Feeds

Memory conference considers the future of our pasts

Technology meets ethics

  • alert
  • submit to reddit

High performance access to file storage

Academics, writers, biographers and computer scientists came together in London today to discuss how and whether technology can and should be used to supplement and augment human memory. The stage for the meeting: the British Library, where the University of Southampton is hosting the Memories for Life Colloquium.

The questions on the table for discussion range from the technical to the profound. How can we store information is one that nearly all attendees agree has been answered pretty well. Storage is getting cheaper and new technologies promise that this trend is set to continue, according to Nigel Shadbolt, professor of computer science at Southampton university.

But delegates are also being asked to consider the ethical implications of storing our lives digitally? Do we need to remember everything, or should we be allowed to forget?

There is a tendency, one delegate said, for us to do things because we can. That, he says, must be tempered by an awareness of the social and political implications of technology.

Cliff Lynch, chair of the Coalition for Networked Information, says that the subject is an important one to debate, because how our data is captured and shared will form the basis for understanding the key intellectual, artistic and political figures of our time.

Biographer Anne Sebba points out that the biographers of the future will be working without one of the major resources on which she and her colleagues depend: letters. Now, when much of our correspondence is created digitally, and we are losing it when we upgrade our computers.

"What will take the place of those letters? The texts we send every day and never print out? We are losing so much information."

But new forms of data are taking their place. "Blogs are invaluable," Sebba notes, but with the corollary that as with all diaries, the author probably has one eye on posterity, so they should be read with a critical eye.

The conference is also tackling the science of the human memory, considering the fallibility of the human mind, and looking at whether technology has a role to play in filling in the gaps. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.