Duplicate, Leak, Deity
Lawrence Cohen de-duplicates the complex story of Indiaâs Biometric Archive(s).
Disservice Lines
In any delivery system, the final leg is often the hardest. Michael Degani takes to the streets of Dar es Salaam to explore the âlast-mile problemâ of Tanzaniaâs energy grid.
Whoâs hacking whom?
What can you do with a Tor exploit? Renée Ridgway discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.
The Zone of Entrainment
We know that environmental concerns have been used to block infrastructure projects. But can infrastructure be used to side-step environmental concerns? Andrew Lakoff on water provision and species protection in California.
When GhostSec Goes Hunting
GhostSec engaged in vigilante counter-terrorism against ISIS. Robert Tynes explores whether this makes them part of the state, part of civil society, or part of empire.
Refuse and Resist!
Joan Donovan dives into the dumpster of the Internet, and comes up holding some tasty ideas about what "doxing" means today and yesterday.
Blood, Paper, and Total Human Genetic Diversity
Jenny Bangham explains how the attempt to create a supply of all possible types of human blood gave rise to genetic diversity research in the 20th century.
The Logic of Leaks, reconsidered
Are leaks fast and slow? Does their âillicit auraâ matter? Naomi Colvin dives into the debate about leaking and the politics of journalism today.
Iterate, Experiment, Prototype
Anke Schwittay and Paul Braund explore the curious intersection between international aid and design.
Anke Schwittay
Paul Braund
Trojan Cans
How did the self-service economy emerge? Franck Cochoy displays the âpico-infrastructureâ behind modern consumption.
Remittance Channels & Regulatory Chokepoints
Since 2008, new financial regulations have reformatted the channels of global remittances. Ivan Small examines how the Vietnamese diaspora is navigating this landscape of regulatory chokepoints.
Customer Care
Robert Foster explores how mobile phones in Papua New Guinea offer new ways for both companies and consumers to give and receive care.
The Extortion Stack
Finn Brunton explores the dream of the perfect leak, and what a science fiction story can tell us about the state of truth today.
Car Wars
A self-driving car is a computer you put your body in. Fiction by Cory Doctorow.
Between the Nation and the State
Is your mobile phone company seeing like a state? Emma Park and Kevin P. Donovan explore telecommunications and contemporary nationalism in Kenya.
Emma Park
Kevin P. Donovan
Microfinance as a Credit Card?
Jonathan Morduch traces the rise of microfinance, and argues that it's time for a new vision.
Power Down
OMG! Hackers take down energy grid! David Murakami Wood and Michael Carter calmly explain the how and why (or why not) of infrastructure hacking today.
David Murakami Wood
Michael Carter
Hacker Madness
Defense lawyer Tor Ekeland gives us an up-close, first-person view of a widespread pathology: how misplaced fear and hysteria is driving an over-reaction to the positive work that hackers can do.
Outbreak of Unknown Origin in the Tripoint Zone
Guillaume Lachenal traces the urgent past of the current ebola outbreak, offering some surprising lessons about borders.
Crowds and Collectivities in Networked Electoral Politics
What happens when a crowd decides to think for it- self? Daniel Kreiss explores the answer in the 2008 Obama campaign.
Microworking the Crowd
How do you turn millions of people into a CPU? Lilly Irani unravels the mysteries of human-as-computation in Amazon Mechanical Turk.
Am I Anonymous?
Learning how Anonymous works means learning to be one. Gabriella Coleman narrates her experience of being in between worlds.
Half-Lives of Hackers and the Shelf Life of Hacks
What is the speed of hacking? Luca Follis and Adam Fish explore the temporality of hacking and leaking in the cases of Snowden, the DNC leaks and the Lauri Love case.
Governing Development Failure
How did little development devices make their way into big development institutions? Jacqueline Best explores the history of policy failure at the World Bank.
Can an Algorithm be Wrong?
How do we know if we are where it's at? Tarleton Gillespie explores the controversy over Twitter Trends and the algorithmic 'censorship' of #occupywallstreet.
Preface: Hacks, Leaks, and Breaches
Gabriella Coleman and Christopher Kelty guide readers through Limn Number 8 on Hacks, Leaks, and Breaches.
Christopher M. Kelty
E. Gabriella Coleman
EXCREMENTA I: Welcome to Excrementa
Brenda Chalfin and Xhulio Binjaku imagine designs for the future with Dwelling-Based Public Toilets in Urban Ghana.
Brenda Chalfin
Xhulio Binjaku
Iconoclasm in the Supermarket
What happens when activists re-label your food? Javier Lezaun explores the "Label It Yourself" movement and its ambivalent power.
Unbearable Future
One of the more spectacular signs of the onset of climate change is the decline of the polar bear population. But is it really in decline? Etienne Benson traces the long and controversial history of modeling the future population of polar bears.
The Paradoxical Authority of the Certified Ethical Hacker
Can hackers be certified? Rebecca Slayton looks at efforts to blend, certify and market the subversive skills of hacking with the ethos of professionalism.
Algorithmic Recommendations and Synaptic Functions
Personalized recommendation is the new marketing. Nick Seaver explains how âcollaborative filteringâ de- fines people through their purchases.
Engineering Collectives: Technology From the Coop
Engineers make the world, but not just as they please. Chris CsikszentmihĂĄlyi recounts how engineers come to be part of one collective or another.
Expertise in the Grid
Do you know how to read your electricity bill? Canay Ăzden-Schilling examines how new electricity expertsâand new publicsâare creating and contesting the price of U.S. household energy today.
The Political Meaning of Hacktivism
Philosopher-kings or Fawkes masks? Ashley Gorham explores the truth-telling zeal of WikiLeaks and the lulzy opinions of Anonymous.
Is Limn Obsolete?
The founding editors reflect on the journalâs
origins
Christopher M. Kelty
Andrew Lakoff
Stephen J. Collier
An Ebola Photo Essay
Frédéric Le Marcis and Vinh-Kim Nguyen document ebola's ecologies in photos.
Frédéric Le Marcis
Vinh-Kim Nguyen
Crafting a Digital Public
What makes a city smart? Alan Wiig examines a project to promote urban development through information infrastructure in Philadelphia.
âWater is life, but sanitation is dignityâ
Tatiana Thieme explores how doing your business has become an opportunity for business in Nairobi.
Are We All Flint?
Why is lead-contaminated water a matter of public concern but contaminated housing is not? Catherine Fennell explores infrastructure and the politics of solidarity.
Fingerprint, Bellwether, Model Event: Anticipating Climate Change Futures
Climate change is now happening faster than our models and stories can comprehend. Jerome Whitington explores three figures of warning that help make sense of it.
Keeping the Books
Finn Brunton goes inside the Bitcoin blockchain to explore the weirdly meticulous collective archive, and how it might someday govern us.
Rational Sin
David Reubi explores how Chicago Economics remade Global Public Health.
Elements of Food Infrastructure
As food has industrialized, it has changed, along with our bodies and our economies. Matthew Hockenberry charts conceptual connections in this issue with a timeline.
Hydraulic Publics
Nikhil Anand explores why reforms to the Mumbai water system failed.
I am Not a Hacker
The term "hacker" is notoriously slippery. Paula Bialski dives into the practices and micropolitics of self-proclaimed non-hackers.
The Public Interest Hack
How are hacking and leaking related? Gabriella Coleman introduces us to the âpublic interest hackâ and explains how it emerged.
A Slightly Better Shelter?         Â
Tom Scott-Smith gets inside an award-winning shelter designed for refugees and asks: what makes it any better than a tent?
Right To Repair
An interview with R2R advocate Kyle Wiens
Townsend Middleton
Gökçe GĂŒnel
Ashley Carse
Recording and Monitoring: Between Two Forms of Surveillance
Vanessa Manceron argues that when naturalists take part in monitoring programs on their âlocal patch,â they are caught between two forms surveillance: care and control.
The Art of the Monger
How do cheesemongers extend the value of a dying commodity? Heather Paxson explores how mongers care for living cheeseâand for the craft of their trade.
Just What Are We Archiving?
What kind of people will we become if we keep trying to archive everything? Geof Bowker reports from inside the Skinner Box.
Interview: Lorenzo Franceschi-Bicchierai
Journalist Lorenzo Franceschi-Bicchierai talks with Limn about the details of the DNC hacks, making sense of leaks, and being a journalist working on hackers today.
E. Gabriella Coleman
Lorenzo Franceschi-Bicchierai
Infrastructure Made Public
Five year planning is dead. Long live the five year plan! Andrew Barry explores infrastructure's transparencies and opacities in the UK
The Emergence of Systemic Financial Risk: From Structural Adjustment (Back) To Vulnerability Reduction
How did "systemic risk" emerge from the Latin American Debt Crisis? Onur Ozgöde explains
Can You Secure an Iron Cage?
Are bureaucracies defensible? Nils Gilman, Jesse Goldhammer, and Steven Weber explore the Office of Personnel Management hack, and what it tells us about the inherent vulnerabilities of bureaucratic organizations in a digital age.
Nils Gilman
Jesse Goldhammer
Steven Weber
The Spy Who Pwned Me
How did we get to state-sponsored hacking? Matt Jones traces the legal authorities and technical capacities that have transformed the power of the nation-state since the 1990s.
EXCREMENTA III: The Leader in Upscale Sanitary Solutions?
Brenda Chalfin reflects on the use of design as a little development device.
Systems at Risk as Risk to the System
Systemic risk in finance refers to at least three things, according to George G. Kaufman and Kenneth E. Scott: It connotes a macro shock that produces nearly simultaneous, large, adverse effects in most or all of the domestic economy or even international financial system. It can also refer to the risk of a chain reaction ...
On Reusable Pasts and Worn-out Futures
Sara Tocchetti explores the reusable pasts of hacking and the worn-out productions of biohackers.
Who Owns Africaâs Infrastructure?
James Christopher Mizes examines how an emerging style of African infrastructure planning and finance is inflecting an old political collectivity with ânewâ values.
Timeline: Ebola 2014
The timeline of the 2014 Ebola outbreak, compiled by Andrew Lakoff
The Origins of Happiness
Boris Jardine tells the story of a little ladder intended to tell us what everyone wants. Where on the ladder are you?
Preface: Little Development Devices / Humanitarian Goods
A brief introduction to the idea behind Issue Number Nine, and the concepts associated with it.
Stephen J. Collier
Jamie Cross
Peter Redfield
Alice Street
Ebola, Running Ahead
What does experimentation look like in the time of emergency? Ann H. Kelly explores the design of clinical trials amidst the ebola crisis.
Prototyping relationships: on techno-political hospitality
Alberto CorsĂn JimĂ©nez & Adolfo Estalella, CSIC, Spanish National Research Council When drafting the original call for papers that led to the âPrototyping culturesâ conference, we noted that the figure of the âprototypeâ had recently emerged as a currency of explanation and description in a number of para-laboratory contexts: from classical industrial and engineering sites ...
Crowd funding and its Challenges
Micro-lending plus crowd-sourcing creates its own problems. Roma Jhaveri explains how to keep crowds happy.
Public Laboratories: Designing and Developing tools for Do-It-Yourself Detection of Hazards
Signals of environmental hazard cannot be heard unless there is a device to detect them. Sara Wylie, Megan McLaughlin and Josh McIlvain show you how to make one yourself.
Megan McLaughlin
Josh McIlvain
Sara Wylie
Archiving Descriptive Language Data
Judith Kaplan explores the possibility of a new GOLD standard for archiving the world's endangered language data.
How to be open about being closed
How does the Internet forget what it should not remember? Reuben Binns dives inside the rules for Biographies of Living Persons at Wikipedia and the right to be forgotten.
The Illicit Aura of Information
Does the unfiltered, illicit status of a leak change the nature of information? Molly Sauter offers a consideration of the half-life of stolen data.
A Mix for the Ages
As media forms come and go, why do cassette tapes live on?
The Long History of Prototypes
Michael Guggenheim The conference organisers Alberto CorsĂn JimĂ©nez and Adolfo Estalella state at the beginning of their invitation: âprototypes have acquired certain prominence and visibility in recent timesâ. What I want to focus on is what the words âvisibilityâ and ârecent timesâ may mean in the above sentence. The problem here is that the conference ...
Cross-Cultural Partnership: TEMPLATE and HOWTO
[From The Cross Cultural Partnership website. Discussed by James Leach in his presentation.–ed] DRAFT version 0.3, September 2007 Preamble The cross-cultural partnership template is designed to help potential collaborators to reach understanding and agreement on the terms of their collaboration. In many contexts people look to the law to establish or enforce a ‘safe space’ ...
The Origins of Extinction
What do barn swallows reveal about the future? In the biogeographical space of "the Zone" around Chernobyl, Adriana Petryna shows us how they force us to think about the origins of extinction.
Ebola, 1995/2014
Nicholas B. King looks back at the dialectics of confidence and paranoia in the Ebola outbreaks of 1995 and 2014
Aeolian Infrastructures, Aeolian Publics
Cymene Howe and Dominic Boyer examine the politics of wind and power â in all their turbulence â in Oaxaca, Mexico
Utopian Hacks
Not all engineers create equally. Götz Bachmann takes us inside the labs of "radical engineers" and the starkly different futures they imagine for us.
The Morris Worm
The Morris worm was released in November of 1988. It was launched surreptitiously from an MIT computer by graduate student Robert Tappan Morris at Cornell University, and spread to internet-connected computers running the BSD variant of UNIX. The worm was designed to be undetectable, but a design flaw led it to create far more copies ...
What Escapes the Total Archive
Rebecca Lemov relates how the stories in the a âdatabase of dreamsâ leak out of the edges, and sometimes overwhelm totality with particularity.
Logisticsâ Liabilities
Deborah Cowen tracks how the movement of goods shapes the meaning of risk.
Scale, Evolution and Emergence in Food Systems
Christopher Otter diagnoses the impossibility of fully governing large-scale food systems and the novel ecologies they create.
The Fish at the Heart of the Food System
David Schleifer and Alison Fairbrother introduce menhaden, the fish you've never heard of but are probably eating right now.
David Schleifer
Alison Fairbrother
Preface: Sentinel Devices
The editors of Limn Number 3 explain what a sentinel is and how it matters today.
Frédéric Keck
Andrew Lakoff
Deep Diagnostics
Alice Street examines the market infrastructure behind off-grid diagnostics.
Rebuilding by Design in Post-Sandy New York
What is the scope for local planning in large-scale infrastructure projects today? Stephen J. Collier, Savannah Cox, and Kevin Grove explore the multiple publics of flood control in New York City
Stephen J. Collier
Savannah Cox
Kevin Grove
What Is to Be Hacked?
Security is no longer a privilege of the few, or a commodity in the hands of those few who can afford it. Claudio (ânexâ) Guarnieri explains why civil society isnât going to secure itself, and why it needs help from hackers.
Claudio (ânexâ) Guarnieri
In the Name of Humanity
The total archive is already here, BalĂĄzs BodĂł finds it hidden in the shadows and run by pirates.
Solar Basics
Jamie Cross explores how a solar-powered lamp became the go-to solution to Puerto Ricoâs energy crisis.
The prototype: a sociology in abeyance
Alberto CorsĂn JimĂ©nez & Adolfo Estalella Could we speak of a saint as a prototype for a religious movement or of a clue as a prototype for a crime? Writing in the early 20th century, philosopher Max Scheler thought that heroes, saints and geniuses played a prototypical role for larger models of social organisation.[1] Scheler ...
The Humble Cookstove
Meena Khandelwal and Kayley Lain reflect on half a century of failed efforts to change how people cook in rural India, before adding a little device of their own to the fire.
Meena Khandelwal
Kayley Lain
The Tighty-Whities Test
Why are farmers burying underwear in their fields?
The Touch-point Collective: Crowd Contouring on the Casino Floor
Women under thirty and retired men might have surprisingly similar tastes for gambling. Natasha Dow SchĂŒll explains how casinos have created a new kind of crowd.
The Weakness of Crowds
Why canât crowds defend themselves? Alek Felstiner explores how the power of crowds to decide is also a weakness when it comes to organizing.
Preface: Crowds and Clouds
This issue of Limn focuses on new social media, data mining and surveillance, crowdsourcing, cloud computing, big data, and Internet revolutions.
Zebras, Blanks and Blobs
How can we work with vast digital collections? Artist Fabienne Hess explores the content and scale of an online image database
Unpacking Googleâs Library
Google wanted to digitize all the worldâs books but eventually abandoned that goal. Mary Murrell explores the rise and fall of one utopian library project and the emergence of new ones in its wake.
Hacking/âJournalism
Philip Di Salvo explores the trading zone between journalism and hacking.
Interview: Kim Zetter
Cybersecurity journalist Kim Zetter talks with Limn about infrastructure hacking, the DNC hacks, the work of reporting on hackers and much more.
Christopher M. Kelty
Kim Zetter
Prototyping Prototyping :: Second Iteration
Lucy Suchman Our conference prototype â the document created by Chris â had the prototypical characteristic of just-in-time production, which meant that Iâve only been able to engage with it properly after the fact. Doing so was a pleasure, and leaves me wishing now for another iteration of the conference. But at least ARCEpisode2 provides ...
Prototyping Prototyping: A Preface
by: Christopher M. Kelty Prototyping Prototyping, began as a conference publication that was finished before the conference. Its goal was to be a âprototypeâ of a conference on prototyping cultures. Participants were invited 2 weeks ahead of time to submit a short piece, and nearly everyone involved did so. Iâm tempted to say: prototyping works. ...
All Lost In The Supermarket
Anthropologist and retail consultant Michael Powell takes us on a stroll down Aisle #6. What's in the center of the grocery store and why is it causing a crisis in the industry?
Global Health Doesn’t Exist
Global health is like the viruses it claims to be combatting; Theresa MacPhail explains how.
Two States of Emergency: Ebola 2014
Andrew Lakoff revisits the received wisdom that the WHO was slow to respond. Slow to respond to what exactly?
Selections from the Valaco Archive
Vadig de Croehling, Director of Ideation, Process, and Interface at the Group for Research on Experimental Accumulation and Speculative Archives (REASArch), offers a sampling of elements from one of his organizationâs most inscrutable archival projects.
The Participatory Development Toolkit
Christopher Kelty opens up a toolkit from the 1990s to explore the prehistory of apps, platforms, and algorithms.
Ecological Chokepoints
What does keeping the lower Mississippi River open for shipping have to do with coastal land loss, regional ecological change, and a pile of rocks? Joshua Lewis explores the relationship between transportation and ecological chokepoints in Louisiana.
Prototyping Prototyping: a pre-conference publication
A publication organized prior to the conference and constructed in time (though only barely) to circulate there. For some, this experiment provided a way to reflect on the relationship of presentation and writing, and the ways that conferences structure and circulate expectations about what kind of work can and should be done there, as opposed ...
Unending Archives
Aleph or Library? Work from the UA Artist Collective explores whether art can be an archive, or an archive art.
The Pre-History of Resilience in Ecological Research
Brian Lindseth explains how "resilience" migrated from ecology of the 1970s to the systemic risks of the present.
The Oil Palm Kernel and the Tinned Can
Do you see the peculiar industrial legacy of West Africa's oil palm tree in a humble tin can? Makalé Faber-Cullen does.
Everywhere and Nowhere: Focus Groups as All-Purpose Devices
Can a focus group be all of us? Rebecca Lemov explores how the box of donuts and the one-way mirror have become essential features of our self-understanding.
Cool Trading
Financial algorithms have smoothed the vagaries of overheated markets. Christian Borch shows how algorithmic trading produces its own set of new chokepoints.
Preface: The Total Archive
Archives make the future. Editors Boris Jardine and Christopher Kelty explore how archives govern us.
Christopher M. Kelty
Boris Jardine
Introduction: Ebola’s Ecologies
Andrew Lakoff, Stephen J. Collier and Christopher Kelty ask what the 2014 Ebola outbreak tells us about the history of pandemic preparedness and the blindspots of global health security today.
Andrew Lakoff
Stephen J. Collier
Christopher M. Kelty
When Crisis Calls
How the COVID-19 pandemic resuscitated old satellite technology in Thailand
The Thick and Thin of the Zone
Soe Lin Aung examines the Thilawa special economic zone to shed light on infrastructureâs changing publics in contemporary Myanmar.
Demanding Mobile Health
What are the infrastructural requirements of mobile health? Vincent Duclos reports on the MOS@N experiment in Burkina Faso.
Interview: Mustafa Al-Bassam
Limn talks with security expert Mustafa Al-Bassam (a.k.a âtflowâ) about the responsibility for information security, the incentive problems it creates and the available solutions.
Mustafa Al-Bassam
E. Gabriella Coleman
Christopher M. Kelty
Scaling Up/Scaling Down
Sophie Dubuisson-Quellier shows how French markets and social movements interact in food provisioning
Sophie Dubuisson-Quellier
The End of Innovation (As We Knew It)
Lucy Suchman, Lancaster University âThe future arrives sooner here.â Iâm driving my car down Hillview Avenue in Palo Alto, California one evening around 1995 and I hear this assertion on U.S. National Public Radio, spoken by a Silicon Valley technologist whoâs being interviewed. Â It elicits a familiar response â a certain tightening in my stomach, ...
Survival of the Cryptic
Should we have privacy for the weak and transparency for the powerful? Sarah Myers West reminds us that we've been agonizing over this question since at least the 1990s, when the cypherpunks first started discussing it.
Romans or Barbarians? Political Campaigns and Social Media in Colombia
Elections are still about shaking hands and kissing babies, for the time being. Maria Vidart explores the first experience with social media campaigning in Colombia.
Bottlenecks: An Urban Physics
From within the interminable traffic jams of Dakar, Senegal, Caroline Melly examines how bottlenecksâor embouteillagesâhave become a fixture of modern life and a window into local ideas about global im/mobility and future possibility.
Expressway Trajectories
On the road to Ugandaâs future
Refusing Abandonment
Cochlear implants deemed obsolete in one country become vital in another
Michele Friedner
Areeba Fatima
From Sensors to Sentinel: Pressure and depression in crime statistics
While policemen watch out for public security, psychologists watch out for the mental health of policemen. Emmanuel Didier looks at these two different uses of statistical data.
âWorld-Worldâ Logistics in Tangier, Morocco
Janell Rothenberg explores a transshipment port complex along the Strait of Gibraltar. While transshipped cargo is never supposed to enter Morocco beyond the port, its movement ultimately depends on local mediation.
System Vulnerability and the Problem of National Survival
Stephen J. Collier and Andrew Lakoff explode strategic bombing theory and the emergence of system-vulnerability thinking.
Stephen J. Collier
Andrew Lakoff
Infra(proto)types In the Air
by: Nerea Calvillo Presentation as a prototype itself: opens questions through the material of In the Air, a project which makes visible the components of the air. A degree of skill and experience is necessary to effectively use prototyping as a design verification tool. (Wikipedia) Prototypical methodology. AÂ prototype is generally object oriented, but it ...
Infrastructural Incursions
What does it take to flood a highway? Penny Harvey and Hannah Knox examine how old infrastructure projectsâand old infrastructural publicsâget submerged by new ones in Peru.
Resilience and Homeland Security: Patriotism, Anxiety, and Complex System Dynamics
In the realm of U.S. homeland security, the word of the day seems to be âresilience.â Benjamin Sims explains.
Demo for Democracy
by: Javier Lezaun Suppose you wanted to test the reality of democracy. Tired of claims and counter-claims, of endless debates about ideals and aspirations, and deeply unconvinced by the arguments of political philosophers, you would like to produce some real, hard facts; to verify, once and for all, that democracy really exists â that it ...
Para-sites: a Proto-Prototyping Culture of Method?
George Marcus, UC Irvine [this text discusses the “Para-Sites” project of the Center for Ethnography and it’s first event, on death penalty mitigation (see exhibit Y) — ed.] Classic anthropological ethnography, especially in its development in the apprentice project/dissertation form, was designed to provide answers, or at least data, for questions that anthropology had for ...
Mechanisms of Invisibility: Forgotten Sentinels of Diethylsbestrol Progeny
Diethylstilbestrol was one of the first identified endocrine disruptors. However, efforts to warn french physicians about the drugâs potentially dangerous effects on pregnant women failed. Emmanuelle Fillion and Didier Torny show how sentinels sometimes donât work.
Didier Torny
Emmanuelle Fillion
The Secret Lives of Corporate Food
Big companies are not just tracing their productsâ life stories, but telling them too. Susanne Freidberg explores why.
Measuring Food
Food system activist Anna Lappé takes stock of the pieces in this issue.
Frozen By the Hot Zone
Joanna Radin explores the role of the "hot zone" in immobilizing people, blood and information
Medical Vulnerability, or Where There Is No Kit
Where there is no kit and no infrastructure, there is vulnerability. Peter Redfield explores the role of medical humanitarian response in the Ebola crisis.
Glucometer Foils
Amy Moran-Thomas examines why diabetes patients worldwide still struggle to measure glucose.
Beam Ends
ââHow whaling history lives on in Nantucketâs energy politics
A Hoard of Hebrew MSS
Ben Outhwaite tells the stories of the people who immerse themselves in one of the most valuable total archives in existenceâthe Cairo Genizah.
The Genomic Open
Leaders of the Human Genome Project promised a genomic total archive. Jenny Reardon argues that their quest inspired visions of freedom and imprisonment vital to understanding todayâs ambivalences around open genomic data.
An âExpensive Toyâ
What does Abu Dhabi's green future look like? Gökçe GĂŒnel explores Masdar City in a once-promising Personal Rapid Transit Pod.
Humility and Hubris in Hydropower
Austin Lord considers the unstable politics of micro-hydropower development in the wake of Nepalâs 2015 earthquake.
Uncertain about risk
It was hard not be impressed with how this simple chart summarized the course of an astoundingly complex historical event
Figures of Warning
What are sentinels? Frédéric Keck and Andrew Lakoff explore various figures of prophecy, herald and prognostication through the ages.
Frédéric Keck
Andrew Lakoff
Exhibit: The Entropy Archives
What does a perfectly random archive look like? Finn Brunton explains.
The Bombing Encyclopedia of the World
How do you plan for the sudden onset of total war? Stephen J. Collier and Andrew Lakoff describe the construction of a vast collection of data about the vital, vulnerable systems of every nation in the world in the aftermath of World War II.
Stephen J. Collier
Andrew Lakoff
Spongy Aquifers, Messy Publics
Is an aquifer a tank or a sponge? Andrea Ballestero investigates how publics navigate the scientific indeterminacy of the underground in Costa Rica
Europeâs Materialism: Infrastructures and Political Space
Sven Opitz and Ute Tellmann explore energy infrastructure and the construction of a European commons.
The Art of In/Detectability
Traffic impedes. But does it also enable? Townsend Middleton traces the cat-and-mouse interplays of trafficking and regulation in one of South Asiaâs most notorious chokepoints: Indiaâs Chicken Neck.
Chokepoint Sovereignty
Jatin Dua reveals why Djiboutiâs history, geography, and precarious present make it a site where national sovereignty and chokepoint dynamics are intimately tied.
Deprecating Death
Can the war on life be rendered obsolete?
Hong Kong as a Sentinel Post
When birds die of H5N1 in China’s border region, the whole territory of Hong Kong is transformed into a sentinel post for pandemic flu. FrĂ©dĂ©ric Keck shows how the city’s new role affects relations between humans and birds in this territory.
The Invisible âJungleâ of Calais
In 2016, French authorities bulldozed the migrant camp known as âthe Jungleâ at the mouth of the Chunnel. In 2017, migrants returned. Photographer Eric Leleu and anthropologist Vincent Joos combine images and words to humanize this chokepoint and counter its infrastructures of invisibility.
How pipelines constrict oil flows
Christopher Jones explores how oilmen have used conduits as weapons to crush competitors, maintain industry dominance, and rake in huge profits.
Preface: Chokepoints
The editors of Limn 10 challenge you to think about "chokepoints" as simultaneously geographical and deeply social phenomena.
Ashley Carse
Jason Cons
Townsend Middleton
Planning for Obsolescence
The emergence of Chinaâs circular economy
Labels for Life
The labels on our food exist in a complex political struggle over consumersâ attention. Xaq Frohlich walks us through the information infrastructure of the label and its impact on our âchoices.â
Nuclear States, Renewable Democracies?
Andreas Folkers recalls how nuclear energy created a powerful counter-public in Germany beginning in the 1970s, and assesses the contemporary politics of energy alternatives.
Chinaâs Infrastructural Fix
How is modernity being reclaimed as a Chinese project? Jonathan Bach investigates the politics of infrastructure in today's most ambitious developmental state.
001: Prototyping Prototyping
What is a prototype and why is it a salient contemporary figure? This collection of writings was provoked by a conference, held in Madrid in November 2010. The goal was to “prototype” a conference publication before the conference itself, both as a demonstration of the process envisioned by ARC studio, and as a way to ...
A Dearth of Numbers: The Actuary and the Sentinel in Global Public Health
How do experts respond to a threat whose probability cannot be calculated but whose consequences could be catastrophic? Andrew Lakoff explores the political dynamics of sentinel devices in the case of the 2009 swine flu pandemic.
Preface: Public Infrastructures / Infrastructural Publics
Stephen J. Collier, James Christopher Mizes, and Antina von Schnitzler ask how infrastructures and their publics are taking shape today.
Stephen J. Collier
James Christopher Mizes
Antina von Schnitzler
Shipping corridors through the Inuit homeland
Claudio Aporta, Stephanie C. Kane, and Aldo Chircop explore the conceptual and lived tensions around ice in Arctic straits. They show how one groupâs obstacle can be another groupâs means of connection.
Claudio Aporta
Stephanie C. Kane
Aldo Chircop
Prototypes in Design: Materializing Futures
Alex Wilkie The two excerpts that follow are drawn from my Ph.D. research User Assemblages in Design: An Ethnographic Study. The thesis is an examination of the role of multiple users in user-centered design (UCD) processes and is based on a six-month ethnographic field study of designers employed to apply the principles and practices of ...
Preface
Illuminating Obsolescence
Townsend Middleton
Gökçe GĂŒnel
Ashley Carse
The âBecomingâ Insurable of Terrorism Risk in the US: Imagining Systemic Risk
Philip Bougen explores terrorism risks and making the unthinkable insurable.
Introduction: Systemic Risk
Stephen J. Collier and Andrew Lakoff introduce the concept of "systemic risk" and the focus of Limn Number 1.
Stephen J. Collier
Andrew Lakoff
Public Safety and Wall Street
Compstat and the Real Time Crime Center are at the epicenter of Bloombergâs New York. Emmanuel Didier explores how they are turning public safety into a commodity for Wall Street.
Ebola, Chimeras, and Unexpected Speculation
Alex Nading explains how brincidofovir's path to the front lines of the Ebola crisis underscores the contingent, speculative, âchimericâ nature of contemporary global health.
On Band-Aids and Magic Bullets
Peter Redfield probes the merits of small solutions to big problems.
The Funnel Effect
In the docks of Sicily, surveillance and humanitarianism mingle with traces of lives and deaths beyond the point of entry. Cristiana Giordano explores what happens when migrants rescued at sea arrive at Europeâs shores.
Dredge Dump Dike
The Dredge Research Collaborative show how sediment management undergirds the social and economic life of the Great Lakes region. Dredging embodies a central fact of the Anthropocene: there is no away.
Dredge Research Collaborative
Art Beyond Waste
An artist reimagines objects discarded in Accraâs vulcanizer shops
Technical Hospitality
Facing a post-antibiotic future, scientists and patients forge new alliances in pursuit of old therapies
Strangling the Internet
Every network has its chokepoints. Nicole Starosielski brings us under the ocean to explore the hidden ones along the information superhighway.