Feeds

Memory conference considers the future of our pasts

Technology meets ethics

  • alert
  • submit to reddit

Top three mobile application threats

Academics, writers, biographers and computer scientists came together in London today to discuss how and whether technology can and should be used to supplement and augment human memory. The stage for the meeting: the British Library, where the University of Southampton is hosting the Memories for Life Colloquium.

The questions on the table for discussion range from the technical to the profound. How can we store information is one that nearly all attendees agree has been answered pretty well. Storage is getting cheaper and new technologies promise that this trend is set to continue, according to Nigel Shadbolt, professor of computer science at Southampton university.

But delegates are also being asked to consider the ethical implications of storing our lives digitally? Do we need to remember everything, or should we be allowed to forget?

There is a tendency, one delegate said, for us to do things because we can. That, he says, must be tempered by an awareness of the social and political implications of technology.

Cliff Lynch, chair of the Coalition for Networked Information, says that the subject is an important one to debate, because how our data is captured and shared will form the basis for understanding the key intellectual, artistic and political figures of our time.

Biographer Anne Sebba points out that the biographers of the future will be working without one of the major resources on which she and her colleagues depend: letters. Now, when much of our correspondence is created digitally, and we are losing it when we upgrade our computers.

"What will take the place of those letters? The texts we send every day and never print out? We are losing so much information."

But new forms of data are taking their place. "Blogs are invaluable," Sebba notes, but with the corollary that as with all diaries, the author probably has one eye on posterity, so they should be read with a critical eye.

The conference is also tackling the science of the human memory, considering the fallibility of the human mind, and looking at whether technology has a role to play in filling in the gaps. ®

High performance access to file storage

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
Swan dive signs off successful science mission
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Dragon capsule arrives at space station for Easter Sunday delivery
SpaceX reports Falcon booster made controlled touchdown in ocean
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.