to an end, they tell the stories of how in their role as fairies, they brought joy and smiles to strangers because they went out of their way to do something special for them. As my friend tells me the story, her eyes sparkle, and there is a big grin on her face. “I know this sounds stupid, but I feel like a fairy,” she wrote in her notes, as she was going through her goals. And somewhere out there, 18 other people also put a small tick-mark against their goals and dreamt of fairy dust.&lt;/p&gt;
&lt;p&gt;Read the original in the &lt;a class="external-link" href="http://www.indianexpress.com/news/make-a-wish/726466/"&gt;Indian Express&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/column-on-digital-natives'&gt;https://cis-india.org/digital-natives/blog/column-on-digital-natives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2013-04-16T06:37:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-october-2-2016-nishant-shah-love-in-the-time-of-tinder">
    <title>Love in the Time of Tinder</title>
    <link>https://cis-india.org/raw/indian-express-october-2-2016-nishant-shah-love-in-the-time-of-tinder</link>
    <description>
        &lt;b&gt;Service providers and information aggregators mine our information and share it in ways that we cannot imagine.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/love-in-the-time-of-tinder-3059643/"&gt;published in the Indian Express&lt;/a&gt; on October 2, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, I met somebody who narrated their digital fairy tale to me. He was waiting in between trains, waiting at a train station, for the connection to arrive. Bored, he opened the dating app Tinder. He swiped right. There was a match. They started chatting. The conversation became interesting. She offered to leave work early and come to the train station to meet him for coffee. They had a five-hour long date. He missed many connections and stayed back with her to spend more time. When he left, they stayed connected using all the digital apps of connection that you can imagine. They started travelling weekends to be with each other. Three years later, he moved countries and jobs to be in the same city as her. Last week, they got engaged to be married. And everybody raised a toast to the resilience of their love, and how they have worked hard at being together. They thanked all the people who have been involved and supportive in helping them through this period. And at the end, she said, she wanted to thank Tinder and WhatsApp, without which they would have never met been able to continue this connection. They were being facetious, but they were also reminding us that we live in appified times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apps are everywhere and they have become so natural and ubiquitous that we have forgotten what it means to live without them. In the case of this fairy tale couple, their very meeting was ordained not by fate and destiny and romantic godmothers, but by a smart app. This app, based on algorithms that judged them to be a good match, drawing from what they like on Facebook and what they share with their friends, presented both of them to each other, causing the first swipe. The app, designed around the principle of FOMO (Fear Of Missing Out), made sure that in the 40 minutes that he was at the train station, both of them looked at their phones, swiped right and had the conversation that began it all. The app created habits that ensured that they trusted each other to meet after a 20-minute chat, to miss trains for the joy of the first extended date. People fell in love, and their love was managed entirely by smart apps.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These apps are designed to assist us in our mundane lives. Behind their seductive design and intuitive interfaces are scripts, norms, rules, protocols and intentions that are influenced and shaped by corporations and individuals, who have a specific interest in expanding their market domains. The creation of profiles on Tinder required both these people to give Tinder access to a wide variety of their personal activities and profiles. As their romance progressed, they involved more apps in their activities. Personal planners, reminders, e-shopping platforms, social media testimonies, deals to buy cheap tickets — all came into play. And even as they came together in a monogamous relationship, the apps encouraged them into data infidelity, wantonly sharing their data, making it speak with strangers, interact with unknown shadows in the dark, morphing and fusing with predatory algorithms that continued to not only follow them but also predict what their needs are. These smart apps might come with friendly interfaces and helpful suggestions, but they do it by making us transparent — they mine our information and distribute and share it in ways that we cannot imagine to ends that we cannot fathom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the apps become a daily part of our lives, holding our hands and comforting our souls, it is good to remember that behind the apps is a pipeline of service providers, data harvesters, information aggregators, who are learning more and more about us, and then without our consent, in the guise of being helpful, are sharing those secrets with things and people we do not know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While they do help us celebrate the moments and make beautiful human connections, they also continue to make oily suggestions and innuendos, gently guiding us into buying more and consuming more. I came home from the engagement party and woke up the next morning with my face being tagged in about 30 pictures on four different social media apps. And each app suggested different things I can do to celebrate this event — buy a new suit for the wedding, buy an engagement gift for the happy couple, get help with planning a bachelor’s party, and get the services of a wedding planning app.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-october-2-2016-nishant-shah-love-in-the-time-of-tinder'&gt;https://cis-india.org/raw/indian-express-october-2-2016-nishant-shah-love-in-the-time-of-tinder&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2016-10-17T02:07:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/pathways/blog/learn-it">
    <title>Learn it Yourself</title>
    <link>https://cis-india.org/digital-natives/pathways/blog/learn-it</link>
    <description>
        &lt;b&gt;The peer-to-peer world of online learning encourages conversations and reciprocal learning, writes Nishant Shah in an article published in the Indian Express on 30 October 2011. &lt;/b&gt;
        
&lt;p&gt;Technologies and learning have always had a close link. In the past, 
distance learning programmes of higher education through the postal 
service, remote education programmes using satellite TV and interactive 
learning projects using information and communication infrastructure, 
have all been deployed with varied results in promoting literacy and 
higher education. In the last two decades, the internet has also joined 
this technology ecology in trying to provide quality and affordable 
education to remotely located areas through “citizen service centres” 
envisioned to reach 6,40,000 Indian villages in the future.&lt;/p&gt;
&lt;p&gt;These technology-based information outreach programmes expand the 
ability of traditional formal learning centres like universities, to 
cater to the needs of those who might not have access to learning 
resources. This vision of networked education relies on existing systems
 of centralised syllabus making, teacher-to-student information 
transfer, grade-based evaluation and accreditation systems, and a 
degree-centred approach to learning.&lt;/p&gt;
&lt;p&gt;I was in New York last week, at an international summit on the future
 of learning, Mobility Shifts, organised by the New School, where more 
than 260 speakers from 21 countries discussed the possibility of 
learning beyond the bounds of the school and university system. Many 
discussions were around the declining public education system (with huge
 disinvestment moves from the government), privatisation of education, 
increasing tuition and fees, and the non-relevance of current education.
 However, along with this digital expansion of the traditional education
 system is an emerging trend that challenges the ways in which we 
understand education and learning – DIY Learning or Do It Yourself 
Learning.&lt;/p&gt;
&lt;p&gt;DIY Learning is a product of the networked condition. It recognises 
that as more people get onto digital information networks, there is a 
possibility of producing peer-to-peer learning conditions, which do not 
have to follow our accepted models of learning and education.&lt;/p&gt;
&lt;p&gt;We have seen the rise of various decentralised and democratised 
knowledge repositories like Wikipedia. The search based algorithms of 
search engines also take into consideration the idea that knowledge is 
personal. User generated content sites like eHow.com show that the 
individual learner is not merely a recipient of information and 
knowledge. Information seeking spaces like Quora have shown that 
knowledge-sharing communities can incite new conditions of learning. Our
 contexts, experiences, everyday practices, aspirations etc. equip us 
with valuable information, which not only shape how we learn but also 
what we find relevant to learn for ourselves. DIY Learning picks up on 
the idea that the infrastructure of education is not necessarily 
designed towards learning. Learning often happens outside the 
classrooms, in informal conversations.&lt;/p&gt;
&lt;p&gt;Thus DIY Learning offers a new model of learning. It destabilises the
 established hierarchy of knowledge production and pedagogy and creates 
an each-one-teach-one model with a twist. Instead of a centralised board
 of curriculum designer who shape syllabi for the “average” student, you
 have the possibility of customised, highly individual, interest-based 
learning curricula where the student is a part of deciding what s/he 
wants to learn. DIY Learning doesn’t recognise the distinctions between 
teachers and students, but recognises them as “peers” within a network, 
encouraging conversations and reciprocal learning rather than 
information transfer based classroom models. Instead of mass-produced 
education that caters only to an imagined average, the DIY Learning 
model recognises that within the same student group, there are different
 rates and scales of learning, thus offering environments suited to the 
aptitude of the students.&lt;/p&gt;
&lt;p&gt;Within the DIY Learning model, aspects of education, from the design 
of curriculum and learning methods, to grading and evaluation are geared
 towards individual preferences and aspirations.&lt;/p&gt;
&lt;p&gt;Many people think of DIY Learning as an alternative to mainstream 
learning processes and structures. However, it is perhaps more fruitful 
to think of DIY Learning as a way of figuring out the problems that 
beset our traditional educational system. It allows us to rethink the 
relationships between learning, education, teaching and technologies. It
 recalibrates the space of the classroom and reconfigures the role of 
the teacher and the student.&lt;/p&gt;
&lt;p&gt;DIY Learning emphasises that merely building schools and universities
 is not enough to assure that learning happens. Learning happens through
 experiences, practice, conversations, internalisations and through 
making mistakes. DIY Learning offers these possibilities in an education
 universe that is constantly refusing to take risks, innovate and adapt 
to the needs of the present. By itself it might not be able to take on 
the roles and functions of the existing education systems. But it does 
warn us that we are preparing our students for our pasts rather than 
their futures. And the time to change is now.&lt;/p&gt;
&lt;p&gt;The original story was published in the Indian Express, it can be read &lt;a class="external-link" href="http://www.indianexpress.com/news/learn-it-yourself/867069/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/pathways/blog/learn-it'&gt;https://cis-india.org/digital-natives/pathways/blog/learn-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Higher Education</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    

   <dc:date>2015-05-14T12:08:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/keeping-it-private">
    <title>Keeping it Private</title>
    <link>https://cis-india.org/internet-governance/keeping-it-private</link>
    <description>
        &lt;b&gt;As we disclose more information online, we must ask who might access it and why. This article by Nishant Shah was published in the Indian Express on Sunday, 15 January 2012. &lt;/b&gt;
        
&lt;p&gt;As a researcher of the blink-and-change cyberspaces, I am often asked 
about the future of all things digital. I generally refuse to answer 
such questions because researchers are happier talking about things past
 than things present. Also, when people ask questions of the future, 
they are more interested in gadgets and platforms. Will Facebook survive
 the next year? Will more people use Twitter? Is the mobile the new 
weapon of protest? Shall we all soon talk only on FaceTime? I shrug my 
shoulders at these questions. However private information and privacy 
ties all these questions.&lt;/p&gt;
&lt;p&gt;I pronounce that 2012 is going to be the year of Personal Information Management and the need for increased privacy, where more than anything else, people will realise that what they do online is not only significant to their present, but that it might bite them in their digital futures. We have heard stories that have hinted at management of information and reputations online. Young people put compromising pictures and videos online, severely damaging their social and professional relationships; people express opinions on public forums, which might not necessarily reflect them well; users reveal personal information, which can be abused by those with malice. These instances should remind us that unlike in the physical worlds, where our foot-in-the-mouth moments, youthful indiscretions or embarrassing behaviour quickly runs through the grapevine and is forgotten, in the digital worlds, the things that we say and do, stay long after we have forgotten them.&lt;/p&gt;
&lt;p&gt;And this is where privacy kicks in. Many people in India, when they encounter the idea of “privacy”, raise their eyebrows. Culturally, we are not very private people. We celebrate our triumphs and sorrows in public, freely part with information to strangers on train rides, and don’t have qualms asking about age, marital status or salary. In the age of ubiquitous computing, we must remember that once something has been committed to the online world, it will be etched somewhere and will be available for somebody else to look at. The internet, specially with increasing bandwidth, expanded spectrum and cloud-based distributed data storage, is an unforgiving space that never lets go.&lt;/p&gt;
&lt;p&gt;Privacy, in this brave new world, is not about disclosure. It is becoming increasingly clear that we will need to disclose more and more of our private information if we want services — from government public delivery systems to private credit and education — online. However, once we have disclosed our private information, then what? Who uses it? Who reads it? Who stores it for what purpose? What are the implications of having that private information out there?&lt;/p&gt;
&lt;p&gt;In the digital world, privacy is about having more control over the personal information that we have disclosed, the right to know who, where, when, how and for what purposes information that we have willingly disclosed is used. And as the country finalises privacy bills, this right of the individual, whose private information is going to feed government and business ecologies, is at stake.&lt;/p&gt;
&lt;p&gt;There is a need to institute better regulation around data protection, data mining, data retention and data retrieval that is still in the limbo in our country, at the mercy of privately crafted terms of service that we blindly accept while signing into the digital world.&lt;/p&gt;
&lt;p&gt;It is time to move away from understanding privacy as disclosure to privacy as control of information — to know who is doing what with your private information and how you should have a say in it. And it is time to realise that just because you don’t have anything to hide, does not mean that you need to be in a state of disclosure. There is a reason why you have curtains in your house, or do not allow strangers to look into your bags.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/keeping-it-private/899804/1"&gt;The article was originally published in the Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/keeping-it-private'&gt;https://cis-india.org/internet-governance/keeping-it-private&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-27T03:50:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-nishant-shah-september-15-2019-kashmirs-digital-blackout-marks-a-period-darker-than-the-dark-side-of-the-moon">
    <title>Kashmir’s digital blackout marks a period darker than the dark side of the moon</title>
    <link>https://cis-india.org/raw/indian-express-nishant-shah-september-15-2019-kashmirs-digital-blackout-marks-a-period-darker-than-the-dark-side-of-the-moon</link>
    <description>
        &lt;b&gt;While we mourn the loss of connection with the moon, remembering a digital blackout closer home.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Dr. Nishant Shah was &lt;a class="external-link" href="https://indianexpress.com/article/express-sunday-eye/shrouded-silence-chandrayaan-2-vikram-lander-kashmir-modi-370-5989905/"&gt;published in Indian Express&lt;/a&gt; on September 15, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When the news came, I was struck with a profound sense of loss. The iced coffee on my desk wept condensed tears as social media started flooding with the news that we have lost contact. There is a complete communication blackout. The last minutes which were the most critical, are now shrouded in mystery. We are doing all we can to reach out, to ping, to find a way to get some information — any information — that tells us that things are all right. People are waiting with bated breath to see if a connection will be made. There is widespread anxiety that comes from knowing that something historic has happened but there is a complete lack of knowledge about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At this point, all attempts at trying to get more information are proving to be futile. The devices that we have pinned our optimism to — seldom remembering that hardware fails — and the streams of communication that have become our digital default have let us down. At this point, in the absence of any clean data, we will be clinging to straws. Maybe one solitary ping will tell us that things are all right. We have given up on long stories, but just a cough, a sneeze, a chortle, a hiccup — anything right now, that tells us there is hope, there is a future, there is a tomorrow where we might be able to take back control, would be welcome. Scientists, journalists, politicians, and the common person on the street, all wait to hear more. But as of now, all we get, as we persistently update our screens and push at buttons, is silence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That silence breaks us. To reach out and get nothing back. To have the entire infrastructure of digital and satellite communication and see it turn to nothing but technojunk in the split of a second. To depend, now, on the unknown — not sure what happens to those who cannot be heard and also those who wait to hear — is unnerving. We fill up the silences with many things — assurances from the Prime Minister about how this is a temporary glitch and we will do better; analysis from media about what could and would have gone wrong in this mission; opinions from people questioning the validity of this move and also bemoaning the validity of our expertise and knowhow; the viral cries of triumph from those who see this as a step in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, it is undeniable that the silence fills us up with sense of grief and loss, making us wonder what the future will hold. And this is not just an individual future but a collective one, where we start realising how technological control and regulation can define and determine our conditions of speech, silence, and connection. It is the moment where we question our brute optimism in science and technology and our soaring ambitions of impossible sounding futures, of singularity and connectivity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Oh, and while I was trying to process the silence of stifled speech and throttled thoughts in Kashmir, which has been under an information and digital blackout for more than a month now, the news of the &lt;a href="https://indianexpress.com/about/chandrayaan-2/"&gt;Chandrayaan&lt;/a&gt;-2’s possible failure and the last minute non-responsiveness from the Vikram lander also trickled in. When the lunar mission news unfolded, I earnestly thought that people were talking about Kashmir — so emotional, passionate, and human, was their interest in the well-being of the exploring robot. Had it landed safely? Was it still chugging along? Was it hurt? Did it get a lunar pellet stuck in its skin?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It took me a while to process that the outpourings of grief and optimism were about the loss of the robotic vehicle’s data stream and not about the loss of voices from Kashmir. I had to reorient my thoughts to figure out that the disconnection from moon was more urgent than the disconnection from people who have been silenced through digital tyrannies. It did give me a pause to realise that the fate of a hurt robot on the moon seemed to generate more concern than the fate of hurt generations of people in the paradise on earth that we have sequestered from the external world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I had to figure out why the Chandrayaan, made in India and a triumph of our space programme, was a global event, whereas the violation of universal human rights through a technological blackout was still internal matters. This technological silence, which will hopefully be a temporary disruption, and, at the most, an expensive lesson for future space missions, refuses to take my attention. I will go back to listening for a sign of voice, of hope, of dignity, and of respect from Kashmir, where the digital blackout continues to mark a period darker than the dark side of the moon.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-nishant-shah-september-15-2019-kashmirs-digital-blackout-marks-a-period-darker-than-the-dark-side-of-the-moon'&gt;https://cis-india.org/raw/indian-express-nishant-shah-september-15-2019-kashmirs-digital-blackout-marks-a-period-darker-than-the-dark-side-of-the-moon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2019-09-26T16:26:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/home-images/Jamillah">
    <title>Jamillah Knowles</title>
    <link>https://cis-india.org/home-images/Jamillah</link>
    <description>
        &lt;b&gt;Jamillah Knowles from BBC is to make a public presentation on User Generated Content at the Centre for Internet and Society on the 26th of September 2009, at 16:00 hours.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/home-images/Jamillah'&gt;https://cis-india.org/home-images/Jamillah&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2009-09-15T10:27:20Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice">
    <title> It’s Common Practice</title>
    <link>https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice</link>
    <description>
        &lt;b&gt;Technologies are no longer abstract. They're habits. What constitutes a habit? The gestures that you make as you read this, the way your eyes flick when you encounter somebody you like, the way you stroke your chin in a moment of reflection, or the split second decisions that you make in times of crises — these are all habits. They are pre-thought, visceral, depending upon biological, social and collective memories that do not need rational thinking. Habits are the customised programming of human life. &lt;/b&gt;
        
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;p&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.indianexpress.com/news/it-s-common-practice/1113490/0"&gt;published in the Indian Express&lt;/a&gt; on May 12, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;However,  habits are not natural. They are, in fact, man-made nature. They appear  as natural, matter-of-fact, instinctive and intuitive, but they are  built over years of shared experiences, learning and empathy. And more  often than we realise, habits are formed because of the different  technologies that surround us.&lt;/p&gt;
&lt;p&gt;If you are reading this column on paper, look at the way you are  holding the magazine, folding the paper and note how you can read this  easily because the text has been arranged from left to right, top to  bottom. If you are browsing through this piece on a digital device, look  at how your fingers move on your scroll button, or on your touchscreen,  helping you make sense of complex devices without a second thought.&lt;/p&gt;
&lt;p&gt;Habits that are formed through technologies work so seamlessly  because they make technologies transparent. They make us forget that  there is a complex network of machines, devices, grids and information  that shape our lives. Do you remember the time when you came across  something online and didn't look for the 'Like' button that is now a  part of everyday internet practice? Do you remember the last time you  struggled to manage the cursor on your screen using a mouse? Do you  realise how the mouse has already become obsolete and is now being  replaced by other touch-and-flick devices for a new generation?&lt;/p&gt;
&lt;p&gt;I recently encountered this habit when my  three-going-on-90-year-old Kindle — the Amazon device I use to read  books — fell in the hands of a six-year-old. Like many digital natives  of her time, she is unfazed by technology and, as her parents confess,  is much better at operating most things digital in the house than them.  She thinks nothing of streaming her favourite cartoon show from a  website. She is adept at customising the many screens on her father's  smartphone and has accepted that specific movements of her fingers will  produce information on brightly-lit touchscreens.&lt;/p&gt;
&lt;p&gt;However, when she used my non-backlit, non-touch Kindle that  requires buttons to be pushed, she faced acute frustration. After trying  to scroll, flick, activate, zoom and pinch on the screen she flung it  at me, bewildered and angry that her habits were suddenly redundant and  challenged. I want to use this moment of reflection to understand how  technologies are integral to our ways of living. Technologies are  habits. You don't need to be online 24x7, constantly upgrading yourself  to the latest version of Android to interact with technology. Instead,  we need to think about technologies as outlets that allow us to think  about who we are and how we relate to the world around us.&lt;/p&gt;
&lt;p&gt;One way of looking at technology as habits is to see how we have  started thinking of ourselves through metaphors of the machines that we  use. For example, it's quite common to hear people complain about "lack  of bandwidth" to describe busy schedules. We now think of ourselves as  systems that need upgrading. Life has long been lived on windows through  which we recycle ourselves.&lt;/p&gt;
&lt;p&gt;If technologies are such an inseparable part of ourselves, maybe  it is time to stop making a distinction between the human and the  technological. It is time to stop thinking about technologies only in  terms of gadgets that can be removed from our biological assemblage. And  indeed, if we are ready to recognise these technologies as a part of  being human, then we need to think of technology politics in a new way.  The questions around piracy, privacy, intellectual property, proprietary  technologies, openness, etc. which are relegated to the digital world  are also questions of us. They are not external problems but are  centrally shaping how we construct ourselves as humans. Through habits.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice'&gt;https://cis-india.org/digital-natives/blog/indian-express-may-12-2013-nishant-shah-its-common-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-04-24T11:41:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/Introduction">
    <title>IT, The City and Public Space </title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/Introduction</link>
    <description>
        &lt;b&gt;In the Introduction to the project, Pratyush Shankar at CEPT, Ahmedabad, lays out the theoretical and practice based frameworks that inform contemporary space-technology discourses in the fields of Architecture and Urban Design. The proposal articulates the concerns, the anxieties and the lack of space-technology debates in the country despite the overwhelming ways in which emergence of internet technologies has resulted in material and imagined practices of people in urbanised India. The project draws variously from disciplines of architecture, design, cultural studies and urban geography to start a dialogue about the new kinds of public spaces that inform the making of the IT City in India. You can also access his comic strip visual introduction to the project at http://www.isvsjournal.org/pratyush/internet/Dashboard.html&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Introducion:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There has been, in the fields of design and architecture, a close link between the shape and imagination of the city spaces and the dominant technologies of the time. The study of space (Architecture, Public places and City form) can lead to very interesting insights into the expression of the society with respect to the dominant technologies. Manuels Castells argues that space is not a mere photo-copy (reflection) of the society but it is an important expression. Fredric Jameson, in his identification of the condition of post-modernity demonstrates how the transition into new technologies is perhaps first and most visibly reflected in the architecture, as physical spaces get materially reconstructed, not only to house the needs and peripheries of the emerging technologies but also to embody their aesthetics in their design and built form.Earlier technologies have led to new understandings of the notions of
the public and commons. Jurgen Habermas argues, how the emergence of print
cultures and technologies led to a structural transformation of the public
sphere by creating new and novel forms of participation and political
engagement for the print readers. Within cinema studies in India, Ashish
Rajadhyaksha and Madhav Prasad have looked at the ‘cinematic city’ - how
material conditions of the city transform to house the cinema technologies, and
how the imagination of certain cities is affected by the cinematic
representations of these spaces. Mike Davis’ formulations of an ‘Ecology of
Fear’ and Sean Cubbit’s idea of ‘The Cinema Effect’ also show the integral
relationship that technologies have with the imagination and materiality of
urban spaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Research Area:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The rise of the Internet in India in last decade poses interesting
questions concerning ways of studying city spaces and its architecture. The
Internet evokes and represents space in more than one way. Communities that
represent the present urban social processes often mediate this visual and
textual reference to space on the Internet but it is also an unwitting
expression of way people choose to imagine their city, its places and its built
form. It is important and pertinent for example to understand how Internet
communities choose to abstract their own city through various direct or
indirect discourses. The following will be the key questions&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
It will be interesting to observe how the idea of
a city gets represented on the Internet through both intended and casual
references. For example is the City seen as a finite clarified artifact (as
many political leadership would like us to believe) or is it seen as complex set
of relationships or systems of places.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
How does the city get represented through the
Internet with reference to its regional physical context (both geographical and
cultural landscape)? Such an enquiry can help us in knowing how representation
of city through the Internet acknowledges, neglects or fails to read its
relationship with the local fundamental conditions&lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; (of topography, water and
culture)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The actual morphological context of the city will then become an
important precursor for such an enquiry. The structure and flows in the city
have often been compared to the Internet itself in popular discourses. This
assumption can be further analyzed through spatial study of the city as a node
in large region and as many several nodes within the city itself. The idea of
Spaces of Flow in metropolis cities and places as nodes serving the flow has
been very well articulated by Manuel Castells at a generic level. The issue of
place&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and its representation
(through internet) can be another area that can offer us very interesting
insights into the relationship between the Cartesian and imagined space. The
evolution of a new graphic language on the Internet needs closer examination
from both its use of spatial symbolism as well as its impact on urban space.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However the contextual issue of an Indian idea of space will becomes
the important narration as a background to such studies. This inquiry needs
examination from a more contextual point of view: from both geographical
(nature of cities) and building typology perspectives (spatial and programmatic
types)&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;The
following questions will be investigated further&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;a.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
How do the current Internet technology, processes
and language reflect in Architecture and urban spaces of cities?&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;b.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Will the form of the City and its Architecture understood
any differently now&lt;a name="_ednref3" href="#_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The relationship between the building skin and spatial typology of
some recent architectural and urban design project can form an interesting
narrative to understand these issues. Here the issue of urban and architectural
lighting, signage and graphics can be examined more closely and hence a study
of the building skins and typology. The other largely ignored area of study
concerns the role of the Government of India with the Internet. When was the
last time we visited the railway reservation center to get a ticket or stood in
a queue for hours to be the first on the window? Many Indians still do, but for
many an Internet based on-line tickets reservation site largely substitutes
that experience of the place (railway reservation center), people and the early
morning tea on the gate. This needs closer examination from point of view of
understanding the transformation and gentrification of some of the most
democratic public service spaces in India such as the Railway stations, Municipal
offices and banks. Apart from the material practices of the people, it is
interesting to see how the integration of technologies within various urban
governance practices affect the way in which cities morph, develop and change.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Methodology: &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;The
aim is to engage with the spatial context of Indian cities while teasing out
issues of the cultural phenomenon associated with the Internet. The following
will be the key methods used in research&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
To identify and narrate the social structures and
processes that engage both with the intangible (meanings, symbols,
communication etc.) and the tangible (morphology, structure, geography) in
select Indian cities. This elaboration will form an important theoretical
premise specific to further understanding space in Indian Cities.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
To document stories of individuals and groups of
the city that demonstrates the typical changes that are taking place in various
social and economic processes as related to the Internet. The aim will be to
address both the tangible and intangible aspects while narrating the stories&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
To map the spatial implication (structure and
nature of spaces) of the above mentioned changes on the city&lt;/p&gt;
&lt;p style="text-align: justify;" class="MsoCommentText"&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
To derive a broader narrative while weaving
through different stories, that attempts to address the issue of Internet,
society and space in Indian Cities&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The research can be largely narrated through documentation of such
representative situations but will require a clear articulation of the
theoretical premises at the onset.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A review literature chapter which specifically marks the different
contours of city-technology relationship – from IT cities which are planned to
house technologies, to SEZ’s which emerge as new forms of technologised cities,
to the gradual transformation and restructuration of city spaces and publics
would also be undertaken. Moreover it will combine the contextual based study
of cities, their public place and Architecture along with studies of the
discourses on the Internet. The project will look at different actors who play
an active, but often invisible role in the transformation of these spaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Dissemination and Outputs:&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The project shall bring forth a monograph (approximately 50,000 words)
that looks at a relationship between internet technologies and the city with a
historical perspective, in order to explore the notions of public, built form,
city spaces etc. within the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A journal paper that engages with the contemporary discourses in
Architecture and produces a new theoretical formulation of the city-technology
relationship.&lt;/p&gt;
&lt;p&gt;

Part of the research
method could possibly include an elective course or workshop at CEPT University
to tap on variety of narrations through different students to strengthen both
the premise and contextual focus of the study.

&lt;br /&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;

&lt;/p&gt;
&lt;div id="edn1"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
This is to say that city form and its perception is very much a result of the
both the local geographical and cultural context&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn2"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
“Place” can be defined through both space and character of an area and where
the human experience is important. We experience places and hence understand it
as they hold different processes and meanings.&lt;/p&gt;
&lt;/div&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a name="_edn3" href="#_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; So
does the presence of Internet in our lives impact the way we begin to
understand the Architecture of our city?&lt;/p&gt;
&lt;p class="MsoEndnoteText"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;strong&gt;Bibliography&lt;/strong&gt;&lt;/p&gt;
&lt;p class="MsoEndnoteText"&gt;Venturi, Robert. &lt;em&gt;Learning from Las-Vegas : the forgotten symbolism of architectural
form. &amp;nbsp;&lt;/em&gt;MIT Press, 1976&lt;/p&gt;
&lt;p&gt;Castell, Manuel. &lt;em&gt;The Rise of the Networked
Society. &lt;/em&gt;Oxford:&lt;em&gt; &lt;/em&gt;Blackwell Publishers, 2000&lt;/p&gt;
&lt;p&gt;Adorno Theoder. &lt;em&gt;The Culture Industrty (Routledge Classics). &lt;/em&gt;Routledge, 2001&lt;/p&gt;
&lt;p&gt;Benjamin Walter. &lt;em&gt;The Arcade Project.&lt;/em&gt; Belknap Press of Harvard University Press, 2002&lt;/p&gt;
&lt;p&gt;Jameson Fredric. &lt;em&gt;Postmodernism or The Cultural Logic of Late Capatalism.&lt;/em&gt; Verso, 1999&lt;/p&gt;
&lt;p&gt;&lt;span class="visualHighlight"&gt;&lt;/span&gt; Davis Mike. &lt;em&gt;Ecology
of Fear: Los Angeles and the Imagination of Disaster&lt;/em&gt;. Random House, 1998&lt;/p&gt;
&lt;p&gt;Ashish Rajadhayaksha. &lt;em&gt;Indian Cinema in the Time of Celluloid: From Bollywood to the Emergency
(South Asian Cinemas). &lt;/em&gt;&lt;/p&gt;
&lt;p class="MsoEndnoteText"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/Introduction'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/internet-society-and-space-in-indian-cities/Introduction&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>City</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Architecture</dc:subject>
    
    
        <dc:subject>Communities</dc:subject>
    

   <dc:date>2011-08-02T06:07:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity">
    <title>IT and the cITy</title>
    <link>https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity</link>
    <description>
        &lt;b&gt;Nishant Shah tells ten stories of relationship between Internet Technologies and the City, drawing from his experiences of seven months in Shanghai. In this introduction to the city, he charts out first experiences of the physical spaces of Shanghai and how they reflect the IT ambitions and imaginations of the city. He takes us through the dizzying spaces of Shanghai to see how the architecture and the buildings of the city do not only house the ICT infrastructure but also embody it in their unfolding. In drawing the seductive nature of embodied technology in the physical experience of Shanghai, he also points out why certain questions about the rise of internet technologies and the reconfiguration of the Shanghai-Pudong area have never been asked. In this first post, he explains his methdologies that inform the framework which will produce the ten stories of technology and Shanghai, and how this new IT City, delivers its promise of invisibility.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Shanghai. City of bits, bytes and
Baozi. China’s home-grown success story that eclipses the colonial legends of
HongKong. The city that was, until the Bejing Olympics, the showcase city which
is now working hard at recovering some of its stolen glory as it prepares for
the World Trade Expo in 2010. A city that is constantly at war with itself,
trying to museumise its past, eradicate pockets of history and times, and
running to escape its present and live in a futuristic tomorrow. A city that
broke the distinctions of the public and the private, by privatising all that
was public, and by encouraging the private to be constructed for a public
spectacle. There are many stories of Shanghai to be told, but the one that
needs to be told now, is about the space of the city and how, in its attempt to
become an IT city, it has become a city of surfaces, all reminding you, in an
overwhelming hypervisual way that is the predominant aesthetic of cyberspaces,
that it is the city that not only houses technology but also embodies it,
becoming, possibly, the only city in Asia that brings the IT back into the
City.&lt;/p&gt;
&lt;img src="https://cis-india.org/home-images/shanghai/image_preview" alt="Aerial view" class="image-left" title="Aerial view" /&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A cursory glance around you,
perhaps travelling in the uber efficient metro system that feeds into the
mobile metaphor of accelerated speed and space that Shanghai has become, or
just walking down the more touristy XinTianDi where the rich and the famous of
Shanghai’s society hang out, or walking down the HuaiHai Road where
sky-scrapers fortress the sky and shopping malls greet you with neon-lit spaces
of consumption, you are overwhelmed at the significant and ubiquitous presence
of internet technologies. The buildings are designed to be interfaces, rather
than walls, covered constantly with the graffiti of digital advertisements,
live weather and stock updates, displaying the latest block-buster movie, or
just presenting a kaleidoscopic array of lights spiralling in a dizzying,
schizophrenic style on the surfaces of the buildings. As you walk through the
sci-fi inspired urban landscape, you try and suppress the feeling of being
inside a giant-size arcade game, waiting for a gobbling monster to come and
devour you, and continue browsing at the city that never remains the same –
either the surfaces mutate so that not even signboards or billboards remain the
same, or the very buildings disappear into rubble under the shadows of gigantic
cranes, as a concentrated demand for real estate necessitates a constant
recycling of limited space (The estimate says that 60 per cent of Shanghai gets
rebuilt every ten years), or high speed transport dissolves the city into a
blur so that only the biggest and the brightest buildings stay as north-stars
to the fluid geography of the city.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If you happen to stand on the
magnificent Bund in PuXi (The older Shanghai), you keep on looking down at the
ground beneath your feet, making sure that it is still there, because the
slightly lurid but dazzling sky-line that faces you, with huge LCD screens
mounted on buildings, lights flirting with low lying clouds on the top of
gigantic buildings, and a constant buzz of electricity breaking the waves in
the Huangpu river, you know that you are in a city that gives IT its address.
No other city in Asia – not even the almost-not-Asia spaces of Tokyo or
Singapore – gives you the assurance of being completely and totally immersed in
the glory of Internet technologies. Shanghai stands, networked, connected,
mobile, accelerated, and in a time-less vacuum that hoovers the future into the
present, as a city that technology studies will have to reckon with in a
paradigm of its own.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/Bund/image_preview" alt="Shanghai Bund" class="image-right" title="Shanghai Bund" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;And so strong is this seduction
of technology that conversations about technology and its place in Shanghai,
always revolves around the surface – about the building of the surface, about
the dissolution of depth (temporal or spatial),&amp;nbsp;
and about imagining the city only in terms of light, connectivity, and
speed. &amp;nbsp;So that the historicity in PuXi
becomes a flat display of the Chinese Way (Zhongguo Fangshi) and the
work-in-progress present in PuDong remains a quest for the future. In this split discourse, the questions and concerns&amp;nbsp; - about governance, about citizenship, about regulation, about cultural production and political negotiation - become invisible. Like the buildings, which get guised in digital cloaks, the questions that pressingly need to be asked but are always postponed, also get cloaked in the rhetoric of development propelled by ICTs and globalisation. In a city that was constructed to eternally deflect attention, ownership or voices, how does one begin to scratch at the surfaces (Literally and figuratively) to search for something more than narratives of consumption, solipsist self-gratification, and self-congratulatory development?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It is with this agenda, in this city, torn and
marked and seamlessly stitched by technology, that I start to unravel my
questions about Internet and Society in China, trying to look at relationships
between technologies, city spaces and identities, drawing from seven months spent
at the Centre for Contemporary Studies at the Shanghai University. These stories, written with retrospective memory and embellished by the privilege of
hindsight, posit a set of questions about Internet technologies, construction
of city spaces, and manifestation of identities in China, but especially in
Shanghai, to locate potentials of social transformation, political
participation, engagement and discourse, which has not been transplanted on
technology studies in China. In the process it also lays down a framework to
understand how, in an oppressive or authoritarian regime, the cultural becomes
the grounds upon which foundations of new political intervention and social
change can be built.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This blog, in its ten different
entries, relies on academic and popular discourse, semi-structured interviews,
participant observation, field work, conversations, and personal experiences that
I collected in my stay there, trying to deal with the double translations of
culture and language. Whenever I have been unsure – and those moments have been
many – I have tried to discuss and debate ideas with colleagues, friends, peers
and participants, to ensure that the observations or arguments are qualified by
more than just a neo-colonial meaning making sensibilities.&amp;nbsp; Despite that rigour, if faults remain, they
are all mine, and hopefully will serve as points of entry into a fruitful
discourse.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity'&gt;https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/itcity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Shanghai</dc:subject>
    
    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>IT Cities</dc:subject>
    

   <dc:date>2009-09-18T10:45:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge">
    <title>IPv6: The Transition Challenge</title>
    <link>https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge</link>
    <description>
        &lt;b&gt;The future of our connected networks is Internet Protocol version 6 (IPv6). Not only is it more efficient and faster than IPv4 which we are currently working with, it is also more reliable and secure. &lt;/b&gt;
        
&lt;p&gt;The IPv6, for instance, has an in-built security protocol called 
IPSec, which authenticates and secures all IP data. The data carrying 
capacity of IPv6 networks is also going to be higher. This means that 
more devices with more features will be able to work seamlessly through 
these networks. Despite the larger load of information, IPv6 packets are
 easier to handle and route, just like postcards with pincodes in their 
addresses are easier to deliver than those without.&lt;/p&gt;
&lt;p&gt;We have already seen great examples of successful implementation 
during the 2008 Beijing Olympics.&amp;nbsp; Every aspect from the security 
surveillance to managing vehicles and the coverage of the Olympic events
 was done over IPv6, including live streaming of the events over the 
Internet. The Chinese government, in fact, has already launched a ‘China
 Next Generation Internet’ (CNGI) project to build IPv6 networks which 
are going to radically change the face of high-speed internet in the 
country. With all these benefits available to us in this next generation
 protocol, the question that remains is why only a meagre 2% of the 
world’s internet traffic is conducted through it? Why haven’t more ISPs 
shifted to IPv6?&lt;/p&gt;
&lt;p&gt;There are two very clear reasons. The first one is that of costs and 
infrastructure. The IPv6 platforms do not communicate easily with the 
IPv4 networks. We have the choice of a mammoth transition of all IPv4 
websites and networks to new IPv6 protocols. This idea of abandoning 
IPv4 and moving to a new protocol is not only redundant; it is also 
futile, because IPv4 is already running the largest network in human 
history quite efficiently. &lt;strong&gt;What we need is translators which will be 
able to speak to both the different versions and help our devices work 
through them seamlessly&lt;/strong&gt;. Older, more successful technologies have 
been able to do this. So, television, for instance, whether it receives 
terrestrial data, satellite images or data transferred via cable, is 
able to translate and render them into images and sounds which we can 
consume with ease. However, the translators for the IPv4 – IPv6 still 
expensive and we need more resources diverted towards making them 
affordable.&lt;/p&gt;
&lt;p&gt;The second reason is linked to the first. In order for IPv6 to become
 popular, it needs a minimum threshold of service providers and users 
riding that network. As long as the deployment remains nascent, there 
will be no concentrated energy to actually try and make the bridges 
between versions 4 and 6. While global technology organisations like 
Tata Communications are ready for the transition, we are going to need a
 systemic change among all stakeholders to make IPv6 a reality, towards a
 faster, safer and more robust Internet.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by &lt;a class="external-link" href="http://www.tatacommunications.com/"&gt;Tata Communications&lt;/a&gt; and the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The above blog post was reproduced in &lt;a class="external-link" href="http://mis-asia.com/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;MIS Asia&lt;/a&gt;, &lt;a class="external-link" href="http://www.cio-asia.com/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;CIO Asia&lt;/a&gt;, &lt;a class="external-link" href="http://computerworld.com.sg/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;Computer World Singapore&lt;/a&gt;, and &lt;a class="external-link" href="http://www.computerworld.com.my/resource/guest-blogs/blog-ipv6--the-transition-challenge/"&gt;Computer World Malaysia&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge'&gt;https://cis-india.org/internet-governance/ip-v-6-the-transition-challenge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6-embrace-the-change">
    <title>IPv6: Embrace The Change</title>
    <link>https://cis-india.org/internet-governance/ip-v-6-embrace-the-change</link>
    <description>
        &lt;b&gt;A moment of transition is always filled with anxiety. There is concern over the unknown and there is a reluctance to move out of the familiar. However, a transition does not necessarily mean migration; or in other words, as we transition to  IPv6 as the new protocol for digital and electronic communication, it does not mean that we are going to abandon the internet as we know it.&lt;/b&gt;
        
&lt;p&gt;In fact, for most of the users, it is going to be a transparent transition, where their devices are going to be able to harness the powers of IPv4 and 6. While there are huge benefits at the back-end, leading to better security protocols and low maintenance, there are a few advantages that the user should also celebrate.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Faster Internet&lt;/strong&gt;: Because IPv6 will open up a huge range of IP addresses, direct routing of data becomes a possibility. As data does not have to be routed through many servers or nodes within a network, it can reach its destination faster. With the way our digital access and sharing is going right now, this is not to be taken lightly. In many ways this is the same transition we had from the dial-up connections, where the transfer of picture and video files within minutes was totally unheard of, while now we’re in an age where we stream high density video on all our computing devices with ease.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More collaborative and shared Internet&lt;/strong&gt;: With the abundance of IP addresses coming our way, there is going to be more scope for multiple devices to be connected online. New platforms of collaborative knowledge production and sharing can be designed to become infinite and inclusive in their scale and architecture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;More connected devices&lt;/strong&gt;: The inter-operability features of IPv6 ensure that more devices are able to communicate with each other with ease. The science-fiction futuristic dream of a completely connected environment where human and artificial intelligence can work together, using a range of devices, is actually a material possibility with large scale IPv6 implementation. This can also trigger new innovation that helps reconstruct some of our existing devices in new forms and shapes.&lt;/p&gt;
&lt;p&gt;While affordability and the migration to new network infrastructure are the gating factors to this transition, these are diminishing costs and we are looking at more interesting internet architecture as we move towards IPv6. Perhaps, one of the most reassuring points of this transition is that we do not need to abandon the familiar internet we are already working with; the transition is not a moving on, but a moving to, and in it are the promises of a safe, secure and speedy internet. Global technology organisations like Tata Communications &lt;a class="external-link" href="http://www.oneipworld.net/"&gt;have embraced this change&lt;/a&gt;; it’s only a matter of time before others too recognise the need for IPv6 and the huge difference it will make to our lives.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by Tata Communications and the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Nishant Shah is Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6-embrace-the-change'&gt;https://cis-india.org/internet-governance/ip-v-6-embrace-the-change&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T06:09:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/ip-v-6">
    <title>IPv6:  The First Steps</title>
    <link>https://cis-india.org/internet-governance/ip-v-6</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society has entered into a small collaboration with Tata Telecommunications in India to celebrate the IPv6 day on June 6th. We will write 5500 word vignettes, which will be sent to their global database consisting of more than 900,000 users in the Asia-Pacific. &lt;/b&gt;
        
&lt;p&gt;It is commonplace to interchange the words Internet and Cyberspace. However, we should make a distinction between the two.&amp;nbsp; Cyberspace is an experiential phenomenon, supported by the Internet but smaller. It refers to the actions, transactions, negotiations performed within the digital network.&lt;/p&gt;
&lt;p&gt;The Internet is a protocol – a set of rules that allows for a digitally connected network of databases to interact with each other. This happens through a standard set of commonly accepted rules, Internet Protocol version 4 – IPv4. IPv4 allows differently configured networks, working on different platforms, and designed through different technologies to communicate effectively by agreeing on a bare minimum of universally accepted codes for data to navigate cyberspace with the least bit of effort.&lt;/p&gt;
&lt;p&gt;IPv4 was defined in 1981, when there were few computers in the world with even fewer connected to networks. It was the protocol that assigned a computer on the Internet, with an IP address, the unique name of a connected device which can be recognised by digital networks. Packets of data transmitted over the Internet need an unique IP address associated to their origin and destination, so that information can travel smoothly.&amp;nbsp; IPv4 was developed so that 4,294,967,296 (2^32) unique IP addresses could be accommodated within the network. When it was designed, it looked like an almost infinite system. No one had ever imagined that the World Wide Web would emerge so quickly! We have reached a point now, where the last free IP addresses have been allotted in February of 2012, and we are now reaching a ‘real-estate’ crisis on the Internet.&lt;/p&gt;
&lt;p&gt;Since every device with Internet connectivity has a unique IP address – computers, servers, tablets, smart-phones, e-book readers and even alarm clocks – we need a lot more IP addresses.&amp;nbsp; IPv6 – or Internet Protocol version 6 – is a new standard by which we are now going to expand the ‘land’ upon which the Internet can grow. IPv6 is an overhaul of the existing system which will be able to handle 340 undecillion (2^128) unique addresses. Leading global Internet Service Providers and technology companies like Tata Communications have recognised &lt;a class="external-link" href="http://www.oneipworld.net/"&gt;this as the need of the hour&lt;/a&gt; since increasingly we are living in digital information societies. However, IPv6 is going to have a range of serious implications for our hardware and software needs as well as our usage patterns and how the Internet is going to expand in the future.&lt;/p&gt;
&lt;p&gt;This communique is brought to you by &lt;a class="external-link" href="http://www.tatacommunications.com/"&gt;Tata Communications&lt;/a&gt; and the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;If you would like any further information on IPv6 at Tata Communications, please reach out to: &lt;a class="external-link" href="mailto:divya.anand@tatacommunications.com"&gt;divya.anand@tatacommunications.com&lt;/a&gt; or write to &lt;a class="external-link" href="mailto:nishant@cis-india.org"&gt;Nishant Shah&lt;/a&gt;, Director-Research at the Bangalore based Centre for Internet and Society.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/ip-v-6'&gt;https://cis-india.org/internet-governance/ip-v-6&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-05T07:18:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
