Notes on Section 1: Living Data
Chapter 1.1 Beautiful Data
- (Fiction) The WWW changed in 2017 to (1) protect private living data and (2) improve the mood of the country. The Whisperer is new CumuLinker technology under evaluation in 2019. C-A-L-M (for “Conversation As Language Modulation” is a set of practices that introduce and accelerate productive interactions. The Whisperer is a wearable (like a vest) that can be artfully designed to communicate through the CumuLinker Cloud to express the wearer’s personality and interests, e.g. through life patches. Whisperers communicate to the wearer through synthetic speech and ear devices. The Whisperer can be programmed for animation or personal information, such as easily forgotten names. The theory that explains the history and ill effects that led to the CumuLinker Revolution is known as surveillance capitalism.
- Ada Byron Lovelace inspires modern women in computing with her Victorian era deed thinking. She lived a short life interacting with famous industrialist Charles Babbage. Often hyped as “the first programmer”, her thinking employs “representation” that foreshadows modern computing and mathematical knowledge that stimulated Babbage’s experiments. Her detailed analysis of Babbage’s Analytic Engine was written at age 26 while maintaining a growing family and without any acknowledged professional status.
- The IBM 1620 computer was simple enough to trust to an undergraduate for mathematical exploration and IT administration.
- IBM 1620 description …
- Autobiographical note) Hours and hours and hours at the 1620 console at Ohio Wesleyan University in the 1960s launched this author into the computing field. Learning Fortran and assembly code was one capability gained, but the lingering lesson was how to get through the period of muddled code while re-engineering a compiler. Every computing student should experience this practical growth and learn from failure and exhaustion as a foundation for team programming, software process, verification/validation, documentation, and other skills taught as “Software Engineering”. Coding is an athletic activity that reveals strengths and weaknesses and preferences and affinity with machines. In memory of Robert L. Wilson, Mathematics Department Chair, Ohio Wesleyan University, Delaware Ohio.
- “Spaghetti code” describes programs troubled by languages that forced control flow into and out of statements, making it hard to understand programs.
- Wikipedia on the Go To statement
- “considered harmful” gained status as a cliched describing other technical problems. “Wikipedia on ‘considered harmful’
- Casey faces a dilemma explaining antiquated programming concepts that nevertheless incited creative networked computing experiments. GOTO-infested programs using the BASIC language developed at Dartmouth spawned an early social network of contributing “computing citizens”, according to Joy Rankin book “Peoples History of Computing in the US”. Unfortunately, a male-dominated institution led to (FutureTense) origins of tech bros cultures. See also chapter 4 of Section 6 about phases of history of social computing.
- The Trickster mythological figure describes the US elected leader in the period of this novel in 2019.
- ‘Risk’ Is a theme of the novel and a central force in computing, as well as life in general.
- Terminology this novel tries to follow (from New Media Dictionary:
- A “threat” is An indication of impending danger or harm, also “to inflict” or the agent for harm”.
- “risk” means the possibility of suffering harm or loss.
- a “hazard” is a source or situation with potential for harm.
- Read more on risks and software failures in Threads (protected).
- “Threat-caster” is a professional and personal characteristic often associated with the mythological “Cassandra” which is protagonist Casey’s root name. ‘Wikipedia on book ‘Warnings’ by Richard Clarke describes incidents of threat-casting.
- Terminology this novel tries to follow (from New Media Dictionary:
Chapter 1.2Casual Algorithms
- (Fiction) CumuLinker does Life Replay” using purloined private data plus public available information to produce a chronology that reads as if written by a journalist. Events might focus on geography, profession, family, health, or other stories that fit the occasion. Life Replay can also be used for personal introspection, e.g. professional review or interactions with another specific person.
- Algorithmic cruelty” occurred in reality in 2014 when Facebook surprised a parent with his recently deceased child’s picture. Inc Facebook incident of algorithmic cruelty Facebook apologized for algorithmic cruelty.
Chapter 1.3 Colorful times
- Text contrast is an important aspect of accessibility for people with low vision. It applies to all visual readers controlled by settings usually embedded in schemes operating as CSS for (Cascading Style Sheets) in Browsers. The readability factors for text contrast are specified and can be validated according to Web standards. This vulnerability is an example of a messy Web and a culture of complexity that supports an industry of developers, now expanded by penetration testers and bug bounty handlers.
- Read more on accessibility and low vision in Chapter 6.3 and Threads (protected).
Chapter 1.4 Seeing Things Differently
- Sally and Casey became acquainted at a (Wikipedia) Fifth Generation conference in Japan.
- Read more on Consequential Reasoning in Threads (protected).
- Sally’s loss of vision leads to standard practices learned as “vision rehabilitation”. She has written a manifesto for accessibility and maintains a blog remarkably like this author’s early experience. “As Your World Changes blog (Autobiographical)
- The Apple iPhone is the primary communication, reading, gaming, and translating instrument for many people with low vision and enough $$$. AppleVis.com tutorials and tips on using iPhones with VoiceOver speech and magnification
- (Fiction) Casey has been invited for a special role under the Science Frontiers funding program. This is modeled after the National Science Foundation where a dozen researchers discuss, rate, and summarize submitted proposals and budgets. “Scientific Merit” and “Social contribution” and “Diversity” are traditional criteria. It is assumed that killer problems will be solved eventually or cast into a different scientific program. Negativity, as in “should never be used” or “cannot be verified” or “will introduce hazards” or “was done 20 years ago” are not included in recommendations that might reduce overall funding among competitive programs. Risks and threats could be assimilated into the review process. (autobiographical) Or, so, it seemed to this reviewer until 2010. Funding for social, possibly negative, consequences had separate sources including nonprofit’s and other foundations.
- “Endless frontier” described by Vannevar Bush defined a long-term approach to science research.
- “As We May Think” (Atlantic magazine, 1945) portrays a dream machine, Memex, for well structured research management yet to be achieved.
- A counter-example to threat aversion is NSF-funded CyberPhysical Systems about (Wikipedia) on Cyber-physical system.
- (Fiction) The Pink Pages Rampage actions is discussed further in Section 6through podcast-style interviews. CumuLinker Reformation riled up beneficiaries of surveillance capitalism, especially Silicon Valley employees. A protest is organized through the dark side of software and a specific vulnerability in web page design.
Chapter 1.5 Lessons Learning
- Here is a summary of preceding Chapters and the protagonist’s planning for the following journey.
Notes on Section 2 “Threats Get Real”
Chapter 2.1 Risky Speaking
- “Vocal terrorism” was predicted openly in 2007. Incidents have yet to be reported in 2022.
- Speech technology is a mature industry with millions of users.
- synthetic speech (Wikipedia) matured from text-to-speech applications as assistive technology alternative to reading by eyesight.
- Note that speech recognition (Wikipedia) is a different technology problem that includes translation from speech to text and also voice recognition. Listen closely when you interact with a voiced system to tell whether it is human or synthetic and how you react to its instructions.
- Learn more about text-to-speech in Thread “Accessibility” (protected).
Chapter 2.2 Internet Down!
- Internet outages are common but not cohesively described.
- The experience of lengthy Internet outage that disrupted transportation and commerce is described in the Northern Arizona outage in 2015.
- An Internet outage map
- Code Red nationally manages emergency notification for regions and cities. not to be confused with sugary drinks or cyber alerts. …
Chapter 2.3 Consequential Reasoning
- “Consequential Reasoning” is a coined term for using logic as the basis for computation within a process of documentation and analysis that drives the logic into programs then actions that make sense to humans.
- Read more about Thread Consequential Reasoning (protected).
- ParaLog is a coined name for a (Wikipedia) logic programming class of programming languages in contrast to object-oriented languages.
- (Wikipedia) Prolog was a popular 1980s logic programming language. Prolog lost its constituency due to programming paradigm and international industrial competition as the Japanese Fifth Generation movement faltered. ParaLog remains viable for applications suitable for CumuLinker if programmers thought differently.
- Blog “A Programmer’s Place” is a great history of programming concepts.
Notes for Section 3 Another Chance
Chapter 3.1 Whisperers Meetup
- The CumuLinker vault of private data accumulated over history is rich in connectivity that amplifies human memory. Casey has tracked Gavin by his books and institutional affiliations. Gavin may have tracked Casey by location or hearsay about her interactions in their peer learning community.
- A body reader can sense attention vectors that amplify the personal historical connection with some type of haptic motion. CumuLinker can strengthen that attention-getting signal with settings for memory and feelings.
- The “Personal Quantification” aka “quantified self” Movementillustrates measurement motives that are now realized in mobile devices.
Chapter 3.2 Lives Unfold
- Casey has a Masters Degree from a unique institution.
- The location and institution are modeled after the Wang Institute of Graduate Studies, 1982-1987, Tyngsboro, Massachusetts . Benefactor benefactor Doctor An Wang.funded a Software Engineering Master Degree curriculum that migrated to Carnegie-Mellon Software Engineering Institute.
- The “Massachusetts Miracle” period produced the mini-computer generation from companies: Wang, Digital, Apollo, Data General, …
Chapter 3.3 Mature Branching
- A premiere Osher Lifelong Learning (OLLI) peer learning networkhas many models for peer learning.
- “Saging and Aging” directs attention to opportunities that build on life experience and courses on any topic someone knows about.
- Carolyn Heilbrun, Columbia University professor and author of Kate Fansler mysteries sums up aging in Last Gift of Time.
- Bumper Sticker Computer Science — I forgot why this is here but its a classicd.
Notes for Section 4 “Nuclear Shadows”
Chapter 4.1 Getting Acquainted
- Los Alamos National Laboratory was site for visit and fictional tour.
- Wildfires 2011 threaten LANL.
- Example of a Wildfire app
Chapter 4.2 Dining On History
- Marilyn aspires to a role like security journalists Julia Angwin, now the Markup” laboratory..
- IBM Watson Success on Jeopardy used logic programming.
- “Mathematics Written on Sand” by W Kahan motivated floating point standards after exhibiting errors in scientific calculators.
- Parnas analysis of Reagan missile defense started discussion of software responsibility.
- Scott Rosenberg commentary explains the context of Parnas arguments.
- Risks digest of failures in computing starting in 1981 continues documentation and discussion.
- Usenet was the primary discussion support network before Web Time and later migrated into Google groups.
- Computer Professionals for Software Responsibility (CPSR) had advocated for social and military causes starting in the 1980s as described in Browsers give warnings and privacy errors here… Babbage Institute CPSR oral history by Severo Ornstein.
- Lynn Conway engineering research, and academic careers followed a transsexual path and contributed to VLSI Revolution (Wikipedia).
- Grace Hopper on Letterman explaining her nanosecond and Navy tours of duty working on COBOL.
- women educator oral histories .
- Women and the Future of Computing, video by Anita Borghelped originate goals and institutes for women in computing, including the annual Grace Hopper event.
- Sputnik and the Eisenhower Administration and Sputnik beeps from JPL
- Televised software safety case, Therac 25, radiation deaths initiated the “software safety” field from Google Scholar.
- “Total information awareness” reaction to 9-11
- Bug bounty programs, such as Fire Fox offered new career opportunities.
- Computer History Museum
Chapter 4.3 “Team 3G Forms”
Notes Section 5 ‘Consequential Reasoning’
Chapter 5.1 ‘Chips Fall’
- Imposter syndrome is often discussed as a problem for women in computing even afflicted presidents of prominent universities. National Library Medicine analysis of the condition with recommendations.
- Casey’s “chip on her shoulder” is explained by the poem, included: poem ‘A Chip On Your Shoulder’ by Albert a Guest.
- the ‘geocaching’ recreational activity uses logic puzzles for cache directions. One tool is “consequential reasoning” and ParaLog.
- Another use of logic puzzles is/was on the Law School Aptitude test logic questions.
Chapter 5.2 ‘Bad Models’
Sally explains contrasting models of disability:
- The social Model of Disability compares with (Wikipedia) The medical model of disability, that is “fix the environment” versus “fix the person”, a complex topic for Disability Studies. person losing vision does better by starting early to adjust to one’s environment rather than expecting a medical cure, while government and social organizations work on environmental deficiencies like transportation, documents, sidewalk clutter, etc.
- Podcast, such as ‘Eyes on Success’, provide a modern educational medium for people with vision loss and for assistive technology.
- A notable model of accessibility recognition is Steve Jobs and the iPhone.
- Hadley Institute offers networked educational programs on disability, technology, and adaptation.
Chapter 5.3 ‘Getting Grounded’
Casey reviews the characteristic of Team 3G as its team leader in preparation for their short summer period of activism against the Pink Page Rampage. As team leader, she wants to use everybody’s strengths, talents, expand their knowledge, and have fun together.
Chapter 5.4 ‘Social Messes’
Marilyn needs advice from her Aunt Sally and recent acquaintance Casey about her perception by others as she tries to launch a journalism career. They reminisce about her youth.
- The Global Network Navigator project assembled early sites on the world wide web as distributed on a CD.
- Computer History timeline 1995.
- How Usenet worked as the early social network and historical facts about Usenet originating at Duke University show There was Social media before the Dawn of Web Time.
Chapter 5.5 ‘A Social Media Makeover’
Casey and Sally dispense advice to Marilyn about her public image. A dispute about vaccines and autism had embroiled Marilyn in social media opinions. She could be subjected to interactions with terrorist groups through facial identification. Public records plagued Sally and also Marilyn in unwanted attention. Privacy explanations and experiments are suggested:
- 2014 book ‘Dragnet Nation by Julia Anguin grew into a quest for experimentation then and 2019 launch of privacy experimentation laboratory.
- A name like “Marilyn Maxxon” leads to alternatives in Google, possibly confusing her identity. Try the search yourself.
- The vaccination-autism controversy entangled people who had social media arguments, complicated by required disentanglement of scientific claims. and CDC Gov assurance.
- Sally’s “Controversy Discovery Engine” is attached to this novel
- (Wikipedia) The Little Bro movement traces to a book by Corey Doctorow but the Little Bro movement is fictional.
Notes for Section 6 ‘Punk Page Podcast’
Chapter 6.1 ‘Welcome Netizens’
- The “Pink Page Rampage” is a fictional event originating in the time of transformation after the CumuLinker Reformation, See CumuLinker threat.
- Marilyn is defining and welcoming the listeners for this podcast.
- The (Wikipedia) term “netizen” is short for “Net citizen”.
- Names like “Maxxson” are comically mangled by Google to connect to familiar names popular with advertisers.
Chapter 6.2 ‘Road to WWW’
Casey and Marilyn are describing some earlier facets of the Internet.
- Internet Hall of Fame and Internet research leader Jon Postel
- Memex, the browser that could have been
- National Infrastructure, “Internet superhighway”, Senator Al Gore
- History of Hypertext and Issue-based analysis
- Shane Harris “The Watchers”
Chapter 6.3 ‘Plain Reading’
Sally explains her view of web page development for people with low vision using screen readers.
- Writing Tools:
- Reading Tools:
Chapter 6.4 ‘Growing Minds’
Marilyn is interviewing Millennial Matt and her son Wildfire Bob
- Internet Archive Wayback Machine
- SOLID project led by Sir Tim Berners-Lee
- CumuLinker Trustee Nominees
- Anil Dash Glitch and more
- ‘Your Undivided Attention’ podcast from Humane Tech
- Linda stone, continuous partial attention
- CMD-IT, Center for Minorities and Disabilities in IT;
- Electronic Frontier Foundation; Cathy O’Neill, author “Weapons of Math Destruction”;
- (Wikipedia) Michael Jon Harris, author book “End of Absence”;
- Telle Whitney, leader of Anita Borg Institute;
Chapter 6.5 ‘Punk Sage Roger’
Marilyn is interviewing a senior member of the Punk Page Rampage team.
- Book “Dark side of Software: Evil on software Projects” by Robert L. Glass and Hjohann Ross is a source of Pink Page insiders.