balance_of_opposites.mdwn (3934B)
1 **Balance of opposites** is important in many permacomputing contexts. 2 3 Many people have a tendency to form dichotomies where one side is somehow 4 "the good one" whereas the other is the "bad" or even "evil" one. Sometimes, 5 the good side is considered so good that it becomes a [[silver bullet]], 6 something that is supposed to be universally good in all cases. 7 8 Balance of opposites can be used to eliminating this kind of black-and-white 9 oversimplification. There are very few things or ideas that are either 10 "good" or "evil" in all possible contexts. Instead of bluntly stating that 11 an idea or a piece of technology is "the best" or "just evil", one should 12 try to delineate the contexts where it works and where it does not. 13 14 ## Yin and yang 15 16 **Yin and Yang** (陰陽) are concepts from Chinese philosophy. Yang is 17 active, controlling and expanding, while Yin is passive, yielding and 18 contracting. They are not "good and evil" but complementary opposites that 19 should have a balance, often via cyclic changes. 20 21 In permacomputing contexts, the Yin-Yang dichotomy is sometimes used to 22 contrast different computing cultures. Modern technological civilization is 23 disproportionally yang, and this yangness extends to the cultures of 24 computer hacking: total control over systems (natural or technological) is 25 praised, which easily leads to impoverished [[monoculture]]s where a lot of 26 energy is wasted on forcing things into narrow standards. 27 28 Too much yin, on the other hand, may lead to an excessive acceptance of the 29 way how things are and "have always been". It likewise easily leads to 30 narrow norms, via traditionalism. The norms may be hostile to innovation, 31 experimentation and reappropriation. It may also lead to intellectual 32 laziness, where rational analysis is not even attempted. 33 34 ## Yin and yang hacking 35 36 These concepts were introduced in the [[Permacomputing 2020]] text. 37 38 In **Yang hacking**, a total understanding and control of the target system 39 is valued. Changing a system's behavior is often an end in itself. There are 40 predefined goals the system is pushed towards. Optimization tends to focus 41 on a single measurable parameter. Finding a system's absolute limits is more 42 important than finding its individual strengths or essence. 43 44 In contrast, **Yin hacking** accepts the aspects that are beyond rational 45 control and comprehension. Rationality gets supported by intuition. The 46 relationship with the system is more bidirectional, emphasizing 47 experimentation and observation. The "personality" that stems from 48 system-specific peculiarities gets more attention than the measurable specs. 49 It is also increasingly important to understand when to hack and when just 50 to observe without hacking. 51 52 Yang hacking is quite essential to computing. After all, computers are based 53 on comprehensible and deterministic models that tiny pieces of nature are 54 "forced" to follow. However, there are many kinds of systems where the yin 55 way makes more sense (e.g. the behavior of neural networks is often very 56 difficult to analyze rationally). 57 58 ## Transgression and immersion 59 60 **Transgression** and **immersion** are two oppositional ways to creatively 61 relate to constraints, especially in the kind of digital art forms that 62 appreciate constraints ([[chip music]], [[demoscene]], [[pixel art]]). 63 64 Transgression is yang: it attempts to "break" or "push" the boundaries; to 65 get a system to do something it is not supposed to be able to do; to find 66 new things by exploring the unexplored possibilities of a given platform. 67 The characteristic sounds and looks of a system (such as the 1:1 square wave 68 in chip music, or clearly visible pixel boundaries) are often considered 69 unrefined and unwanted. 70 71 Immersion is yin: instead of breaking away from the typical and unrefined, 72 it takes it as the basis to build on. The 1:1 square wave is now very much 73 wanted. The individual characteristics of a system are appreciated and 74 explored ever deeper. 75