Feeds

Memory conference considers the future of our pasts

Technology meets ethics

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Academics, writers, biographers and computer scientists came together in London today to discuss how and whether technology can and should be used to supplement and augment human memory. The stage for the meeting: the British Library, where the University of Southampton is hosting the Memories for Life Colloquium.

The questions on the table for discussion range from the technical to the profound. How can we store information is one that nearly all attendees agree has been answered pretty well. Storage is getting cheaper and new technologies promise that this trend is set to continue, according to Nigel Shadbolt, professor of computer science at Southampton university.

But delegates are also being asked to consider the ethical implications of storing our lives digitally? Do we need to remember everything, or should we be allowed to forget?

There is a tendency, one delegate said, for us to do things because we can. That, he says, must be tempered by an awareness of the social and political implications of technology.

Cliff Lynch, chair of the Coalition for Networked Information, says that the subject is an important one to debate, because how our data is captured and shared will form the basis for understanding the key intellectual, artistic and political figures of our time.

Biographer Anne Sebba points out that the biographers of the future will be working without one of the major resources on which she and her colleagues depend: letters. Now, when much of our correspondence is created digitally, and we are losing it when we upgrade our computers.

"What will take the place of those letters? The texts we send every day and never print out? We are losing so much information."

But new forms of data are taking their place. "Blogs are invaluable," Sebba notes, but with the corollary that as with all diaries, the author probably has one eye on posterity, so they should be read with a critical eye.

The conference is also tackling the science of the human memory, considering the fallibility of the human mind, and looking at whether technology has a role to play in filling in the gaps. ®

Internet Security Threat Report 2014

More from The Register

next story
MARS NEEDS WOMEN, claims NASA pseudo 'naut: They eat less
'Some might find this idea offensive' boffin admits
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
Comet Siding Spring revealed as flying molehill
Hiding from this space pimple isn't going to do humanity's reputation any good
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
Human spacecraft dodge COMET CHUNKS pelting off Mars
Odyssey orbiter yet to report, though - comet's trailing trash poses new threat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.