Excellent Thoughts and Photos on Desire Lines

Among my more popular posts is Way more about paths at UC Berkeley than you’d ever want to read. It got some recent traction, and in the comments were a couple of interesting items I wanted to call to people’s attention.

Phil gives us a fab photo of paths in front of the Hotel Moskva.

Robin Sloan and a colleague published “On the Beaten Path,” which attempts to find the applied math in such wanderings.

DIS2004 – Design for Hackability Panel

I just attended the Design for Hackability panel here at DIS2004. Hacking, in this context, tended to mean appropriating existing technologies for purposes other than intended. Anything from modifying Barbie Dolls to grabbing audio and text feeds to manipulate objects to jumpstarting social interaction between strangers.

It was one of those talks where meme overload causes a bit of cerebral paralysis. Some notes I jotted down…

– There’s a prevailing notion that “hacking” is a meme on the rise. More things are being hacked. Hacking is getting easier to do. The first suggestion as to way the increase dealt with the lowering of barriers to entry — hacking is easier, because, thanks to the Web, you can get instructions for hacking more readily. Also, some of the tools of this kind of hacking — RSS feeds, audio streams, plug-ins, etc — are more readily available.

However, I think a more important aspect to the rise of hacking is as a response to what is feeling like an increasingly monolithic culture. This was touched on briefly, but I think more crucial. I think our larger political and consumer systems have left a lot of people feeling disempowered and without identity– and hacking is a way to regain control, to personalize, to make Things Your Own.

– One thing that suggested this rise of hackability was an increase in presence in pop culture. The magazine Readymade was a case in point — it’s filled with do-it-yourself projects for augmenting and configuring your life. And I wondered the degree to which Readymade is like Wallpaper or Seventeen — it’s more aspirational than actually practiced. People crave the DIY life, don’t have the time for it, but can read about at and feel involved.

– And then I thought of Alton Brown, and his requirement of every tool in his kitchen to be a “multitasker”. Alton has done a lot to hack kitchen tools (and non-kitchen tools) for the purpose of cooking. This was a tangential thought. Though the success of Good Eats speaks to the popularity of this approach.

– I started wondering if it’s valuable to distinguish between hacking products and hacking media. Jonah Brucker-Cohenand Lalya Gaye strike me as product hackers. Dan Hill, through his work with BBC Radio online, addressed more media hacking — blogs, BBC radio feeds, etc. Similarly, Elizabeth discussed the Billboard Liberation Front.

Though, as I’m typing these notes, I’m seeing the distinctions between the two blur. Things like Steam are products for hacking media. But, I guess, for me, I see hacking media as far more accessible than hacking products.

– Hackability Happens. This was a theme, though not necessarily stated explicitly. Designers need to recognize that people will modify their products to adapt to their personal needs, contexts. Period.

– However, currently, hackability is kind of a privilege. You need to have the savvy and the time to hack. And while the barriers are dropping, they are still significant. I fear that, in this strive for hackability, we’ll create a new set of haves and havenots… I mean, we see this already. People who can hack have a distinct advantage over those who can’t. This relates a bit to my post on Shit Is Too Hard To Use. I’ve been watching people attempt to use products that require a significant level of technical savvy. And people are feeling overwhelmed by these technical requirements.

– So, for me, what I realized would come out of this notion of “design for hackability” is a pattern language for hackability. Given that users will configure their products, and, if I want to be a responsible designer, I want to support and enable such configuration, what are ways and approaches I can take to accommodate hackability. What are the qualities of hackable systems?