Anthony J. Pennings, PhD

WRITINGS ON DIGITAL ECONOMICS, ENERGY STRATEGIES, AND GLOBAL COMMUNICATIONS

The Great Monetary Surge Since 2020 and the Return of Inflation

Posted on | March 4, 2022 | No Comments

COVID-19 hit dramatically in early 2020, sending the financial markets around the world reeling and unemployment soaring. The immediate response in the US was a monetary surge led by the Federal Reserve Bank and legislation by the US Congress.

The rising money tide reversed the economic collapse, alleviated some of the harshnesses of the K-shaped recovery, and helped many companies weather the sudden downturn.[1] These monetary and fiscal spikes continued to reverberate in the economy, increasing the value of financial assets, reducing unemployment, but also adding to inflationary pressure not seen since the 1970s.[2]

This post examines the 2020 monetary surge and compares it with additional spending in 2021 and the slight declines entering 2022. What impact did the second Trump stimulus have in December 2020? What additional liquidity did the Biden “Build Back Better” bills in 2021 introduce? Also, how much did the Fed’s continuing Quantitative Easing (QE), zero reserve ratios, and low interest rates contribute to the rise of inflation?

The chart below shows the amount of money in the economy over the last few decades and the dramatic jump in 2020.[3]

The Fed moved first as COVID-19 emerged. It slashed interest rate targets and let banks lend without restriction. The Fed Funds interest rate went down to nearly zero again while bank reserve ratios were reduced from 10 percent to 0 percent. That meant that banks could lend out freely without holding a fraction of deposits in reserve. Meanwhile, the Fed called desperately for government spending to assist the emergency and recovery process. Senate Leader Mitch McConnell responded.

Fiscal policy shaped quickly in the Senate. All US spending bills must originate from the House of Representatives, so the Senate used a previous House bill to create the CARES Act. The Middle Class Health Benefits Tax Repeal Act, originally introduced in the U.S. Congress on January 24, 2019 was used as a “shell bill” to begin working on economic and public health relief for the accelerating Covid-19 pandemic.

The Senate added content to combat the virus and protect faltering businesses and the unemployed. Then, on March 27, 2020, President Trump signed the $2.2 trillion CARES (Coronavirus Aid, Relief, and Economic Security) Act into law. Jared Kushner, the President’s son-in-law, became the “coronavirus czar” in charge of personal protective equipment (PPE) and other medical equipment needed to treat Covid patients.

The bill also included the controversial Paycheck Protection Program (PPP) and its famous Section 1106, which provided forgiveness of up to the full principal amount of qualifying loans. The PPP was replenished the next month with an additional $484 billion.

The chart below shows the amounts of M1 money in the economy (currency, demand deposit bank accounts, and liquid deposits, such as OCDs and savings deposits, and money market deposit accounts) including the dramatic jump in the spring of 2020 and extends the above chart into 2021 and the beginning of 2022.

Money supply

So, 2020 saw about $3.7 trillion in additional fiscal spending for COVID-19 relief in addition to the Fed’s QE, reduction of Fed Funds interest rates from 1.5% to near 0. These numbers show the dramatic economic stimulus that quickly turned the economy around as indicated partially in the Dow-Jones Industrial Index (DJIA) of the top 30 companies by market capitalization (shown below) and pricing power as well as the turn-around in unemployment.

Stock market since 2020

It was a pretty impressive response in that spring in 2020. The Fed hit hard with the reserve ratio, fed funds rate, and QE. Having done about all that it could to jack up the money supply in 2020, the Fed begged for fiscal support. The Senate and House of Representatives delivered. GOP Senate Leader Mitch McConnell had pulled in some impressive legislation with the CARES Act but the COVID-19 pandemic was still raging around the world and not affecting everyone the same.

Compare 2020 with the pandemic spending in 2021. Biden’s proposed Build Back Better plan was conceived to address COVID-19’s K-shaped recovery, specifically to strengthen the middle class, provide care for the elderly, increase affordable housing, and reduce child poverty. First on the agenda was the American Rescue Plan, passed and signed in March 2021 for about $1.9 trillion.[4]

Second was the bi-partisan infrastructure bill with $579 billion in new spending added to what had already been planned. While not specifically Coronavirus relief, the Infrastructure Investment and Jobs Act (IIJA) added $1.2 trillion over ten years ($120 billion a year) to the economy. This included money for roads and bridges, broadband, mass transit, and even for a network of EV charging stations.

Infrastructure Bill

Concerns about inflation increased during 2021, especially after President Biden signed a new bill for COVID-19 relief in the spring and the bi-partisan infrastructure bill in the summer. A third bill, the American Families Plan, or BBB III, was pushed by the progressive wing of the Democratic Party. It proposed additional spending of up to $6 trillion and was heavily debated, but it did not get the support of two Democratic Senators and was never voted on. The media narrative was very negative, not about the bill, but bickering in the Democratic party.

So roughly $2 trillion was added in 2021, or about half as much as the 2020 stimulus spending. It was still a lot of money, plus bank money from continued QE and low-interest rates. The $5 trillion in 2020 for domestic relief spending raised concerns about excess demand, especially in light of global reductions in the supply of goods and services. It was a lot to add to an economy with its supply of goods and services depleted by unemployment, closed factories, seaport bottlenecks, and rising energy prices.

But at the risk of sounding like Condoleezza Rice after 9/11, no one ever imagined the supply of goods and services would come under such pressure as COVID-19 continued. Inflation needs money but is also a matter of supply, and market failures can dramatically affect rising prices.

Inflation is a complex interplay between effective demand and the provision of goods and services. Inflation can be demand-pull or cost-push. Demand-pull inflation is when an increase in demand (too much money) is greater than the ability of production of goods and services to keep up and typically results in higher prices. Its calculation also needs to consider the pricing power of major suppliers. After all, prices only go up when suppliers change their price sheets.

Cost-push inflation happens when prices increase due to rising costs of raw materials and wages. The Russian invasion of Ukraine and the sanctions imposed created shortages of essential resources from both countries, such as aluminum and carbon-based products such as fertilizers, natural gas, nickel, and crude oil. It is difficult to assess the impact of food shortages that might result from the degradation of the Ukrainian infrastructure. Overall, rising costs of inputs, measured by the Producer Price Index (PPI), pressure suppliers to raise prices.

But most of the current problems come from supply shortages due to the limits of the COVID-19 pandemic. Calculating the delays in factory production, the chip shortages, the reduction in oil production, restaurant closures, and shipping containers waiting at the docks, etc., will give us a tally of what has gone missing in the US economy and what is producing inflationary forces.

We had a fantastic shot of money into the US economy during 2020. The legislated increases continued into 2021 but nowhere near the amounts of the previous year.[5] The stimulus helped forestall an economic collapse but became part of the complex equation of supply and demand forces increasing prices. The global inflation that emerged from the COVID-19 resulted from a “perfect storm” of economic and political issues.

Postcript 2024

A few weeks after the passage of the CHIPS and Science Act, Biden signed the Inflation Reduction Act (IRA) on August 16, 2022. The “Chips Act” appropriated $52.7 billion and authorized roughly $280 billion in new funding to boost domestic research and manufacturing of semiconductors in the United States. The IRA name was initially ridiculed by the Republicans as inflation reached 9.1% that summer, but the inflation rate halved over the next year and declined to 3.9% by early 2024.

In a surprising move, the IRA was sponsored by Senators Chuck Schumer (D-NY) and Joe Manchin (D-WV), who had previously opposed the progressive’s multi-trillion Build Back Better III version, primarily due to climate change regulations and massive spending. The fact that all Democrats in the Senate and House voted for the bill and all Republicans voted against it underscored the complex political dynamics at play.

Inflation rate since 2020

It focused mainly on healthcare, continuing subsidies for the Affordable Care Act, and reinstating the ability of the government to negotiate drug prices, especially insulin, that had been eliminated by the Bush-Cheney administration in 2003. The most significant fiscal impact was the $663 billion in tax benefits for energy, and the climate investments agriculture energy, manufacturing, transportation, environmental justice, and pollution reduction and/or resilience.[6]

Fed Funds Rate since COVID started

Another critical institution is the Federal Reserve, whose Chairman Jerome Powell insisted until late 2021 that the inflation rate was “transitory.” As shown in the chart above, the Fed’s targets went from near-zero interest rates (Fed Funds Rate) in March 2022 with 11 rate hikes to a range of 5.25 percent to 5.5 percent in July 2023 where it has stayed at an actual rate of about 5.3 percent for at least a year.

Covid is over (fingers crossed). Inflation has returned to George W. times (high of 4.1%), marking what Bloomberg called a remarkable turnaround given it took 8.5 years to get back to 3 percent after the 1970s. Spending was down in fiscal year 2023 decreased $137 billion, or 2.2 percent. Oil is up about 9% from a year ago due to geopolitical concerns, mainly shipping through the Red Sea. One last note: China’s production and tariffs on imports remain a long-term stress on prices in the US.

Citation APA (7th Edition)

Pennings, A.J. (2022, Mar 4). The Great Monetary Surge Since 2020 and the Return of Inflation. apennings.com https://apennings.com/dystopian-economies/the-great-monetary-spike-of-2020/

Notes

[1] The K-shaped recovery indicated a split between groups of society that were able to adjust fairly rapidly economically and those subject to long-term unemployment and poverty.
[2] The US has had four significant periods of high inflation since WWII. The first, industrial demand inflation occurred with the massive Cold War development, including the interstate road system and the buildout of the telephone system. Then, the birth of the baby boom generation led to consumer demand inflation in the 1960s, with additional spending for Vietnam War. The third spike came from the global oil crisis due to the rise of OPEC in the 1970s and the redistribution of petrodollars worldwide via bank lending. In the US you also had the Baby Boomers buying homes for the first time. Globalization set in during the 1980s due to advances in air transportation, maritime containerization, and international communications – increasing supply and leading to meager inflation. We are now in the fourth age of US inflation due to COVID-19 spending and associated reduction of global shipping, as well as the shutdown of services and manufacturing capability.
[3] Money supply statistics from St. Louis FRED.
[4] The Trump government increased deficits almost as much as the Obama administration, except in half the time. It also spent more on stimulus in 8 months in 2020 than Biden did in all of 2021. But it had the COVID-19 virus and had to respond. Biden’s expenditures, while prescient because of Delta and Omnicron variants, was a bit more elective and Biden III was stopped by Sen Manchin (W-VA). The federal deficit totaled nearly $2.8 trillion in 2020, about $360 billion more than in 2021. So I consider it about equal and in total, about half the monetary part of inflation. The Fed, through QE, 0% reserve ratio, and near-zero interest by Trump appointee Jerome Powell added the other half.
[5] The Fed added $4.66 trillion to the money supply n 2020 and another $10 trillion up to February 2022. So that is a lot of money. Biden stopped the stimulus for the most part, but the Fed is still adding money.
[6] IRA interestingly from Wikipedia and Fed Funds Rate chart from St. Louis FRED.

Share

© ALL RIGHTS RESERVED



AnthonybwAnthony J. Pennings, PhD is a Professor at the Department of Technology and Society, State University of New York, Korea. Before joining SUNY, he taught in the Digital MBA program at St. Edwards University in Austin, Texas. Originally from New York, he taught at Marist College and from 2002-2012 was on the faculty of New York University where he taught comparative and digital economics. His first academic job was at Victoria University in New Zealand. He was also a Fellow at the East-West Center in Honolulu, Hawaii.

US Technology Diplomacy

Posted on | December 31, 2021 | No Comments

Edited Remarks to the Global Technology Diplomacy Forum 2021. Hosted by the Ministry of Foreign Affairs of the Republic of Korea. November 30, 2021, 13:30 (KST)

Ladies and Gentlemen, Ambassador Min,

I’d like to cover three areas today as I talk about US technology diplomacy. First, I want to talk about America’s domestic renewal and how it relates to its international diplomatic agenda. Americans across the political spectrum recognize that the US needs to change. However, they differ on the causes and the solutions. Then I will address some of the major US institutions managing technology diplomacy, including the private sector.

Lastly, I want to end with comments on “norms” in multilateral technology diplomacy. Norms provide guidance and processes for mutual understanding and diplomatic leadership. As the increasing centrality of technology has disrupted the State Department’s mission objectives and brought other departments and agencies into the mix, diplomatic leadership has become even more crucial. Issues such as the “securitization” of cyber technology – state actors involved in cyberattacks, and the tensions they are creating with tech companies, are of particular concern.

So, America is rediscovering itself, undergoing domestic renewal, and once again sorting out its friends and enemies around the world. As is the rest of the world, we are experiencing dramatic technological change, pressured by the pandemic, climate pollution, decentralized finance, and changes in the global media ecosystem. I could add to this list, but I think you get the point.

America is divided. It was rocked by the MAGA movement, otherwise known as Make America Great Again. President Trump stressed border security, carbon utilization, and tax cuts while alienating many traditional international allies. He withdrew from many international forums, including the Paris Climate Accords, the World Health Organization, UNESCO, the Human Rights Council, and the Iranian nuclear negotiations.

Now the US is embarking on the Build Back Better plan. Instead of focusing on tax cuts for the more affluent, it focuses on money to end the pandemic, building US infrastructure, and creating the conditions for families to return to work. It allocated $3.1 trillion in spending on top of some $5 trillion in 2020 for domestic spending, raising concerns about excess demand in light of global reductions in the supply of goods and services.

The primary goal of both administrations has been to get through this pandemic. Recent spending has shifted to infrastructure, mainly roads and bridges, mass transit, renewable energy, and even broadband. It is, in a sense, a “smart new deal,” literally a grand experiment, if phase 3 is passed that will support parents going back to work and address climate concerns.

A new influence is called MMT or modern monetary theory. Rather than the pained austerity theory that hampered the Obama administration’s attempts to recover from the Great Recession, MMT tries to delink deficits from borrowing and taxes. It encourages government spending where appropriate because only naitonal governments can issue the official currency, while cautioning against the real risks of inflation.

So, the US is looking inwards. But it recognizes international threats and opportunities. I am not in any way a speaker for the Biden administration, but let me echo some concerns here today and start by recognizing the multiple branches and institutions with international reach that influence mediations regarding science and technology.

The actors involved in US diplomacy are many. The Departments of Agriculture, Homeland Security, Defense, Treasury, even the Federal Reserve Bank all have some roles in international diplomacy. However, the Departments of Commerce and State are most relevant to today’s topic, as is the trade negotiation representative of the executive office.

Since diplomacy starts with the President, let me first draw attention to the United States Trade Representative (USTR), a Cabinet-level position currently headed by Katherine Tai, an attorney fluent in Mandarin. Tai is the President’s principal trade advisor, negotiator, and spokesperson on trade issues and develops and coordinates U.S. trade policy, in consultation with other federal agencies and Congress. Her nomination was confirmed in the Senate without dissent, which is indicative of the Biden’s administration concerns about China.

Remember that Biden was still Vice-President in 2015 when the Made in China 2025 Report was released that simultaneously angered and struck fear in American industry. It created a backlash in American politics, including implementing the failed tariffs on Chinese goods. The event is reminiscent of Japan’s Fifth Generation AI project in the early 1980s. Luckily, the fear of Japanese AI led to investments in supercomputers and networking and ultimately the Internet thanks to the “Atari Democrats,” a group that included Al Gore and Gary Hart.

The Department of Commerce is also critical. “Commerce” includes the International Trade Administration (ITA) and the NTIA. The latter includes the Office of International Affairs (OIA) that advises the US President on international telecommunications and information policy issues. The OIA plays an important role in the formulation of international information and communications technology (ICT) policies including ICANN and DNS issues. Domestically, the NTIA is in charge of the $65 billion in spending for broadband development that was designated in the 2021 infrastructure bill.

Secretary of Commerce

Commerce is engaged in technology and patent protection to help American businesses maintain their edge over global competitors. Secretary Gina Rimando is particularly interested these days in legislation that will allow her to entice foreign companies to the US to reduce supply chain worries. She was very pleased recently, when Samsung announced a $17 billion dollar investment in a semiconductor fabrication site in Texas. The site is, by the way, about 30 kilometers from my home in northern Austin.

Secretary Rimando is confident that “Commerce has tools to level the global playing field.” Major concerns include ensuring access to foreign markets, enforcing export controls, protecting intellectual property (IP), and being an advocate for American business. Commerce is awaiting final passage of the United States Innovation and Competition Act (USICA) that will allocate $10 billion to the Dept of Commerce to invest in regional tech hubs across the US.

Speaker Pelosi recently agreed with Majority Leader Schumer to conference to reconcile the Act. But in light of the supply chain shocks, particularly in semiconductors, several other bills might be included. The “Chip Act” has proposed another $52 billion to help develop the semiconductor industry manufacture on US soil. It was passed by the Senate but held up a bit by the House as it pushed through BBBII, the Bi-partisan infrastructure act.

Another relevant bill that might be connected is the Facilitating American-Built Semiconductors Act (FABS). As part of the USICA, it would double the number of “fabs” from 9 to 18. Fabs are enormous multi-billion dollar facilities needed to fabricate or manufacture advanced chips. Currently, Taiwan’s TSMC is the world leader, but Samsung is nearly as potent.

As mentioned earlier, Samsung is investing in Austin, Texas, while TSMC is building new facilities in Phoenix, Arizona. Intel is also building there, as the former world innovator and leader looks to regain stature. But the number of fabs throughout Asia could grow to over 50 in the upcoming decade. As a result, total investment in the US should be in the range of $500 billion to regain a significant presence in the global production of chips and ensure supplies for domestic use, including the automobile industry.

Anthony Blinken is our current Secretary of State and has had a busy year consolidating international coalitions that were pulled apart during the last administration. Blinken presented the Biden administration’s vision of a strategic approach to shaping the rules for technology and science policy in several forums this year. He recognizes that US diplomacy needs to “shape the strategic tech landscape, not just react to it.” He has recently taken an interest in Artificial Intelligence (AI), citing important work reported in the OECD 2019 Recommendations on AI. He stressed the importance of AI that respects human rights and democratic values.

He has also been working on the Quad (Australia, India, Japan, US) Framework for Technology, in which they committed to integrating human rights and democratic values into the ways “technology is designed, developed, governed, and used,” particularly in wireless 5G and beyond.

You can see here what he calls “pillars” representing the State Dept’s science and technology priorities.

    Build US capacity and expertise in global health, cyber security, climate and emerging technologies through multilateral diplomacy;

    Ensure leadership in technology leadership by encouraging more initiative and more innovation;

    Protect the Internet and US analytical capabilities;

    Set standards and norms for emerging technologies;

    Make technology work for democracy;

    Develop cooperative relationships by “friend-shoring” and “near-shoring” to help secure and resilient supply chains;

    Protect “innovative ecosystems” and talent “pipelines.”

Let me start to conclude by bringing to your attention cybersecurity and the private sector. The Department of State is paying increasing attention to computer and network security threats and weaknesses. But tensions are emerging between nation-states that increasingly see technology as a security issue and tech companies that feel the pressure from customers for additional protection and support.

Microsoft called for a “Digital Geneva Convention” in February 2017 to protect citizens and companies from cyber attacks. The proposal was not warmly received. But they followed up after the May 2017 WannaCry ransomware cyberattacks by gathering broad corporate support with the Cybersecurity Tech Accord.

These companies want governments to protect their customers and not cajole them into attacking innocent people or companies. They also want to empower developers to build more resilient ICT systems. They see value in developing strategic partnerships across many sectors of society to achieve their objectives.

CTA signatories agree to commitments in four key areas:

    Stronger defense against cyberattacks by pledging to protect all customers globally regardless of the motivation for attacks online;

    No offense by choosing to not help governments or other actors launch cyberattacks against innocent civilians or enterprises and protecting against the tampering or exploitation of products and services through every stage of technology development, design, and distribution;

    Empowering developers and the people and businesses that use their technology by helping them build and improve capacity for protecting themselves; and

    Building upon existing relationships and taking collective action together to establish new formal and informal partnerships with industry, civil society, and security researchers.

The goals of the Cybersecurity Tech Accord are to improve technical collaboration, coordinate vulnerability disclosures, and share information about threats. Most of all it is to minimize the introduction of malicious code into the Internet and other aspects of cyberspace. Microsoft suggested five important “norms” that should inform international discussions of cybersecurity:

    Harmonization;
    Risk reduction;
    Transparency;
    Proportionality, and;
    Collaboration.

Norms are common in multilateralism as they are used to work out approaches to common concerns. Norms are better seen as processes and not goals. It is not so much a matter of norm acceptance but a a struggle over precise meanings, eventually favoring the member states’ prerogative.

Norms are not treaties that need to be ratified by the Senate nor alliances like NATO, whose Article 5 provides that if a NATO Ally is the victim of an armed attack, it is an attack on all members. They are not specific agreements like those achieved at the WTO meetings in 1996 and 1997 that gave us a truly World Wide Web. While norms do not have the force of law, they still can have weight. Norms can provide positive guidance. For example, the ITU called for an end to facial recognition technologies. You may have noticed Facebook stopped using it. Conversely, norms can also result in some states being labeled “bad actors.” Consequently, sanctions can be applied.

Technological strength is now recognized as a prime determinant of economic, political, and military power. The U.S. is rebuilding its industrial strength and returning wealth to its citizens. This transformation will require working with key international partners to encourage investment and innovation while protecting the Internet and needed supply chains, as well as critical intellectual property. A significant challenge will be to make technology work for democracy while safeguarding personal data.

Citation APA (7th Edition)

Pennings, A.J. (2021, Dec 31). US Technology Diplomacy. apennings.com https://apennings.com/how-it-came-to-rule-the-world/digital-monetarism/us-technology-diplomacy/

Ⓒ ALL RIGHTS RESERVED



AnthonybwAnthony J. Pennings, PhD is a professor at the Department of Technology and Society, State University of New York, Korea where he teaches broadband policy and a science and technology studies. Before joining SUNY, he taught at St. Edwards University in Austin, Texas, where he keeps his US home. Most of his career was spent on the faculty of New York University. His first faculty position was at Victoria University in New Zealand and he also a Fellow at the East-West Center in Honolulu, Hawaii.

Symbolic Economies in the Virtual Classroom: Dead Poets and the Lawnmower Man

Posted on | November 4, 2021 | No Comments

The stark contrasts between the closed moral community of the preparatory Welton Academy in the Dead Poets Society (1989} and the emotional and intellectual capers of its new teacher Johnald “John” Charles Keating afford the opportunity to query the processes of energetic investments and signification in modernity’s educational spaces.

Likewise, the representation of educational subjectivity in The Lawnmower Man (1992 provides an ancillary contrast for exploring the technicalization of educational space. Particularly an interrogation of its operations on the body and its intellects could prove helpful in an analysis of the symbolic dynamics that operate in the “virtual classrooms.”[1] These are emerging through new multimedia communications technology and telecinematic simulation equipment.

This post examines two films that address the production of modern educational spaces and subjectivities. Through them we can begin to figure the symbolic and energetic configurations in the “virtual classroom” and other technological environments for learning and training. Note that this is from my PhD dissertation Symbolic Economies and the Politics of Global Cyberspaces (1993).

The boarding school’s repressed libidinous and spiritual “economies” invite a reading of The Dead Poets Society that focuses on socio-signifying practices. Notably, it figures the role of the teacher as what Goux termed a symbolic third. Drawing on his quest for a general economics based on symbolic energies, we can not only figure the teacher as representative of patriarchal but also logocentric significance. Like money, a condensation of value occurs that raises his position to the privileged subject and evaluator. Also, the chosen text rises to the select mode of signifying. Their role becomes the mediator and arbitrator of intellectual values and texts. Consequently, they develop a monopoly on the construction of facticity and truth.

The teacher, played by Robin Williams, is a “media event” in the sense that, by elaborating a series of emotionally and intellectually rich forms of signification, he disrupts the school’s anti-erotic sovereignties and traditional forms of educational worship. John Keating is a carefully constructed teacher-character who maintains a credible front to his peers while engaging his students in a series of revaluing exercises. His invoking the philosophy of “carpe diem,” for example, disrupts the ascetic delays of pleasure and self-gratification. Instead, these serve to channel emotional and intellectual investments into the subjectivities prescribed by the school’s bourgeois govern-mentality.

His unusual behavior and pedagogy invoke a curiosity in his students that addresses their subjugated desires and self-construction. His former pact with a secret society of self-proclaimed poets awakens their dormant dreams of social adventure and expressive identities. This secret knowledge, time-tested by the ancients of their alma mater, promises sexual conquest and alternative forms of imagination. “Spirits soared, women swooned, and gods were created.” By re-presenting literary classics of Shakespeare and Milton, but with the voice of macho film star and arch-American John Wayne, he distorts the distinctions between “high” and “low” cultures and encourages the dissolution of aesthetic boundaries that work to solidify not only class distinctions but the socio-symbolic rigidifications of emotional affect.

The reincarnated “Dead Poets Society” organize their meetings in a cave located off the campus in a nearby forest. There they read unauthorized poetry, smoke cigarettes, and mix with women – all the activities that are forbidden at the school. As Gebauer points out, the symbology of the cave has never been about the outside world, but about the inside one. “Our imagination remains captive in the cave. We do, in fact, repeatably seek out the cave in a different form.” Our ontology has its commencement in the topography of the cave and he points out: “In one way or another, all our notions of paradise are linked with situations of the cave.”[2] This is also the encapsulating trajectory of Virillio’s last vehicle.

However, Keating’s enthusiastic ideations soon conflict with other domains of symbolic controls, including the potent Oedipal dynamics that have proved to rein too tight a grip on one of his students. In his quest to act in a community play, the student goes against his father’s demands to cut down on his extracurricular activities, forges a permission slip, and performs the leading role of Buck in A Midsummer Night’s Dream.

The father inadvertently discovers the disobedience and shows up at the play to observe. Despite the acclaim and evident success, he fiercely pulls his son away from the backstage party. After a confrontation at home, where among other things, the mother’s disappointment is invoked to punish the son, the son is forbidden to act again or at least until he goes on and finishes medical school. Faced with this paternal injunction, he takes his own life.

The death of the student presents a moral catastrophe that overpowers Keating’s privileged text of spontaneity and impunity. These are now recoded as degenerate improprieties and their “unproductive” forms of expenditure are tallied against the teacher as infractions within the Calvinistic ledgers of the schoolmasters. The conflicting father is able to easily organize the dismissal of the teacher.

As Keating collects his things from the classroom, the students respond by pledging their allegiance to the teacher and the teachings of the Dead Poets Society. They stand on top of their class desks and recite, “My captain, my captain,” from Walt Whitman’s 1865 tribute to the recently assassinated U.S. president Abraham Lincoln. With this they honor Keating’s role as their navigator through the uncharted course of adolescent squanderings and discoveries.

The Dead Poets Society reflects the profound symbolic and historic investments structuring traditional education and how the currency of the teacher can facilitate new types of energetic and intellective exchanges. What will occur in new virtual environments of the Metaverse? If educational space is to become cyberspace in a socially and politically responsive way, than it behooves us to mark its inception with at least one strategy that is sensitive to the “economies” which mediate and control its symbolic investments.

Suppose we view education as the inscription of subject sovereignties and the socialization of new moral and administrative subjectivities required by the post-industrial information society (“proto-sovereignties”). In that case, the virtual classroom presents an alluring new vehicle for liberating expressive capabilities, massaging sensory intelligences, and prescribing new competencies in terms of workplace requirements or prevailing art and intellectual practices.

The Dead Poets Society reflects the profound symbolic and historic investments structuring traditional education and how the currency of the teacher can facilitate new types of energetic and intellective exchanges.

An instructive approach has been taken up by writers developing a history of computer technology around the theme of the “military information society.”[4] They rightly point to the military’s significant influence on the development of computer-generated simulation environments and information technology in general. Noble, for example, writes about the militarization of learning and the production of what he calls “mental materiel.”[5]

The merging of educational technology and the cognitive sciences received its impetus from recognizing that behaviorist theory had reached diminishing returns. Technical advances in cognitive/instructional technology would be more fruitful.[5] This combination emerged metaphorically in popular culture as the ‘cyborg’ imagery. Machinery is directly implanted into the corporeality of the docile body or, in most cases, designed to interface effectively. Cognitive science since its beginnings has been the “science of the artificial,” with the production of prescribed mental processes modeled on computer procedures and systems foremost on its laboratorial agenda.[6]

The film Lawnmower Man presented a “cyberpunk” vision of the new technology. While the film has been criticized for its overbearing Frankensteinish narrative, its visual and technological settings drew from industry leaders and became a showcase for the potential of virtual reality VR technology. Its poster subheading, “Nature made him an idiot, science made him a god” allows us a foray into the disciplining aspect of the new technology.

Virtual reality uses computer-controlled 3-D graphics and an interactive environment which is oriented from a learner or viewer perspective and which tends to suspend the viewer’s belief that the environment is produced. In virtual reality, the body is encased in a computer-mediated and what Zuboff called an informated environment that continuously records performative data. The user wears a sensor-laden set of goggles and often gloves tied to a megacomputing system capable of tracking and responding to the movements and commands of the user. This system is still in the process of transformation and it is likely that the variety of user interfaces will be marketed and brought into use.

In this story, Dr. Angelo of Virtual Space Industries has major contracts with the US government to experiment with VR to produce better fighting and technology-competent soldiers. His initial work is with chimpanzees, who are fitted into a sensory bodysuit and helmet and hang suspended in a gyroscopic device that allows the body to turn 360 degrees in any direction. In combination with constant injections of vitamins and neurotropic drugs, the chimp is subjected to long training hours of fighting within various electronically simulated environments.

When Dr. Angelo’s chimp escapes and kills a guard, it is hunted down and killed. The investigator then turns to a human subject to continue his work “on the evolution of the human mind.” Jobe is a dim-witted ward of St. Anthony’s Church who makes his living caring for the church and mowing lawns, one of which belongs to Dr. Angelo. Cajoled by the doctor’s argument that he could become smarter and thus avoid “people taking advantage of him,” Jobe agrees to undergo some tests and participate in the VR training.

Unfortunately, the government liaison tampers with the serums and computer learning programs. He installs “Project Five” formulas that were designed to produce extreme forms of aggression for warfare. The continuous work on Jobe had originally transformed him into an attractive, socially graceful, and intelligent subject, but the new program transforms him into a symbolic authority figure and a despotic shaman. Through his electronically enhanced and meticulous training, Jobe becomes a “cyberchrist” and enters the world’s telecommunications networks with the promise that he will give us what we yearn for — a figurehead to lead us.

The Lawnmower Man counters the mythic tendency that VR is becoming a liberation technology, that it will soothe our souls and free our consciousness. Instead, it suggests VR’s trajectory is one of efficiency and training that presents its own positivities and productions. The movie lacks the moral subtlety that might have made it more successful. Still, it serves to pick up on some of the discourse that VR has fit into and exposes a large audience to questions regarding VR technology.

Educational “visionaries” are “tripping over themselves to transform the schools, unwittingly, into a staging ground for playing out militarized scenarios.”[7] Combined with the new imperatives of international capital, which has become totally dependent on the new information technologies, mechanized learning “becomes a site for the actual production of ‘mental materiel’ – for the design and manufacture of ‘intellectual capital.” Public education is implicated as both a laboratory and a site of legitimization for the new technical learning. A new “cognitivist agenda” was responding to the demands of corporations with “problem-solving” skills and the ability to interpret and construct “abstract symbolizations.”

The lessons of film analyses textualize both the romantic and disciplinary notions of education to inform contemporary circulations and ideations of educational policy and practice. A long tradition of involving the viewer in a cinematic experience of suspended belief has resulted in a rich body of textual interpretation that may be helpful for the analysis of virtual reality applications in educational spaces.

Postscript

The Covid-19 era is giving VR new life due to the urgency of social distancing and the possibilities of technology. In Synthetic Worlds: The Business and Culture of Online Games (2005), author Edward Castronova pointed to three trends transforming the gaming version of VR that are relevant to education. Most people associated VR with hardware: goggles, gloves, and other haptic devices. But the advancements in software and network protocols have given confidence to its developments; particularly, software engines like Unreal have accelerated speeds and increased resolution for both augmented and virtual reality. The other development was the enhancement of communities and collaboration. It’s not just about individuals, but individuals working together. Another is the development of commercial markets for virtual environments, items, and even avatars. Particularly with the Metaverse now the focus of corporations like Facebook and Nvidia, we are entering a wild west of virtual life.

Citation APA (7th Edition)

Pennings, A.J. (2021, Nov 04) Symbolic Economies in the Virtual Classroom: Dead Poets and the Lawnmower Man. apennings.com https://apennings.com/meaningful_play/symbolic-economies-in-the-virtual-classroom-dead-poets-and-the-lawnmower-man/

Share

Notes

[1] Hiltz, R.S. (1986) “The Virtual Classroom,” Journal of Communication. Spring.
[2] Gebauer, G. (1989) “The Place of Beginning and End: Caves and Their Systems of Symbols,” In Kamper & Wulf (eds.) Looking Back on the End of the World. (NY: Semiotext(e) Foreign Agents Series). p. 28.
[3] See Chapter 5.
[4] Levidow, L. and Robins, K. (1989) Cyborg Worlds: The Military Information Society. (London: Free Association Books).
[5] Noble, D. D. (1989) “Mental Materiel: The Militarization of Learning and Intelligence in US Education,” in Levidow, L. and Robins, K. Cyborg Worlds: The Military Information Society. (London: Free Association Books). p. 22.
[6] Quote from H.A. Simon (1981) “Cognitive science: the newest science of the artificial,” in D.A. Norman, ed. Perspectives on Cognitive Science. (Hillsdale, NJ: Ablex/Erlbaum). pp. 13-25.
[7] Noble, D. D. (1989) “Mental Materiel: The Militarization of Learning and Intelligence in US Education,” in Levidow, L. and Robins, K. Cyborg Worlds: The Military Information Society. (London: Free Association Books). p. 35.
ibid, p, 34.

Share

© ALL RIGHTS RESERVED



AnthonybwAnthony J. Pennings, PhD is Professor at the Department of Technology and Society, State University of New York, Korea. Before joining SUNY, he taught in the Digital MBA program at St. Edwards University in Austin, Texas. Most of his career was in New York at Marist College in New York for three years, and New York University for 10 years. His first academic position was at Victoria University in New Zealand. He has also spent time as a Fellow at the East-West Center in Honolulu, Hawaii.

Building Dystopian Economies in Facebook’s Metaverse

Posted on | October 31, 2021 | No Comments

Facebook’s new name “Meta” and its interest in a VR metaverse has me flashing back to a talk I gave on April 17, 2008 about Second Life, an online virtual world that was popular before social media began to dominate the Web. This post examines the dynamics and economies of virtual worlds while considering the hybrid conversions and interactions with the world outside it.

It’s no mistake that I’m writing this on Halloween, the holiday of expressive meanings and facades. Virtual environments like Fortnite, Minecraft, and Roblox explode with creative representations, not just as places to visit virtually but opportunities to interact, play, and conduct commerce. Now Metaverse promises new online services like working virtually and digital goods like designable avatars and transactable NFTs (Non-Fungible Tokens). But are people ready to don VR helmets and live, play, and work in a Ready Player One universe?

The talk was held in downtown New York City at the Woolworth Building, known as the “Cathedral of Commerce” when it was built in 1913. The location was strangely appropriate given the topic, a wrap-up of a year-long project at New York University on Second Life. The project involved an animation class taught by Mechthild Schmidt-Feist, and my class, the Political Economy of Digital Media. I still have the tee-shirt my students gave me that says “Got Linden?” a reference to Second Life’s currency, the Linden. Click on the image for a larger view of the mind map notes from my talk:

Symbolic Economies of Second Life talk

The talk gave me a chance to tie in discussions from my PhD dissertation, Symbolic Economies and the Politics of Global Cyberspaces (1993). I went back to my dissertation because it looked at money in fictional virtual worlds, from Sir Thomas Moore’s (1516) Utopia to Samuel Butler’s Erewhon (1872) and William Gibson’s cyberspace trilogy. His classic Neuromancer (1984)[1] originally conceived “cyberspace” as a digital world, the “matrix,” that someone could “jack into” with a neural plug in their skull. I also discussed Neal Stephenson’s Snow Crash (1992) that coined the term “Metaverse.”

At the time, I was looking for a way to understand how money could become electronic. My Masters thesis was on banking and telecommunications deregulation and how it led to the “Third World debt crisis” and the privatization of public assets worldwide. But it was empirical and largely descriptive. Cyberpunk was intriguing as a way to theorize money in some “future” settings.

So it was useful to examine historical texts regarding money. Sir Thomas More’s Utopia (1516) was central as it imagined a place WITHOUT MONEY. Utopia, which means “no place,” was an imaginary land ruled by its leader Utopus. The island nation outlawed gold and often ridiculed it. But it was not within certain symbolic formations, including the significance of its leader Utopus. So I used the notion of symbolic thirds from Jean-Joseph Goux to analyze the political economy of utopias and the “dys”-topias of these cyberpunk genre novels.[2] This strategy also involved a reversal. In this case, what happens to a place with an excess of money and other symbolic forms?

Dystopias are places with excesses – of money and other significations. Meanings circulate, slide about, and proliferate. Symbolic economies refer to society’s tendency to both fix meanings and elevate certain things into “symbolic thirds.” Social pressures tend to isolate and elevate a member of a category to a higher position that is then used to judge the other members of that class. Money is the most recognizable symbolic third, but others include certain artists, captains, creative works, monarchs, and other and political leaders. Donald Trump, it can be argued, rose to a type of symbolic currency for the MAGA movement. These thirds evaluate relationships between things, assign and reconcile corresponding values, and facilitate exchanges. I decided to revisit my old work that examined Second Life and now turn to Facebook’s Metaverse to investigate how economies and monies can emerge in these electronic/digital environments.

I had a helpful bridge, the work of Cory Ondrejka, a Second Life co-founder and Chief Technical Officer for Linden Labs, the developer of Second Life. His “Escaping the Gilded Cage: User Created Content and Building the Metaverse” also used the cyberpunk genre as a point of departure and demonstrated how online infrastructures can provide opportunities for different kinds of online worlds and economies to emerge and harness the power of player creativity. He focused on the costs and strategies of producing video games (particularly massively multiplayer online games-MMOGs) and virtual environments to build a online spaces to match the richness and complexity of the real world.[3]

Ondrejka addressed problems that plagued virtual reality and identified four issues with creating content in digital worlds like Second Life and also video games for the consoles such as PlayStation and Xbox. They were difficulties in:

  1. creating first-class art;
  2. the lengthy development cycles needed;
  3. the hours of gameplay that had to be produced;
  4. the many players that needed to be accommodated, and;
  5. the large teams that had to be hired and managed effectively to create digital content.

These technical issues continued to be addressed by software engines like Unity and Unreal. They have combined with innovations in hardware such as the Oculus Rift headset goggles and the HTC Vive Virtual Reality System to create significant advances virtual environment and interaction. Increases in computation speed and facility in scripting languages have also empowered professional designers and players to create new immersive experiences.

The resultant tools and techniques of these VR engines include:

  1. better scripts for avatar and player locomotion;
  2. responsive user interface synchronization and haptic (feeling) controls;
  3. editor techniques to create virtual 3D environments such as landscapes and urban architectures;
  4. adjustable stereo media for VR Head Mounted Displays (HMD);
  5. advanced plugins to expand and facilitate VR interactions and gameplay elements, and;
  6. high-volume high-speed/low-latency data networking that connects the temporal and spatial dimensions of a VR/AR environment with the user navigation actions.

They can be combined to continue to improve the desired quality of the virtual experience for the end user, despite expected limitations in available system resources. However, they are insufficient to maintain the gameplay and psychic investments necessary to ensure long-term engagements in a virtual world like the Metaverse.

Creating successful virtual worlds and economies with the traditional model of a single group is highly unlikely. User-created content is a key ingredient for a dynamic online world with a vibrant economy and that requires vesting user participation. Do it yourself (DIY) tools and techniques need to be tied to online and real world rewards.

One of Ondrejka’s inspirations was the The Mystery of Capital by Hernando De Soto, a popular economist throughout the “Third World,” who focused on capitalism being a system of representations and rights. He argued that connecting poor people to property via a system of legal representations was the most effective way to empower them to build wealth. Connecting the construction of online wealth to individuals would be crucial to successful virtual economies.[4]

Ondrejka suggested that online virtual worlds with vibrant economies are really only possible if:

  1. users are given the power to collaboratively create the content within it;
  2. each of those users receive broad rights to their creations. These would be primarily property rights over virtual land, in-world games, avatar clothes, etc.;
  3. they also need to convert those creations into real world capital and wealth.

Online virtual worlds need a system of incentives and symbolic currencies to propel them. The software tools to create and program virtual content are readily available but the legal systems need to be refined for online environments to protect property rights both within the virtual sphere and outside it.

Player-created content was not entirely new to virtual environments. id Software, a small Texas-based company, used the ego-centric perspective to create the first-person shooter (FPS) game, Wolfenstein, in May of 1991. id followed with the extraordinarily successful DOOM in December 1994. DOOM combined a shareware business model with the distribution capabilities of the emerging Internet. Just two months after Netscape introduced its first browser as freeware over the Web, DOOM enthusiasts by the droves were downloading the game by FTP to their PCs, many of them with just a 14.4 kb modem. In a prescient move, id decided to make DOOM’s source code available to its users. Making the code available allowed new modifications to the game called “mods.”

This innovation allowed their fans to create their own 2.5D (not quite 3-D) levels and distribute them to other players. A popular one involved using the characters from the Simpsons’ animated TV show running around the DOOM environment. Homer Simpson was able to renew his health by finding and eating donuts. The US military created a version called Marine DOOM designed to introduce soldiers to urban fighting and the idea of killing. Many of the company’s new employees were recruited because of the excellence of their mods, and the extra help allowed them to create the next stage of their innovative online gameplay, QUAKE.

Second Life was born in June 2003 and offered users the ability to create content using built-in tools. They could develop objects and give them scripted behaviors (i.e., a tree and its leaves swaying in the wind). They could create their own avatar (representation of themselves or an entirely fictitious persona) and architectural structures. They could buy and sell land and any other objects they made because they had an in-world currency and sought to protect intellectual property. Some 99% of the new world was user-created, and no permits, pre-approval processes, or separate submission were required. The key was the ability to perform transactions and maintain property rights.

It will be interesting to watch these dystopian virtual worlds emerge. Gibson used the motif of “the biz” to refer to the dangerous circulations of various currencies in his cyberspace trilogy, both online and in the gritty urbanscape where natural bodies existed. But virtual markets for currency exchanges had existed since at least the 1970s when Reuters introduced its Money Monitor Rates.

We’ve been living in this online/offline world for a while. Databases and spreadsheets structure the “real” world, but we don’t often perceive the changes or attribute causality to online dynamics. Amazon’s impact on retailing is one of the more pronounced effects, but you must go to the mall or see a local store close to conceptualize its effects in the offline world. Amazon excels in its offline infrastructure, but its online capabilities’ integration gives it a special power. Big data collection and search, recommendation algorithms, one-click payment capabilities (licensed from Apple), combined with its delivery information and extensive logistics and warehouse system, give it massive economic power. These trends suggest that the Metaverse, or Nvidia’s Omniverse, will have synergistic economic effects in the offline world.

The dynamism of virtual worlds will depend on the ability of participants to communicate, collaborate and sell items to each other for in-game virtual currency or barter effectively for such things. This market environment will require a legal framework and rules for purchasing and owning in-game items and properties. Converting virtual currencies for real-world currencies and vice-versa are also crucial in the dystopic economies of the metaverse vision.

The type of personal interactions via avatars are what makes the metaverse intriguing, and controversial. Second Life ultimately wasn’t that impressive because people were just walking around in their avatar “costumes” most of the time and wound up insulting or hitting on people with sexual innuendos. I think successful participation will be a matter of how these environments and interactions are organized. Multiplayer games illicit a lot of “trash talk,” but they are structured around the gameplay. Productive online places might need to have dress codes and other parameters for behavior, depending on their purpose.

Ironically, it was Facebook (and the digital camera) that largely displaced Second Life. People quickly became bored of living through avatars in a world of impersonal, jerky, low-resolution graphics. Second Life became a sort of continuous online Halloween party with people hidden in costumes and behind constructed facial and body facades. Instead, people gravitated to Facebook and then Instagram because they preferred a representational style that was closer to real-life. They wanted to post pictures of friends and family, and of course, their cats, dogs, and dinner foods. They wanted to construct stories of themselves and share memes and narratives about what they found funny and important in the world.

So are people ready for the Ready Player One universe? That remains to be seen.

Citation APA (7th Edition)

Pennings, A.J. (2021, Oct 31) Building Dystopian Economies in Facebook’s Metaverse https://apennings.com/meaningful_play/dystopian-economies-in-facebooks-metaverse/

Share

Notes

[1] Gibson, W. (1984) Neuromancer. New York: Ace Books.
[2] Goux, J. (1990) Symbolic Economies. Ithaca: Cornell University Press).
[3] Ondrejka, Cory R., Escaping the Gilded Cage: User Created Content and Building the Metaverse. Available at SSRN: https://ssrn.com/abstract=538362
[4] Soto, Hernando de, (2000) The Mystery of Capital : Why Capitalism Triumphs in the West and Fails Everywhere Else. New York: Basic Books.

© ALL RIGHTS RESERVED

AnthonybwAnthony J. Pennings, PhD is a Professor at the State University of New York, Korea. Previously, he taught at St. Edwards University in Austin, Texas and was on the faculty of New York University from 2002-2012. He has been examining the emergence of digital money and monetary policy since he wrote his Masters thesis on telecommunications and banking deregulation and how it led to the “Third World Debt Crisis” in the early 1980s.

Hypertext, Ad Inventory, and the Use of Behavioral Data

Posted on | October 14, 2021 | No Comments

Artificial Intelligence (AI) and the collection of “big data” are quickly transforming from technical and economic challenges to governance and political problems. This post discusses how the World Wide Web (WWW) protocols became the foundation for new advertising techniques based initially on hypertext coding and online auction systems. It also discusses how the digital ad economy became the basis of a new means of economic production based on the wide-scale collection of data and its processing into extrapolation products and recommendation engines that influence and guide user behaviors.

As Shoshana Zuboff points out in her book, Surveillance Capitalism (2019), the economy expands by finding new things to commodify, to make into products or services that can be sold.[1] When the Internet was opened to commercial traffic in the early 1990s and the World Wide Web established the protocols for hypertext and webpages, a dramatic increase in content and ad space became available. New virtual “worlds” of online real estate emerged. These digital media spaces were made profitable by placing digitized ads on them.

Then, search engines emerged that commodified popular search terms for advertising and also began to produce extraordinary amounts of new data to improve internal services and monitor customer behaviors. Data was increasingly turned into prediction products for e-commerce and social entertainment. Much of the data is collected via advertising processes, but also purchasing behaviors and general sentiment analysis based on all the online activity that can be effectively monitored and registered. The result is a systemic expansion of a new system of wealth accumulation that is dramatically changing the conditions of the prevailing political economy.

The Internet’s Killer App

The World Wide Web was the “killer app” of the Internet and became central to the modern economy’s advertising, data collection, e-commerce, and search industries. Killer apps are computer applications that make the technology worth purchasing. Mosaic, Netscape, Internet Explorer, Firefox, Opera, Chrome were the main browsers for the WWW that turned Internet activities into popular and sometimes profitable pastimes.

In addition, computer languages made the WWW malleable. Markup languages like HTML were utilized to display text, hypertext links, and digital images on web pages. Programming languages like JavaScript, Java, Python, and others made web pages dynamic. First by working with the browser and then servers that could determine the assembly and content of a web page, including where to place advertisements.

Hypertext and the Link Economy

The World Wide Web actualized the dream of hypertext, linking a “multiverse” of documents long theorized by computer visionaries such as Vannevar Bush and Ted Nelson. Hypertext provides digital documents with links to other computer resources. What emerged from these innovations was the link economy and the meticulous collection and tracking of information based on the words, numbers, graphics or images what that people “clicked.”

Apple’s HyperCard in the late 1980s created documents with “hot buttons” that could access other documents within that Apple Macintosh computer. Tim Berners-Lee at CERN used one of Steve Jobs’ Next Computers to create the hypertext environment grafted on the Internet to become the World Wide Web. The HyperText Transfer Protocol (HTTP) allowed links in a cyber document on a web browser to retrieve information from anywhere on the Internet, thus the term World Wide Web.

The “click” within the WWW is an action with a finger on a mouse or scratchpad that initiates a computer request for information from a remote server. For example, online advertising entices a user to click on a banner to an advertiser’s website. The ability to point and click to retrieve a specific information source created an opportunity to produce data trails that could be registered and analyzed for additional value. This information could be used for quality improvement and also probabilities of future behaviors

All these new websites, called “publishers” by the ad industry, contained the potential for “impressions” – spaces on the website that contained code that called to an ad server to place a banner ad on the website. The banner presented the brand and allowed visitors to click on the ad to go to a designated site. Over the years, this process became quite automated.

Ad Metrics

When a web page retrieves and displays an ad, it is called an impression. Cost per impression (CPM) is one monetization strategy that measures an advertiser’s costs when their ad is shown. It is based on the number of times the ad is called to the site per one thousand impressions. Online ads have undergone a bit of a resurgence because they do more for branding than previously recognized.

A somewhat different strategy is based on the click-through rate or CTR. In the advertising world, CTR is a fundamental metric. It is the number of clicks that a link receives divided by the number of times the ad is shown:

clicks ÷ impressions x 100 = CTR

For example, if an ad has 1,000 impressions and five clicks, then your CTR would be 0.5%. A high CTR is a good indication that users find your ads intriguing enough to click. Averages closer to 0.2 or 0.3 percent are considered quite successful as banner popularity has decreased.

The Monetization of Search

An advertiser can also pay the publisher when they specifically drive traffic to a website. This is called Pay-per-click (PPC) or cost per click (CPC). PPC is now used by search engines as well as some website publishers.

PPC can be traced to 1996 when Planet Oasis launched the first pay-per-click advertising campaign. A year later, the Yahoo! search engine and hundreds of other content providers began using PPC as a marketing strategy. Pricing was based on a flat-rate cost per click ranging from $0.005 to $0.25. Companies vied for the prime locations on host websites that attracted the most web traffic. As competition increased for preferred online ad spaces, the click-based payment system needed a way to arbitrate the advertisers’ interest.

This led to the first auction systems based on PPC. A company called Overture.com was created at Idealabs, a Pasadena-based incubator run by Bill Gross. Later called GoTo.com, they launched the first online auction system for search in 1998.

Gross thought the concept of Yellow Pages could be applied to search engines. These large books were significant money makers for telephone companies. Businesses would pay to have their names and telephone numbers listed or purchase an ad listed under a category like bookstore, car insurance, or plumber.

Many words entered into online searches were also strongly connected to commercial activities and potential purchases. Therefore, it made sense that advertisers might pay to divert a keyword search to their proprietary websites. How much they would pay was the question.

Overture.com’s real-time keyword bidding system paid online publishers a specific price each time their link was clicked. They even developed an online marketplace so advertisers could bid against one another for better placement. They started with clicks worth only 1 cent but planning that valuable keywords would be worth far more. They invented PPC to emphasize that it was more important that the link be clicked than seen. By the end of the dot.com bubble in 2001, Overture was making a quarter of a billion dollars a year.

The tech recession in the early 2000s put new pressures on Internet companies to develop viable revenue models. Google had developed the best search engine with its PageRank system but wasn’t making enough money to cover its costs. PageRank ordered search results based on how many valid websites linked to a website. So a company like Panasonic would have many valid sites connected to them. Sites that attracted other search engines just because they listed the names of major companies would not get the same priority as with Google. But good search did not mean good profits.

The dominant strategy at the time was to build a portal to other sites. People would come to the website for the content, and the banner ads would provide revenues. Companies would license search capabilities from DEC’s AltaVista or Inktomi and build content around it. This is how companies like HotBot and Yahoo! progressed. So it was a mystifying surprise when Google rolled out its website with no content or banners. Just a logo with an empty form line for entering search terms.

Informed by Overture, Google rolled out a new advertising model called AdWords in late 2000. Initially a CPM (Cost-per-thousand-impressions) model, it developed into a subscription model that allowed Google to manage marketing campaigns. Then, in 2002, a revamped AdWords Select incorporated PPC advertising with an auction-based system based on the work at Idealabs.

Overture sued Google for infringement of their intellectual property but eventually settled. They had changed their name to Goto.com and were acquired by Yahoo! At Goto.com, advertisers “bid” against each other to be ranked high for popular words. When someone searches and clicks on a word like “insurance,” the sites for the highest bidders will appear according to the highest bids. They also automated the subscriber account process. A settlement was agreed to for millions of Google shares in exchange for intellectual property rights to their bidding and pay-per-click and systems. The move marked an offshoot of the digital ad economy. Emerging powerfully with keyword search and auctioning, and combined with MapReduce and Hadoop-driven “big data” processing, Google’s AdWords became an immediate revenue driver.

How Does the AdWords Auction Work?

From Visually.

Google also bought YouTube in 2006 and eventually created a new ad market for streaming videos. They used a new advertising product called AdSense that was offered in 2003 after Google acquired Applied Semantics. AdSense served advertisements based on site content and audience. It placed ads around or on the video based on what it sensed the content was about. Monetization depended on the type of ad, the cost of views or CPM, and the number of views.

Using Behavioral Data

Facebook’s social media platform started its ascent in 2005, but it also needed a way to monetize its content. It first focused on gathering users and building its capital base. That it used, in part, to acquire several companies for their technical base, such as the news-gatherer FriendFeed. By 2009, it had determined that advertising and data-gathering would necessarily be its profit-making strategy with Facebook Ads and Pages.

Facebook started as a more traditional advertising medium, at least conceptually. It would provide content designed to capture the user’s awareness and time, and then sell that attention to advertisers. Advertising had always merged creativity and metrics to build its business model. Facebook capitalized on the economies of the user-generated content model (UGC) and added user feedback experiences such as the “like” button. Also, sharing and space for comments to provided a more interactive experience, i.e., adding dopamine hits.

Facebook had the tools and capital to build an even more elaborate data capturing and analysis system. They started to integrate news provided via various feeders using coding techniques and XML components to move beyond just a users’ friends’ content. Facebook built EdgeRank, an algorithm that decided which stories appeared in each user’s newsfeed. It used hundreds of parameters to determine what would show up at the top of the user’s newsfeed based on their clicking, commenting, liking, sharing, tagging, and, of course, friending.

Facebook then moved to more dynamic machine learning-based algorithms. In addition to the Affinity, Weight, and Time Decay metrics that were central to EdgeRank, some 100,000 individual weights were factored into the new algorithms. Facebook began using what we can call artificial intelligence to curate the pictures, videos, and news that users visitors saw. This aggressive curation has raised concerns and increased scrutiny of Facebook and its algorithms’ impact on teens, democracy, and society.

Frances Haugen, a former Facebook employee testified in October 2021 to Congress about the potential dangers of Facebook’s algorithms. Legal protections allowed her to present thousands of pages of data from Facebook research.[2] The new scrutiny has raised questions about how much Facebook, and other platforms like it, can operate opaque “black box” AI systems outside of regulatory oversight.

Summary

This post discussed how the hypertext protocols created an opportunity to gather useful data for advertisers and also became money makers for web publishers and search engines. The Internet and the World Wide Web established the protocols for hypertext and webpages allowing for a dramatic increase in content to be made available and with it, ad space. The web’s click economy not only allowed users to “surf” the net but collected information on those activities to be tallied and processed by artificial intelligence.

Subsequently, information on human actions, emotions, and sentiments were technologically mined as part of a new means of economic production and wealth accumulation based on advanced algorithmic and data science techniques used to gather and utilize behavioral data to predict and groom user behaviors.

Citation APA (7th Edition)

Pennings, A.J. (2021, Oct 14). Hypertext, Ad Inventory, and the Use of Behavioral Data. apennings.com https://apennings.com/global-e-commerce/hypertext-ad-inventory-and-the-production-of-behavioral-data/

Notes

[1] Zuboff, S. (2019) The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power.

[2] Legal protections based on federal laws including the Dodd-Frank Act, a 2010 Wall Street reform law, and the Sarbanes-Oxley Act, a 2002 legal reaction to the Enron scandal give some protections to corporate “whistleblowers.”

Share

© ALL RIGHTS RESERVED



AnthonybwAnthony J. Pennings, Ph.D. is Professor at the Department of Technology and Society, State University of New York, Korea. From 2002-2012 he was on the faculty of New York University where he taught economics of media, and a course on New Technologies in Advertising and PR. He keeps his American home in Austin, Texas and has taught in the Digital Media MBA program at St. Edwards University He joyfully spent 9 years at the East-West Center in Honolulu, Hawaii.

The North-South Politics of Global News Flows

Posted on | October 3, 2021 | No Comments

“Free flow was at once an eloquent democratic principle and an aggressive trade position on behalf of US media interests.”
– Herman, E.S., and McChesney, R. W., The Global Media [1]

The “free-flow” of transborder news and data communications became a hot topic for international governance and politics in the 1970s after the US went off the global gold standard. It was the dawning of a new age of digital monetarism. Freeing the flow of capital from the constraints of individual nation-states (including the US since the New Deal) was one of the foremost global issues of the Reagan Administration in the 1980s, and news became a contentious part of the process. Major areas of disagreement emerged between the South’s Non-Aligned Movement (NAM) and the North (Group of 5) that would shape the future of the global economy.

This research summarizes and discusses the globalization of capital movement and the information and news that lubricates its transactional systems. An international information divide, literally a divide by national boundaries, needed to be transcended for this globalization to work. I examine the perspective of what has been called the “South” – the countries that inhabit the southern hemisphere (except for Australia and New Zealand) and their historic struggles with the more developed “North.” These countries organized into a ninety-member Non-Aligned Movement (NAM) and subsequently began to attack what they considered a new type of “neo-colonialism.” While quite different, almost all these countries were concerned about corporate power’s growing strength and influence for the First World “North” countries.[2]

Governments became increasingly concerned that the computerized society with its international data flows could affect its citizens and interfere with national security, cultural sovereignty, and economic success. One of the concerns was exemplified by the debates over what was called “Transborder Data Flow” (TDF).[3] TDF was first used in discussions on privacy protection by the OECD in June of 1974. Then in a subsequent OECD seminar in 1977, the definition expanded to include nonpersonal information. South countries also expressed concerns about social and cultural information flowing in from developed countries. In contrast, news about their countries often focused on natural disasters, political instability, and other topics that did not show them in a positive light.

The South called for both a New International Economic Order (NIEO) and a New World Information Order (NWIO), which would provide a collective voice and address these issues. Galtung and Vincent listed the NIEO’s five basic points. The first was better terms of trade for the Third World. Countries of the South wanted improved and/or decreased trade with the countries of the North. Tariffs and other restrictions in the First and Second Worlds were a significant concern, as was the tendency for the South to export raw materials to the North. In contrast, the opposite flow of trade tended to be value-added products such as cars, processed foods, military arms, and electronics. Second, South countries wanted more control over productive assets in their own countries. Capital, nature, labor, technology, and management of foreign corporate branches tended to elude local concerns.[4]

These countries wanted to set up locally controlled industries leading to “import-substitution,” replacing foreign-produced products with those made within the nation. South countries also wanted more Third World interaction. This meant increased South-South trade and economic/technical cooperation between developing countries. Fourth, they also wanted more Third World counter-penetration such as financial investment in “rich” countries. Lastly, they wanted more Third World influence in world economic institutions, such as the World Bank, the IMF, and UNCTAD, as well as in the policies and activities of transnational corporations. In 1974, the NIEO was adopted by a special session of United Nations General Assembly.

These concerns were followed up by calls for a “New World Information and Communication Order” (NWICO), an important but largely rhetorical attack on the global news media, particularly the newswires like Associated Press. In 1976, UNESCO (United Nations Economic, Social, and Cultural Organization) established what later became known as the MacBride Commission, after its chair, Sean MacBride, from Ireland. The commission was charged with studying global communications. The commission’s report, Many Voices, One World (MacBride Commission 1980/2004), outlined the main international problems in communication and summarized NWICO’s primary philosophical thrust. Two years later, UNESCO passed the Mass Media Declaration that spelled out the ethical and professional obligations of the mass media and its journalists. After the MacBride Commission “vaguely” endorsed the NWICO in 1980, UNESCO passed a resolution calling for the elimination of international media imbalances and stressing the importance of news serving national development.[5]

These issues are relevant because they foreshadowed problems inherent in the internationalization of the Internet. They are also indicative of the increasing tensions building between the two as the North attempted to use the “Third World debt crisis” to institute a set of structural reforms designed to open these countries to the flows of money-capital, data processing, and finance related news. Going off gold and the oil crises in the 1970s resulted in most of these countries going heavily into debt. This left them vulnerable to pressure by the North. The Reaganomic response was swift and effective.

The MacBride Report reflected UNESCO’s traditional concerns with the “free flow” of information and calls for a “plurality” of communication channels, but it was released at a time when the new Reagan and Thatcher governments were setting out their own agendas for an international order of communications and capital flows. In the wake of international money’s new demands for information and news, they wanted to maintain a strong neoliberal stance on international communication. Despite strong international opposition, the US redrew from UNESCO and stopped paying membership dues to the United Nations.

But the primary strategy was a structural adjustment of domestic economies to open them up to money-capital and news. By making additional lending subject to the scrutiny of the International Monetary Fund (IMF), the North pressured the South to liberalize their economies and protect the free flow of information moving through their borders. Thus, in conjunction with the financial industry’s need for international data communications, the debt crisis allowed the North to pave the way for the globalization of news and, eventually, the Internet.

Consequently, the main thrust of this research argues that the road for the international Internet and e-commerce was substantially paved by the attempts to free up the global flows of financial news and information needed for the new regime of digital monetarism. Share markets were opened to international investments, and governments were pressured to privatize public utilities and other government assets. A new era of spreadsheet capitalization was emerging that allowed for inventorying and valuing of assets. Turning these assets into tradeable securities was heavily reliant on information and news flows. News became a contentious issue during the 1970s, especially for the “Third World,” which tied it to other issues of economic and informational importance.

This post argues that international flows of information and news were substantially altered in the late 1970s and early 1980s. Freeing the flow of capital from the constraints of individual nation-states (including the US government) was the foremost international issue of the Reagan Administration outside of the Cold War. The securitization of assets required information and news to adequately price and sell on global sharemarkets. Reagan’s tax cuts became the new foreign aid as the US deindustrialized, and capital flows created a global system of digital finance supply chains. By the 1990s, the digital global system had entrenched itself, and a condition of pan-capitalism developed, with South countries becoming “emerging markets” in the global order.[6]

Notes

[1] Herman, E.S., and McChesney, R. W. (1997) The Global Media: The New Missionaries of Global Capitalism. London: Cassell. p. 17.
[2] Chilote, R.H. (1984) Theories of Development and Underdevelopment. Boulder, CO: Westview Press.
[3] R. Turn, “An Overview of Transborder Data Flow Issues,” in null, Oakland, CA, USA, 1980 pp. 3-3.doi: 10.1109/SP.1980.10010
https://doi.ieeecomputersociety.org/10.1109/SP.1980.10010
[4] Galtung, J. and Vincent, R. (1992) Global Glasnost: Towards a New World Information and Communication Order. NJ: Hampton Press.
[5] Jussawalla, M. (1981) Bridging Global Barriers: Two New International Orders. Papers of the East-West Communications Institute. Honolulu, Hawaii.
[6] Tehranian, M. (1999) Global Communication and World Politics: Domination, Development, and Discourse. Boulder, CO: Lynne Rienner Publishers. p. 83.

Ⓒ ALL RIGHTS RESERVED



AnthonybwAnthony J. Pennings, PhD is Professor at the Department of Technology and Society, State University of New York, Korea. Originally from New York, he started his academic career Victoria University in Wellington, New Zealand before returning to New York to teach at Marist College and spending most of his career at New York University. He has also spent time at the East-West Center in Honolulu, Hawaii. When not in the Republic of Korea, he lives in Austin, Texas.

ARPA and the Formation of the Modern Computer Industry, Part 2: Memex, Personal Computing, and the NSF

Posted on | September 26, 2021 | No Comments

With World War II winding down, President Roosevelt asked Vannevar Bush, his “czar” of all federally funded scientific research, for a set of recommendations on the application of the lessons learned during the war. The President was particularly interested in how the scientific and technological advances achieved in the war effort could improve issues like national employment, the creation of new industries, and the health of the nation’s population. This post looks at Bush’s contribution to the formation of the National Science Foundation and computing developments that lead to interactivity and networking.

Bush managed the Office of Scientific Research and Development under Roosevelt and later became President Truman’s science advisor. While not actually stationed in New Mexico, Bush had the overall supervisory responsibility for building the first atomic bomb and was uniquely positioned to understand the new technologies and scientific advances coming out of the war. As a result, Bush took up the President’s challenge and wrote two articles that would have far-reaching consequences.

Bush’s articles provided the rationale for funding a wide range of technological and scientific activities and inspired a new generation of researchers. His first written response, “Science, the Endless Frontier,” led to the formation of the National Science Foundation (NSF). The NSF provided widespread funding for scientific and technological research throughout the country’s universities and research institutes.[1] In the mid-1980s, it would take control of the non-military part of the ARPANET and link up supercomputing centers in response to the Japanese economic-technological threat. The NSFNET, as it was called, would also standardize the TCP/IP protocols and lead to the modern Internet.

Bush’s second response, “As We May Think,” was published in the Atlantic Monthly in July 1945, just a few months after Hitler committed suicide and a month before Bush’s atomic bombs were dropped on Japan. The article received lukewarm attention at first, but it persisted and inspired many people, including J.C.R. Licklider, who pursued a vision of computing interactivity and communications based on Bush’s ideas.

In a war that increasingly turned to science and technology to provide the ultimate advantage, Bush’s responsibilities were crucial to the outcome of World War II. These burdens also placed him in a troublesome position of needing to read, digest and organize an enormous amount of new scientific information. This responsibility led him to develop and forward the idea of an information technology device known as the “memex,” something he had been working on in the late 1930s while he was a professor and the Vice-President of MIT.[2]

The memex is arguably the model for the personal computer and was a distinct vision of man-machine interactivity that motivated Licklider’s interest in time-sharing technologies and networking. Bush’s conception of a new device aimed at organizing and storing information at a personal level led to a trajectory of government-sponsored research projects that aimed to realize his vision. In 1960, Licklider, a lecturer at MIT, published “Man-Computer Symbiosis,” a theoretical article on real-time interactive computing. [3] Licklider, a psychologist by training, later moved to Department of Defense’s Advanced Research Projects Agency (ARPA) in 1962 to become the first director of its Information Processing Techniques Office (IPTO).

It was the intersection of his vision with the momentum of the Cold War that led to the fruition of Bush’s ideas, largely through the work of Licklider. The first timesharing systems were constructed at MIT with funding from ARPA, as well as the Office of Naval Research. Constructed over the years 1959 to 1962, these efforts led to a working model called Compatible Time-Sharing System (CTSS). Using the new IBM 7090 and 7094 computers, CTSS proved that the time-sharing concept could work, even though it only linked three computers.

The military later supplied MIT with a $3 million grant to develop man-machine interfaces. By 1963 Project MAC, as it was called, connected some 160 typewriter consoles throughout the campus and in some faculty homes with up to 30 users active at any one time. It allowed for simple calculations, programming and eventually what became known as word processing. In 1963 the project was refunded and expanded into a larger system called MULTICS (Multiplexed Information and Computing Service) with Bell Labs also collaborating in the research. MULTICS demonstrated the capacity to handle 40-50 users and use cathode ray tube (CRT) graphic devices, and accommodate users that were not professional programmers.[4]

As the cases of computing and timesharing show, the military-industrial tie drove early computing developments and created the foundation for the Internet to emerge. Funding for a permanent war economy introduced the information-processing regime to the modern world. In conjunction with research institutes like MIT, MITRE, and RAND, and corporations such IBM, GE, as well as the Bell System, IT got its start.

Licklider’s notion of an “Inter-Galactic Computer Network” began to circulate as a vague idea through a like-minded group of computer scientists who were beginning to see the potential of connected computers. The IPTO was beginning to seed the literal invention of computer science as a discipline and its establishment in universities around the country. In Licklider’s memo of April 25, 1963, he addressed the “members and affiliates” of the network that had coalesced around his vision, and the money of ARPA. His concern was that computers should be able to communicate with each other easily and provide information on demand. The project was posed in terms of cross-cultural communications. The concept helped ARPA change its focus from what went on inside the computer to what went on between computers.

The technology was not quite there yet but the expertise was coming together that would change computing and data communications forever. Using military money Licklider began the support of actual projects to create computer technologies that expanded Bush’s vision. A little-known corporation called Bolt, Beranek, and Newman (BBN) was one of the most significant to come out of a new complex of agencies and companies working on computing projects. The bond between this small corporation, MIT, and ARPA produced a packet-switched network that became the precursor to today’s modern Internet.

In conjunction with the National Science Foundation, ARPA pursued human-computer interactivity and subsidized the creation of computer science departments throughout the country. It funded time-sharing projects and funded the first packet-switching technology and would be the foundational technology of the Internet.

Notes

[1] Bush stayed with the government throughout the 1940s directing science funding and then becoming the first head of the National Science Foundation after it was established in 1950.
[2] Information on Bush’s early conception of the memex from M. Mitchell Waldrop’s (2001) The Dream Machine: J.C.R. Licklider and the Revolution that Made Computing Personal. New York: The Penguin Group. Particularly useful is the second chapter that focuses on Bush.
[3] Licklider, J.C.R (1960) “Man-Machine Symbiosis,” IRE TRANSACTIONS ON HUMAN FACTORS IN ELECTRONICS. March.
[4] Denicoff, M. (1979) “Sophisticated Software: The Road to Science and Utopia,” in Dertouzos, M.L. and Moses, J.(1979) The Computer Age: A Twenty Year View. Cambridge, Massachusetts: The MIT Press. p. 370-74.

Share

© ALL RIGHTS RESERVED



AnthonybwAnthony J. Pennings, PhD is a Professor at the Department of Technology and Society, State University of New York, Korea. Before joining SUNY, he taught at St. Edwards University in Austin, Texas. His first academic job was at Victoria University in Wellington, New Zealand. Most of his career was at New York University. He has also spent time as a Fellow at the East-West Center in Honolulu, Hawaii at also supported his Ph.D.

Engineering the Politics of TCP/IP and the Enabling Framework of the Internet

Posted on | September 22, 2021 | No Comments

The Internet was designed with a particular architecture – an open system that would accept any computer and connect it to any other computer. A set of data networking protocols allowed any application on any device to communicate through the network to another application on another device. Email, web files, text messages, and data from sensors could be sent quickly over the Internet without using significant power or other resources from the device. The technical “architecture” of the Internet was designed to empower the network’s edges – the users and their hardware. Its power has been borne out as those edges are no longer just large mainframes and supercomputers but continued to incorporate new devices like PCs, laptops, smartphones, and the tiniest of sensors in the emerging Internet of Things (IoT).

This post explores the “political engineering” of the Internet protocols and the subsequent policy framework for a national and global data communications network that empowered users and created an open environment for competition, social interaction, and innovation. This system has been challenged over the years by programmatic advertising, oligopolistic ISPs, security breaches, and social media. But it’s still a powerful communications system that has changed commerce, entertainment, and politics worldwide.

The Power of Protocols

What gives communicative power to the Internet’s architecture are the protocols that shape the flows of data. With acronyms like TCP, IMAP, SMTP, HTTP, FTP, as well as UDP, BGP, and IP, these protocols formed the new data networks that would slowly become the dominant venue for social participation, e-commerce, and entertainment. These protocols were largely based on a certain philosophy – that computer hosts should talk to computer hosts, that networks were unreliable and prone to failure, and that hosts should confirm with other hosts that the information was passed to them successfully. The “TCP/IP suite” of protocols emerged to enact this philosophy and propel the development of the Internet.[1]

TCP/IP protocols allow packets of data to move from application to application, or from web “clients” to “servers” and back again. They gather content such as keystrokes from an application and package them for transport through the network. Computer devices use TCP to turn information into packets of data – 1s and 0s – sent independently through the web using Internet Protocol. Each packet has the address of its destination, the source of origination, and the “payload,” such as part of an email or video.

The nodes in the network “route” the packets to the computer where they are headed. Destinations have an IP address that are included in routing tables that are regularly updated in routers on the Internet. This involves some “handshaking” and acknowledging the connections and packets received between what we have been calling alternatively the edges/devices/hosts/applications/processes.

More specifically, a “process” on an application on one device talks to a “process” on an application on another device. So, for example, a text application like Kakao, Line, WhatsApp, or WeChat communicates to the same application on another device. Working with the device’s operating system, TCP takes data from the application and sends it into the Internet.

There, it gets directed through network routers to its final destination. The data is checked on the other side, and if mistakes are found, it requests the data be sent again. IMAP and SMTP retrieve and move email messages through the Internet, and most people will recognize HTTP (Hypertext Transfer Protocol) from accessing web pages. This protocol requests a file from a distant server, sets up a connection, and then terminates that connection when the files download successfully. Connecting quickly to a far off resource, sometimes internationally, and being able to sever the link when finished is one of the features that makes the web so successful.

HTTP is at the center of what has been called the World Wide Web (WWW). Mostly called the ‘web” these days, it combined the server with the “browser” to provide a powerful new utility – the website. Hypertext Markup Language (HTML) enabled the browser to present text and images on a 2-D color screen. The WWW empowered the “dot.com” era and allowed many people to develop computer skills to produce websites. Every organization had to have an online “presence” to remain viable, and new organizations were started to take advantage of the fantastic reach of the web. Soon, server-side software empowered a myriad of new possibilities on the net, including browser-based email, e-commerce, search, and social media.

Devices connect or “access” an Internet Service Provider (ISP), either from a home, school, or Wi-Fi connections at a café or public network in a train or park. Mobile subscriptions allow access to a wireless cell tower with a device antenna and SIM card. Satellite service is becoming more available, primarily through HughesNet, ViaSat, and increasingly SpaceX’s Starlink as more low-orbit satellites are launched. Starlink is teaming up with T-Mobile in the US to connect a smartphone directly to the low-orbit satellite network.

Physical media make a difference in good Internet access by providing the material access to the ISP. Various types of wires and fiber optic cables or combinations provide the critical “last mile” connection from the campus, home premise, or enterprise. Ethernet connections or wireless routers connect to a modem and router from your cable company or telco ISP to start and end communication with the edge devices.

Conceptually, the Internet has been divided into layers, sometimes referred to as the protocol stack. These are:

    Application
    Transport
    Network
    Link
    and Physical layers.

The Internet layers schematic survived the Open Systems Interconnection (OSI) model with a more efficient representation that simplified the process of developing applications. Layers help conceptualize the Internet’s architecture for instruction, service and innovation. They visualize the services that one layer of the Internet provides to another using the protocols and Application Programming Interfaces (APIs). They provide discrete modules that are distinct from the other levels and serve as a guideline for application development and network design and maintenance.

The Internet’s protocol stack makes creating new applications easier because the software that needs to be written only for the applications at the endpoints (client and server) and not for the network core infrastructure. Developers use APIs to connect to sockets, a doorway from the Application layer to the next layer of the Internet. Developers have some control of the socket interface software with buffers and variables but do not have to code for the network routers. The network is to remain neutral to the packets running through it.

The Network layer is where the Internet Protocol (IP) does its work. At this layer, the packets are repackaged or “encapsulated” into larger packets called datagrams. These also have an address on them that might look like 192.45.96.88. The computers and networks only use numerical names, so they need to use a Domain Name Service (DNS) if the address is an alphabetical name like apennings.com.

Large networks have many possible paths, and the router’s algorithms pick the best routes for the data to move them along to the receiving host. Cisco Systems became the dominant supplier of network routers during the 1990s.

Although the central principle of the Internet is the primacy of the end-to-end connection and verification – hosts talk to hosts and verify the successful movement of data, the movement of the data through the network is also critical. The network layer in the TCP/IP model transparently routes packets from a source device to a destination device. The job of the ISPs are to take the data encapsulated at transport and network and transport it – sometimes over long distances via microwave towers, fiber optic cables, or satellites. The term “net neutrality” has emerged to protect the end-to-end principle and restrict ISPs from interfering with the packets at the network layer. If ISPs are allowed to examine data from the Application layer, they could alter speed, pricing, or even content based on different protocols.

The diffusion of the TCP/IP protocol was not inevitable. Computer companies like IBM, Honeywell, and DEC developed their own proprietary data communications systems. Telecommunications companies had already established X.25 protocols for packet-switched data communications with X.75 gateway protocols used by international banks and other major companies. TCP looked like a long shot, but the military’s subsequent decisions in 1982 to mandate it and National Science Foundation’s NSFNET support secured momentum for TCP/IP. Then, in 1986, the Internet Advisory Board (IAB) began to promote TCP/IP standards with publications and vendor conferences about its features and advantages. By the time the NSFNET was decommissioned in 1995, the protocols were well established.

The Philosophy of TCP

The military began to conceptualize the decentralized network as part of its defense against nuclear attack in the early 1960s. Conceived primarily by Paul Baran at RAND, packet-switching was developed as way of moving communications around nodes in the network that were destroyed or rendered inoperable by attack. Packets could be routed around any part of the network that was congested or disabled. If packets going from San Francisco in California to New York City could not get through a node in Chicago, they could be routed around the Windy City through nodes in other cities. As networks were being considered for command and control operations they had to consider that eventually computers would not only be in fixed installations but in airplanes, mobile vehicles, and ships at sea. The Defense Advanced Research Projects Agency (DARPA) funded Vint Cerf and others to create what became the TCP and IP protocols to connect them.

The Internet was also informed by a “hacker ethic” that emerged at MIT in the late 1950s and early 1960s as computers moved away from punch-cards and began to “time-share” their resources. Early hacking stressed openness, decentralization, and sharing information. In addition, hackers championed merit, digital aesthetics, and the possibilities of computers in society. Ted Nelson’s Computer Lib/Dream Machines (1974) was influential as the computer world moved to California’s Silicon Valley.

The counter-culture movement, inspired by opposition to the Vietnam War was also important. Apple founders Steve Jobs and Wozniak were sympathetic to the movement, and their first invention was a “Bluebox” device to hack the telephone system. Shortly after, the Apple founders merged hacktivism with the entrepreneurial spirit as they emphasized personal empowerment through technology in developing the Apple II and Macintosh.

The term hackers has fallen out of favor because computers are so pervasive and people don’t like to be “hacked” and their private data stolen or vandalized. But the hacker movement that started with noble intentions and continues to be part of the web culture. [2]

Developing an Enabling Policy Framework

Although the Internet was birthed in the military and nurtured as an academic and research network, it was later commercialized with an intention to provide an enabling framework for economic growth, education, and new sources of news and social participation. The Clinton-Gore administration was looking for a strategy to revitalize the struggling economy. “It’s the Economy, Stupid” was their mantra in the 1992 campaign that defeated President George H. Bush and they needed to make good on the promise. Their early conceptualization as information highways framed them as infrastructure and earned the information and telecommunications sectors both government and private investment.

Initially, Vice-President Gore made the case for “information highways” as part of the National Information Infrastructure (NII) plan and encouraged government support to link up schools and universities around the US. He had been supporting similar projects as one of the “Atari Democrats” since the early 1980s, including the development of the NSFNET and the supercomputers it connected.

As part of the National Information Infrastructure (NII) plan, the US government handed over interconnection to four Network Access Points (NAPs) in different parts of the country. They contracted with big telecommunications companies to provide the backbone connections. These allowed ISPs to connect users to a national infrastructure and provide new e-business services, link classrooms, and electronic public squares for democratic debate.

The US took an aggressive stance in both controlling the development of the Internet and pressing that agenda around the world. After the election, Gore pushed the idea of the Global Information Infrastructure (GII) worldwide that was designed to encourage competition in both the US and globally. This offensive resulted in a significant decision by the World Trade Organization (WTO) that reduced tariffs on IT and network equipment. Later the WTO encouraged the breakup of national post and telegraph agencies (PTTs) that dominated national telecommunications systems. The Telecommunications Act of 1996 and the administration’s Framework for Global E-Commerce were additional key policy positions on Internet policy. The result of this process was essentially the global Internet structure that gives us relatively free international data, phone, and video service.

Summary

As Lotus and Electronic Freedom Frontier founder Mitch Kapor once said: “Architecture is politics”. He added, “The structure of a network itself, more than the regulations which govern its use, significantly determines what people can and cannot do.” The technical “architecture” of the Internet was primarily designed to empower the network’s edges – the users and their hardware. Its power has been borne out as those edges are no longer large mainframes and supercomputers but laptops, smartphones, and the tiniest of sensors in the emerging Internet of Things (IoT). Many of these devices have as much or more processing power than the computers the Internet was invented and developed on. The design of the Internet turned out to be a unique project in political engineering.

Citation APA (7th Edition)

Pennings, A.J. (2021, Sep 22). Engineering the Politics of TCP/IP and the Enabling Framework of the Internet. apennings.com. https://apennings.com/telecom-policy/engineering-tcp-ip-politics-and-the-enabling-framework-of-the-internet/

Notes

[1] Larsen, Rebekah (2012) “The Political Nature of TCP/IP,” Momentum: Vol. 1 : Iss. 1 , Article 20.
Available at: https://repository.upenn.edu/momentum/vol1/iss1/20

[2] Levy also described more specific hacker ethics and beliefs in chapter 2, Hackers: Heroes of the Computer Revolution. These include openness, decentralization, free access to computers, and world improvement and upholding democracy.

Ⓒ ALL RIGHTS RESERVED



AnthonybwAnthony J. Pennings, PhD is Professor at the Department of Technology and Society, State University of New York, Korea. Originally from New York, he started his academic career Victoria University in Wellington, New Zealand before returning to New York to teach at Marist College and spending most of his career at New York University. He has also spent time at the East-West Center in Honolulu, Hawaii. When not in the Republic of Korea, he lives in Austin, Texas.

« go backkeep looking »
  • Referencing this Material

    Copyrights apply to all materials on this blog but fair use conditions allow limited use of ideas and quotations. Please cite the permalinks of the articles/posts.
    Citing a post in APA style would look like:
    Pennings, A. (2015, April 17). Diffusion and the Five Characteristics of Innovation Adoption. Retrieved from https://apennings.com/characteristics-of-digital-media/diffusion-and-the-five-characteristics-of-innovation-adoption/
    MLA style citation would look like: "Diffusion and the Five Characteristics of Innovation Adoption." Anthony J. Pennings, PhD. Web. 18 June 2015. The date would be the day you accessed the information. View the Writing Criteria link at the top of this page to link to an online APA reference manual.

  • About Me

    Professor at State University of New York (SUNY) Korea since 2016. Moved to Austin, Texas in August 2012 to join the Digital Media Management program at St. Edwards University. Spent the previous decade on the faculty at New York University teaching and researching information systems, digital economics, and strategic communications.

    You can reach me at:

    apennings70@gmail.com
    anthony.pennings@sunykorea.ac.kr

    Follow apennings on Twitter

  • About me

  • Writings by Category

  • Flag Counter
  • Pages

  • Calendar

    February 2025
    M T W T F S S
     12
    3456789
    10111213141516
    17181920212223
    2425262728  
  • Disclaimer

    The opinions expressed here do not necessarily reflect the views of my employers, past or present.