William J. Mitchell
Excerpts from City of Bits: Space, Place, and the Infobahn

Former Dean of the School of Architecture and Planning at MIT
First MIT Press paperback edition, 1996
© Copyright 1995-1997 Massachusetts Institute of Technology
[Original MIT website for the html edition]

[Note: This book contains many outdated examples, but we should consider the main argument about place, space, and consequences for the material city as an ongoing question and topic of research. -MI]

SYNOPSIS

City of Bits is a comprehensive introduction to a new type of city, a largely invisible but increasingly important system of virtual spaces interconnected by the emerging information superhighway. William Mitchell makes extensive use of concrete, practical examples and illustrations in a technically well-grounded yet accessible examination of architecture and urbanism in the context of the digital telecommunications revolution, the ongoing miniaturization of electronics, the commodification of bits, and the growing domination of software over materialized form.

In seven chapters -- Pulling Glass, Electronic Agoras, Cyborg Citizens, Recombinant Architecture, Soft Cities, Bit Biz, and Getting to the Good Bits -- Mitchell argues that the crucial issue before us is not one of putting in place the digital plumbing of telecommunications links and associated electronic appliances, nor even of producing content for electronic delivery, but rather one of creating electronically mediated environments for the kinds of lives that we want to lead.

William J. Mitchell was Professor of Architecture and Media Arts and Sciences and Dean of the School of Architecture and Planning at the Massachusetts Institute of Technology. Among the books he has authored or coauthored are The Reconfigured Eye: Visual Truth in the Post-Photographic Era, The Logic of Architecture, Digital Design Media, The Art of Computer Graphics Programming, and Computer-Aided Architectural Design.

Chapter 1

Pulling Glass

As the fin-de-K countdown cranked into the nineties, I became increasingly curious about the technicians I saw poking about in manholes. They were not sewer or gas workers; evidently they were up to something quite different. So I began to ask them what they were doing. "Pulling glass," was the usual reply.

They were stringing together some local, fragments of what was fast becoming a worldwide, broadband, digital telecommunications network. 1 Just as Baron Haussmann had imposed a bold spider's web of broad, straight boulevards on the ancient tangle of Pari s, and as nineteenth-century railroad workers had laid sleepers and steel to shrink the windy distances of the North American frontier, these post-whatever construction crews were putting in place an infobahn -and thus reconfiguring space and time relationships in ways that promised to change our lives forever. 2 Yet their revolutionary intervention was swift, silent, and (to most eyes) invisible. 3 At about the same time, I discovered-as did many others that I no longer had to go to work.

Not that I suddenly became idle; it's just that the work now came to me. I did not have to set out every morning for the mine (as generations of my forebears had done), the fields, the factory, or the office; I simply carried a lightweight laptop computer that gave me access to the materials on which I was working, the tools that I required, and the necessary processing power. When I wanted to connect to the network, I could just plug it in to the nearest telephone socket or to the RJ-11 connections that were beginning to appear on airplane seats. Increasingly, I found that I did not even need to be near an outlet; my pocket-sized cellular telephone could do the job. Nor, in the age of the Walkman, did I have to go to the theater to be entertained. More and more of the instruments of human interaction, and of production and consumption, were being miniaturized, dematerialized, and cut loose from fixed locations.

How was the laptop on which I am writing these words (in an airport lounge) designed and built? Neither by an old-fashioned craftsman, lovingly contriving it like a Stradivarius violin, nor in some sprawling, smokestacked, Fordist factory. Its components and subassemblies were engineered and manufactured concurrently at locations scattered throughout the world-from Silicon Valley to Singapore. Computer-aided design (CAD) systems, computer-controlled processes, and industrial robots were used at every step.

Component fabrication and product assembly operations were geographically separated, and component deliveries were carefully paced and orchestrated to avoid both shortages and unnecessary stockpiling. The various design, component manufacture, and product assembly tasks were performed not within a single industrial corporation, but by different members of an intricate international alliance. The finished product's software-which I chose and installed myself-is as crucial as the hardware. Now that this complex artifact is in my hands it is intensively used, but its useful life is short; soon it will be obsolete. When it can no longer connect me to the electronic information environment as effectively as some competing product (even though it still works perfectly well), I shall simply transfer my software and data and throw the superseded carcass away; the information ecosystem is a ferociously Darwinian place that produces endless mutations and quickly weeds out those no longer able to adapt and compete. Neither handicraft of the sort so passionately defended by Ruskin and Morris, nor durable, standardized, mass-produced, industrial object of the kind that fascinated the early modernists, my laptop is an emblematic product of the electronic information age.

The texts that follow reimagine architecture and urbanism in the new context suggested by these observations-that of the digital telecommunications revolution, the ongoing miniaturization of electronics, the commodification of bits, and the growing domination of software over materialized form. They adumbrate the emergent but still invisible cities of the twenty-first century. And they argue that the most crucial task before us is not one of putting in place the digital plumbing of broadband communications links and associated electronic appliances (which we will certainly get anyway), nor even of producing electronically deliverable "content," but rather one of imagining and creating digitally mediated environments for the kinds of lives that we will want to lead and the sorts of communities that we will want to have.

What does it matter? Why should we care about this new kind of architectural and urban design issue? It matters because the emerging civic structures and spatial arrangements of the digital era will profoundly affect our access to economic opportunities and public services, the character and content of public discourse, the forms of cultural activity, the enaction of power, and the experiences that give shape and texture to our daily routines.

Massive and unstoppable changes are under way, but we are not passive subjects powerless to shape our fates. If we understand what is happening, and if we can conceive and explore alternative futures, we can find opportunities to intervene, sometimes to resist, to organize, to legislate, to plan, and to design.

Chapter 2
Electronic Agoras

My name is wjm@mit.edu (though I have many aliases), and I am an electronic flâneur. I hang out on the network. 1 The keyboard is my café. Each morning I turn to some nearby machine -my modest personal computer at home, a more powerful workstation in one of the offices or laboratories that I frequent, or a laptop in a hotel room-to log into electronic mail. I click on an icon to open an "inbox" filled with messages from round the world-replies to technical questions, queries for me to answer, drafts of papers, submissions of student work, appointments, travel and meeting arrangements, bits of business, greetings, reminders, chitchat, gossip, complaints, tips, jokes, flirtation. I type replies immediately, then drop them into an "outbox," from which they are forwarded automatically to the appropriate destinations. (Note the scare quotes. "Box" is a very loose metaphor, and I will come back to that later.) If I have time before I finish gulping my coffee, I also check the wire services and a couple of specialized news services to which I subscribe, then glance at the latest weather report. This ritual is repeated whenever I have a spare moment during the day.

Traditionally, you needed to go someplace to do this sort of thing-to the agora, the forum, the piazza, the café, the bar, the pub, Main Street, the mall, the beach, the gym, the bathhouse, the college dining hall, the common room, the office, or the club -and where you went pegged your peer group, your social position, and your role. 2 It also framed expectations about how you should represent yourself by your clothing, body language, speech, and behavior and about the interactions that were to take place. Each familiar species of public place had its actors, costumes, and scripts. But the worldwide computer network-the electronic agora-subverts, displaces, and radically redefines our notions of gathering place, community, and urban life. The Net has a fundamentally different physical structure, and it operates under quite different rules from those that organize the action in the public places of traditional cities. It will play as crucial a role in twenty-first-century urbanity as the centrally located, spatially bounded, architecturally celebrated agora did (according to Aristotle's Politics ) in the life of the Greek polis and in prototypical urban diagrams like that so lucidly traced out by the Milesians on their Ionian rock. 3

Spatial / Antispatial
....

The Net negates geometry. While it does have a definite topology of computational nodes and radiating boulevards for bits, and while the locations of the nodes and links can be plotted on plans to produce surprisingly Haussmann-like diagrams, it is fundamentally and profoundly antispatial. It is nothing like the Piazza Navona or Copley Square. You cannot say where it is or describe its memorable shape and proportions or tell a stranger how to get there. But you can find things in it without knowing where they are. The Net is ambient -- nowhere in particular but everywhere at once. You do not go to it; you log in from wherever you physically happen to be. In doing this you are not making a visit in the usual sense; you are executing an electronically mediated speech act that provides access -an "open sesame." Your own address is not pinned to a place; it is simply an access code, with some associated storage space, to some computer located somewhere on the Net. It does not matter much what sort of computer it is or where you might find it. (I have never laid eyes on the machine that gives me access to the network. I suppose it is in some back room at MI T. There is no reason for me to seek it out.) To get on the network you establish physical connection to your host machine (through a digital link, by dialing in from any telephone via phone lines and a modem, or even via a cellular modem), provide the access code, and give a password. You can then ask the host to send you the accumulated contents of your inbox, and you can send it your outbox for distribution. 4 Other users of the network hook into their host machines in the same way. Thus, unlike telephone calls or fax transmissions, which link specific machines at identifiable locations (the telephone on your desk and the telephone on my desk, say), an exchange of electronic mail (e-mail) links people at indeterminate locations. If I send you an e-mail message, it will come tagged with my name/address, but you will not know whether I transmitted it from my office or typed it in at home while sipping a glass of wine or entered it into my laptop on a trans-Pacific flight and then sent it from a public telephone at Narita airport. And I need not know where you are-your current street address and zip code or your telephone number; I just direct my message to your network name/address, and I can be sure that it will eventually end up at whatever machine you choose to log in from.
....

So the Net eliminates a traditional dimension of civic legibility. In the standard sort of spatial city, where you are frequently tells who you are. (And who you are will often determine where you are allowed to be.) Geography is destiny; it constructs representations of crisp and often brutal clarity. You may come from the right side of the tracks or the wrong side, from Beverly Hills, Chinatown, East Los Angeles, or Watts, from the Loop, the North Side, or the South Side, from Beacon Hill, the North End, Cambridge, Somerville, or Roxburyand everybody knows how to read this code. (If you are homeless, of course, you are nobody.) You may find yourself situated in gendered space or ungendered, domains of the powerful or margins of the powerless; there are financial districts for the pinstripe set, pretentious yuppie watering holes, places where you need a jacket and tie, golf clubs where you won't see any Jews or blacks, shopping malls, combat zones, student dives, teenage hangouts, gay bars, redneck bars, biker bars, skid rows, and death rows. But the Net's despatialization of interaction destroys the geocode's key. There is no such thing as a better address, and you cannot attempt to define yourself by being seen in the right places in the right company. 5

....

Synchronous / Asynchronous

A face-to-face human conversation-the sort for which dinner tables and traditional seminar and meeting rooms are designed is a spatially coherent, corporeal, and strictly synchronous event. The participants are all present in the same place, everybody hears the words as they are spoken, and replies usually come immediately. The telephone and talk radio have allowed conversants to be dispersed spatially but have not altered this condition of synchrony. (Until the introduction of the answering machine, you had to be by the phone, at the right time, to take a call.) But there is an alternative. Where necessary, as when Pheidippides was dispatched to run from Athens to Sparta and back, the ancient Greeks used messengers for asynchronous communication. The letter and the postal system, the fax machine, the humble home answering machine, and the fancy corporate voice mail system are all more up-to-date devices for asynchronous communication and so-more significantly in this context-are the network's e-mail and bulletin board system s. 19 In the asynchronous mode, words are not heard as they are spoken, but are repeated at some later point. Replies do not come immediately. The unity of the face-to-face conversation is fractured both spatially and temporally.

We usually find the laggardliness of the Postal Service's snail-mail, its enforcement of slug's-pace asynchrony, to be a nuisance. As much more efficient asynchronous communications systems have become commonplace, though, we have seen that strict synchrony is not always desirable; controlled asynchrony may have its advantage s. We all know how inconvenient an unexpected demand for communication-a knock on the office door when one is deep in thought or a telephone call at the wrong time-can be. Business people and academics have gratefully discovered that it is usually much easier to communicate between Boston and Tokyo by fax than it is to find convenient times at both ends for telephone conversations. Answering machines and voice mail systems eliminate the frustration of telephone tag. You can attend to your e-mail whenever it is convenient to do so, not when you are unexpectedly and arbitrarily interrupted by a telephone ring. We are discovering that strictly synchronous communication is really just a limit case of asynchronous communication.

The tilt toward electronic asynchrony will have increasingly dramatic effects upon urban life and urban form. In the familiar, spatial, synchronous style of city, there is a time and a place for everything. 20 Gathering spots like restaurants and cafés are open, and people come together in them, for well-defined periods. Workers carry out their tasks during standard business hours, and there are predictable rush hours as they travel to and from their workplaces. Buses and trains have schedules, appointments and meetings are arranged for specific moments, theatrical performances, television program s, and university classes are slotted for particular times. Just as each city has its characteristic spatial organization, so it has its own daily, weekly, and seasonal rhythms-very different for New York, Rome, Delhi, and Tokyo. As there is prime real estate, so there is prime time. But now extrapolate to an entirely asynchronous city. Temporal rhythm turns to white noise. The distinction between live events and arbitrarily time-shifted replays becomes difficult or impossible to draw (as it often is now on the television news); anything can happen at any moment. 21 When, for example, does an online forum take place, and where do you show up for it? You cannot say. The discussion unfolds over an indefinite period, among dispersed participants who log in and out at arbitrary moments, through uncoordinated posting and receipt of e-mail messages.

Narrowband / Broadband

The bandwidth-disadvantaged are the new have-nots. It's simple; if you cannot get bits on and off in sufficient quantity, you cannot directly benefit from the Net. The consequences of this are brutally obvious. If the value of real estate in the traditional urban fabric is determined by location, location, location (as property pundits never tire of repeating), then the value of a network connection is determined by bandwidth, bandwidth, bandwidth. Accessibility is redefined; tapping directly into a broadband data highway is like being on Main Street, but a low baud-rate connection puts you out in the boonies, where the flow of information reduces to a trickle, where you cannot make so many connections, and where interactions are less intense. The bondage of bandwidth is displacing the tyranny of distance, and a new economy of land use and transportation is emerging-an economy in which high-bandwidth connectivity is an increasingly crucial variable.

Since the cost of a high-bandwidth cable connection grows with distance, information hotspots often develop around high-capacity data sources, much as oases grow up around wells. "Smart" office buildings, for example, may have their own dish antennas for satellite communications and fiber-optic links to the outside world, and they provide internal broadband connections to these sources. University campuses may connect their internal computer networks to long-distance telecommunications backbones, so creating privileged, information-rich communities. Teleports, which concentrate powerful telecommunications equipment, may be built to serve industrial parks or financial districts. 22 And telecottages may play similar roles in rural areas. 23 So some very contentious public policy issues start to pop up. The American telephone system was set up to provide "universal service" reaching not only to profitable markets for telecommunications services, but also to poor communities and to remote and sparsely populated areas where the costs of providing service are high and the customers are few. As part of the package, telephone companies became regulated monopolies, and unprofitable services were cross-subsidized by profitable ones. But will the fast lanes of the information superhighway--the switched, broadband, digital networks that will be required for the most advanced services--be deployed with the same lofty goal? Or will they serve only the affluent and powerful, while rural communities languish at the ends of information dirt tracks and economically marginalized neighborhoods get redlined for telecommunications investment?

Broadcast bandwidth is another matter-one of radiation epicenters and transmitter power rather than of network topology and cable capacity. There is only so much electromagnetic spectrum, so it is a definitively fixed resource in a given broadcast area. And there are only so many geosynchronous satellite "parking spaces" in the Clark Circle. 24 So powerful organizations will, no doubt, increasingly contend for shares of the bit radiation business in localities dense with receivers, and will seek like ancient despots to bring concentrations of population under their control. 25 No network connection at all-zero bandwidth-makes you a digital hermit, an outcast from cyberspace. The Net creates new opportunities, but exclusion from it becomes a new form of marginalization. 26
....

Being There

For millennia architects have been concerned with the skin-bounded body and its immediate sensory environment-with providing shelter, warmth, and safety, with casting light on the surfaces that surround it, with creating conditions for conversation and music, with orchestrating the touch of hard and soft and rough and smooth materials, and with breezes and scents. Now they must contemplate electronically augmented, reconfigurable, virtual bodies that can sense and act at a distance but that also remain partially anchored in their immediate surroundings. (The Neuromancer fantasy of cyberspace that totally masks physical space-and so produces completely disembodied electronic existence -represents a theoretical limit, not a practical condition.) When you wear your Walkman on the bus, your feet are on the floor and your eyes see the physical enclosure, but an electronic audio environment masks the immediately surrounding one and your ears are in another place. When you don a head-mounted stereo display to play Dactyl Nightmare in a virtual reality arcade, the immediate visual environment is supplanted by virtual space, but your sense of touch reminds you that you still remain surrounded by now-invisible solid objects. When you juxtapose a videoconference window to a distant time zone with a glazed opening to the immediate surroundings, you can contrast night with day and winter with summer. Increasingly the architectures of physical space and cyberspace-of the specifically situated body and of its fluid electronic extensions-are superimposed, intertwined, and hybridized in complex ways. The classical unities of architectural space and experience have shattered as the dramatic unities long ago fragmented on the stage-and architects now need to design for this new condition.

As we look back to previous eras, we multiply augmented cyborgs can recognize that we have much to be thankful for. But we should not forget our roots-the cultures of those long, pre-silicon centuries in which our ancestors had to do it all with protoplasm. They had little opportunity to extend their nervous systems or upgrade their bodies, so they made places for inhabitation-buildings and cities -that were carefully fitted to the scale and limitations of the original equipment and structured to promote constant face-to-face, eye-to-eye, within earshot and within arm's length contact.

Life in pre-cyborg places was a very different experience. You really had to be there.

Chapter 4
Recombinant Architecture

As our bodies morph into cyborgs, the buildings that house them are also transforming. Increasingly, telecommunication systems replace circulation systems, and the solvent of digital information decomposes traditional building types. One by one, the familiar forms vanish. Then the residue of recombinant fragments yields up mutants.

Facade / Interface

First, some historical perspective. Not so long ago, when the world seemed simpler, buildings corresponded one-to-one with institutions and rendered those institutions visible.

Architecture played an indispensable representational role by providing occupations, organizations, and social groupings with their public faces. Firehouses were for firefighters, schoolhouses were for scholars, and jailhouses were for jailbirds. The monarch's palace at Versailles, like the For-bidden City of Beijing or the Red Fort in Delhi, housed the ruler and his court, and its in-your-face form unambiguously expressed established power; it was where the ruling got done, and it was what you tried to grab if you wanted to usurp.

Everyone knew that the General Motors headquarters building in Detroit-with its boardroom on the topmost floor -was where cigar-sucking captains of industry ran the company and decided (so they thought) what was good for the country as well. Buildings were distinguished from one another by their differing uses, and the inventory of those uses represented social division and structure. The Roman theorist Vitruvius recognized this when he enunciated the principle of architectural decorum-appropriateness of form to purpose and status. And when the French revolutionary architect Ledoux wanted to demonstrate the possibility of a new social order, he designed and drew the hardware of his utopia-architecture parlante, the buildings that were to accommodate and vividly illustrate its restructured institutions.

Under this historically familiar condition, the internal organization of a building-its subdivision into parts, the interrelation of those parts by the circulation system, and the evident hierarchies of privacy and control-reflected the structure of the institution and physically diagrammed its pattern of activities. There was a complementarity of life and bricks and mortar, like that of snail and shell. If there was a mismatch, then the building had to be modified or the institution was forced to adapt. In his best Obi wan-Kenobi mode, remarking on the British Houses of Parliament, Winston Churchill cast this point into a much-quoted aphorism: we make our buildings and our buildings make us. 1 But now, increasingly, software beats hardware. In the early 1990s, for example, Columbia University scrapped plans to build a twenty-million-dollar addition to its law library and instead bought a Connection Machine (a state-of-the-art supercomputer) and embarked on a program of scanning and storing ten thousand deteriorating old books yearly. 2 Library users would no longer go to a card catalogue and then physically retrieve books from the stacks.

Nor would they open books, look up topics of interest in the table of contents or the index, and then flip through the pages to get to what they wanted. At computer workstations, they would enter queries (in plain English), retrieve lists of stored documents in response, and search through those documents to find relevant passages. 3 The task of designing and implementing the library extension had been fundamentally redefined. It was no longer one of laying out and constructing a building, with storage and circulation areas, to house the shelf space required by an expanding collection. It became one of designing and programming the computer tools for storing, querying, retrieving, and displaying digitally encoded text. Henceforth, the library would be extensible and reconfigurable in software.

Today, institutions generally are supported not only by buildings and their furnishings, but also by telecommunication systems and computer software. And the digital, electronic, virtual side is increasingly taking over from the physical. In many contexts, storage of bits is displacing storage of physical artifacts such as books, so that the need for built space is reduced. Electronic linkage is substituting for physical accessibility and for convenient connection by the internal circulation systems of buildings, so that access imperatives no longer play such powerful roles in clustering and organizing architectural spaces. And-as when an ATM screen rather than a door in a neoclassical edifice on Main Street provides access to a bank-computer-generated graphic displays are replacing built facades as the public faces of institutions.

It is time to update Churchill's bon mot. Now we make our networks and our networks make us.

Bookstores / Bitstores

The most obvious epicenter of this shakeup is the information business. And it is particularly instructive to consider the fate of one of its most familiar architectural manifestations, the book shop. Where will we find twenty-first-century Pickwicks?

The problem with printed books, magazines, and newspapers-Gutenberg's gotcha-is distribution. Paper documents can be mass produced rapidly at centralized locations, but they must then be warehoused, transported, stocked at retail outlets, and eventually hand carried to wherever they will be opened and read. There are built and specially equipped places for each of these activities: the publisher's office, the printing plant, the warehouse, the bookstore, the newspaper kiosk, lounges and waiting rooms stocked with magazines, and the easy chair beside the fire. These places are distributed at appropriate locations within the urban fabric and play important roles in differentiating that fabric and the activities unfolding within it. Harvard Square would not be the same without Out of Town News and its diverse collection of bookstore s.

Records and videos generate analogous places and spatial structures. The record store long ago took its place alongside the bookstore in downtown retail districts and shopping malls.

Then, in the 1980s, video stores popped up everywhere-proliferating particularly in strips, shopping centers, and rural market centers, where they could easily be reached by car. Like the gas station and the fast-food outlet, video stores became a characteristic element of the suburban landscape.

When we separate information from its usual paper and plastic substrates, though, stockpiling and transporting physical products become unnecessary. Consider, for example, a venture announced by Blockbuster Entertainment (a large video-rental and record store chain) and IBM in May 1993. 4 The idea was to store recordings, in digital format, on a central server and to distribute them via a computer network to kiosks in record stores.

There, customers could select recordings from a menu, download them to the kiosk, and copy them to CDs on the spot. Bookstores could work the same way, by downloading texts and rapidly laser-printing them. Through such point-of-sale production, the producers and wholesalers save on inventory, warehouse, and transportation costs, the retailers save on shelf space, and the customer potentially gets access to a much wider selection.

But inscription on to the substrate need not necessarily occur at this particular point along the information distribution chain. (Though, naturally enough, it is the point that most interests retailers.) Electronic, digital distribution might carry all the way to homes or other points of consumption. An alternative publishing strategy, then, is to download books and magazines from online databases to home laser printers (successors to the crude fax machines of the 1980s and 1990s) and to download recordings to home stereos, videos to home televisions, and newspapers to home computers. (This can be integrated with a recycling strategy; print on recycled paper and toss the printouts back into the recycling bin when their useful life is over.) Yet another strategy for text, music, or video on demand is simply to provide hundreds or thousands of simultaneously available digital channels, with each one repeatedly broadcasting specialized programs.

The Internet's Electronic Newsstand pioneered the new publishing pattern of downloading on demand when it opened in July 1993. 5 It provided online access to magazine articles-thus allowing customers to browse, as they might in a traditional newsstand-and also allowed convenient placement of subscription orders for print versions. An electronic bookstore and sections for business publications and newsletters were soon added. It was established with eight magazines; less than a year later the list had grown to eighty, and the service was being accessed forty thousand times per day from all over the world.

With changes in modes of information distribution come changes in acts of consumption-even in the familiar ritual of reading a newspaper. As I write this, the New York Times and the Boston Globe -in the form of large lumps of reprocessed cellulose -land with thumps on my Cambridge doorstep each morning and must eventually find their way to the recycling bin. The Chicago Tribune, the San Jose Mercury News, and many others show up as well, but silently and immaterially-on my computer. Instead of turning their pages, I use software that picks out the items I want to see; headlines become menu items to click.

....

Gutenberg's revolution created places where printed information was concentrated and controlled. But electronic, digital information has a radically different spatial logic. It is immaterial rather than bonded to paper or plastic sheets, it is almost instantaneously transferable to any place that has a network connection or is within range of a bit radiation source, and it is potentially reprocessable at any reception point-thus shifting much of the editorial and formatting work and responsibility from the producer's centralized plant to the consumer's personal hardware and software. Even more importantly, elimination of the need for access to printing presses and paper supplies has removed traditional barriers to entering the publishing business; anyone with an inexpensive computer and a network connection can now set up a server and pump out bits.

The likely result is a radical change in the sizes and locations of information supply points. When the Chicago Tribune Tower was constructed, it stood as the proudly visible center of a vast collection and distribution system and an emblem of the power of the press. Every day the news flowed in and the printed papers flowed out to the surrounding metropolis. But on the infobahn, where every node is potentially both a publication and consumption point, such centralized concentrations of activity will be supplanted by millions of dispersed fragments.

Stacks / Servers

The old British Museum reading room provided an architectural interface to the vast book stacks that lay beyond. From outside, the classical, columnar facade functioned as an icon-signifier of an access point. From within the circular, domed reading room (which looks in plan like a sectored hard disk), books could be summoned up by the action of specifying a call number.

Library attendants would then retrieve volumes from the stacks for use at a reading table. (In later years, tourists would come to look for the very table at which Karl Marx sat absorbing vast amounts of printed information and transforming it into a blueprint for revolution.) The cycle would be completed by performing the task of reshelving the books until they were needed again.

Functionally, the whole thing was a very large, very slow version of what computer technicians now know as a database server: you send requests, and you get back items of stored information. This highly refined functional diagram was the outcome of a long evolutionary process. 8 In early libraries, with small numbers of volumes, books had lined the walls of the reading room. Later, as the ratio of book storage to reading space changed, the book stacks were separated from the reading rooms and increasingly became the dominant spatial element; the new type was clearly emerging in Leopoldo della Santa's 1816 theoretical project for a library. 9 By the time that Karl Friedrich Schinkel produced his Berlin Staatsbibliothek project in 1835-36, it seemed logical to propose a huge, rectangular block of gridded stack space with a grand public stair in the center and access stairs at the four corners. And in 1854-56, when Sydney Smirke designed his rotunda for insertion into the older fabric of the British Museum, the book stacks became a huge, separate iron structure.

Popular graphical user interfaces of personal computers function in much the same way as Smirke's careful architectural arrangements. Icons are arrayed on the screen, like doorways along a street, to make visible the available access points. Clicking on an icon (like knocking on a door) puts the user in a space-in this case a rectangular "window" on the screen-from which files of information can be requested. In response to user requests, software routines retrieve files from the disk, display them on the screen for inspection and manipulation, and perhaps eventually rewrite them back to the disk.

Now extrapolate from this small-scale example and imagine a 10-million-volume, digital, online, humanities research library. 10 (For comparison, the Library of Congress had nearly 15 million volumes on 550 miles of shelves in the early 1990s, the British Library had about 12 million on a couple of hundred miles, and Harvard's Widener had about 3.5 million.) 11 The catalogue would be available on the network. Volumes or chapters might be downloaded to a scholar's personal workstation in a minute or two, then displayed or laser-printed as required. (It matters little where the digital volumes physically reside-just that they can be accessed efficiently-and they occupy little physical space anyway. The collection's existence would not be celebrated architecturally, as the grandiose mass of Widener celebrates the accumulative power of Harvard.) This library would never close.

Those addicted to the look and feel of tree flakes encased in dead cow (and prepared to pay for it) would not have to kick the habit; elegant physical volumes could automatically be generated on demand. Nothing would ever be checked out, in somebody else's carrel, lost, or in the limbo of the reshelving cart. Old volumes could live out their days in safe and dignified retirement in climate-controlled book museums. And the librarians could run backups (look what happened to the Library of Alexandria, where they didn't have a way to do it!).

The task facing the designers of this soft library is a transformation (with some invariants, but many radical changes) of what faced the Smirke brothers and the librarian Panizzi as they evolved the design for the British Museum and Library. 12 The facade is not to be constructed of stone and located on a street in Bloomsbury, but of pixels on thousands of screens scattered throughout the world. Organizing book stacks and providing access to them turns into a task of structuring a database and providing search and retrieval routines.

Reading tables become display windows on screens. Resources are made available to the public by allowing anyone to log in and by providing computer workstations in public places, rather than by opening reading room doors. The huge stacks shrink to almost negligible size, the seats and carrels disperse, and there is nothing left to put a grand facade on.

It will not be possible to tell tourists where some Marx of the next millennium sat. All that is solid melts in air.
....

Department Stores / Electronic Shopping Malls

Don't make the mistake of thinking that cyberspace marketplaces are all about mathematical whiz kids furiously trading esoteric derivatives, though. Even something as prosaic as the kitchen sink can now be offered and purchased electronically. When Matsushita opened a new-for-the-nineties kitchen showroom in Shinjuku, it was advertised as "the only place in the world where a person can walk in off the street and experience a high-tech Virtual Reality system in a consumer application." 50 You could strap on a headset and a data glove to inspect the appliances on offer. Actually, it didn't work very well; the crude visual simulations approximated a condition of legal blindness, the gesture sensors recognized only a few simple hand and finger movements, and the heavy apparatus made your neck hurt. But by keeping the show and eliminating the room, it did save lots of very expensive Tokyo real estate.

It was only a transitional step. Once the traditional product showroom has been virtualized-replaced by a set of computer simulations -it can potentially be entered and explored from anywhere. (Elaborate virtual reality interfaces are probably unnecessary; on-command video clips of clothing being modeled, or viewer-controlled video cameras that can be used to inspect products remotely, can probably suffice to create effective virtual showrooms.) When there is enough network bandwidth, and when adequate display devices are sufficiently inexpensive and widespread, Shinjuku rents become irrelevant. The electronic mall becomes the digital successor to the Sears catalogue and the home shopping shows on cable television.

"Going shopping" now means something new. 51 Traditionally, it suggested a trip to market-contact with the historic urban center, a chance to mingle with fellow citizens. Market squares and market days were important spatial and temporal markers. The interface between stall or shop and public place was highly standardized; fronts were either left open to show the goods inside or (from the later seventeenth century) took the form of glazed display windows. 52 Groups of shops might be unified architecturally to yield grander urban elements, as in Giuseppe Mengoni's Milan Galleria. Alternatively, as the opening of the Bon Marché in Paris demonstrated in 1852, a multitude of departments might be combined in a single, great, vertically stacked store-a downtown place to which crowds of shoppers would swarm by train, tram, or bus. 53 More recently, these patterns have largely been displaced by the newer ones of driving to the suburban shopping mall or to the megawarehouse on the fringes of town. 54 But the electronic mall simply short-circuits the trip to a concentration of goods and displays, and replaces the glazed display window facing the street with windows on a computer screen.

Salesperson, customer, and product supplier no longer have to be brought together in the same spot; they just have to establish electronic contact. This idea was successfully pioneered in the phone-order computer business; the "stores" run by companies like Dell consist of toll-free telephone lines or computer network connections, warehouses located conveniently to transportation hubs, and United Parcel Service trucks equipped with wireless computers. A geographically distributed, electronically supported consumer transaction system completely replaces the traditional retail floor.

Even where familiar-looking retail stores remain, they are fast transmuting into computer-intensive network nodes. Bar code scanners at supermarket checkouts, terminals for credit card transactions, and wireless computers at rental car returns are the obvious first steps, but the close coupling of retail space to cyberspace can go far beyond that. Since the 1980s the retail chains Wal-Mart and Kmart have been using VSAT (Very Small Aperture Terminal) satellite systems to link widely scattered stores, delivery trucks, and warehouses into sophisticated computer systems for just-in-time inventory control, price updates, credit card authorization, and videoconferencing. 55 The same systems potentially allow on-shelf LED (light-emitting diode) displays of prices to be changed in all stores in a matter of seconds. Hand-held, wireless, inventory-tracking computers allow store assistants to check stock levels and prices and place orders without leaving the sales floor, and hand-held wireless sales terminals (much like electronic clipboards) are replacing fixed point-of-sale terminals in some stores. 56 Kmart's ShopperTrak system uses infrared sensors to track where the customers are in the store, to dispatch salespeople and open up checkout lanes when they are needed, and to provide information for setting advertising and display strategies. 57 Increasingly though, merchants will find that they can dispense with sales floors and sales staff altogether and just maintain servers with databases of product specifications, prices, availability information, images, and simulations. The phone-order business becomes the network-order busines s. This arrangement potentially cuts overhead, taps into bigger markets, and lends itself to further automation at many levels. Product information can be adjusted instantly as supplies and prices change. Consumers might either "window shop" by remotely accessing such virtual store s, or they might delegate the task to software shopping agents that go out on the Net with shopping lists, inspect the specifications and prices of the merchandise on offer, and return with reports on the best available matches and prices.

Closure of a sale can immediately trigger a delivery order at a warehouse, update an inventory database, and initiate an electronic money transfer. So, as the Internet has opened up to commercial use, as commercial online services have grown, and as switched video networks have emerged, schemes for cybershopping have proliferated. Consider some snapshots of pioneering entrepreneurial efforts, circa early 1990s.

Groceries. Plans announced for Time Warner's pilot Full Service Network in Orlando, Florida, include access to an interactive menu of 20,000 products from an online supermarket and 7,500 from a drugstore. 58 In these virtual stores, the act of shopping is scaled down to pointing and clicking; the shopper moves along "shelves" on which realistically rendered packages are displayed, drags items to a "cart," and eventually pays with a credit card. [ ]The order is then delivered at a prearranged time.

Automobile s. Contemplate Automall, another service announced for Time Warner's Orlando network. The idea is that viewers will interactively browse through selections of cars and trucks, configure the options, then ask a salesperson to bring a vehicle out to the house for a test drive.

Computers. At the bargain-basement, low-margin end of the computer business, the Internet Shopping Network went online in 1994 with a World Wide Web "storefront" and product catalogue accessed through Mosaic. When a customer selects a catalogue item, the system automatically verifies the customer's credit, scans the current inventory lists of suppliers, selects the lowest-cost combination of distributor, warehouse, and delivery service, and places the order. Delivery is by express package servic e. "When a customer pushes that button," the proprietor announced, "he's causing a product to be spit out the back of a warehouse with his name onit." 59 Pizz a. 60 Interactive television will replace the telephone. You enter a virtual pizza parlor and see a menu of available toppings. As you choose, a displayed pizza is modified accordingly and the price is tallied. When you are satisfied, the nearest pizzeria is notified and the order speeds to your door.

Clothing. Imagine a virtual clothing boutique. The catalogue is a large collection of video clips showing models wearing the items on offer; these clips can be accessed randomly from your home television set. (The president of Time Warner has commented: "We're talking about a fundamental shift in advertising.... You can bring the showroom to your house and take a 15-minute walk through it.") 61 Your detailed measurements are stored in a database somewhere. There is no inventory; when you place an order, computer-controlled machinery accesses these measurements and fabricates the item perfectly to your size. (Fitting rooms become unnecessary, and your size is never out of stock.) It is then delivered to your door.

With such soft shops, specialized retail districts and the departments that make up department stores simply become directory categories -logical groupings presented as menu items, icons, or virtual "storefront s" in the interfaces of online services. Retail location becomes a matter of being in the right directories. As with the old telephone Yellow Page s, customers let their fingers (or rather now, their cursors) do the walking. The stock is bigger and the selection larger than in the mightiest big-box off-ramp superstore. The things that remain in physical form are warehouses (which may become smaller as computerized inventory-control strategies become more sophisticated) and delivery vehicles.

Work / Net-Work

Offices are sites of information work-specialized places where numbers, words, and sometimes pictures are collected, stored, transformed, and disseminated. 63 So their tissue is mostly composed of desks equipped with information-handling devices (telephones, computers, fax machines, printers, file cabinets, inboxes and outboxes, and the like), meeting and conference rooms, copying centers and mailrooms, and reception and circulation spaces.64 From the economist's viewpoint, they are locations where value is added to information.

As information work has grown in volume and importance, and as increasingly efficient transportation and communication systems have allowed separation of offices from warehouses and factories, office buildings at high-priced central business district (CBD) locations have evolved into slick-skinned, air-conditioned, elevator-serviced towers. These architecturally represent the power and prestige of information-work organizations (bank s, insurance companie s, corporate headquarters of business and industrial organizations, government bureaucracies, la w, accounting, and architectural firm s, and so on) much as a grand, rusticated palazzo represented the importance of a great Roman, Florentine, or Sienese family. So, for example, when the Hong Kong and Shanghai Bank wanted to demonstrate its power and importance, it built a shiny high rise in the heart of Hong Kon g's business district. Then the Bank of China trumped it by constructing a much taller tower on a nearby, overlooking site.

From this follows a familiar, widely replicated, larger urban patternone that you can see (with some local variants) from London to Chicago to Tokyo. The towers cluster densely at the most central, accessible locations in transportation networks. Officeworkers live in the lower-density suburban periphery and commute daily to and from their work. This tightly focused arrangement (as opposed to more diffuse distributions) allows considerable scale economies to be achieved in mass transit systems. Downtown services meet the needs of people in their worker rolesduring weekdays, while suburban services are there for those same people in their roles as residents in the evenings and on weekends.

The bonding agent that has held this whole intricate structure together (at every level, from that of the individual office cubicle to that of CBDs and commuter rail networks) is the need for face-to-face contact with coworkers and clients, for close proximity to expensive information-processing equipment, and for access to information held at the central location and available only there. But the development of inexpensive, widely distributed computational capacity and of pervasive, increasingly sophisticated telecommunications systems has greatly weakened the adhesive power of these former imperatives, so that chunks of the old structure have begun to break away and then to stick together again in new sorts of aggregations. We have seen the emergence of telecommutin g, "the partial or total substitution of telecommunication, with or without the assistance of computers, for the twice-daily commute to/from work."65 Gobs of "back office" work can, for example, be excised from downtown towers and shifted to less expensive suburban or exurban locations, from which locally housed workers remain in close electronic contact with the now smaller but still central and visible head offices.

These satellite offices may even be transferred to other towns or to offshore locations where labor is cheaper. (Next time you pay your credit card bill or order something from a mail-order catalogue, take a look at the mailing address. You'll find that the envelope doesn't go to a downtown location in a major city, but more likely to an obscure location in the heartland of the country.) The bedroom communities that have grown up around major urban centers also provide opportunities for establishing telecommuting centers-small, Main Street office complexes with telecommunications links to central offices of large corporations or government departments. 66 As a consequence, commuting patterns and service locations also begin to change; a worker might bicycle to a suburban satellite office cluster or telecommuting center, for example, rather than commute by car or public transportation to a downtown headquarters.

....

But the prophets of urban dissolution underestimated the inertia of existing patterns, and the reality that has evolved in the 1980s and 1990s is certainly more complex than they imagined. The changing relative costs of telecommunication and transportation have indeed begun to affect the location of office work. 73 But weakening of the glue that once firmly held office downtowns together turns out to permit rather than determine dispersal; the workings of labor and capital markets and the effects of special local conditions often end up shaping the locational patterns that actually emerge from the shakeup. 74 Perhaps the time has not yet come to bid farewell to those vertiginously vainglorious corporate monuments that have defined the great downtowns of the twentieth century. But they no longer seem so inevitable. Given a choice, many of us may prefer working with a net.

At Home / @Home

The domestic living room is emerging as a major site at which digitally displaced activities are recombining and regrounding themselves in the physical world. It's not just in the homes of electroyuppies, digirati, and chiphead hobbyists. In many places now, news and entertainmen t, educatio n, work, shopping and bankin g, and lots of general social interaction are starting to flow in and out through small, housebroken, electronic boxes. We are, it seems, seeing a reversal of the "gradual divorce of the home ... from the workplace" that Lewis Mumford's narrative The City in History located in the seventeenth century. 75 Couch potatoes and cable company executives have been quick to define the consumer electronic appliances that accomplish this as more intelligent descendents of the television set. But there is much more to them than that; they might equally well be regarded as smart, multimedia telephones or as domesticated computers. 76 They insinuate themselves in among familiar furnishings and appliances and displace or eliminate their roles.

In some ways, an information appliance hooked up to a high-bandwidth cable is a lot like an old-fashioned mailbox. It is where information streams into the house and is decoded, and, conversely, it is where information is encoded and sent out in digital form. But there is, of course, no need to hang it on the front door. It can be wherever cables can reach. It can even be wireless. The postman now knocks anywhere.

When attached to a display device (like a television set or personal computer monitor), such an appliance presents itself as a hearth that radiates information instead of heat. Just as the fireplace with its chimney and mantel was the focus of a traditional living room, and later became the pivot point for Frank Lloyd Wrigh t's box-busting house plans, so the display-the source of dat a, news, and entertainment -now bids to become the most powerful organizer of domestic spaces and activities. In most rooms, it's what most eyeballs are most likely to lock onto most of the time.

Connected to an appropriate paper-processing mechanism, an appropriately configured information appliance can receive or send a fax, make a copy of a document, or deliver today's newspaper right into your hand. Printe r, photocopie r, fax machin e, and newspaper delivery box all condense into one compact device. It becomes the new reading and writing desk, and it belongs in the study or the home office, beside the recycling bin.

An information appliance can also create electronic stoops-places where you can hear and be heard, or see (on a display) and be seen (via a video camera) without completely relinquishing the privacy and controllability of the home. But these places need not be positioned (like the old urban stoops lauded by nostalgic planning theorists) at the boundary between private property and the street; they can just as easily be internal, thus restructuring the traditional public-to-private hierarchies of domestic space.

For a designer of domestic space, these differences do matter. When information appliances are treated as interactive televisions or as electronic hearths, small groups of people will sit around them in living rooms, view them from distances of eight to ten feet, and probably control them with hand-held remote devices. Where they are assimilated to the tradition of the personal computer, individuals in dens and studies will view them from distances of about eighteen inches and use keyboards. If they are configured as two-way videophones that create zones of semi-public space, then we will not want them in bedrooms or bathrooms, but if they are equipped with medical monitoring devices, then that is precisely where we will need them.

Increasingly, homes will be places with network addresses as well as street addresses. The functions of the various interior spaces will be established, in large part, through installation of specialized information spigots and collectors. And, as networks and information appliances deliver expanding ranges of services, there will be fewer occasions to go out.

Decomposition / Recombination

This sort of analysis reveals only part of the story, though. Efficient delivery of bits to domestic space will, in addition, collapse many of the spatial and temporal separations of activities that we have long taken for granted. Many of our everyday tasks and pastimes will cease to attach themselves to particular spots and slots set aside for their performance-workplaces and working hours, theaters and performance times, home and your own time-and will henceforth be multiplexed and overlaid; we will find ourselves able to switch rapidly from one activity to the other while remaining in the same place, so we will end up using that same place in many different ways. It will no longer be straightforward to distinguish between work time and "free" time or between the space of production and the space of consumption. Ambiguous and contested zones will surely emerge.

Imagine, for example, that you are in your living room at eight o'clock in the evening. One window on your screen connects you to a database on which you are paid to work, another shows the news from CNN, and another puts you in a digital chat roo m. You switch your attention back and forth-mostly dealing with the database, but keeping an eye on the news and occasionally interjecting a comment into the interesting conversation that is unfolding in the chat room. Children come and go, making their usual demands, and you sometimes turn your attention to them. Are you at work or at play? Should you be charging your time (or some percentage of it) to your employer? If so, is your supervisor entitled to check up on you by monitoring the screen display? Are you occupying tax-deductible work space or nondeductible living space?

Such instabilities and ambiguities in space use also challenge traditional ways of representing social distinctions and stages of socialization.77 In many societies there are well-defined, separate places in the dwelling for men, women, and children and for family members and for guests; different information circulates in these different spatial settings.

Young children may be isolated and protected in nurseries and playgrounds, and there may be architecturally differentiated places for adolescents, adult breadwinners, and retirees. At an urban scale, prisons, convents, residential colleges, orphanages, hospices, halfway houses, official residences for political and religious leaders, and low-income housing projects make vivid social distinctions by creating readily identifiable, physically discrete domains. But categories lose their clarity, and rites of passage require redefinition, when the uses of built space are no longer permanently assigned and depend from minute to minute on software and the fleeting flow of bits.

Thus there will be profound ideological significance in the architectural recombinations that follow from electronic dissolution of traditional building types and of spatial and temporal patterns. Opposing ideologues have lost no time in pressing upon us their tendentious visions of this restructuring. To the right, some futurologists (particularly Alvin Toffle r) 78 have painted a neo- Norman Rockwell picture of cozy electronic cottages that "glue the family unit together again." As Toffler sees it, "The electronic cottage raises once more on a mass scale the possibility of husbands and wives, and perhaps even children, working together as a unit." With the anticipated decline in commuting to work, and the increasing possibility of changing jobs without changing houses, we can expect "greater community stability" and "a renaissance among voluntary organizations like churche s, women's groups, lodges, clubs, athletic and youth organizations." He imagines a cozy return to the days of the loom in the living room, the farmhouse dairy, and merchants who lived above the shop, and to the community structures that accompanied these arrangements.

From the left, eliminating the spatial and legal distinctions between home and workplace usually looks more like an insidious strategy to decentralize and proliferate the Dark Satanic Mill. It removes the possibility of finding any refuge from the workplace, encourages long and irregular work hours, impedes organization of workers and regulation of workplace conditions, and puts women right back in the home. Domestic space becomes electronic sweatshop. In the resulting digital dystopia, "Landmarks are likely to be financial complexes and electronic skyscraper-fortresses, cordoned off from depleted and decaying inner city residential areas," while more affluent private estates and apartments are "sealed off from the surrounding community by elaborate surveillance and security systems." 79 We can formulate these issues in social equity terms. Shall we allow home-based employment, education, entertainment, and other opportunities and services to be channeled to some households and not to others, thereby technologically creating and maintaining a new kind of privilege? Or can we use the infobahn as an equalization mechanism-a device for providing enhanced access to these benefits for the geographically isolated, the homebound elderly, the sick and disable d, and those who cannot afford wheels?

We can also formulate them as questions about architecture's fundamental representational role. If we can no longer make the traditional urban distinction between, on the one hand, major public and commercial buildings that represent institutions, and, on the other hand, relatively uniform and repetitive housing areas, how shall we make social organization and power legible? Going out, going to work, going to school or to church, going away to college, and going home are economically significant, socially and legally defining, symbolically freighted acts. To change or eliminate them, as electrocottages and cybercondos promise to do, is to alter the basic fabric of our lives.

Programmable Places

Building type by building type, the story is much the same. The floor plan of a traditional store, library, theater, school, bank, stock exchange, office, home, or any other kind of building clearly shows how it works: you see particular places for the various activities that are to be housed, together with a circulation system of doors and passageways that integrates these parts into a functioning whole. If you look at the site plan, you can also see how entry and exit points, windows, and walls relate the whole composition to its natural setting or urban context. And at an urban scale, streets and public places interconnect buildings.

Classical architects of the eighteenth and nineteenth centuries handled the task of putting spaces together by creating hierarchies of great and small spaces around axial, symmetrical circulation systems connected to grand, formal entries and public open spaces. 80 With the aim of being as logical and efficient as possible, functionalist modernists of the twentieth century have often derived their less regular layouts directly from empirically established requirements of adjacency and proximity among the necessary spatial elements. 81 But when telecommunication through lickety-split bits on the infobahn supplements or replaces movement of bodies along circulation paths, and when telepresence substitutes for face-to-face contact among the participants in activities, the spatial linkages that we have come to expect are loosened. The constituent elements of hitherto tightly packaged architectural and urban compositions can begin to float free from one another, and they can potentially relocate and recombine according to new logics. Perhaps it is not too romantic to imagine that unique natural environments, culturally resonant urban settings, and local communities that hold special social meaning will increasingly reassert their power. Perhaps we will find compelling advantages to putting together spaces-like living spaces and work space -that were once thought to belong in different buildings located in different zones of the city. In any case, the old bonds break down and new groupings can begin to form.

Simultaneously, the fresh requirements of the infobahn age suddenly kick in. Buildings and parts of buildings must now be related not only to their natural and urban contexts, but also to their cyberspace settings. Increasingly, they must function as network interfacesloading docks for bits. They must be equipped with electronic sensors and effectors, onboard processing power, sophisticated internal telecommunications capabilities, software, and capacity for getting bits on and offmuch like computer screen space that can be programmed for many different uses. Instead of living rooms, we will have domestic spaces that can be programmed for work, education, and entertainment. In place of today's centralized schools and hospitals, we will have systems for projecting specialized expertise into many different placesfrom airplane seats to isolated rural community centers-wherever and whenever it is required. Instead of building huge suburban theme parks filled with different rides, entertainment moguls will construct networks of much smaller, reprogrammable, simulation rides. 82 Rooms and buildings will henceforth be seen as sites where bits meet the body-where digital information is translated into visual, auditory, tactile, or otherwise perceptible form, and, conversely, where bodily actions are sensed and converted into digital information.

Building these programmable places is not just a matter of putting wires in the walls and electronic boxes in rooms (though that is a start). As the relevant technologies continue to develop, miniaturized, distributed computational devices will disappear into the woodwork. Keyboards and mouse pads will cease to be the only bit-collection zones; sensors will be everywhere. Displays and effectors will multiply. In the end, buildings will become computer interfaces and computer interfaces will become buildings.

Architects of the twenty-first century will still shape, arrange, and connect spaces (both real and virtual) to satisfy human needs. They will still care about the qualities of visual and ambient environments. They will still seek commodity, firmness, and delight. But commodity will be as much a matter of software functions and interface design as it is of floor plans and construction materials. Firmness will entail not only the physical integrity of structural systems, but also the logical integrity of computer systems. And delight? Delight will have unimagined new dimensions.

Chapter 5
Soft Cities

In a world of ubiquitous computation and telecommunication, electronically augmented bodies, postinfobahn architecture, and big-time bit business, the very idea of a city is challenged and must eventually be reconceived. Computer networks become as fundamental to urban life as street systems. Memory and screen space become valuable, sought-after sorts of real estate. Much of the economic, social, political, and cultural action shifts into cyberspace. As a result, familiar urban design issues are up for radical reformulation.

Real Estate / Cyberspace I was there at the almost-unnoticed Big Bang-the silent blast of bits that begat the new communities of the digital era. It was UCLA, fall 1969, and I was a very young assistant professor writing primitive CAD software and trying to imagine the role that designers might play in the emerging electronic future. In a back room just down the hallway from the monster mainframe on which I worked, some Bolt Beranek and Newman engineers installed a considerably smaller machine that booted up to become the very first node of ARPANET -the computer network that was destined to evolve into the worldwide Internet. 1 From this inconspicuous point of origin, network tentacles grew like kudzu to blanket the globe. By December there were four ARPANET nodes. In April 1971 there were 23, in June 1974 there were 62, and in March 1977 there were 111. Soon, cyberspace was busting out all over: two more important networks, CSnet (funded by the National Science Foundatio n) and BITNET (funded by IB M) developed in the early 1980s. A high-speed backbone (NSFnet) was in place by July 1988; this connected thirteen regional networks scattered across the United States-much as the interstate highway system linked local road networks-and the whole loosely organized system became known as the Internet. During the late 1980s and early 1990s more and more networks connected to the Internet, and by 1993 it included nearly two million host computers in more than 130 countries. In the first six months of 1994 more than a million additional machines were hooked up.

In the United States, by that point, there was one Internet host for every couple of hundred people. 2 (Take care in interpreting these figures, though; the actual density is likely to be much higher in affluent, computer-literate places like Cambridge, Massachusett s, and Palo Alto, Californi a, and much lower in inner-city Detroit or East Los Angeles.) According to the best estimates-but in truth, nobody really knew-there were more than thirty million active users. 3 While the Internet community was evolving into something analogous to a ramshackle Roman Empire of the entire computer world, numerous smaller, independent colonies and confederations were also developing. Dial-in bulletin board systems such as the Sausalito-based WEL Lmuch like independent city-states-appeared in many locations to link home computers. 4 Commercial online services such as Compuserv e, Prodig y, and America Online emerged in parallel to the government-sponsored, education-and research-oriented Internet. Before long, though, most of these erstwhile rivals found it necessary to join forces with the Internet.

There would not have been a great deal to connect if computers had remained as large and expensive as they were when ARPANET began in 1969. But as networks developed, so did inexpensive personal computers and mass-marketed software to run on them. The very first, the Altair, showed up in 1974, and it was followed in the early 1980s by the first IBM PCs and Apple Macintoshes. Each one that rolled off the assembly line had its complement of RAM and a disk drive, and it expanded the potential domain of cyberspace by a few more megabytes of memory.

Somewhere along the line, our conception of what a computer is began to change fundamentally. It turns out that these electronic boxes are not just big, fast, centralized calculating and data-sorting machines, as ENIA C, UNIVA C, and their mainframe successors had led us to believe. No, they are primarily communication devices -not dumb ones like telephone handsets, that merely encode and decode electronic information, but smart ones that can organize, interpret, filter, and present vast amounts of information. Their real role is to construct cyberspace-a new kind of place for human interactions and transactions.

....

On the Spot / On the Net

Why do some places attract people? Often, it is because being on the spot puts you in the know. The merchants' coffeehouses of eighteenth-century New York, for instance, provided opportunities to get the latest shipping information, to meet potential trading partners, and to exchange other important commercial information. 13 Depending on your trade, you might find the need to locate in the financial district, the garment district, or SoHo, on Harley Street, Fleet Street, or Lincoln's Inn Fields, in Hollywoo d, Silicon Valle y, or Detroi t. You might be attracted to the literary salon, the corner saloon, or the Cambridge high table. It's not just a matter of where the jobs are, but of where you can exchange the most up-to-date, specialized information with the most savvy people; you may be able to do the same work and pursue similar interests if you are out in the sticks, but you are likely to feel cut off and far from the center of things.

In cyberspace, list servers soon evolved to perform some of the same functions. These are programs for broadcasting e-mail messages to all the "subscribers" on specified address lists. They are like electronic Hyde Park Corners-places in which anybody can stand up and speak to the assembled crowd. Lists may assemble formal groups such as the employees of a business, or the students enrolled in a class, or they may be constructed through some informal, self-selection process. As with physical assemblies, some lists are public and some secret, some are open to anybody and some are rigorously exclusive.

Electronic "newsgroup s" were also quick to develop. Newsgroup software allows participants to "post" text messages (and sometimes other sorts of files), much as you might pin printed notices to a physical bulletin board. The notices-queries, requests, responses, news items, announcements, tips, warnings, bits of gossip, jokes, or whatever-stay there until they are deleted, and anyone who enters the place can read them. Usually there is a hosta sort of Cyber de Stael or Virtual Gertrude presiding over an online rue de Fleury-who sets topics, coaxes the exchanges along when they flag, and occasionally kicks out an unruly or objectionable participant. 14 By the 1990s there were countless thousands of these places, advertising every interest you might imagine and some that you surely would not. If you wanted to be in touch and up with the latest in your field, it was increasingly important to have ready access to the right newsgroups. And your physical location no longer mattered so much.

When there is a sudden need, ad-hoc newsgroups can spring almost instantly into existence. Within hours of the January 1994 Los Angeles earthquake, there was a Usenet newsgroup called alt.current-events.la.quake. Long before the rubble had been swept from Wilshire Boulevard and before telephone service had unjammed, it was providing a place to post damage reports and find news about friends and relatives. It was the best place to be if you wanted to know what was going on.

The virtual communities that networks bring together are often defined by common interests rather than by common location: Unix hacker s, Amiga enthusiast s, Trekkie s, and Deadheads are scattered everywhere. But the opposite can also be true. When networks and servers are organized to deal with information and issues of local concern to the people of a town or to the students, staff, and faculty of a university, they act to maintain more traditional, site-specific communities. So, for example, the City of Santa Monica's pioneering Public Electronic Network (PEN) is available only to residents of Santa Monica, to people who work in the city, or at thirty-five public-access terminals located within the city boundaries.

15 And the Athena educational network was put in place on MIT's Cambridge campus to serve the MIT community.

Street Networks / World Wide Web

Ever since Ur, urban places have been linked by movement channels of various kinds: doorways and passageways have joined together the rooms of buildings, street grids have connected buildings to each other, and road and rail networks have allowed communication between distant cities. These familiar sorts of physical connections have provided access to the places where people lived, worked, worshipped, and entertained themselves.

Now there is a powerful alternative. Ever since the winter of 1994, I have had a remarkable piece of software called Mosaic on the modest desktop machine that I'm using to write this paragraph. 16 (Right now, Mosaic is open in another window.) Mosaic is a "client" program that provides convenient access to World Wide Web (WWW) servers located throughout the Internet. These servers present "pages" of information, which may be in the form of text, graphics, video, or sound. Pages typically have "hyperlinks" pointing to related pages elsewhere in the Web, allowing me to jump from page to page by clicking on highlighted text or images.

The "home page" of any WWW server invites me to step, like Alice through the looking glass, into the vast information flea market of the Web--a cyberspace zone now consisting of countless millions of interconnected pages. The astonishing thing is that a WWW page displayed on my screen may originate from a machine located anywhere on the Internet. In fact, as I move from page to page, I am logging into computers scattered around the world.

....

Public Space / Public Access

Once public and private spaces are distinguished from each other they can begin to play complementary roles in urban life; a well-organized city needs both. 32 And so it is in cyberspace. At the very least, this means that some part of our emerging electronic habitat should be set aside for public uses-just as city planners have traditionally designated land for public squares, parks, and civic institutions. Public pressure for this grew in the 1990s as the importance of cyberspace became increasingly clear. In 1994, for example, Senator Inouye of Hawaii introduced to the US Senate a bill that would reserve 20 percent of all new telecommunication capacity for free, public uses (noncommercial educational and informational services and civic discourse) and would provide funding for those uses. 33 But urban public space is not merely un-private-what's left over when everyone walls off their private domains. A space is genuinely public, as Kevin Lynch once pointed out, only to the extent that it really is openly accessible and welcoming to members of the community that it serves. 34 It must also allow users considerable freedom of assembly and action. And there must be some kind of public control of its use and its transformation over time. The same goes for public cyberspace, so creators and maintainers of public, semipublic, and pseudopublic parts of the online world-like the makers of city squares, public parks, office building lobbies, shopping mall atriums, and Disneyland Main Streets-must consider who gets in and who gets excluded, what can and cannot be done there, whose norms are enforced, and who exerts control. These questions, like the complementary ones of privacy and encryption, have become the foci of crucial policy debates.

The Internet and commercial online services like America Online and Compuserve have to date provided only semipublic cyberspace at best, since they are widely but not universally accessible; you have to belong to a subscribing organization or have to pay to get in. This begs the question of how truly public cyberspace-the equivalent, say, of the Piazza San Marco in Venice-might be constructed. The community networks that emerged in the 1980s and 1990s- Santa Monica Public Electronic Networ k, Blacksburg Electronic Villag e, Telluride InfoZon e, Smart Valle y, and Cambridge Civic Networ k, for examplesought answers by trying to make network access openly available to entire communities in the same way that city hall and the local public parks traditionally have been. 35 Many of these community networks are structured as so-called free-net s, in which a "city" metaphor is explicitly used to structure information access: you go to the appropriate "building" to find the information or services that you want. Thus the "welcome" screen of the Cleveland Free-Net (one of the oldest and largest, with more than 35,000 registered users and over 10,000 log-ins per day) presents the following quotidian directory:

1. The Administration Building 2. The Post Office 3. Public Square4. The Courthouse and Government Center 5. The Arts Building 6. Science and Technology Center7. The Medical Arts Building 8. The Schoolhouse (Academy One) 9. The Community Center and Recreation Area10. The Business and Industrial Park 11. The Library12. University Circle13. The Teleport14. The Communications Center15. NPTN/USA Today Headline News On the free-net model, then, the new, virtual city becomes a kind of electronic shadow of the existing physical one. In many (though not all) cases, a citizen can choose between going to an actual public building or to the corresponding virtual one.

Being There / Getting Connected

But a free-net's superimposition of the virtual onto the physical, while sensible enough, is not a logical or technical necessity. In fact, one of the most interesting questions for twenty-first-century urban designers to ask is, "How should virtual and physical public space relate to one another?" Consider the obvious options. There is complete dissociation of the two if the electronic public space is accessible only from personal computers in homes and businesses. Another possibility is to associate access points with civic architecture: put an electronic information kiosk in the lobby of city hall or in the public library, for example. The Berkeley Community Memory and Santa Monica PEN systems have demonstrated a more radical strategy by placing rugged workstations in places like laundromats and at congregation points for the homeless; these workstations thus begin to play a public role much like the traditional one of fountains in the public places of Rome. The artist Krzysztof Wodiczko has gone a step further by suggesting that the physically homeless and displaced might carry electronic "alien staffs"personal devices that connect them to cyberspace and sometimes construct public representations of self by providing information to others about who they are and where they come from. These are public rather than personal digital assistants.

Since physical distance means little in cyberspace, the possibility also exists to "condense" scattered rural communities by creating public spaces that serve large, thinly populated areas. The Big Sky Telegrap h, which has been running in Montana since 1988, successfully pioneered this idea. 36 It began by linking one-room and two-room rural schoolhouses across the state, and it has focused on education, economic opportunity, and economic self-sufficiency.

In economically disadvantaged communities, where adequate public facilities of a traditional kind do not exist, the possibility of providing public cyberspace may become an important community development issue. Increasingly, communities and their planners will have to consider tradeoffs between investing scarce resources in creating or upgrading parks and community buildings and putting the money into effective electronic networks.

Whatever approach is taken to deploying network capacity for public purposes, though, simply making computers available and providing some kind of electronic access to civic information and discourse is not enough to create successful public cyberspace. Just as parks and squares must be pleasant and welcoming to a diverse population in order to function effectively, so must the interfaces to public areas of cyberspace; an interface that depends on cryptic commands and arcane knowledge of computer technology is as much a barrier to most people as is a flight of steps to a park user in a wheelchai r. People must also feel secure and comfortable-not subject to hostility, abuse, or attack. And more subtly, but just as importantly, the cultural presumptions and cues that are built into an interface must not discourage potential users. 37 Think of important physical public spaces like New York's Central Park and consider the extent to which both their successes and their failures depend on these sorts of things; designers of public cyberspace will have to deal with them as well.

Community Customs / Network Norms Where public cyberspace exists, how can and should it be used? Do the customs and laws that govern physical public space still make sense in this new context?

As usage of the Internet and commercial online services has grown, there have been increasingly frequent disputes that have tested the limits of acceptable behavior in electronic public places and raised the question of how these limits might reasonably be enforced. In April 1994, for example, some particularly thick-skinned lawyers from Phoenix spammed the Internet by indiscriminately spraying a commercial advertisement for the services of their firm into thousands of newsgroups. 38 This blast of unwanted bits had the same effect as driving a blaring sound truck into a public park. The Internet community reacted with outrage and disdai n, and flamed back tens of thousands of complaints. One of the unrepentant perpetrators proclaimed his right to be a pain and threatened to do it again.

Eventuallyto cries of "censorshi p!" from some quarters-a young Norwegian programmer wrote and unleashed an effective piece of "cancelbo t" software that sniffed out and automatically removed the offending advertisements wherever they showed up. 39 In another widely publicized incident that unfolded almost simultaneously, a graduate student at MIT was busted by the FBI for operating an Internet bulletin board that had become a very active site for illegal activity -much like a bar in which drug deals were going down. Copies of commercial software were being posted, then downloaded without payment by users who logged in from all over the world. Was the operator of this openly accessible place responsible for knowing and controlling what was going on there? Or could he rightfully claim that it was just none of his business?

Like the proprietors of shopping malls and Disneylands, the operators of commercial online services must struggle with the inherently contradictory nature of the semipublic places they create. On the one hand, these places need lots of paying customers to support them, so they have to seem as welcoming, open, and inclusive as possible. On the other hand, though, the operators want to stay in firm control of what goes on. (The question is often framed as one of whether these services should be regarded as common carrier s, like the telephone companies, and therefore not responsible for any libelous, obscene, or criminal information that they might carry or whether they should be in control and therefore held responsible like book and newspaper publishers and television broadcasters.) The last time I peeked at Prodig y, for example, I found the following notice from the management (a bit like the "Do not spit" signs that used to appear in railway stations): "And please remember that PRODIGY is for people of all ages and backgrounds. Notes containing obscene, profane or sexually explicit language (including descriptions of sexual acts, and whether or not masked with `x's and the like) are not allowed. A good test is whether the language in your note would be acceptable at a public meeting." Prodigy explicitly aims at a family audience, so it remorselessly enforces the norms of Middle America. 40 Its competitors Compuserve and Genie have different sorts of constituencies, but their operators also take care to remove messages they consider obscene or illegal. And America Online has shut down some feminist discussion forums because, according to a spokesperson, kids might see the word "girl" in the forum's headline and "go in there looking for information about their Barbie s." 41 The excluded feminists might be forgiven for responding in not-for-prime-time language. And forget the `x's. These places have found a useful role to play, but don't mistake them for genuine, open-to-all, watch-out-for-yourself spaces for unconstrained public discourse.

....

Chapter 6
Bit Biz

Follow the money! If you want to understand how a community--physical or virtual--has grown and survived, look to its economic base.

You will see that the ancient cities of Mesopotamia, the Nile, the Indus, and the Yellow River were made possible by invention of the wheel, the plow, and the irrigation ditch; they emerged in the midst of fertile agricultural hinterlands and busied themselves with the accumulation and exchange of excess agricultural production. When barbarian invaders threatened, cities like Rome and Constantinople became fortified enclosures with large military populations engaged in protecting the citizenry and civil institutions. With the development of maritime trade, Venic e, Pisa, and Geno a-owing to their favorable locations-flourished as mercantile centers. With steam and steel in the nineteenth century came mushrooming industrial cities like Manchester and Pittsburg h. And in the soft cities of cyberspace the economic engine is the bit business-the production, transformation, distribution, and consumption of digital information. 1 Economics 101 / Economics 0 and 1 Colin Clark's textbook-enshrined distinctions among economic sectors suggest that we should expect, first of all, to find a primary production level at the foundation of the bit business. And indeed, useful information is now continually harvested from the world by keyboards, microphones, video cameras, surveillance satellites, point-of-sale terminals, and desktop document scanners, and then stored in databases like wheat in silos. There are innumerable small operations, and there are a few massive bit extraction and refining enterprises, such as those converting large libraries and image collections into digital form and putting them online.

At the level corresponding to secondary industry in Clark's schema, raw bits are transformed into information products and distributed to consumers. Here, software takes command; its role in information economies is similar to that of industrial machinery and manufacturing plants in industrial ones. (Some day, perhaps, some enterprising urban historian will produce a history of industrial and commercial application software that parallels Sigfried Giedion's cataloguing and celebration of early machines in Mechanization Takes Command. ) Sometimes production and distribution operations are related in something approximating the traditional, industrial way-as when a publisher uses databases and document-production software to create a newsletter, then e-mails copies to subscribers. Increasingly, though, the production capabilities are shifting to the consumer end-as when a wire service feed flows into a personal computer, where stories are automatically selected and laid out by personal newspaper-production software. Potentially, each node in a computer network is both a production and a consumption site for information products, and the channels carry a complex, multiway information trade.

In cyberspace, the tertiary Clarkian level becomes that of information retailers, brokers, agents, and middlemen. The editors and publishers of a scientific journal, for example, provide the essential services of evaluating the relevance and scientific merit of submitted papers and selecting the best for publication. Though production and distribution mechanisms for traditional print journals and emerging online journals are very different, this information-brokering function remains. Similarly, when gatherings shift from bars to bulletin boards, there is still a need for somebody to serve as "innkeeper" to keep the premises in order and the conversation moving along. And as retailing and banking go online, sales jobs move to cyberspace.

Networks and cyberspace communities connect players in the different sectors, much as transportation systems and cities on the ground have always done. Like farmers putting their wheat on the railroad to get it to markets and consumers, primary producers of information can put their bits on the Net. Manufacturers of information products can find suppliers and raw materials on the Net, then ship their finished work back out. Sales people and professional consultants can set up shop at network addresses instead of at locations on Main Street. If you surf around the World Wide Web for a while, or explore the offerings of any commercial online service, you will find booming activity at all of these levels.

Tangible Goods / Intellectual Property This activity only exists, of course, because people have come to value bits. So they are willing to spend resources on creating, acquiring, storing, transforming, and transferring bits. They find that they are interested in trading bits, and in many cases they want to protect their bits.

Lawyers like to look at valuable bits as a form of intellectual propert y, like texts printed on paper or movies distributed on videotape. They reason that incentives for the creation of digital works are needed, so creators should have limited monopolies that allow them to make money from their intellectual contributions while society as a whole benefits from the production and distribution of knowledge. It follows, then, that cyberspace economic activity should be regulated by copyright and patent law, though perhaps modified and extended to take account of the novel characteristics of digital media and distribution systems.

But the "property" metaphor can be misleading, since digital artifacts (such as application software files, text files, and digital movies and audio files) differ from tangible property like land, buildings, automobiles, and printed books in several crucial ways. 2 They can be reproduced indefinitely at trivial cost, and through telecommunications networks they can be distributed almost instantaneously throughout the world. They take up very little storage space, and they can often be moved around undetectably. In many contexts, it is quick and easy to transform and combine existing digital information to produce new works that may seem very different.

Most importantly perhaps, one person's use of a file or some application software need not interfere with or prevent another's use of the same resource. Land is different: if I build on a lot, then you cannot. So are automobiles: if I have the family car, then you do not. So, even, are books and videotapes: if I check out a copy of some work from the library, then other users cannot. By contrast, the digital resources that are available in cyberspace do not have to be scarce resources. And it is a queer kind of property that can be valuable without being intrinsically scarce.

Because of these differences, the growing cyberspace business community is finding that it cannot rely on either the traditional legal mechanisms for protecting the bits that it sells and barters or on familiar ways of assuring payment. Infobahn-oriented strategies are emerging.

For example, providers of news archives and other large, frequently updated databases may charge users not for the information that they download but for the time spent logged in to the provider's server to conduct searches; since the retrieved information is most valuable when it has been extracted from the latest version of the database, users have an incentive to perform (and pay for) new searches rather than to rely on bootleg copies of the results of old searches. Or, where users receive continuous streams of information-as in the case of the news feeds that are used to create personalized newspapers-payment can be by subscription; where subscriptions are not paid, the information stream can be cut off. In the case of online books and journals, and of movies on demand, providers can maintain comprehensive online catalogues that allow users to get quickly and conveniently to what they want, then the providers can charge fees for downloading the material to the user's printer or viewing device.

Invention of mechanisms like these is one part of the answer to the problem of constructing a workable framework for cyberspace business -one that adequately protects the originators and distributors of bits, while avoiding unnecessary impediments to the free flow of information. Another part is the development of intellectual property law to cover the new situations that arise in cyberspace. Yet another -perhaps most important of all-is the emergence of a broadly shared sense of morality in these matters. Whatever technical and legal controls are implemented will succeed only to the extent that they have community acceptance; unresolved moral disputes will create conflict among members of cyberspace communities just as surely as they do in other contexts.

Moving Material / Processing Bits

It would be easy to miss the point by pushing this sort of analysis to its logical extreme and so concluding that cyberspace economic activity operates autonomously in its own realm-disconnected from material, place-based operations. But bits often have value precisely because they tell us something about the material world and can usefully guide our actions in that world. In fact, the electronic linkages of cyberspace largely serve (as Manuel Castells has put it) to "connect agriculture and manufacturing with the consumption of goods and services, and with the management of organizations and institutions of society." 3 The emerging result seems to be a complex interaction between established, geographically located urban and regional economies and the increasingly powerful effects of long-distance, almost instantaneous information flows within worldwide virtual communities.

Geographers, economists, and planners will have to gather data and do some careful analysis to sort out what is really going on, but here are some plausible guesses. First, there are growing forces acting to decentralize economic activity. Managers and professionals are increasingly able to scatter across the globe while reintegrating their activities through telecommunications. The mobility of capital has been heightened. A world economy can now function in real time. Firms can maintain unity of management while decentralizing production and participating in markets worldwide. At the same time, there are some vigorous centralizing forces. Production processes remain ultimately dependent on appropriation and transformation of matter, so industrial locations are still largely determined by local availability of raw materials and access to labor markets. Furthermore, the initial development of an advanced telecommunications infrastructure is likely to favor existing urban centers (with their high and profitable concentrations of information work) over small towns and remote areas. In the end, these opposing forces will have complex and socially differentiated effects on urban and regional development processes and on industrial, commercial, and residential locational patterns. There is no simple formula.

So cyberspace communities-like eighteenth-century seaports, nineteenth-century railroad town s, and mid-twentieth-century motel/fast-food strip s-play specialized roles within the complex new economic order that develops as a new kind of infrastructure is deployed.

They are stops on the infobahn. The world's apparently insatiable greed for bits will fuel their growth, as demand for manufactured goods drove development of earlier industrial cities and transportation centers. They will flourish as places to make bucks from bits by producing them, owning them, moving them, brokering them, gambling with them, skimming them, stealing them, and inventing new ways to add value to them.

Physical Transactions / Electronic Exchanges Historically, communities have fostered economic activity by providing specialized settings for buyers and sellers to meet and exchange goods and services. 4 In Politics Aristotle proposed that a city should have both a "free" square in which "no mechanic or farmer or anyone else like that may be admitted unless summoned by the authorities" and a marketplace "where buying and selling are done ... in a separate place, conveniently situated for all goods sent up from the sea and brought in from the country." 5 Ancient Rome had both its fora civilia for civic assembly and its fora venalia for the sale of food. These Roman markets were further specialized by type of produce; the holitorium was for vegetables, the boarium for cattle, the suarium for pigs, and the vinarium for win e. Medieval marketplaces were places both for barter and exchange and for religious ritual. Modern cities have main streets, commercial districts, and shopping malls jammed with carefully differentiated retail stores in which the essential transaction takes place at the counter-the point of sale-where money and goods are physically exchanged.

In cyberspace the necessary connection of buyers and sellers is established not through physical proximity but through logical linkage. It is all done with software and databases. Merchants get to potential customers by accessing lists of electronic addresses; the key to successful marketing is not being in the right neighborhood with the right sorts of customers for whom to lay out wares, but (as with the older strategy of direct-mail marketing) having the right lists for sending out advertising. Conversely, customers get to merchants by accessing online catalogue s; to search efficiently for particular goods, they need appropriate collections of catalogue pointers rather than convenient access to specialty stores and shopping districts. Lists of lists and catalogues of catalogues provide convenient starting points for making business connections, much as merchants of different kinds might cluster together in a bazaar or shopping center. 6 Technically, then, the logical pointers linking merchants and customers can run in either direction. But there is a question of who is in control. Do the merchants compile, maintain, sort, and filter all the databases, and decide when and where to direct their advertising? This raises questions about possible invasion of privacy by pinpoint marketers, of how customers can fend off unwanted advertising, of who has the right to initiate transactions, and of whether some groups may be systematically denied information about things that they need (a new form of redlinin g). 7 Or do customers construct and maintain databases of pointers to catalogues they find useful and get product information only when they request it? This makes it difficult to market new products and difficult for new merchants to break into markets. So a successful cyberspace marketplace probably needs some appropriate balance of the two.

....

Immaterial goods such as insurance policies and commodity futures are most easily traded electronically. The idea is readily extended to small, easily transported, high-value specialty items-books, computer equipmen t, jewelr y, and so on-the sorts of things that have traditionally been sold by mail order. But it makes less sense for grocery retailing and other businesses characterized by mass markets, high bulk, and low margins. Cyberspace cities, like their physical counterparts, have their particular advantages and disadvantages for traders, so they are likely to grow up around particular trade specializations
....

Territory / Topology

While spatially defined power erodes in cyberspace, though, another kind of power arises to take its place-that of the system operators (sysops). Whoever runs a machine that serves as a network node can grant or deny user access to that node and can switch on or black out whatever subnetwork that node runs. Sysops can control the inflow of bits into a machine, decide which bits get stored there and which do not, determine which bits can be processed and in what ways, and control the outflow. So look to network topologies, not to jurisdictional maps, to discover patterns of control and power. In particular, look for strategic bottlenecks, the cyberspace Khyber Passes, through which many things flow but which can easily get cut off. These are the sites where real power is exerted. 27 You will quickly see that operators of dial-in bulletin boardslike despotic rulers of walled city-states-can completely control them. Commercial online services like Compuserve and America Online also centralize power, but on a much larger scale, and they have to answer to very diverse and potentially fractious user communities. The private networks run by banks and other large business organizations are closed to outsiders and answer only to themselves.

The Internet, by contrast, is a huge, loose confederation of thousands of smaller, usually locally run, computer networks. Its structure is highly redundant (a feature ultimately deriving from its roots in the old ARPANET, which was deliberately given a distributed, redundant structure so that it could survive partial nuclear destruction and the knockout of military headquarters); there are normally many different ways to transmit a message from one node to another. 28 There are few Khyber Passes on the Internet, then, and there is no very effective way to grab control of it. Unlike banana republics, it does not have a clear center of authority to take over in a coup. It is a remarkable political invention-a very large-scale structure with significant built-in capacity to resist concentrations of power and authoritarian control.

But uncontrolled territory has its dangers. To protect themselves from the outlaws, interlopers, and subversives who may lurk on the wide-open Internet frontier, many commercial and governmental organizations have begun to create "firewalls"-secure computers interposed between their internal networks and the Internet outside. As in ancient walled cities, these organizations then have narrow gates that allow traffic to go out but can be defended against unwanted intrusions.

So a new logic has emerged. The great power struggles of cyberspace will be over network topology, connectivity, and access-not the geographic borders and chunks of territory that have been fought over in the past.

Electoral Politics / Electronic Polls To Aristotle the idea of a placeless, borderless community would have seemed very strange;

it appeared self-evident to him that a state -a self-governing political unit-had a definite, bounded territory in which the citizens lived and over which they exerted control. In Politics he devoted a section to enumerating the properties that this territory ideally should have: it should be productive enough for self-sufficiency, large enough for the citizens to live comfortably but in moderation, hard for hostile forces to invade, easy for an expeditionary force to depart from, convenient for surveillance, well situated in relation to sea and land transportation, and well within reach of agricultural produce and of raw materials needed for manufacturing processes. 29 This classical view of the territorial state finds architectural expression in the government assembly buildings (usually augmented by bureaucratic support structures) that traditionally have been erected at the hearts of governed territories. (Nobody erects them outside, except in the occasional special case of governments in exile.) So a city has its city hall, a state has its state house, and a nation -depending on its form of government-may have a Versailles, a Westminster, a Kremli n, a White House and Congres s, or whatever. At a larger scale, whole cities may be designated as state or national capitals-special places for government business.

In most modern systems, the politicians who assemble in these places represent specific territories from whence they come.

Clearly the technological means are now emerging to replace these spatial and architectural arrangements with electronics and software, and it isn't hard to construct plausible arguments in favor of such a substitution. For a start, political assemblies could become virtual, with representatives connecting by computer network instead of sitting together in chambers. This is not such a big step; assembly chambers are already equipped with electronic systems for recording votes, and most of us watch the proceedings-if we watch them at all -on C-Span or on local cable. Such a rearrangement would be bad for things like fancy Washington restaurant s, but it would keep politicians closer to their constituents, and it would save on transportation and accommodation costs.

However and wherever the power holders get together, though, there remain the more basic political questions of who holds power, whose interests are served by the power holders, and how these power holders are to be made accountable. Aristotle devoted a great deal of Politics to these issues. According to his teleological view, he argued that the state existed to serve the common good and that constitutions should therefore be judged according to whether the rulers served their own interests only or those of all the citizens. He then went on to describe and evaluate all the different types of constitutions that he could imagine-five types of kingship, four types of oligarchy, and four types of democracy.

As political theorists were quick to note when the discipline of cybernetics emerged in the 1940s and 1950s, these sorts of discussions can readily be recast in computational terms.

You can, as Aristotle had pointed out, have various kinds of tyrannies in which control is exerted from the top and there is no effective feedback loop from the ruled to the rulers. Or you can put in feedback loops of some kind, so that the rulers feel the consequences of their actions and are prompted to attend to the common good. Elections, then, establish one important kind of feedback loop and opportunity for corrective action; if the rascals are not acting for the public good, the populace can throw them out.

But electoral mechanisms have some obvious limitations as control devices. They operate on a slow cycle, and their effects on specific policies may not be very sharply focused. This is, at least in part, an inevitable consequence of traditional electoral technology. When votes from large numbers of people scattered over wide areas must be collected and tabulated by manual means, the process always ends up being a sluggish, cumbersome, and expensive one. It just isn't practical to repeat it too frequently.

As telecommunications networks have developed, there has been growing flirtation with the idea of replacing old-fashioned voting booths and ballot boxes with electronic polling. In a cyberspace election, you might find the policies of candidates posted online, you might use your personal computer to go to a virtual polling place to cast your vote, and the votes might be tallied automatically in real time. Because all students have access to the on-campus Athena network, for example, MIT can conduct its student government elections in this way. There are, of course, potential problems with electronic stuffing of ballot boxes, but these can be handled through password control of access to the virtual ballot box or (better) through use of encryption technology to verify a voter's identity.

Other kinds of electronic feedback are evolving, too. For instance, as the Internet and commercial online service communities grew rapidly in the 1990s, American politicians quickly realized that they needed e-mail addresses. So you can now fire off your comments on the day's issues to president@whitehouse.gov or vice.president@whitehouse.gov. The idea quickly spread to other parts of the world; in summer 1994 Polan d's prime minister, Waldemar Pawlak, went online at prime_minister@urm.gov.pl. 30 And I once tried sending some suggestions on reproductive rights to pope@vatican.co m, but it just turned out to be the address of a hacker playing a prank. Anyway, the pontiff logs in wirelessly to quite another place.

Electronic feedback can even be swift enough, potentially, to support real-time (or at least very fast) direct democracy on a large scale. 31 Populist demagogues like Ross Perot have proffered visions of sitting in front of your two-way television, watching debates, and bypassing the politicians by immediately, electronically recording your response. The network presents the packaged alternatives. Vote with your remote!

Grizzled old operators still like to assure us that "all politics is local." But in the cyberspace era, things may be very different. You do not have to buy into Perot's appallingly reductionist view of political discourse to realize that cyberspace has the potential to change political institutions and mechanisms fundamentally; it opens up ways of assembling and communicating with dispersed political constituencies, new opportunities for instigating and formulating issues, and mechanisms for providing decisions and feedback at a much faster pace than in the past.

Surveillance / Electronic Panopticon

Though the fashion for Foucault has come and gone, the PoMo maître has left us with the indelible realization that power and surveillance are tightly bound up together. He repeatedly portrayed society as a giant panopticon, in which power holders exert surveillance over the rest and in which subjects' awareness of constant surveillance is a reminder that punishment awaits if they step out of line. The rulers would know, and they would respond.

It is not surprising, then, that a traditional role of architecture has been not only to make efficient surveillance possible, but also publicly to represent the presence of surveillance.

Jeremy Bentham's own panopticon prison design is not unique, but only one of the most extreme and vividly diagrammatic examples. After all, civic and institutional buildings are normally constructed by those in power. So we see prominent watchtowers on the walls of old cities and of modern jails, monumental police headquarters buildings bristling with electronic antennae in city centers (look at Parker Center in downtown Los Angele s), receptionist and guard desks conspicuously placed in building lobbies everywhere, and even little signs saying "Police take notice." As the electronic era dawned, George Orwell presciently anticipated that telecommunications devices would take over these roles; in the world of 1984 the television monitor became an ever-present instrument of surveillance, and the displayed face of Big Brother was a constant, graphic reminder that he was, indeed, watching. But Orwell did not bother to think through the technical details, and this scheme would not really have worked-not with the primitive electronics that Orwell knew about, anyway. Where would Big Brother have put all the corresponding monitors on the receiving end? Where would he have found the labor force to watch them all? How would he have sifted through and collated all that information?

What actually happened was far more subtle and insidious. Instead of one Big Brother, we got a vast swarm of Little Brothers. Every computer input device became a potential recorder of our actions. Every digital transaction potentially left fingerprints somewhere in cyberspace. Huge databases of personal information began to accumulate. And the collation problem was solved; efficient software could be written to collect fragments of information from multiple locations in cyberspace and put them together to form remarkably complete pictures of how we were conducting our lives. We entered the era of dataveillance. 35 The last time I came face-to-face with the Little Brother dataveillance force was in a car salesman's cubicle. In response to the Honda hawker's two-finger typed command, a jittering old printer spewed out a TRW credit report, a minutely detailed listing of all my credit transactions and transgressions, going back years and years. Many sources had been combed and correlated electronically to put it all together: the databases of banks, stores, collection agencies, credit unions, insurance companies, motor vehicle agencies, magazine subscription services, and a lot more. 36 It was an impressive performance; TRW's electronically mediated surveillance had never faltered, and it had not missed anything. That printed report was as vivid a demonstration of power as any face peering out from a display screen.

But this is just the beginning; our lives have been leaving increasingly complete and detailed traces in cyberspace as two-way electronic communications devices have proliferated and diversified. Telephones were the first such devices to find widespread use; they soon yielded telephone company billing data-records of when, where, and by whom calls were made.

Then bank ATM machines and point-of-sale terminals in retail stores began to produce transaction records. As personal computers were plugged into commercial online networks, they too began to create electronic trails.

There is more of this to come. As switched video networks become extensively used for everyday purposes- shopping, banking, selecting movies, social contact, political assembly-they potentially will grab and keep much more detailed portraits of private lives than have ever been made before. And wearable device s-ones that continuously monitor your medical condition, for example, or perhaps the cybersex suits that some journalists have avidly imagined-may construct the most up-close and intimate of records.

Life in cyberspace generates electronic trails as inevitably as soft ground retains footprints; that, in itself, is not the worrisome thing. But where will digital information about your contacts and activities reside? Who will have access to it and under what circumstances?

Will information of different kinds be kept separately, or will there be ways to assemble it electronically to create close and detailed pictures of your life? These are the questions that we will face with increasing urgency as we shift more and more of our daily activities into the digital, electronic sphere.

Contention about the limits of privacy and surveillance is not new, but the terms and stakes of the central questions are rapidly being redefined. Isolated hermits can keep to themselves and don't have to keep up appearances, but city dwellers have always had to accept that they will see and be seen. In return for the benefits of urban life, they tolerate some level of visibility and some possibility of surveillance-some erosion of their privacy. Architecture, laws, and customs maintain and represent whatever balance has been struck. As we construct and inhabit cyberspace communities, we will have to make and maintain similar bargains-though they will be embodied in software structures and electronic access controls rather than in architectural arrangements. And we had better get them right; since electronic data collection and digital collation techniques are so much more powerful than any that could be deployed in the past, they provide the means to create the ultimate Foucaultian dystopia. 37
....

Chapter 7
Getting to the Good Bits

During the nineteenth and twentieth centuries, cities have been transformed by successive waves of transportation and communications technology. At each stage, new combinations of buildings, transportation systems, and communication networks have served the needs of the inhabitants. Now, as the infobahn takes over a widening range of functions, the roles of inhabited structures and transportation systems are shifting once again, fresh urban patterns are forming, and we have the opportunity to rethink received ideas of what buildings and cities are, how they can be made, and what they are really for. The challenge is to do this right-to get us to the good bits.

1835: Pre-Industrial Settlements "This will be a place for a village," intoned the explorer John Batman when he encountered Port Phillip Bay in 1835, as I recall from the Australian history that I learned so long ago in dusty country schoolrooms with the songs of magpies swirling in on the scorching, eucalyptus-laden breeze. We would take out our red plastic templates to trace maps of the island continent and its straggling river systems into our blue-lined exercise books, then we would meticulously mark the tracks of inland trailblazers and coastal navigators, locating the settlements that followed and inscribing the dates.

Much later, when I learned the age-old distinction between civitas and urbs, I realized that we had been rehearsing our own particular foundation myths-the ritualized tales of how our wandering ancestors had chosen sites and constructed places for their communities. We schoolchildren in the bush learned of the heroes who selected the spots, of the settlers who came to these places, and of how the first, rough tracks and shelters were laid out upon the freshly cleared ground. We were told of convict settlements and ports for communities of whalers and sealers along the coasts, of the gold-rush towns and agricultural centers that had sprung up in the interior, of how the railroad and telegraph systems had spawned remote and desolate villages, and of how merchant, industrial, and administrative cities had grown at favored locations in the emerging transportation network. And we heard how colonial bureaucrats and military officers-Hoddle, Light, and others-had plunked down the surveyed street grids that introduced the beginnings of urban form and order to the scrubby brown land.

1956: The Commuter City By 1956, when I first made the long, slow rail journey to the distant big city-for the Olympics in Melbourn e-industrial capitalism had firmly taken hold and the postwar immigrants were pouring in. Some hours after meat pie and tea at the Ballarat railway refreshment rooms (a beer for Dad), the grimy train steamed first through a ring of suburban housing, then penetrated what seemed an interminable zone of factories and warehouses to reach the heart of the metropolis. There I found department stores and shopping arcades, theaters, grand old hotels, government offices, the headquarters of banks and insurance companies, the fancy professional consulting rooms of Collins Street, crowds, and foreign voices. It was all there. And every day the trams and trains and streams of cars would wash a huge tide of workers into the city in the morning, then-with a brief pause for thirsty workers to grab a drink at the pub (a custom known locally as the six o'clock swill)-would suck them out to suburbia again in the evening.

All these patterns and rhythms were generated by the need to put bodies in particular places, at particular times, for particular purposes. The convict settlements were intended to remove the undesirable and inconvenient to the antipodes-as far from English soil as possible, at places that had been picked out for their practicality as ports and their supposed potential for self-supporting agriculture. The gold-rush towns exploded into existence at just those spots where miners could dig the precious metal from the ground, and the cattle and sheep men were drawn to water and grazing lands. Often these special places were far from each other, and certainly they were all remote from the rest of the world-connected by lengthy and tenuous transportation routes along which passengers, products, and information slowly and sporadically flowed; their inhabitants had no way to escape the prison house of distance. By mid-twentieth century in the coastal capitals, the space of the city itself was subdivided into specialized places to live, places to go to work, and places to assemble for shopping and entertainment, all interconnected by roads and railway networks for moving bodies back and forth. And it mattered where you came from-the tree-lined pleasances of South Yarra or the grubby streets of Brunswick, Sydne y, or the bush.

In the sixties, geography was destiny still, so many of my generation left the vast, isolated southern continent to be closer to the centers of things.

1994: Telepresence Fast forward. The year is now 1994, and I am typing this text on a computer in my office at MIT. On the same screen, there is a video window open to the design studio upstairs where my students are working, and there are additional windows to studios at universities in St. Louis, upstate New York, Vancouve r, Hong Kon g, and Barcelon a. There is a small video camera on my desk, so that the students can also see me at work. We are all interconnected by the Internet, and the students in these different locations and time zones are working together on proposals for some new housing in an old area of Shangha i. Through their computer workstations, the students and their instructors can exchange CAD models and rendered images of proposals, get answers to queries about site and program, and discuss and criticize each other's work. For the moment, at least, we scattered souls have become an electronically linked virtual community. Bodily location is no longer an issue; for me, the students in Hong Kong are as much a part of it as are those to be found within walking distance of my office.

We have reinvented the human habitat. Back when it took many months for an exchange of letters between an isolated Australian settlement and a foreign city, most of a citizen's interactions were necessarily with other inhabitants of that same settlement. Your community consisted of your close neighbors; you could love it or you could leave it. But as transportation and communications capabilities improved in the industrial era, maintaining contact with widely dispersed friends and family became much easier, and it became possible to participate actively in communities of interest that were not tied to your hometown. In the two centuries from the first convict fleet's arrival in Botany Bay to the formation of the Internet-1788 to 1988 -the preindustrial relationship of civitas to urbs was radically restructured. Today, as telepresence augments and sometimes substitutes for physical presence, and as more and more business and social interactions shift into cyberspace, we are finding that accessibility depends even less on propinquity, and community has come increasingly unglued from geography. Our network connections are becoming as important to us as our bodily locations.

AD 2K: The Bitsphere Cyberspace is opening up, and the rush to claim and settle it is on. We are entering an era of electronically extended bodies living at the intersection points of the physical and virtual worlds, of occupation and interaction through telepresence as well as through physical presence, of mutant architectural forms that emerge from the telecommunications-induced fragmentation and recombination of traditional architectural types, and of new, soft cities that parallel, complement, and sometimes compete with our existing urban concentrations of brick, concrete, and steel.

For designers and planners, the task of the twenty-first century will be to build the bitsphere-a worldwide, electronically mediated environment in which networks are everywhere, and most of the artifacts that function within it (at every scale, from nano to global) have intelligence and telecommunications capabilities. It will overlay and eventually succeed the agricultural and industrial landscapes that humankind has inhabited for so long.

This unprecedented, hyperextended habitat will transcend national boundaries; the increasingly dense and widespread connectivity that it supplies will quickly create opportunities-the first in the history of humankind-for planning and designing truly worldwide communities. Just as the ancient polis provided an agora, markets, and theaters for those living within its walls, the twenty-first-century bitsphere will require a growing number of virtual gathering places, exchanges, and entertainment spots for its plugged-in populace. Just as architects have traditionally designed schools, hospitals, and other service facilities to meet the needs of surrounding local areas, bitsphere planners and designers will structure the channels, resources, and interfaces of educational and medical service delivery systems for much more extended constituencies. Commercial, entertainment, educational, and health care organizations will use these new delivery systems and virtual places to operate, cooperate, and compete on a global scale.

We will need rules for this emerging game. Like more familiar social and political units, international bitsphere communities will urgently require appropriate constitutions, institutions, public policies, and laws; perhaps there will be a specialized law of cyberspace, as there is now a law of the sea. At the same time, established, territorially defined nations, states, regions, and cities will have to adapt their pre-bitsphere structures and customs to the new contextone in which borders no longer have their old meaning, rights and powers may not be defined by spatial boundaries, property cannot be protected in traditional ways, and much of the economic, social, and cultural action has been attracted to the upstart venues of cyberspace.

Nations that seek to remain economically competitive and to provide high living standards for their citizens will race to embark on their National Information Infrastructure projects as, in the past, they have invested in their ports and shipping fleets, railroad networks, and highway systems. And as they do so, they will have to resolve fundamental questions about the political economy of cyberspace; the answers that they reach will largely determine the kinds of nations that they become. Democratic ideals (and the lessons of the telephone system) suggest that they should strive to provide universal access -affordable, ubiquitously present, high-bandwidth service to all their citizens. If equality of opportunity and symmetry of participation are valued, then all classes of users (not just privileged groups and institutions) should be able to create as well as receive information; this means that the infrastructure has to provide two-way digital pipes and allow anyone to set up a server. If bottom-up community development efforts and entrepreneurial enterprise are to be encouraged, then the infrastructure must have a carefully crafted open architecture; it should allow a wide range of hardware companies, software developers, network service providers, content providers, and users to produce and integrate components which extend and add value to the system. And if the infrastructure is to encourage national coherence rather than a new kind of balkanization, then its development must be guided by policies and standards that assure interoperability between all the subnetworks of the national system.

These national information infrastructures will not come cheap, and policy makers will face the difficult question of how to pay for them. The various possible answers have profoundly differing social consequences, so the policy debates are likely to be contentious ones. Some will argue, from positions grounded on ideals of social justice, that universal access and attention to the public good should be guaranteed by treating national information infrastructures as public utilities paid for with tax dollars. Others will claim that only the private sector can mobilize the resources needed to construct these infrastructures quickly and run them efficiently and that private-sector service providers will therefore have to be motivated by opportunities for profits from toll charges and advertising sales. In the end, cyberspace development-much like real estate development-will probably progress through a complex and evolving blend of public policies and investments with private-sector responses to emerging opportunities.

Does development of national and international information infrastructures, and the consequent shift of social and economic activity to cyberspace, mean that existing cities will simply fragment and collapse? Or does Paris have something that telepresence cannot match? Does Rome have an answer to Neuromancer? Most of us would bet our bottom bits that the reserves of resilience and adaptability that have allowed great cities to survive (in changed form) the challenges of industrialization and the automobile will similarly enable them to adapt to the bitsphere. Though immersion in electronically propelled bits will progressively reduce our reliance on bodily presence and material exchange, thus altering the ways in which we use physical space and weakening many of the activity linkages that now hold large urban agglomerations together, there is no reason to think that this novel condition will make us indifferent to our immediate surroundings or suddenly eliminate our desire for face-to-face human contact in congenial settings. We will still care about where we are, and we will still want company. So cities and towns will probably find opportunities to restructure themselves-to regroup housing, workplaces, and service facilities into reinvigorated small-scale neighborhoods (both urban and rural) that are effectively nourished by strong electronic links to a wider world, but simultaneously prize their differences from other places, their local institutions and hangouts, and their unique ambiences and customs. A community's capacity to connect globally can yield renewed opportunity for its citizens-freed from the need to seek employment and services in distant urban centers-to know their neighbors and to participate in local affairs.

As the development of pioneering campus and community networks has already suggested, there will be an important role here for local subnetworks of the national and international systems-electronic Main Streets that provide places for citizens to present themselves in their communities, to exchange greetings and gossip with neighbors, and to transact local business. Bitsphere civic design will encompass not only traditional matters of roads and sidewalks, sewers, and land-use zoning, but also development of local network infrastructure and creation of electronic venues for local communication and interaction.

By redirecting access to services and opportunities, the growing information infrastructure has the potential to create winners and losers on a vast scale. It is pleasant to imagine a nation of networked Aspens and cyberspaced Santa Monicas peopled by convivial, bicycle-riding locals, but the obvious danger is that such restructuring will instead produce electronic Jakartas-well-connected, well-serviced, fortified enclaves of privilege surrounded by miserable hyperghettoes, where investments in information infrastructure and appliances are not made, electronically delivered services do not reach, and few economic opportunities are to be found. The poor could be left with the obsolete and decaying urban remnants and isolated rural settlements that the more privileged no longer need. Surely the most fundamental challenge in building the bitsphere will be to deploy access according to principles of social equity-not in ways that heighten the privilege of the haves and further marginalize the have-nots.

Within bitsphere communities, there will be subnetworks at a smaller scale still-that of architecture. Increasingly, computers will meld seamlessly into the fabric of buildings and buildings themselves will become computers-the outcome of a long evolution. Pre-industrial buildings were not much more than supporting skeletons and enclosing skins. With the Industrial Revolution, they acquired increasingly complicated mechanical physiologies;

soon they were routinely equipped with water supply and sewage systems, heating and air-conditioning systems, electrical systems, safety systems, and more. Now they are getting electronic nervous systems-network connections, cabling in the woodwork, and information appliances. As the speed at which bits zip around a building approaches that at which they are moved inside today's computers, as different sorts of specialized sensors and input devices harvest bits at arbitrary locations, as processors are embedded wherever they happen to be needed, and as all the various displays andappliances are integrated into building-wide, digitally controlled systems, it will become meaningless to ask where thesmart electronics end and the dumb construction begins; computers will burst out of their boxes, walls will be wired, and the architectural works of the bitsphere will be less structures with chips than robots with foundations.

Architects will increasingly confront practical choices between providing for bodily presence and relying on telepresence. They will be forced to explore the proper respective roles of physically constructed hardware and symbolically encoded software, and of actual space and virtual places. And eventually they will find new ways to accommodate human needs by recombining transformed fragments of traditional building types in a matrix of digital telecommunication systems and reorganized circulation and transportation patterns.

From the sidelines, no doubt, technoromantic theoreticians will egg them on to Gibsonian gestures of dematerialization and radical renunciation of traditional architectural means, while materiality chauvinists will provide ringing denunciations of a world that they see going to hell in a handheld device.

And finally, there will be the intimate bits. Just as clothing has traditionally formed a first interface to the physical world, so our personal electronic devices and bodynets will become interfaces between flesh and nervous system and the bitsphere. Hand-held remote control devices will be used to interact with digital televisions and other information devices.

Personal digital assistants and laptop computers will wirelessly exchange bits with the surrounding infrastructure. Body-mounted and implanted medical monitoring devices will transmit data to environmental control systems. Miniature storage devices will hold vital medical records, identification, and digital cash. Our electronic accouterments will range from headphones to sensor gloves and the latestfashions in smart sneakers. And their designers will create themost immediate, private digital environments-our personal cyberspace.

Networks at these different levels will all have to link up somehow; the body net will be connected to the building net, the building net to the community net, and the community net to the global net. From gesture sensors worn on our bodies to the worldwide infrastructure of communications satellites and long-distance fiber, the elements of the bitsphere will finally come together to form one densely interwoven system within which the knee bone is connected to the I-bahn.

The uncertainties and dangers of the bitsphere frontier are great, but it is a place of new opportunity and hope. So forget the global couch-potato patches that Marshall McLuhan surveyed back in the sixties. This will be the place for a global village.


Footnotes
Chapter 1

For an overview of the process of fiber-optic network installation, see Andrew Kupfer, "The Race to Rewire America," Fortune, April 19, 1993, 42-61. The converging futures of computer networks, cable TV networks, and telephone networks are explored in detail in Gary Stix, "Domesticating Cyberspace," Scientific American 269: 2 (August 1993): 100-10.

1.Development of the worldwide telecommunications infrastructure began in 1837, when the telegraph was demonstrated and patented. The telephone followed in 1876.

Long-distance telegraph and telephone networks had developed by the dawn of the twentieth century, and the technology of wireless telegraphy was emerging. By the 1950s extensive analog telecommunications networks employed wire, cable, and microwave links together with crossbar switching technology. In the 1960s digital telecommunications systems began to supplant the older analog ones, and the first communications satellites were put into service. Fiber-optic cables and ISDN (Integrated Services Digital Network) lines became increasingly commonplace in the 1980s. By mid-1994 the local cable television company was providing me with direct access to the Internet computer network from my home in Cambridge, Massachusett s, and it was clear that existing, largely separate, telephone, radio, television, and data networks would eventually evolve into a worldwide, broadband, digital service.

Politicians and journalists began to talk about the emergence of an Information Superhighway system.

2.Cable links are mostly underground and in building walls, wireless links are completely invisible, and most installations of digital telecommunications equipment are small and inconspicuous.

Footnotes Chapter 2

The Parisian flâneur made his literary debut in Baudelaire's famous essay "The Painter of Modern Life" (1863). He was a man of the boulevards: he strolled them to observe the life of the great city and by so doing also put himself on display.

1. The Greek agora is the prototype urban public space. In the ancient Greek city, the agora was a central, open space where public life was enacted. Having an agora was essential to being a city rather than merely a settlement.

2.After being overrun and destroyed by the Persians in 494 B.C., the Ionian city of Miletos was rebuilt, beginning in 479 B.C., according to a master plan by the Milesian architect Hippodamos. It was sited on a rocky peninsula on the Aegean coast of what is now Turke y. Streets were laid out in a regular grid, and there was a magnificent agora in the center, adjacent to the harbor. Aristotle credited Hippodamos with being the inventor of "the art of planning cities."

3.The software performs the basic functions of storing messages at some central location as they arrive, then forwarding them to the addressee's personal computer or workstation when requested. Voice mail and video mail systems operate in similar ways.

4.Sometimes a domain that is closely associated with a particular group- for example media@mit - does acquire a certain cachet. As network usage grows, it may be that some access providers will attempt to distinguish themselves by providing premium service (faster machines, fancier interfaces) and trade on their snob value. But at least for now the basic point remains valid: logical connection matters much more than physical location. The compendium E-Mail Addresses of the Rich and Famous (Reading, MA: Addison-Wesle y, 1994) does not define any particular cyberspace neighborhood.

5.Finger files are maintained by many of the host computers on the Internet. (Some hosts, for security or privacy reasons, do not provide access to them.) Internet users can, for example, finger me by typing finger wjm@mit.edu. This yields my full name, mailing address, and phone number - just as if they looked me up in the printed MIT phone directory. If they are resourceful and knowledgeable, they can construct a fairly detailed description of me (or practically anybody else who uses Internet) by piecing together fragments of information from various accessible databases.

6.For example, the San Jose Mercury News maintains an online database of personal ads (not that you will find me on this one). Give the command "Search RSVP personals" and you will be greeted with the message, "Type words that describe what you are looking for, then click List Ads. For example, 'men and non-smoker'"

7.For information on the Usenet Oracle, send e-mail to oracle@cs.indiana.edu with the word "help" in the "Subject" line.

8.See Erving Goffman's classic The Presentation of Self in Everyday Life (New York: Doubleday, 1959) for a discussion of the many and complex ways in which we acquire information about general socioeconomic status, competence, trustworthiness, attitude, and so on in face-to-face interactions.

9.Even before text became digital, printed text created some space for these games. George Eliot and Henry Handel Richardson played them with panache. But the network greatly expands that space.

10.Some early published stories of this sort of thing quickly attained the status of cyberspace morality tales. A 1985 Ms. magazine story by Lindsy Van Gelder, for example, told the story of "Joan," a disabled older woman who participated in the Compuserve network's "Between the Sexes" online conference. "Joan" was eventually unmasked, to the shock and dismay of many of the other conference participants, as a middle-aged male psychiatrist. Then, in summer 1993, the news media reported widely on "The Case of the Cybercad" on the WELL (a popular Bay Area online conferencing system). After he teleromanced several women at the same time (without telling them of the others), the women tumbled to his deceptive game and publicly denounced him in a WELL conference space. These tales recall similar ones from the early days of the telephone, when "phonies" began to take advantage of the telephone's elimination of visual cues, and people's inexperience in dealing with this, to set up swindles.

11.Students of cyberspace culture might, then, do well to take a close look at the gay studies literature.

12.Such agents are discussed in detail in the "Intelligent Agents" special issue of Communications of the ACM 37: 7 (July 1994). In 1994 the idea began to go commercial in a significant way; for example, General Magic introduced the Telescript language intended for programming practical software agents. See John Markoff, "Hopes and Fears on New Computer Organisms," The New York Times, Thursday, January 6, 1994, D1, D5.

13.Joseph Bates, "The Role of Emotion in Believable Agents," Communications of the ACM 37: 7 (July 1994): 122-25.

14.Apple Computer's famous promotional videotape The Knowledge Navigator provided an early dramatization of this idea. It featured a bow-tied agent called Phil, who looked a bit like a talking passport photo and who supposedly performed librarian and resource-management tasks.

15.There is now a technical answer of a sort. We can use encryption techniques to put verifiable digital "signatures" on electronic documents. But this does not alter the basic fact that telecommunication distances us from the flesh-and-blood bodies of those with whom we communicate and puts constructed electronic masks in their place.

16.This already happens with machines. The existence of once-popular but now obsolete types of computer terminals, such as teletypes and DEC VT-100s, is regularly simulated by software running on more up-to-date hardware.

17.Mitch Kapor (in an e-mail note after reading a manuscript draft) has chided me for being a bit silly about this. He may be right. Many of the early, grand promises of artificial intelligence have gone unfulfilled and will continue to be unfulfilled unless there are spectacular breakthroughs of a kind that do not seem imminent, so we cannot expect to get to Gibsonian silicon immortality by extrapolation of current technology. But it is certainly worth noting, at least, that existence on the Net radically extends the kind of pseudo-immortality that authors gain from having their books published.

18.For the early history of asynchronous communication systems (using runners, chains of men with loud voices, pigeons, drums and horns, fire, semaphore, ships, the Pony Express, and so on), see Prakash Chakravati, "Communications from Cave Messages to Mail Messages," IEEE Power Engineering Review 12: 9 (September 1992): 29-31.

19.In Technics and Civilization (New York: Harcourt Brace Jovanovich, 1934) Lewis Mumford dated the synchronous city back to the thirteenth century, when monasteries introduced mechanical clocks, began to ring out the hours, and so started to impose orderly routines on urban life.

20.There is a growing literature on the relationship between telecommunications and the use of time in modern urban societies. See D. Gross, "Space, Time, and Modern Culture," Telos 50 (1981): 59-78; D. Gross, "Temporality and the Modern State," Theory and Society 14 (1985): 53-82; A. Kellerman, Time, Space, and Society: Geographical Societal Perspectives (Dordrecht: Kluwer, 1989); A. Kellerman, "The Decycling of Time and the Reorganization of Urban Space," Cultural Dynamics 4 (1991): 38-54; G. Raulet, "The New Utopia: Communication Technologies," Telos 87 (1991): 39-58.

21.The first teleport was developed by the Port Authority of New York and New Jersey in the late 1970s; Manhattan office buildings were connected via fiber-optic links to a telecommunications park in New Jersey. On teleports generally, see A. D. Lipman, A.

D. Sugarman, and R. F. Cushman, eds., Teleports and the Intelligent City (Homewood, IL: Dow Jones-Irwin, 1986).

22.L. Qvortrup, "The Nordic Telecottages: Community Teleservice Centers for Rural Regions," Telecommunications Policy 13 (1990): 59-68.

23.For a brief introduction to the geography of communications satellites, see A.

Kellerman, "Microwave and Satellite Communications," Telecommunications and Geography (London: Belhaven, 1993), pp.38-47.

24.For a lively analysis of the issues involved here, see Nicholas Negroponte, "The Bit Police: Will the FCC Regulate Licenses to Radiate Bits?," Wired 1:2 (May/June 1993): 112.

25.As I wrote these words, despite endless talk in the popular press about the Information Superhighway, most American schoolrooms did not even have telephones.

26.Actually, of course, we are talking about a great many more bits. From a telecommunications viewpoint, intimacy is a matter of using all sensory modalities and opening up the bandwidth as far as possible. Conversely, stripteases (look, don't touch) and other rituals of erotic titillation often depend on shutting down a few sensory channels.

27.Bandwidth becomes particularly important here since the rough telecommunications rule of thumb is that good video requires about a thousand times as much bandwidth as speech. A picture is truly worth a thousand words.

28.One current approach is to combine a gesture-sensing glove with arrays of tiny switches known as tactors. When the tactors are stimulated by a current, they press on the fingertips. Pneumatic cylinders that provide variable resistance to the fingers as air pressure is regulated by computer have also been tried. Yet another approach is to employ servomotor-driven joysticks that vibrate to simulate movement across rough and bumpy surfaces, and push back when solid objects or force fields are encountered. At a larger scale, flight simulators and motion-based amusement rides use hydraulic rams to accelerate riders over short distances and so subject them to g-forces similar to those experienced in moving vehicles. Perhaps the most effective early application of force feedback, though, was in the Atari videogame Hard Drivin', which transmitted through a steering wheel the feel of a racecar in motion.

29.For example, stationary exercise bicycles have incorporated increasingly sophisticated computer monitoring of the user's physical response, together with automatic adjustment of the level of difficulty of the simulated terrain. And NEC's "virtual skiing" laboratory in Tokyo has developed a system that senses head position, leg movements, and pole movements, as well as blood flow and stress; it simulates actual slopes and adjusts them according to the user's ability. See Kimiko Eastham, "Everything but the Broken Bones," Wired 1: 3 (July/August 1993): 29.

30.Postmodern prostitution is a pretty hackneyed fantasy by now (though journalists never seem to tire of pop-eyed speculation about it); Frederik Pohl explored it in his 1966 short story "Day Million." For a survey of interactive computer porn in the 1990s, see John Tierney, "Porn, the Low-Slung Engine of Progress," The New York Times, Sunday, January 9, 1994, section 2, pp.1, 18.

31.For a comprehensive survey of the relevant technologies, see Grigore Burdea and Philippe Coiffet, Virtual Reality Technology (New York: John Wiley, 1994).

32.Paul Virilio, The Lost Dimension (New York: Semiotext(e), 1991), p.60.

33.Once again, pen >> sword. This word does not have a respectable technical pedigree, but was introduced by William Gibson in his 1984 novel Neuromancer. Many old computer hands detest it for the conceptual vulgarities that it has come to connote.

But it has won out against all the plausible alternatives and has succeeded in taking possession of its semantic niche, so I shall use it.

34.A literary subgenre, analogous to the western pulp novel, has already developed to chronicle the tales of this territory. Basic sources on the topic are John Perry Barlow, "Crime and Puzzlemen t" (June 8, 1990) and "Crime and Puzzlement Part 2" (July 21, 1990), available by FTP from the Electronic Frontier Foundation ( eff@well.sf.ca.us ).

35.Most of the research and fact-checking for this book was done by browsing, searching, and retrieving information in this way. My research assistant, Anne Beamis h, spent most of her time surfing the Net to search library catalogues, bibliographies, and databases and to download papers, news stories, and press releases.

Footnotes Chapter 3

In the seventeenth century, Robert Hooke clearly saw this coming. In the preface to Micrographia (1665) he wrote: "The next care to be taken, in respect of the Senses, is a supplying of their infirmities with Instruments, and as it were, the adding of artificial Organs to the natural. ... And as Glasses have highly promoted our seeing, so 'tis not improbable, but that there may be found many Mechanical inventions to improve our other Senses, of hearing, smelling, tasting, touching. "

1.The hypercello was developed by Tod Machover and his team at MIT's Media Laborator y. A brief technical description is given in Tod Machover, "Hyperinstruments: A Progress Report 1987-1991," MIT Media Laboratory, January 1992. See also Thomas Levenson, "Taming the Hypercello," The Sciences (July/August 1994): 15-17.

2.The term is from "cybernetic organism" and applies to artificial and augmented bodies animated by human intelligence. In Arthur C. Clark e's 1956 novel The City and the Stars, for example, human beings convert themselves into cyborgs by transferring their minds into machines. More recently, the concept has been deployed to good effect by cultural critics; see Donna Haraway, Simians, Cyborgs, and Women: The Reinvention of Nature (New York: Routledge, 1991); and Mark C. Taylor, "The Betrayal of the Body: Live Not," in Nots (Chicago: University of Chicago Press, 1993), pp.214-55.

3.For an introduction to the topic of the body in architectural and urban space, see Richard Sennett, Flesh and Stone: The Body and the City in Western Civilization (New York: W. W. Norton and Company, 1994). Here we're talking about flesh and bits.

4.The technology of bodynets was rapidly emerging by the early 1990s. Infrared wireless communication between electronic devices had, for example, become commonplace. (One inexpensive personal communicator became popular with school kids because its infrared capabilities allowed silent passing of electronic "notes" in class.) Conformable, wearable computers of various kinds were beginning to appear.

5.Industrial designer Emilio Ambasz has already speculated about "a soft portable telephone, a soft lap computer, a soft camera." See I. D. 39: 3 (May/June 1992): 28-29.

6.For a brief survey of electronic prostheses, implants, and related issues, see Gareth Branwyn, "The Desire to Be Wired," Wired 1: 4 (September/October 1993): 62-65, 113.

7."How to Scan a Cat," The New York Times Magazine, Sunday, January 16, 1994, p.11.

8.For a convenient summary of the early history of television, see Steven Lubar, InfoCulture: The Smithsonian Book of Information Age Inventions (Boston: Houghton Mifflin Company, 1993).

9.For a discussion of Xerox PARC research on media spaces, see Sara A. Bly, Steve R.Harrison, and Susan Irwin, "Media Spaces: Video, Audio, and Computing," Communications of the ACM 36: 1 (January 1993): 28-47.

10.This metaphor originated with the "Hole-in-Space" project of video artists Kit Galloway and Sherri Rabinowitz in 1980. The artists set up a two-way video connection between outdoor public pedestrian spaces in Century City, California, and Lincoln Center in New York City. Images of pedestrians were projected at approximately full scale, and transcontinental casual pedestrian encounters could take place.

11.Duets, produced by Phil Ramone (Capitol Records, 1993).

12.For a brief account of the process and of the technology employed, see Anthony Ramirez, "A Major Record Album: Only a Phone Call Away," The New York Times, Thursday October 7, 1993, D1. See also National Public Radio, "A Review of Frank Sinatr a's Latest Album `Duets'," Weekend Edition transcript for Saturday, November 13, 1993, segment 18.

13.Hans Fantel, "Sinatra's `Duets' Album: Is It a Music Recording or Technical Wizardry?," The New York Times, Saturday, January 1, 1994, pp.11, 23. William Safire added, in a column entitled "Art Vs. Artifice" ( The New York Times, Monday, January 3, 1994, A23): "The `duets' are a series of artistic frauds. The singers never sang together, never interacted. Sinatra wheezed out his soundtrack and others - by telephone - laid down their counterfeit counterpoint."

14.Avital Ronell, The Telephone Book: Technology, Schizophrenia, Electric Speech (Lincoln: University of Nebraska Press, 1989), p.301.

15.Elizabeth M. Wenzel, "Localization in Virtual Acoustic Displays," Presence 1: 1 (Winter 1992): 80-107.

16.Use of motion-based simulators for entertainment can be traced all the way back to early fairground carousels, with their bobbing wooden horses for small children.

Modern motion-based simulators for location-based entertainment (LBE) installations typically have computer- <->controlled hydraulic actuators that move riders along up to three axes of translation and three of rotation. See Stephen Clarke-Willson, "The Design of Virtual Environments - Value Added Entertainment," Computer Graphics 28: 2 (May 1994): 102-4.

17.Y. S. Kwoh, J. Hou, E. A. Jonckheere, and S. Hayati, "A Robot with Improved Absolute Positioning Accuracy for CT Guided Stereotactic Surgery," IEEE Transactions in Biomedical Engineering 35 (1988): 153-60.

18.W. S. Ng, B. L. Davies, R. D. Hibberd, and A. G. Timoney, "Robotic Surgery: A First-Hand Experience in Transurethral Resection of the Prostate," IEEE Engineering in Medicine and Biology 12: 1 (March 1993): 120-25.

19.Charles Petit, "Robot's Operating Room Success: Sacramento Man Takes a Few Steps 2 Days After Surgery," San Francisco Chronicle, November 10, 1992, A4.

20.In 1993 NASA attempted to put an eight-legged, teleoperated robot called Virgil down the crater of Mount Erebus in Antarctica. Unfortunately, the mission failed due to a broken cable. In 1994 the Dante 2 robot made a more successful descent into the Mount Spurr volcano in Alaska; see Warren E. Leary, "Robot Is Nearing Goal Inside Active Volcano," The New York Times, Tuesday, August 2, 1994, C8.

21.For a brief survey of such applications, see David C. Churbuck, "Applied Reality," Forbes, September 14, 1992, pp.486-90.

22.See "Robot Disarms Gunman," Associated Press Online, Sunday, September 5, 1993, for the story of how a teleoperated robot owned by a Maryland police department was successfully used to disarm a murder suspect hiding in a closet. According to the report, "Transmitting the scene by a video camera, the robot opened a closet door at the direction of a fire department employee who was at the controls from a safe distance."

23.Michael W. McGreevy, "The Presence of Field Geologists in Mars-Like Terrain," Presence 1: 4 (Fall 1992): 375-403.

24.This account is based on Alvin and Heidi Toffler, War and Anti-War (Boston: Little, Brown and Company, 1993), pp.111-12.

25.Col. Frederick Timmerman Jr., "Future Warriors," Military Review (September 1987). For more discussion of the relevant technologies, see Steven M. Shaker and Alan R. Wise, War Without Men (Washington, DC: Pergamon-Brassey's, 1988).

26.Rodney Brook s, Anita Flynn, and Lee Tavrow, "Twilight Zones and Cornerstones: A Gnat Robot Double Feature," MIT Artificial Intelligence Laboratory, 1989.

27.Edmund L. Andrews, "A Robot Ant Can Be Tool or Tiny Spy," The New York Times, September 28, 1991. The construction of the silicon ant is briefly described in BCS Tech (May 1993): 3-4.

28.Warren Robinet t, "Synthetic Experience: A Proposed Taxonomy," Presence 1: 2 (Spring 1992): 229-47.

29.Eric Drexler and Chris Peterson, with Gayle Pergamit, Unbounding the Future (New York: William Morrow, 1991).

30.The early histories of telegraphy and wireless telegraphy are usefully narrated in Lubar, InfoCulture.

31.Robinett, "Synthetic Experience."

32.This was in 1993. Equivalent technology was slower to appear in the US; see Mathew L. Wald, "An Oldsmobile Option for Self-Navigating Car," The New York Times,

33.Wednesday January 5, 1994, D2, and Mathew L. Wald, "Navigating Your Auto by Computer," The New York Times, Tuesday, February 8, 1994, D5. For an introductory survey of the technology, see Robert L. French, "Cars That Know Where They're Going," The Futurist (May/June 1989): 29-36. There is a well-developed technology of Geographic Information Systems (GIS ). As geopositioning and mobile computing technologies develop, it becomes increasingly feasible to deliver the resources of a GIS system to precisely where they are needed in the field.

34.For discussion of flexible, electronic road-use pricing and related ideas, see M. Hepworth and K. Ducatel, Transport in the Information Age: Wheels and Wires (London: Belhaven Press, 1992). A section of Route 91 in Orange County, California, introduced automatic vehicle identification (AVI) devices, electronic sensors, and a "congestion pricing" system to mitigate traffic jam problems; see Suneel Ratan, "Traffic-Free Roads: Engineers Are Merging Computers and Concrete to Ease Driving's Biggest Pain," Fortune, July 13, 1992, p.83.

35.A technical introduction to the issues involved here is provided in Pravin Varaiya, "Smart Cars on Smart Roads: Problems of Control," IEEE Transactions on Automatic Control 38: 2 (February 1993): 195-207.

Footnotes Chapter 4

For elaboration of this line of argument in a more recent context, see Langdon Winner, The Whale and the Reactor: A Search for Limits in an Age of High Technology (Chicago: University of Chicago Press, 1986).

1.William M. Bulkeley, "Libraries Shift from Books to Computers," The Wall Street Journal, Monday, February 8, 1993, B4.

2.This has some additional advantages. Books are brittle, but bits don't bust. Fragile old books can be preserved by storing their pages in digital format, then reprinting facsimiles where necessary on acid-free paper.

3.Steve Lohr, "Record Store of the Near Future: Computers Replace the Racks," The New York Times, Wednesday, May 12, 1993, pp.1, D13; and Kevin Maney, "Revolution in Store for Record Shops," USA Today, Monday, May 17, 1993, B1-B2.

4.Access to the Electronic Newsstand is via Gopher or Telnet. Information is available at info@enews.com.

5.John Tierney, "Will They Sit by the Set, or Ride a Data Highway?," The New York Times, Sunday, June 20, 1993, p.1.

6.In September 1993 Murdoch acquired Delphi Internet Service s, a small online service specializing in providing access to the Internet. Plans to publish a worldwide online newspaper were announced. See Josh Hyatt, "Future Subscribers," The Boston Globe, Friday, September 3, 1993, pp. 71, 73.

7.Development of library and museum plans is explored in Thomas A. Markus, "Visible Knowledge," in Buildings and Power (London: Routledge, 1993), pp.171-212.

8.Nikolaus Pevsner, A History of Building Types (Princeton: Princeton University Press, 1976), p.106.

9.The possibility of such a library has become a topic of discussion among humanities scholars. See Technology, Scholarship, and the Humanities: The Implications of Electronic Information (Santa Monica: The Getty Art History Information Program, 1993), p.23. For a general discussion of the move toward online libraries, see John Browning, "Libraries Without Walls for Books Without Pages," Wired 1: 1 (1993): 62-110.

10.See "US, British Libraries Need Space," Channel DLS 25: 8 (April 1990): 8; "Mobile Shelving Snafu: British Library Building Under Construction in London Delayed by Rusting Stacks," ENR 229, September 28, 1992, p.17; and "Dispersal of Harvard

11.Library," San Francisco Chronicle, March 29, 1989, A20: 1. Some soft libraries already exist. The Thesaurus Linguae Grecae - a very extensive corpus of ancient Greek texts - has been published on CD by Yale University Press. And a two-gigabyte British National Corpus - a national treasury of the English language - is under development. See Brian Keeney, "The Keeper of the Living Language," Guardian 33: 5, April 25, 1991. As the British Library itself, in 1993, prepared to move to new quarters in St. Pancras, debate raged about the relative importance of traditional and electronic library services. In a letter to the London Review of Books (September 9, 1993, pp.4-5) a rather Blimpish spokesperson for the "Regular Readers' Group" questioned "BL management's right to alter the British Library's traditional role as provider of public reading rooms to that of a depot supplying books in electronic form to universities and public libraries for a fee," and went on to assert, "It is a policy which completely destroys the basis for scholarly work: that is, the creation of original work from primary sources."

12.Pevsner, "Museums," in A History of Building Types, pp.111-38.

13.Similar systems have been developed for the National Gallery in Washington and other museums. See Phil Patton, "The Pixels and Perils of Getting Art Online," The New York Times, Sunday, August 7, 1994, section 2, pp.1, 31.

14.Pevsner, A History of Building Types, p.74.

15.A standard starting point for Frankfurt-style critiques of this development is J<129>rgen Habermas, The Structural Transformation of the Public Sphere (Cambridge, MA: MIT Press, 1989; translation of the 1962 German original). See also Noam Chomsky's powerful analysis in E. Herman and N. Chomsky, Manufacturing Consent: The Political Economy of the Mass Media (New York: Pantheon, 1988).

16.The idea was put forward in a presentation at the MIT Media Laboratory symposium "Digital Expression" in October 1994.

17.Thus teaching space tends to be organized much like dramatic space; the connection was made explicit by the emergence of the anatomy theater, for formal instruction of medical students, in the sixteenth century. See Markus, "Invisible Knowledge," in Buildings and Power, pp.229-44.

18.This and other school plans of the Age of Reason are explored in ibid., "Formation," pp.41-94.

19.John G. Kemeny and Thomas E. Kurtz, "Dartmouth Time Sharing," Science 162: 3850 (October 11, 1968): 223-28.

20.See J. M. Arfman and P. Roden, "Project Athena: Supporting Distributed Computing at MIT," IBM Systems Journal 31: 3 (March 1992): 550-63; and Gregory A. Jackson, "Education and Computing at MIT: A 10th Birthday Snapshot of Project Athena," MIT Academic Computing, Fall 1993.

21.For discussion of a pioneering exploration of teleseminar teaching, see Mark C.

22.Taylor and Esa Saarinen, Imagologies: Media Philosophy (New York: Routledge, 1994). D. Chandler, "Astronomy Classes Soon May Stargaze in Daylight," The Boston Globe, February 18, 1993.

23.See Larry Press, "Tomorrow's Campus," Communications of the ACM 37: 7 (July 1994): 13-17.

24.For the evolution of hospital plans, see Pevsner, "Hospitals," in A History of Building Types, pp.139-58. Markus has an insightful discussion in "The Sad," in Buildings and Power, pp.107-18. A comprehensive and detailed history is provided in J. D. Thompson and G. Goldin, The Hospital: A Social and Architectural History (New Haven: Yale University Press, 1975).

25.Both are reproduced in Pevsner, "Hospitals," in A History of Building Types, pp.139-58.

26.In both cases, in fact, the task can be formulated mathematically as a quadratic assignment problem. For a classic early discussion, see B. Whitehead and M. Z. Eldars, "An Approach to the Optimum Layout of Single-Storey Buildings," Architects' Journal, June 17, 1964, pp.1373-79. Early attempts to derive efficient hospital plans automatically are surveyed in William J. Mitchell, Computer-Aided Architectural Design (New York: Van Nostrand Reinhold, 1977).

27.John McConnell, "Medicine on the Superhighway," The Lancet 342, November 27, 1993, pp.1313-14.

28.See Andrew Purvis, "Healing by Wire," Time, May 18, 1992, p.68; Lou Fintor, "Telemedicine: Scanning the Future of Cancer Control," Journal of the National Cancer Institute 85: 3 (February 3, 1993): 183-84; Peter L. Spencer, "The Future of Telemedicine," Consumers' Research 76: 5 (May 1993): 38; Lisa Belkin, "New Wave in Health Care: Visits by Video," The New York Times, July 15, 1993, A1; C. Everett Koop, "Telemedicine Will Revolutionize Care," USA Today, August 23, 1993, A9; Stephanie Plasse, "The Doctor Is On-Line," Boston Globe, September 8, 1993, pp.43, 45; Lance Fraser, "Remote Possibilities," New Physician 42: 6 (September 1993): 24; Peter Yellowlees and William T. McCoy, "Telemedicine: A Health Care System to Help Australians," Medical Journal of Australia 159: 7 (October 4, 1993): 437; Rhonda Bergman, "Letting Telemedicine Do the Walking," Hospitals & Health Networks 67: 20 (October 20, 1993): 46-48; Rebecca Piirto Heather, "Electronic House Calls," American Demographics (March 1994): 6; Gary Busack, "Rural Connections," Health Progress 75: 3 (April 1994): 48; and Robert S. Boyd, "Telemedicine: Two-Way Interactive Video," Washington Post, May 31, 1994, WH8.

29.Neil Izenberg, Director of the Nemours Center for Biomedical Communication, quoted in the transcript of "Networked Health Care Delivery: Opportunities and Challenges for the 90s," MIT Communications Forum, October 21, 1993.

30.Proceedings of the symposium "Medicine Meets Virtual Reality II: Interactive Technology & Healthcare," San Diego, California, January 27-30, 1994. Available from Allied Management Associates, 70530,1227@compuserve.com .

31.See R. Weinstein, K. Bloom, and S. Rozek, "Telepathology: Long Distance Diagnosis," American Journal of Clinical Pathology 91: Supplement 1 (1989): S39-42; and R. Keil-Slawik, C. Plaisant, and B. Schneiderman, "Remote Direct Manipulation: A Case Study of a Telemedicine Workstation," in H. J. Bullinger, ed., Human Aspects in Computing: Design and Use of Interactive Systems and Information Management (Amsterdam: Elsevier Science Publishers, 1991).

32.See B. Preising, T. C. Hsia, and B. Mittelstadt, "A Literature Review: Robots in Medicine," IEEE Engineering in Medicine and Biology Magazine 10 (1991): 13-22.

Diana Phillips Mahoney, "Virtual Science," Computer Graphics World 17: 7 (July 1994): 20-26, provides a less technical survey of some pioneering attempts to develop adequately realistic surgical simulation and telesurgery systems.

33.Ian W. Hunter, Tilemachos D. Doukoglou, Paul G. Charette, Lynette A. Jones, Mark A. Sagar, Gordon Mallinson, and Peter J. Hunter, "A Teleoperated Microsurgical Robot and Associated Virtual Environment for Eye Surgery," Presence 2: 4 (Fall 1993): 265-80.

34.See Proceedings of the ARPA Advanced Biomedical Technology Workshop, "Integration of Advanced Technology in the Battlefield and Operating Room," Tucson, Arizona, November 12-13, 1993, for descriptions of various physiological status monitoring systems for military personnel.

35.For useful brief histories of prison architecture, see Pevsner, "Prisons," in A History of Building Types, pp.159-68; and Markus, "The Bad," in Buildings and Power, pp.118-30.

36.Max Winkler, "Walking Prisons: The Developing Technology of Electronic Controls," The Futurist (July/August 1993): 34-36.

37.Ibid, p.36.

38.Kirk Johnson, "One Less Thing to Believe In: High-Tech Fraud at an ATM," The New York Times, Thursday, May 13, 1993, pp.1, B9. For an account of the trial of the culprits, see Steve Burkholder, "Masterminds of $107,460 ATM Caper Face Sentencing," The Boston Globe, Sunday, December 19, 1993, pp.57, 59. The mastermind, Scott Pace, used the alias "Will Sutton."

39.D. G. Price and A. M. Blair, The Changing Geography of the Service Sector (London: Belhaven Press, 1989), p.130.

40.Peter Passell, "Fast Money," The New York Times, Sunday, October 18, 1992, Section 6, p.12. CHIPS, CHAPS, SWIFT and other elements of the large-scale, international EFT system are discussed in Allen B. Frankel and Jeffrey C. Marquardt, "International Payments and EFT Links," in Elinor Harris Solomon, Electronic Funds Transfers and Payments: The Public Policy Issues (Boston: Kluwer Nijhoff Publishing, 1987), pp.111-30.

41.Pevsner, A History of Building Types, p.193. Pevsner notes that the related idea of insolvency also, originally, had a very spatial and physical interpretation; when a banker turned out to be insolvent his bench was broken up - banca rotta.

42.For development of the idea of the virtual bank, see Robert P. Barone, "The Bank and Its Customer: Tomorrow's Virtual Reality Bank," Vital Speeches of the Day 59 (February 15, 1993): 282-86.

43.For discussions of these possibilities, see Burnham P. Beckwith, "Eight Forecasts for US Banking," The Futurist (March/April 1989): 27-33; James B. Rule, "Value Choices in Electronic Funds Transfer Policy" (Washington, DC: Office of Telecommunications Policy, undated); and David R. Warwick, "The Cash-Free Society," The Futurist (November/December 1992): 19-22.

44.Alan Radding, "Casino Takes a Gamble on Cashless Transactions," Infoworld, June 20, 1994, p.70.

45.Thomas McCarroll, "Futures Shock: Are Trading Floors Obsolete. A New System Quickens the Race Toward a Global Electronic Market," Time, June 29, 1992, p.69.

46.Reuters, "Bond System Delay Asked," The New York Times, Thursday, April 29, 1993, D16.

47.Peter A. Abken, "Globalization of Stock, Futures, and Options Markets," Economic Review (July/August 1991): 1-21.

48.John Greenwald, "The Secret Money Machine," Time, April 11, 1994, pp. 28-34. [to text] 49. David Tracey, "Touring Virtual Reality Arcades," International Herald Tribune, May 7, 1993.

50.For the shopper, the tradeoff is between the multisensory richness and possible recreational value of store shopping on the one hand and the speed and convenience of teleshopping on the other. See F. Koppelman, I. Salomon, and K. Proussaloglou, "Teleshopping or Store Shopping? A Choice Model for Forecasting the Use of New Telecommunications-Based Services," Environment and Planning B 18 (1991): 473-89.

51.Pevsner, A History of Building Types, p.257.

52.For an insightful discussion of the appearance of the department store and the role that it assumed in urban life, see Richard Sennett, "Public Commodities," in The Fall of Public Man (New York: Norton, 1992), pp.141-49.

53.Kansas City's Country Club Plaza, built in 1922, is often cited as the prototype of the suburban shopping mall. Southdale Mall in Edina, Minnesota, built by Victor Gruen in 1956, was the first fully enclosed mall. For histories, see W. S. Kowinski, The Malling of America (New York: William Morrow, 1985); and B. Maitland, Shopping Malls: Planning and Design (Essex, UK: Construction Press, 1985).

54.Renee Covino Rouland, "Satellites Move into the Mainstream," Discount Merchandiser 30 (June 1990): 45-46. On VSAT technology, see Jay C. Lowndes, "Corporate Use of Transponders Could Turn Glut to Shortage," Aviation Week & Space Technology 126 (March 9, 1987): 122-25.

55.Stephanie Strom, "Wireless Signals Keep Retailers Humming," The New York Times, Wednesday, July 29, 1992, D7.

56.Francine Schwadel, "Kmart Testing `Radar' to Track Shopper," The Wall Street Journal, Tuesday, September 24, 1991, B1.

57.Patrick M. Reilly, "Home Shopping: The Next Generation," The Wall Street Journal, Monday, March 21, 1994, R11.

58.David Bank, "After Browsing Catalogs, Dial Up Internet for Order," San Jose Mercury News, Wednesday, April 20, 1994, 9D.

59.In 1994 the Pizza Hut chain pioneered electronic pizza service by setting up the PizzaNet Home Page on the World Wide Web.

60.John Tierney, "Will They Sit by the Set, or Ride a Data Highway?" The New York Times, Sunday, June 20, 1993, p.1.

61.One industry analyst has remarked: "Cyberspace is going to finish what Walmart started. Interactive shopping via computer networks is going to put more traditional downtowns and more mom-and-pop stores out of business." Richard Sclove, quoted by John Markoff in "Staking a Claim on the Virtual Frontier," The New York Times, January 2, 1994, E5.

62.This building type can be traced back, at least, to Giorgio Vasari's Uffizi in Florence, constructed in 1560-74. Downtown office buildings became increasingly popular in the nineteenth century, and - particularly in Chicago - evolved into steel-framed, elevator-serviced highrises by the end of the century. For a brief history, see Pevsner, A History of Building Types, pp.213-24.

63.For an account of the evolution of this pattern, see JoAnne Yates, Control Through Communication: The Rise of System in American Management (Baltimore: The Johns Hopkins University Press, 1989). Early-nineteenth- century American business enterprises were usually small, family affairs in which the internal operations were controlled and coordinated through word of mouth and by letter. The railroads, the telegraph system, and later the telephone facilitated the emergence of larger and more far-flung organizations employing newer modes of internal communication and more hierarchical, systematic management techniques. New technologies for the production, reproduction, and storage of documents also played an important role.

64.Jack M. Nilles, "Traffic Reduction by Telecommuting: A Status Review and Selected Bibliography," Transportation Research A 22A:4 (1988): 301-17.

65.The Shenandoah Valley Telecommuting Center for federal government workers who would otherwise commute to Washington, DC is the first installation in a federally

66.funded pilot program. See Abby Bussel, "Telecommuting and Main Street," Progressive Architecture (March 1994): 55. Wendy A. Spinks, "Satellite and Resort Offices in Japan," Transportation 18 (1991): 343-63.

67.See Kirk Johnson, "New Breed of High-Tech Nomads: Mobile Computer-Carrying Workers Transform Companies," The New York Times, Tuesday, February 8, 1994, B1, B5.

68.James Martin and Adrian R. Norman, The Computerized Society: An Appraisal of the Impact of Computers on Society in the Next Fifteen Years (Englewood Cliffs, NJ: Prentice-Hall, 1970), pp.32, 155-56.

69.See in particular J. M. Nilles, F. R. Carlson, P. Gray, and G. J. Hannemann, The Telecommunications-Transportation Tradeoff: Options for Tomorrow (New York: John Wiley, 1976).

70.Robert E. Calem, "Working at Home, for Better or Worse," The New York Times, Sunday, April 18, 1993, Business Section, pp.1, 6. "Telecommuters" are defined here as "employees of businesses or government agencies working part or full time at home instead of at the office." By this point, newspaper reports were increasingly suggesting that telecommuting was significantly on the rise in the United States: The Miami Herald (December 13, 1993, p.24) reported that one million more people were telecommuting in 1993 than in the previous year, marking a 15 percent increase in the number of company employees who worked at home part or full-time during normal business hours; The Wall Street Journal (December 14, 1993, p.B1) reported that 20 to 40 percent of all employees surveyed would like to telecommute; The Atlanta Constitution (January 2, 1994, p.E2) reported that the trend toward electronically supported work at home accounted for 45 percent of all new jobs from 1987 to 1992; The St. Petersburg Times (January 3, 1994, p.19) claimed that men's suit sales had plummeted because "dealing with people through faxes and computers" meant that "there is no need for appearance to be as large a factor."

71.Melvin M. Webber, "The Post-City Age," Daedalus 97 (1968): 1091-110. For similar views, see R. F. Abler, "What Makes Cities Important," Bell Telephone Magazine 49: 2 (1970): 10-15; and P. C. Goldmark, "Communication and Community," Scientific American 227 (1972): 143-50.

72.By now, there has been considerable empirical study of the tradeoffs between telecommuting and travel and of the spatial and other effects of telecommuting. See, for example, Rebecca Hamer, Eric Kroes, and Harry Van Ooststroom, "Teleworking in the Netherlands: An Evaluation of Changes in Travel Behaviour," Transportation 18 (1991): 365-82; Patricia L. Mokhtarian, "Telecommuting and Travel: State of the Practice, State of the Art," Transportation 18 (1991): 319-42; Jack M. Nilles, "Telecommuting and Urban Sprawl: Mitigator or Inciter?" Transportation 18 (1991): 411-32; Ram M. Pendyala, Konstadinos G. Goulias, and Ryuichi Kitamura, "Impact of Telecommuting on Spatial and Temporal Patterns of Household Travel," Transportation 18 (1991): 383-409; and Ilan Salomon, Helen Nancy Schneider, and Joseph Schofer, "Is Telecommuting Cheaper Than Travel? An Examination of Interaction Costs in a Business Setting," Transportation 18 (1991): 291-318.

73.This position is argued in Aharon Kellerman, "Telecommunications and Cities," in Telecommunications and Geography (London: Belhaven Press, 1993), pp.93-115.

74.Lewis Mumford, The City in History: Its Origins, Its Transformation (New York: Harcourt Brace and World, 1961), p.383.

75.By the mid-1990s, a major battle was shaping up between the computer and television industries over the characteristics of the device that would deliver bits to the home. The cable industry was pushing set-top boxes that would turn television sets into interactive devices, while personal computer companies were adding audio, video, and telecommunications capability to their products. See John Markoff, "I Wonder What's on the PC Tonight," The New York Times, Sunday, May 8, 1994, section 3, pp.1, 8.

76.For discussion of this point (largely with reference to pre-computer electronic media), see Joshua Meyrowitz, No Sense of Place: The Impact of Electronic Media on Social Behavior (New York: Oxford University Press, 1985).

77.Alvin Toffler, "The Electronic Cottage," chapter 16 of The Third Wave (New York: William Morrow and Company, 1980). See also Rowan A. Wakefield, "Home Computers and Families: The Empowerment Revolution," The Futurist 20: 5 (September/October 1986): 18-22.

78.Kevin Robins and Mark Hepworth, "Electronic Spaces: New Technologies and the Future of Cities," Futures 20: 2 (April 1988): 155-76. See also Tom Forester, "The Myth of the Electronic Cottage," Futures 20: 3 (June 1988): 227-40.

79.See Jean-Nicolas-Louis Durand, Précis des le<135>ons d'architecture (Paris: Ecole Polytechnique, 1802), for a systematic, textbook exposition of this approach.

80.For a discussion of the underlying logic of this approach, see Jenny A. Baglivo and Jack E. Graver, Incidence and Symmetry in Design and Architecture (Cambridge: Cambridge University Press, 1983).

81.One early example of this sort of system is Cinetropolis, developed by Iwerks Entertainment. See "Theme Parks: Feeling the Future," The Economist 19 (February 1994): 74-75.

Footnotes Chapter 5

ARPANET was funded by ARPA - the Advanced Research Projects Agency of the US Federal Government - and it was intended for use by the military and by computer science researchers. For a useful summary of the early history, see Jeffrey A. Hart, Robert R. Reed, and Francois Bar, "The Building of the Internet," Telecommunications Policy (November 1992): 666-89.

1.The 1993, statistics are from a December 16, 1993, online posting "Revised Internet Index" by Win Treese of the DEC Cambridge Research Laboratory.

2.Accurate estimates of user numbers are hard to make, and there is some argument about these figures. See Peter H. Lewis, "Doubts Are Raised on Actual Number of Internet Users," The New York Times, Wednesday, August 10, 1994, 1 and D4.

3.For a history of the WELL, see Cliff Figallo, "The Well: Small Town on the Internet Highway System," September 1993, available from the author at fig@well.sf.ca.us.

4.Mitchell Kapor and John Perry Barlo w, "Across the Electronic Frontier," Electronic Frontier Foundation, Washington, DC, July 10, 1990.

5.It seems to have first appeared on a DEC PDP-1 at MIT in 1962. It was the progenitor of increasingly fancy space shoot-'em-ups that appeared as computers became faster and graphics more sophisticated.

6.The Picospan software, authored by Marcus Watts to support interaction on the WELL, provided a very influential early model for this sort of virtual place.

7.Miss Manners has tackled the question of how to handle this progression. She advises: "Miss Manners would not go so far as to say that a computer bulletin board exchange constitutes a proper introduction, but she has heard worse ones. Notwithstanding, it does not confer any social obligation." The Washington Post, Wednesday, August 18, 1993, B5.

8.Apparently SIMNET was inspired by Battlezone, an Atari arcade game from the early 1980s. For discussions of SIMNET, see Warren Katz, "Military Networking Technology Applied to Location-Based, Theme Park and Home Entertainment Systems," Computer Graphics 28: 2 (May 1994): 110-12; Michael Harris, "Entertainment Driven Collaboration," Computer Graphics 28: 2 (May 1994): 93-96; and Bruce Sterling, "War Is Virtual Hell," Wired 1: 1 (1993): 46-99.

9.See Katz, "Military Networking," for an introduction to DIS technology.

10.The aspects of synthetic experience, and technologies currently available to provide them, are surveyed in Warren Robinett, "Synthetic Experience: A Proposed Taxonomy," Presence 1: 2 (Spring 1992): 229-47.

11.The phenomenon of feeling present in a virtual place has been discussed extensively in the literature of simulation and virtual environments. See, for example, Carrie Heeter, "Being There: The Subjective Experience of Presence," Presence 1: 2 (Spring 1992): 262-71.

12.For discussion of New Yor k's communication advantages and their role in its growth to commercial dominance, see Eric H. Monkkonen, America Becomes Urban: The Development of U.S. Cities and Towns 1780-1880 (Berkeley: University of California Press, 1988).

13.Though, as Miss Stein might well have judged had she encountered a newsgroup, "Remarks are not literature."

14.The City of Palo Alto was also quick to create an online information service, but took the very different approach of setting up a World Wide Web server on Internet. You can access it by Mosaic or Lynx http://www.city.palo-alto.ca.us, or you can get information by e-mailing to wwwadmin@city.palo-alto.ca.us. There is a city government phone directory, a city council agenda and meeting schedule, and so on.

15.On the development, introduction, and remarkable initial success of NCSA Mosai c, see John Markoff, "A Free and Simple Computer Link," The New York Times, Wednesday, December 8, 1993, D1, D5. Mosaic is essentially a point-and-click, graphic interface to the World Wide Web, an international system of database servers organized to allow remote requests for information from any computer on the Internet. The original work on World Wide Web was done by Tim Berners-Lee at CERN in Geneva in the late 1980s. Mosaic was developed at the National Center for Supercomputer Applications at the University of Illinois, Urbana-Champaign. By early 1994, more than 50,000 copies of Mosaic were being downloaded monthly from NCSA's public server.

16.The first MUD, written at the University of Essex by Roy Trubshaw and Richard Bartle, was based on the fantasy board game Dungeons and Dragons - hence the name. There are numerous arcane variants on the generic Multi-User Something idea - TinyMUDs, MUSEs, MUSHs, MUCKs, MOOs, and so on. The differences do not matter for our purposes here. On the experience of MUD crawling, see David Bennahum, "Fly Me to the MOO," Lingua Franca 4: 4 (May/June 1994): 1, 22-37.

17.This is, of course, closely related to the old literary issue of establishing a voice. "Call me Ishmael" might be the opening ploy in a MUD interaction. So Wayne Booth's classic The Rhetoric of Fiction (Chicago: University of Chicago Press, 2nd ed., 1983) serves as a pretty good theoretical introduction to MUDding.

18.As programmers will appreciate, MUDs constitute a natural application for object-oriented programming techniques, and the developments of the MUD idea and of object-oriented programming have been intertwined.

19.Chip Morningstar and F. Randall Farmer, "The Lessons of Lucasfilm's Habitat," in Michael Benedikt, ed., Cyberspace: First Steps (Cambridge, MA: The MIT Press, 1991), pp.273-302. On Populopolis see Howard Rheingold, "Habitat: Computer-Mediated Play," in The Virtual Community (Reading, MA: Addison-Wesley, 1993), pp.188-96.

20.In Hindu mythology, an avatar is a deity descended to earth in bodily form; the word is from the Sanskrit for "descend."

21.Morningstar and Farmer, "The Lessons of Lucasfilm's Habitat," pp.286-87.

22.Lewis Mumford, The City in History (New York: Harcourt Brace and World, 1961), p.384.

23.One consequence is that you can get sued for invasion of privacy. Under American tort law, one who intentionally intrudes upon the seclusion of another is subject to liability if the intrusion would be highly offensive to a reasonable person. On the general idea of privacy rights, see Alan F. Westin, Privacy and Freedom (New York: Atheneum, 1967).

24.Authentication systems were not needed on the earliest computers, and they are not commonly used on personal computers today, since access to the machine can be controlled physically. But they are required on machines that have many potential users. Thus they first came into widespread use with the growing popularity of mainframe-based, multi-user, timesharing systems in the 1960s, and the idea carried over to computer networks in which a user logged into one machine can remotely access other machines.

25.You should not assume, though, that a password-protected place is necessarily private. In the widely reported case of Bourke v. the Nissan Motor Corporation in 1993, Nissan dismissed some employees after peeking into their password-protected electronic mail boxes. The employees sued for invasion of privacy and wrongful determination. But the California courts ruled against the employees' claim that the passwords created an expectation of privacy.

26.William M. Bulkeley, "Cypher Probe," The Wall Street Journal, Thursday, April 28, 1994, A1, A8.

27.Peter H. Lewis, "Of Privacy and Security: The Clipper Chip Debate," The New York Times, Sunday, April 24, 1994, F5.

28.Jerry Berman, quoted by Steven Levy, "Battle of the Clipper Chip," The New York Times Magazine, Sunday, June 12, 1994, pp.44-51, 60, 70. In June 1994 the US Public Policy Committee of the Association for Computing Machinery (USACM) released an expert panel report entitled "Codes, Keys and Conflict: Issues in U.S. Crypto Policy," which took a strong stand against Clipper and urged the Clinton Administration to withdraw it.

29.Jim Kallstrom, quoted by Levy, "Battle of the Clipper Chip."

30.For a useful summary of some of the legal issues, with particular reference to electronic mail privacy and electronic monitoring of employees, see Michael Traynor, "Computer E-Mail Privacy Issues Unresolved," The National Law Journal, Monday, January 31, 1994, pp. 52-54.

31.For a classic discussion of the public/private dichotomy in architecture and urban design, see Serge Chermayeff and Christopher Alexander, Community and Privacy (New York: Doubleday, 1963).

32.Senate Bill S.2195. Inouye was serving as Chairman of the Communications Subcommittee of the Senate Commerce, Transportation and Science Committee.

33.Kevin Lynch, A Theory of Good City Form (Cambridge, MA: The MIT Press, 1981). See also Stephen Carr, Mark Francis, Leanne G. Rivlin, and Andrew M. Stone, "Rights in Public Space," in Public Space (Cambridge: Cambridge University Press, 1992), pp.137-86.

34.The Berkeley Community Memory system, going back to the early 1970s, was a very early experiment with elements of the idea. For a survey and discussion of the first community networking efforts, see Doug Schuler, "Community Networks: Building a New Participatory Medium," Communications of the ACM 37: 1 (January 1994): 39-51.

35.Frank Odasz, "Big Sky Telegraph," Whole Earth Review (Summer 1991): 32-35.

36.Some of these issues are very basic. If you want to create a successful online public space for a multi-ethnic community, for example, you cannot rely solely on prompts and commands in English.

37.Peter H. Lewis, "Arizona Lawyers Form Company for Internet Advertising," The New York Times, Saturday, May 7, 1994, p.51. On the issue of Internet advertising, see Lawrence M. Fisher, "From an Executive at Ogilvy & Mather, Some Guidelines for Tasteful Advertising on the Internet," The New York Times, Wednesday, August 3, 1994, D16.

38.Peter H. Lewis, "Censors Become a Force on Cyberspace Frontier," The New York Times, Wednesday, June 29, 1994, pp.1, D5.

39.There has been much controversy about Prodigy's control - and sometimes refusal to exert control - over its "public" forums; for a lively account, see Anne Wells Branscomb, "Questioning Applicable Laws: Prodigy," in Who Owns Information? From Privacy to Public Access (New York: Basic Books, 1994), pp.98-103.

40.Peter H. Lewis, "Censors Become a Force on Cyberspace Frontier."

41.For discussions, see Steven Levy, Hackers: Heroes of the Computer Revolution (New York: Dell, 1984); and Schuler, "Community Networks: Building a New Participatory Medium."

Footnotes Chapter 6

For an introduction to the bit business, see Robert Lucky, Silicon Dreams: Information, Man, and Machine (New York: St. Martin's Press, 1989).

1.For a discussion of difficulties in applying intellectual property law in cyberspace, see Mike Godwin, "Some `Property' Problems in a Computer Crime Prosecution," posting on misc.legal,comp.orf.eff.talk of an article that first appeared in Cardozo Law Forum (September 1992).

2.Manuel Castells, The Informational City: Information Technology, Economic Restructuring, and the Urban-Regional Process (Cambridge, MA: Blackwell, 1989), p.129.

3.For historical surveys of these places, see J. B. Jackson, "Forum Follows Function," in N. Glazer and M. Lilla, eds., The Public Face of Architecture (New York: Free Press, 1987), and M. Webb, A Historical Evolution: The City Square (New York: Whitney Library of Design, 1990).

4.Aristotle, Politics, VII, xii.

5.The commercial online services provide "shopping centers" that are basically conveniently organized and presented catalogues of online catalogues. On the Internet, more ad-hoc compilations like the Internet Mall have performed a similar function on a fairly small scale (for information, e-mail taylor@netcom.com ). CommerceNet, which went online on the Internet in April 1994, is an ambitious system of World Wide Web "storefronts" accessed through Mosaic ( http://www.commerce.net ).

6.For a discussion of some of these issues, see Anne W. Branscomb, "Who Owns Your Name and Address?," in Who Owns Information? From Privacy to Public Access (New York: Basic Books, 1994), pp.9-29.

7."Prodigy Service Member Agreement," Prodigy Services Company, White Plains, 1989. For discussion, see Oscar H. Gandy, Jr., The Panoptic Sort (Boulder: Westview Press, 1993), p.104.

8.List construction practices are hair-raisingly surveyed in Jeffrey Rothfeder, Privacy for Sale: How Computerization Has Made Everyone's Life an Open Secret (New York: Simon & Schuster, 1992).

9.Peter H. Lewis, "Attention Shoppers: Internet Is Open," The New York Times, Friday, August 12, 1994, D1-D2.

10.For details, see Martin E. Hellman, "The Mathematics of Public-Key Cryptography," Scientific American 241: 2 (August 1979): 146-147.

11.For an introduction to electronic cash schemes, see David Chaum, "Achieving Electronic Privacy," Scientific American (August 1992): 96-101.

12.Details on the DigiCash scheme can be obtained by sending e-mail to info@digicash.nl.

13.Aristotle, Politics, I, iv.

14.The line between agents and more traditional sorts of software tools is not easily drawn. But software is agentlike to the extent that it operates autonomously and intelligently. If it can somehow be programmed to enact your personal wishes, if it has some capacity to learn from experience, and if it can adapt to the unexpected and execute contingency plans, then you can confidently call it an agent.

15.Marvin Minsky, The Society of Mind (New York: Simon & Schuster, 1987).

16.Evan I. Schwartz, "Software Valets That Will Do Your Bidding in Cyberspace," The New York Times, Sunday, January 9, 1994, p.11.

17.Ellen Germain, "Software's Special Agents," New Scientist 142: 1920 (April 9, 1994): 19-20.

18.See Pattie Maes, "Agents That Reduce Work and Information Overload," Communications of the ACM 37: 7 (July 1994): 31-40, 146. An early commercial example of this sort of agent was Open Sesame! - a Macintosh program from Charles River Analytics.

19.Some of these problems are explored in Donald A. Norman, "How Might People Interact with Agents," Communications of the ACM 37: 7 (July 1994): 68-71.

20.We might turn to ancient philosophy and law dealing with slaves for some guidance here, but it turns out not to be much help. Following Aristotle's view of slaves as live tools, Roman law basically denied that slaves were autonomously intelligent; they occupied some kind of limbo between human beings and animals. So, for example, a slave who killed somebody was either malfunctioning and should be destroyed or was carrying out an instruction for which the owner was responsible. The Stoics took the contrary view that slaves should be treated as autonomously intelligent beings, and Seneca famously developed the position that they were capable of virtuous action and should be held responsible for the virtue or otherwise of their acts.

21.See for instance, "Officials Fight Computerized Child Porn," San Jose Mercury News, Wednesday, September 1, 1993, 20A.

22.For text of the Defense Motion to Dismiss, see Computer Underground Digest 6: 55 (Sunday, June 19, 1994) files 1-6. On the conviction, see "Couple Guilty of Sending Pornography by Computer," Los Angeles Times, Friday, July 29, 1994, A10; and Computer Underground Digest 6: 69 (Sunday, July 31, 1994), files 1-6.

23.See Nathan Torkington, "Proposed New Zealand Legislation," Computer Underground Digest 6: 60 (Wednesday, July 6, 1994), file 7. The text of the bill is reproduced in Computer Underground Digest 6: 65 (Sunday, July 17, 1994), file 1.

24.See Peter H. Lewis, "On the Internet, Dissidents' Shots Heard 'Round the World," The New York Times, Sunday, June 5, 1994, E18. The Digital Freedom Network may not, in practice, be very effective, since network access currently does not reach many of the places where books are notoriously banned. It certainly would not get The Satanic Verses to the hinterlands of India, Pakistan, and Iran, for example. But it does establish the idea, and it suggests a very likely future condition.

25.See Ray Bradbury, Fahrenheit 451: The Temperature at Which Books Burn (New York: Ballantine, 1953).

26.According to a perhaps apocryphal or exaggerated story, all the broadcast networks in the old Soviet Union ran through a single switch, so that they could be shut down in an instant. True or not, this is a compelling image of totalitarian control of electronic telecommunication.

27.The contrast between centralized, potentially authoritarian, client-server architectures for computer networks and the decentralized, redundant, peer-to-peer structures and inter-networking of the Internet is explored in Roger Clarke, "Information Technology: Weapon of Authoritarianism or Tool of Democracy," IFIP World Congress, Hamburg, August, 31, 1994.

28.Aristotle, Politics, VII, v.

29.Rick E. Bruner, "Info Explosion Extends to the Former East Block," The Boston Globe, Monday, August 1, 1994, pp.18-19.

30.For one view of how this might work, see D. Elgin, "Conscious Democracy Through Electronic Town Meetings," Whole Earth Review (Summer 1991): 28-29.

31.Recall that William Gibson's cyberspace novels postulate head implants as interface devices. When characters offend against the power structure, they risk getting their brains fried. Any kind of force-feedback device also has the potential to inflict violence.

32.This may become a standing threat and standard penalty, just as transportation to Australia became a standard penalty in the eighteenth- century British legal system.

33.An occasional criticism of online public spaces is that they represent a wimpy cop-out - a withdrawal from full-blooded engagement in real urban places with all their risks and dangers. (It's a line that seems particularly popular with New Yorkers.) I'm not so sure. There are few places nastier than the site of an all-out flame war.

34.Roger A. Clarke, "Information Technology and Dataveillance," Communications of the ACM 31: 5 (May 1988): 498-512.

35.On the methods of TRW and other major credit bureaus, see Rothfeder, "The Secret Sharers," in Privacy for Sale, pp.31-62.

36.For development of this scenario, see Gandy, The Panoptic Sort.