Skip to content

Commit

Permalink
Merge pull request #719 from 41hulk/guyn-patch-9
Browse files Browse the repository at this point in the history
Illustrating history and technology with visuals
  • Loading branch information
GlenWeyl committed Mar 20, 2024
2 parents 9413316 + b6c2b58 commit d78048f
Show file tree
Hide file tree
Showing 10 changed files with 162 additions and 193 deletions.
75 changes: 35 additions & 40 deletions contents/english/2-1-a-view-from-yushan.md

Large diffs are not rendered by default.

86 changes: 40 additions & 46 deletions contents/english/3-3-the-lost-dao.md

Large diffs are not rendered by default.

4 changes: 3 additions & 1 deletion contents/english/4-0-rights-os-and-⿻-freedom.md
Original file line number Diff line number Diff line change
Expand Up @@ -88,7 +88,9 @@ Operating systems (OSs) are a ubiquitous feature underpinning digital life. Almo

OSs roughly define the possibility space for applications that run on them. There are basic traits in terms of performance, appearance, speed, machine memory usage—to name a few—that applications running on a particular OS share and must respect to work on that platform. For example, iOS and Android allow for touch interfaces, while earlier smartphones (like the [Blackberry](https://en.wikipedia.org/wiki/BlackBerry) or [Palm](https://en.wikipedia.org/wiki/Palm,_Inc.)) relied on styluses or keyboard entry. Even today, iOS and Android apps have different looks, feels and performance characteristics. Applications are coded for one (or possibly multiple) of these platforms, drawing on the processes built into the OS to determine what their application can and cannot do, what it has to build bespoke and what it can rely on underlying processes for.

Boundaries are rarely sharp. While [Macintosh](https://en.wikipedia.org/wiki/Mac_(computer)) was the first mass-market computer with a graphical user interface ([GUI](https://en.wikipedia.org/wiki/Graphical_user_interface)) OS, earlier computers with a command-line interface sometimes had programs that included elements like a GUI. Similarly, while virtual (VR) and augmented reality (AR) headsets (see our chapter on [Immersive Shared Reality](https://www.plurality.net/v/chapters/5-2/eng/?mode=dark) below) are much more effective today, there are some VR and AR experiences that can run on a smartphone, properly worn on the head. Furthermore, while OS designers try to include security protocols that defend against application behaviors that violate or threaten the integrity of the underlying OS, they can never hope to avoid them entirely.[^WorldEnds] Many, perhaps most, computer "viruses" are precise examples of such violations. OSs thus define the normal behavior of applications on their system, providing tools applications can harness and reasonable expectations they can have about other applications, defining the terrain of the easily possible.
Boundaries are rarely sharp. While [Macintosh](https://en.wikipedia.org/wiki/Mac_(computer)) was the first mass-market computer with a graphical user interface ([GUI](https://en.wikipedia.org/wiki/Graphical_user_interface)) OS
<img src="../../figs/4-0-macintosh.jpeg" width="100%" alt="Apple LISA II Macintosh-XL by Gerhard »GeWalt« Walter, retrieved from https://commons.wikimedia.org/wiki/File:Apple-LISA-Macintosh-XL.jpg. Used under Creative Creative Commons CC0 1.0 Universal Public Domain Dedication.
(https://creativecommons.org/publicdomain/zero/1.0/deed.en)">, earlier computers with a command-line interface sometimes had programs that included elements like a GUI. Similarly, while virtual (VR) and augmented reality (AR) headsets (see our chapter on [Immersive Shared Reality](https://www.plurality.net/v/chapters/5-2/eng/?mode=dark) below) are much more effective today, there are some VR and AR experiences that can run on a smartphone, properly worn on the head. Furthermore, while OS designers try to include security protocols that defend against application behaviors that violate or threaten the integrity of the underlying OS, they can never hope to avoid them entirely.[^WorldEnds] Many, perhaps most, computer "viruses" are precise examples of such violations. OSs thus define the normal behavior of applications on their system, providing tools applications can harness and reasonable expectations they can have about other applications, defining the terrain of the easily possible.

[^WorldEnds]: Nicole Perlroth, *This is How They Tell Me the World Ends: the Cyberweapons Arms Race* (New York: Bloomsbury, 2021).

Expand Down
190 changes: 84 additions & 106 deletions contents/english/4-3-commerce-and-trust.md

Large diffs are not rendered by default.

Binary file added figs/2-1-chiang.jpeg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added figs/3-2-georg.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added figs/3-3-TedNelson.jpeg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added figs/3-3-arpanet.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added figs/4-0-macintosh.jpeg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added figs/4-3-bitcoin.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit d78048f

Please sign in to comment.